24,515 research outputs found
The Influence of Personality on Code Reuse
The ubiquity and necessity of computer software requires programmers to reuse extant code to keep up with increasing software demands. Researchers have started to investigate the underlying psychological processes and the programmer characteristics affecting code reuse. The present study investigated the role of programmer personality (propensity to trust, suspicion propensity) on willingness to reuse code. Programmers were recruited through Amazon’s Mechanical Turk. Programmers completed propensity to trust and suspicion personality inventories and were subsequently presented with 18 pieces of computer code containing transparency and reputation manipulations. The results demonstrated that propensity to trust did not influence willingness to reuse code. However, facets of suspicion propensity did affect reuse willingness. Programmers lower in trait mal-intent perceptions and higher in cognitive activity were more likely to report they would reuse code. Implications and applications are discussed
A Reputation Economy: Results from an Empirical Survey on Academic Data Sharing
Academic data sharing is a way for researchers to collaborate and thereby
meet the needs of an increasingly complex research landscape. It enables
researchers to verify results and to pursuit new research questions with "old"
data. It is therefore not surprising that data sharing is advocated by funding
agencies, journals, and researchers alike. We surveyed 2661 individual academic
researchers across all disciplines on their dealings with data, their
publication practices, and motives for sharing or withholding research data.
The results for 1564 valid responses show that researchers across disciplines
recognise the benefit of secondary research data for their own work and for
scientific progress as a whole-still they only practice it in moderation. An
explanation for this evidence could be an academic system that is not driven by
monetary incentives, nor the desire for scientific progress, but by individual
reputation-expressed in (high ranked journal) publications. We label this
system a Reputation Economy. This special economy explains our findings that
show that researchers have a nuanced idea how to provide adequate formal
recognition for making data available to others-namely data citations. We
conclude that data sharing will only be widely adopted among research
professionals if sharing pays in form of reputation. Thus, policy measures that
intend to foster research collaboration need to understand academia as a
reputation economy. Successful measures must value intermediate products, such
as research data, more highly than it is the case now
Study of Tools Interoperability
Interoperability of tools usually refers to a combination of methods and techniques that address the problem of making a collection of tools to work together. In this study we survey different notions that are used in this context: interoperability, interaction and integration. We point out relation between these notions, and how it maps to the interoperability problem.
We narrow the problem area to the tools development in academia. Tools developed in such environment have a small basis for development, documentation and maintenance. We scrutinise some of the problems and potential solutions related with tools interoperability in such environment. Moreover, we look at two tools developed in the Formal Methods and Tools group1, and analyse the use of different integration techniques
Recommended from our members
Using Learning Analytics to Implement Evidence-Based Interventions to Support Ethnic Minority and International Student Social Integrations
As universities in the UK become increasingly diverse, one common challenge is how best to socially integrate ethnic minority and international students into the classroom and larger campus. Indeed, research currently demonstrates that students most often form social and learning connections with peers from the same ethnicity or culture, despite the benefits of intergroup connections. However, few studies have looked at student social networks to determine how they influence actual behaviours in group learning activities. In this research, Social Network Analysis and Learning Analytics methods will be used to explore the role of social networks in classroom participation and attainment for ethnic minority and international students, highlighting replicable interventions that can help promote social cohesion in the UK
A Classification of Scripting Systems for Entertainment and Serious Computer Games
The technology base for modern computer games is usually provided by a game engine. Many game engines have built-in dedicated scripting languages that allow the development of complete games that are built using those engines, as well as extensive modification of existing games through scripting alone. While some of these game engines implement proprietary languages, others use existing scripting systems that have been modified according to the game engine's requirements. Scripting languages generally provide a very high level of abstraction method for syntactically controlling the behaviour of their host applications and different types of scripting system allow different types of modification of their underlying host application. In this paper we propose a simple classification for scripting systems used in computer games for entertainment and serious purposes
Recommended from our members
What motivates academic dishonesty in students? A reinforcement sensitivity theory explanation
BACKGROUND: Academic dishonesty (AD) is an increasing challenge for universities worldwide. The rise of the Internet has further increased opportunities for students to cheat.
AIMS: In this study, we investigate the role of personality traits defined within Reinforcement Sensitivity Theory (RST) as potential determinants of AD. RST defines behaviour as resulting from approach (Reward Interest/reactivity, goal-drive, and Impulsivity) and avoidance (behavioural inhibition and Fight-Flight-Freeze) motivations. We further consider the role of deep, surface, or achieving study motivations in mediating/moderating the relationship between personality and AD.
SAMPLE: A sample of UK undergraduates (N = 240).
METHOD: All participants completed the RST Personality Questionnaire, a short-form version of the study process questionnaire and a measure of engagement in AD, its perceived prevalence, and seriousness.
RESULTS: Results showed that RST traits account for additional variance in AD. Mediation analysis suggested that GDP predicted dishonesty indirectly via a surface study approach while the indirect effect via deep study processes suggested dishonesty was not likely. Likelihood of engagement in AD was positively associated with personality traits reflecting Impulsivity and Fight-Flight-Freeze behaviours. Surface study motivation moderated the Impulsivity effect and achieving motivation the FFFS effect such that cheating was even more likely when high levels of these processes were used.
CONCLUSIONS: The findings suggest that motivational personality traits defined within RST can explain variance in the likelihood of engaging in dishonest academic behaviours
Trust perceptions of metadata in open-source software: The role of performance and reputation
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Open-source software (OSS) is a key aspect of software creation. However, little is known about programmers’ decisions to trust software from OSS websites. The current study emulated OSS websites and manipulated reputation and performance factors in the stimuli according to the heuristic-systematic processing model. We sampled professional programmers—with a minimum experience of three years—from Amazon Mechanical Turk (N = 38). We used a 3 × 3 within-subjects design to investigate the relationship between OSS reputation and performance on users’ time spent on code, the number of interface clicks, trustworthiness perceptions, and willingness to use OSS code. We found that participants spent more time on and clicked the interface more often for code that was high in reputation. Meta-information included with OSS tools was found to affect the degree to which computer programmers interact with and perceive online code repositories. Furthermore, participants reported higher levels of perceived trustworthiness in and trust toward highly reputable OSS code. Notably, we observed fewer significant main effects for the performance manipulation, which may correspond to participants considering performance attributes mainly within the context of reputation-relevant information. That is, the degree to which programmers investigate and then trust OSS code may depend on the initial reputation ratings
Aerospace medicine and biology: A continuing bibliography with indexes, supplement 184
This bibliography lists 139 reports, articles, and other documents introduced into the NASA scientific and technical information system in August 1978
- …