What is trust in a recommender for software development? Gail C. MurphyEmerson Murphy-Hill University of British Columbia Tasktop Technologies Inc.

Slides:



Advertisements
Similar presentations
Chapter 14: Usability testing and field studies
Advertisements

Marc Gold & Associates© 4101 Gautier-Vancleave Rd. Ste. 102 Gautier, MS (228) Discovery and Customization The Touchstone of Customization:
Set your Sales The Selling Process.
Alina Pommeranz, MSc in Interactive System Engineering supervised by Dr. ir. Pascal Wiggers and Prof. Dr. Catholijn M. Jonker.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
CHAPTER 1 WHAT IS RESEARCH?.
HOW DO PROFESSIONAL DEVELOPERS COMPREHEND TO SOFTWARE Report submitted by Tobias Roehm, Rebecca Tiarks, Rainer Koschke, Walid Maalej.
25 Steps to Successful Discovery and Customization
1 COMM 301: Empirical Research in Communication Kwan M Lee Lect1_1.
Learning and Teaching Conference 2012 Skill integration for students through in-class feedback and continuous assessment. Konstantinos Dimopoulos City.
Were Kettle’s Sales Calls Effective In Tesco? Nigel Marriott Chartered Statistician May 2007.
The Proposal Review Process Matt Germonprez Mutual of Omaha Associate Professor ISQA College of IS&T.
Presenter: Kay Fenton UNITEC Institute of Technology Auckland, New Zealand.
Third Party Advertising Evaluation: American Express eStatement Topline July 2008.
Peer Interaction Effectively, yet Infrequently, Enables Programmers to Discover New Tools Emerson Murphy-Hill North Carolina State University Gail Murphy.
WASC: Street Interviews Summary of Report Prepared by Kaye Bragg, Ph.D. Director of the CSUB Assessment Center Summary of Report Prepared by Kaye Bragg,
Return On Investment Integrated Monitoring and Evaluation Framework.
Redesigning the Graphical Interface of the CreativeEDU Web Application By Ulysses Lamont Cannon & Hínár György Polczer INLS S ummer 2006.
Chapter 12 The Counseling Interview. © 2009 The McGraw-Hill Companies, Inc. All rights reserved. Chapter Summary Preparing for the Counseling Interview.
Visual Basic Prototyping Visual Basic uses both a Visual Editor and is Code Based. With several simple lines of code, Visual Basic will navigate between.
Info /7 DMU1 The story so far… Systems Analysis & Design Academic Year 2008/9 Lecture 10.
Educational Media Research Centre (EMRC). ECE Department. EdTech2004: The Fifth Annual Irish Educational Technology Users' Conference Institute of Technology.
Developing introductory training in R Ria Sanderson, Duncan Elliott, ONS.
Knowledge is Power Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
1 Lecture 6 The Systems Analyst (Role and activities) Systems Analysis & Design Academic Year 2008/9.
5E INQUIRY LEARNING CYCLE. EngageExplore ExplainElaborate Evaluate.
European Forum for Primary Care Goteborg 2-4 Sep 2012 Integrating online communities and social networks with computerised treatment for insomnia: a qualitative.
LSSU Faculty Center for Teaching Friday, October 3, 2014 Classroom Visits for Peer Evaluation.
Holland Central School District New Teacher Mentoring Program Introduction.
Chapter 4: Beginning the Analysis: Investigating System Requirements
Chapter 12 The Counseling Interview Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Asynchronous Discussions and Assessment in Online Learning Vonderwell, S., Liang, X., & Alderman, K. (2007). Asynchronous Discussions and Assessment in.
Reflecting on Reflection: Making it Work
Learners’ Attitudes and Perceptions of Online Instruction Presented by: Dr. Karen S. Ivers Dr. JoAnn Carter-Wells Dr. Joyce Lee California State University.
Research on the Interaction Between Human and Machines University of Houston-Clear Lake Tasha Y. David.
Planning and Integrating Curriculum: Unit 4, Key Topic 1http://facultyinitiative.wested.org/1.
INTRODUCTION TO BLENDED LEARNING Bill Wisser, Ph.D. Simmons College 24 April 2012.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Teaching Study Skills Suggestions from Introductory-Level Classes with Major and Non majors Katryn Wiese – City College of San Francisco.
BACKGROUND The Web is a global information resource Web users that seek information vary, culturally and ethnically Users of different cultural backgrounds.
IST 210: Organization of Data
Project Management Cross lifecycle Activity
Evaluation School Year Review. Evaluation Intent  Collaborative process to support professional growth  Conversations and reflection should.
Record Authenticity as a Measure of Trust: A View Across Records Professions, Sectors, and Legal Systems Corinne Rogers University of British Columbia.
1  [company] Inc. [year] Girl Scouts of the USA Secure Site Project Kickoff [date]
By Godwin Alemoh. What is usability testing Usability testing: is the process of carrying out experiments to find out specific information about a design.
Research methods 16 th January Research methods Important to have a clear focus for your research. Hypothesis Question Grounded data.
The Use of Formative Evaluations in the Online Course Setting JENNIFER PETERSON, MS, RHIA, CTR DEPARTMENT OF HEALTH SCIENCES.
BACKGROUND The Web is a global information resource Web users that seek information vary, culturally and ethnically Users of different cultural backgrounds.
GIT 6 Update on Local Leadership Management Strategy Local Leadership management strategy submitted on December 15 th to Bay Program Office Management.
3-Feb-2002Sid Maxwell ( )1 Using the Remote: A Contextual Inquiry Inquiry ‘in situ’ –family room (Cable, TV, VCR, DVD) –master bedroom (Cable, TV)
Mentoring Presentation for the Boston Chapter of the Association of Government Accountants January 21, 2016 All rights reserved. Copyright © Management.
Aims: Teach the applications of Javascript Explained examples User friendly.
Data gathering (Chapter 7 Interaction Design Text)
Assessment Procedures for Counselors and Helping Professionals, 7e © 2010 Pearson Education, Inc. All rights reserved. Chapter 16 Communicating Assessment.
IST 210: ORGANIZATION OF DATA Introduction IST210 1.
How the resort of Puerto Pollensa in Mallorca is establishing itself as a winter tourism destination By Hannah Logan BA (Hons) Travel and Tourism Management.
Research and Development Dr Julie Hankin Medical Director.
Software Engineering Session 12 INFM 603. Software Software represents an aspect of reality –Input and output represent the state of the world –Software.
Ink-Tutoring Sungjoon Steve Won School of Computer Science Human-Computer Interaction Institute.
Kathleen Hayes, PhD Candidate.
Customer Insights Group 3 - Cell Phone
Management Mentors, Inc.
SWE-795 Presentation 01 11/16/2018 Asking and Answering Questions during a Programming Change Task Jonathan Sillito, Member, IEEE Computer Society, Gail.
Qualitative Data Analysis Week 2
LinkedIn Basics Monica Dombrowski Technology Education Manager
Used to help design comfortable efficient products
Research methods in sociology
Don’t just listen to music; listen to people
Presentation transcript:

