Who Are the “End Users”? Mary Shaw Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
1 End User Software Engineering Mary Shaw Carnegie Mellon University.
Advertisements

Notes from WEUSE IV Discussions. Notes Carolyn Seaman, UMBC. Bioinformatics, big spectrum, part of it is EUP. Interested in EUSE. Malea Umarji, UMBC,
Debugging in End- User Software Engineering summarized by Andrew Ko Toward Sharing Reasoning to Improve Fault Localization in Spreadsheets Joey Lawrance,
3rd Campus Grid SIG Meeting. Agenda Welcome OMII Requirements document Grid Data Group HTC Workshop Research Computing SIG? AOB Next meeting (AG)
A PowerPoint Presentation
Programming Paradigms and languages
17136C Understanging Buyers Ch.04 Organisational buying behaviour Section A:True or False.
Hypothesis Testing Part I – As a Diagnostic Test.
 Running are a method of recording a student’s reading behavior. Running Records provide teachers with information that can be analyzed to determine.
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Aging Users are Still Users Today’s tech-savvy boomers will remain comfortable with technology as they age, though they may need different interfaces.
Search Engines and Information Retrieval
Carving up the Space of End User Programming EUSES, Lincoln, NE, Oct ‘05.
CS 345A Data Mining Lecture 1
SE 450 Software Processes & Product Metrics Reliability: An Introduction.
Estimating the Numbers of End Users and End User Programmers Christopher Scaffidi Brad Myers Mary Shaw Carnegie Mellon University EUSES Consortium VL/HCC.
6/16/20151 Recent Results in Automatic Web Resource Discovery Soumen Chakrabartiv Presentation by Cui Tao.
Like any machine, a website is the sum of its parts. Web analytics are the tools used to transform ordinary sites into high performance money making machines.
Dimensions Characterizing Programming Feature Usage by Information Workers Christopher Scaffidi, Andrew Ko, Brad Myers, Mary Shaw Carnegie Mellon University.
© 2002 McGraw-Hill Companies, Inc., McGraw-Hill/Irwin TURNING MARKETING INFORMATION INTO ACTION.
Sampling Prepared by Dr. Manal Moussa. Sampling Prepared by Dr. Manal Moussa.
Technische Universität München The influence of software quality requirements on the suitability of software cost estimation methods 24th International.
Beyond EUP to EUSE Mary Shaw Carnegie Mellon University.
Science and Engineering Practices
Using Situational awareness and decision making
Social Media Challenges Corporate Environment. Traditional Businesses Can’t Ignore It  Using small business social media brings its own challenges of.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
Business Driven Technology Unit 4
1 Project Management Principles Coursework Assignment: Things to pay attention to, for the report and the oral presentation...
SOCIAL MEDIA FOR BUSINESS reqSmart. Some Facts about Social Media - I Years to reach 50 million users. Radio – 38 years Television – 13 years Internet.
What is Software Engineering? the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software”
Sociological Research Methods and Techniques
Defining the Research Problem
Search Engines and Information Retrieval Chapter 1.
What Our Students Need Most The 7 Fundamental Conditions of Learning.
CWIC Developers Meeting January 29 th 2014 Calin Duma Service Level Agreements High-Availability, Reliability and Performance.
Kristina Lerman Aram Galstyan USC Information Sciences Institute Analysis of Social Voting Patterns on Digg.
1 Predict & Prevent Workplace Injuries Cary Usrey Implementation Manager.
What are the main differences and commonalities between the IS and DA systems? How information is transferred between tasks: (i) IS it may be often achieved.
Heuristic evaluation Functionality: Visual Design: Efficiency:
Mining the Web to Create Minority Language Corpora Rayid Ghani Accenture Technology Labs - Research Rosie Jones Carnegie Mellon University Dunja Mladenic.
This material is approved for public release. Distribution is limited by the Software Engineering Institute to attendees. Sponsored by the U.S. Department.
“Learn It! Live It!” Ensuring the Workforce Readiness Skills and Behaviors of Today’s and Tomorrow’s Workers Quality Enhancement Plan Faculty Training.
Supporting Researchers and Institutions in Exploiting Administrative Databases for Statistical Purposes: Istat’s Strategy G. D’Angiolini, P. De Salvo,
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
Hawaii Clean Energy Initiative Online Presence. Social Media Best Practices Leverage Networks Generate “noise” Influence Search Expand Reach.
Case-Based Authentic Assessment Applications within Wikis Maya Israel Andrew Moshirnia Susan Anderson ED-Media Summer, 2008.
Project Estimation techniques Estimation of various project parameters is a basic project planning activity. The important project parameters that are.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
Framework for Interactive Applications Matthew Korchinsky Advisor: Aaron Cass Senior Project – Computer Engineering – 2006 Abstract The Java language was.
Hawaii Clean Energy Initiative Online Presence. Social Media Best Practices Leverage Networks Generate “noise” Influence Search Expand Reach.
HAWAII CLEAN ENERGY INITIATIVE ONLINE PRESENCE Cover goes here.
Website design and structure. A Website is a collection of webpages that are linked together. Webpages contain text, graphics, sound and video clips.
Public Relations & Social Media
Public Relations and the Net Moving into the World of Cyberspace.
Advanced Software Engineering Lecture 4: Process & Project Metrics.
CS223: Software Engineering Lecture 4: Software Development Models.
Cs Future Direction : Collaborative Filtering Motivating Observations:  Relevance Feedback is useful, but expensive a)Humans don’t often have time.
Errors in Reasoning. Fallacies A Fallacy is “any error in reasoning that makes an argument fail to establish its conclusion.” There are two kinds of fallacies.
Social Information Processing March 26-28, 2008 AAAI Spring Symposium Stanford University
Definition: a statement that is put forward as the basis of something to be proved What is a Thesis Statement?
Turning Software into a Service – The Critique Paul Kopacz Brian Moore.
Lesson Planning in the Elementary Classroom By: Sara Peck.
Presented By: Madiha Saleem Sunniya Rizvi.  Collaborative filtering is a technique used by recommender systems to combine different users' opinions and.
Standards for Decision Making
22C:145 Artificial Intelligence
Teacher Configurable Coding Challenges for Block Languages
Testing Hypotheses about Proportions
WRITE MARKETING COPY and EXECUTE TARGETED S
Web Mining Ref:
Presentation transcript:

Who Are the “End Users”? Mary Shaw Carnegie Mellon University

There are lots of EUs C. Scaffidi, M. Shaw, and B. Myers. Estimating the Numbers of End Users and End User Programmers. VL/HCC'05: Proc 2005 IEEE Symposium on Visual Languages and Human-Centric Computing, pp , Using data from the Bureau of Labor Statistics, we estimate that over 90M Americans will use computers at work in Of these, only about 2.5M will be professional programmers; 40.5M will be managers and (non-software) professionals. This does not include home users or non-US users, so there will be many more than 90M total end users. Most of them will “program” in some way.

They are not all alike C. Scaffidi, Andrew Ko, B. Myers, and M. Shaw. Dimensions Characterizing Programming Feature Usage by Information Workers. VL/HCC'06: Proc2006 IEEE Symposium on Visual Languages and Human-Centric Computing, pp , Analysis of web-based survey of Information Week readers

Their skills differ, even within clusters  “Programming” can mean anything from editing spam filters to writing complex code Copying the html for a web page hit counter vs creating that html yourself  Let’s not make a sharp distinction about where “programming” starts  Let’s not lump all programming together No citation yet,

Therefore we should …  Identify some structure for the vast population of EUs Find more content clusters Create something like Bloom’s taxonomy for skill levels  Then we can profile tasks or EU groups “level 4 in macro cluster, level 2 in link cluster, …”  Then we can focus on the needs of groups with specific profiles

EUs are not SEs  EUs do not have rich and robust mental models of their computing systems they fail to do backups They misunderstand storage models (especially local vs network storage) they execute malware they innocently engage in other risky behavior.  The responses of SE to this mismatch between real computing systems and EUs’ models has been to seek ways to help the users act “rationally”.

Real EUs’ decisions are not rational  Systematic errors in frequency estimation People systematically overestimate low frequency events, overestimate high frequency events  Which is more common, murder or suicide? Memory effects: easiest retrieval is taken as fact  Recently viewed information (news) dominates collected facts (data)  Subjective judgments Peoples’ perceptions of incidence and risk are notably (and demonstrably) flawed  Simple models Simple linear functions consistently outperform experts Insensitive to coefficient values (sensitive to sign) Reid Hastie and Robyn M Dawes. Rational Choice in an Uncertain World. Sage Publications 2001 Reviewed in Reid Hastie and Robyn M Dawes. Rational Choice in an Uncertain World. Sage Publications 2001

Therefore we should …  Stop trying to “fix” the users, but instead support the ways they actually think Metainformation structures that accumulate positive and negative evidence  Develop EU SE support that supports the forms of reasoning that real people use “low-ceremony” evidence (reputation, reviews) as well as “high-ceremony” evidence (verification, testing)

End of presentation

High Ceremony Evidence  Widely accepted among computer scientists  Potentially high levels of assurance  Need precise specifications, substantial effort  The Academic Big Four – the “gold standard” Formal verification Results from trusted automatic generator Systematic testing Empirical studies in operation  And also Inspections Assurance cases, other sound certification (others from comparative analysis)

Low Ceremony Evidence  Widely available information, used informally  Largely ignored by professionals  Not suitable for high assurance, but inexpensive  Examples “best X” reports (linear functions of subjective marks) editorial reviews recommending certain components for certain contexts (cf Consumer Reports) advertising claims by vendors 3rd party reviews of vendors and products by users recommendations by co-workers auction and betting mechanisms, “wisdom of crowds”, branding, seller reputation subjective certification checklists popularity