What is trust in a recommender for software development? Gail C. MurphyEmerson Murphy-Hill University of British Columbia Tasktop Technologies Inc.

ICSE recommender B recommender A recommender C recommender D recommender n+1

ICSE study 1 study 2 recommender of development tools interviews about how professionals learn tools 3 rd year students in multi-week case study 18 professional developers for an hour each

study 1 - Spyglass ICSE 20104

study 1 - Spyglass ICSE longitudinal user study - effective in helping a developer discover previously unknown useful tools? - effective in encouraging a developer to use a previously unknown tool? - explore source code more efficiently? - notification mechanism obtrusive? 9 participants for ~ 3 weeks

study 1 - Spyglass ICSE longitudinal user study - effective in helping a developer discover previously unknown useful tools? - effective in encouraging a developer to use a previously unknown tool? - explore source code more efficiently? - notification mechanism obtrusive? 9 participants for ~ 3 weeks

1. timing affects trust ICSE inefficient navigation Spyglass notifies recommendation available developer investigates recommendation

study 2 – tool discovery ICSE interviews - how do developers discover tools - focus on social discovery between peers (peer recommendation & peer observation) 18 professional developers, 1 hour interviews

2. social trust eases uptake ICSE “I’ve known them for a while and how they get things done, so I can translate that to how I get things done” “If you can get a feel for people that you know, either because you know them online […] or in person […] you have a pretty good estimate of what your reaction will be”

3. trust trumps precision ICSE “Honestly; I bet the [recommender] would have better success rate [than a peer] at recommending things that I would like, but that doesn’t mean that I would trust the [recommender] more”

establishing trust ICSE prior interaction seems key can trust be borrowed from a peer? can trust be sidestepped? make it feel like discovery rather than suggestion

establishing trust ICSE prior interaction seems key can trust be borrowed from a peer? can trust be sidestepped? make it feel like discovery rather than suggestion what do/would you trust? what makes you trust the source?