SlideShare uma empresa Scribd logo
1 de 62
Soo Ling Lim*, Daniele Quercia † , and Anthony Finkelstein* *University College London and  † MIT SENSEable City Lab Using Social Networks to Analyse the Stakeholders of Large-Scale Software Projects
 
 
 
Stakeholder
Guildford, UK ©  River Wey
Software project failure rate FAILURE SUCCESS CHAOS Report, The Standish Group International, Inc.
Identify  Prioritise
Build a   Stake holder   Net work
Step 1: Find initial stakeholders Users Developers Legislators Decision-makers
Step 2: Get recommendations
Step 2: Get recommendations <Alice, Director of Estates, 4>
Step 3: Draw social network
Step 3: Draw social network Alice
Step 3: Draw social network Alice Carl Bob
Step 3: Draw social network Alice Carl Bob
Step 4: Apply social network measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Research Questions ,[object Object],[object Object],[object Object],[object Object],RQ RQ RQ RQ
RALIC: UCL Access Control Project
Stakeholder Details
OpenR
ClosedR
Top 20 Stakeholders
Existing Method StakeNet lists
Existing Method Ground Truth list StakeNet lists
Existing Method Ground Truth list StakeNet lists Existing Method list
Example Stakeholder List 4 UCL visitor Dave 3 Student Carl 2 Head of Security Bob 1 Director of Estates Alice Priority Stakeholder Role Stakeholder
RQ1a. Identify stakeholder roles Found them! Omitted external library users 90% 89% Precision 90% 40% Recall StakeNet Existing Method
RQ1b. Prioritise stakeholder roles Accuracy ( ρ )
RQ2. Identify and prioritise stakeholders 57% 91% Out-degree 66% 91% In-degree 65% 91% Degree 78% 87% PageRank 56% 91% Closeness 52% 92% Betweenness No prioritisation 47% Existing method Prioritisation (Accuracy ) Identification (Recall)
RQ2. Identify and prioritise stakeholders Security and Access Systems
RQ2. Identify and prioritise stakeholders Security and Access Systems
RQ2. Identify and prioritise stakeholders Security and Access Systems
RQ2. Identify and prioritise stakeholders Security and Access Systems StakeNet List
RQ3. OpenR vs. ClosedR Identify stakeholder roles 95% 90% Precision 60% 90% Recall ClosedR OpenR
RQ4. StakeNet vs. Individuals legislators users developers directors managers StakeNet Accuracy ( ρ) 85%
StakeSource Tool
StakeSource Tool www.stakesource.co.uk
Current & Future Work + Different projects + Collaborative filtering + Network change over time + Prioritise across various issues
Soo Ling Lim [email_address] Daniele Quercia [email_address] Anthony Finkelstein [email_address] www.stakesource.co.uk
Extra Slides
StakeNet’s Output
Data Size
68 surveys
Open-ended Recommendations 4463 recommendations 127 stakeholders
Closed-ended Recommendations 839 recommendations 76 stakeholders
Existing Method Ground Truth
Building Ground Truth ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
85 stakeholders 62 roles
Existing Method Ground Truth StakeNet
Open-ended:  127 stakeholders  70 roles Closed-ended: 67 stakeholders  39 roles
Existing Method Ground Truth StakeNet Existing Method
 
 
 
18 stakeholders 28 roles
Precision & Recall
OpenR vs. ClosedR
Decision Tree
RQ5. Motivation to recommend 81% responded
Identify stakeholder roles It was established that there were 17,000 “external” library members who would require new cards if the Library turnstiles were to be de-commissioned.  The Board decided that  this objective   should be removed  as the associated costs and complications far outweighed the benefits. “ ” Post implementation report
Identify stakeholder roles

Mais conteúdo relacionado

Mais procurados

Characterizing and Detecting Integrity Issues in OWL Instance Data
Characterizing and Detecting Integrity Issues in OWL Instance DataCharacterizing and Detecting Integrity Issues in OWL Instance Data
Characterizing and Detecting Integrity Issues in OWL Instance Data
Jie Bao
 
Uncovering hidden relationships from past changes: evolutionary dependencies ...
Uncovering hidden relationships from past changes: evolutionary dependencies ...Uncovering hidden relationships from past changes: evolutionary dependencies ...
Uncovering hidden relationships from past changes: evolutionary dependencies ...
Marco Aurelio Gerosa
 

Mais procurados (6)

Interventionist-methods - Methods in user-technology studies
Interventionist-methods - Methods in user-technology studiesInterventionist-methods - Methods in user-technology studies
Interventionist-methods - Methods in user-technology studies
 
Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016
 
Findability through Traceability - A Realistic Application of Candidate Tr...
Findability through Traceability  - A Realistic Application of Candidate Tr...Findability through Traceability  - A Realistic Application of Candidate Tr...
Findability through Traceability - A Realistic Application of Candidate Tr...
 
Characterizing and Detecting Integrity Issues in OWL Instance Data
Characterizing and Detecting Integrity Issues in OWL Instance DataCharacterizing and Detecting Integrity Issues in OWL Instance Data
Characterizing and Detecting Integrity Issues in OWL Instance Data
 
Mining Software Repositories
Mining Software RepositoriesMining Software Repositories
Mining Software Repositories
 
Uncovering hidden relationships from past changes: evolutionary dependencies ...
Uncovering hidden relationships from past changes: evolutionary dependencies ...Uncovering hidden relationships from past changes: evolutionary dependencies ...
Uncovering hidden relationships from past changes: evolutionary dependencies ...
 

Semelhante a ICSE10 StakeNet Talk

Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...
Lucy McKenna
 
SGCI - The Science Gateways Community Institute: International Collaboration ...
SGCI - The Science Gateways Community Institute: International Collaboration ...SGCI - The Science Gateways Community Institute: International Collaboration ...
SGCI - The Science Gateways Community Institute: International Collaboration ...
Sandra Gesing
 
Privacy Concerns vs. User Behavior in Community Question Answering
Privacy Concerns vs. User Behavior in Community Question AnsweringPrivacy Concerns vs. User Behavior in Community Question Answering
Privacy Concerns vs. User Behavior in Community Question Answering
Nicolas Kourtellis
 

Semelhante a ICSE10 StakeNet Talk (20)

Open science - Science 2.0
Open science - Science 2.0Open science - Science 2.0
Open science - Science 2.0
 
Rhea: Adaptively Sampling Authoritative Content from Social Activity Streams
Rhea: Adaptively Sampling Authoritative Content from Social Activity StreamsRhea: Adaptively Sampling Authoritative Content from Social Activity Streams
Rhea: Adaptively Sampling Authoritative Content from Social Activity Streams
 
supporting communities in an increasingly decentralized biomedical research e...
supporting communities in an increasingly decentralized biomedical research e...supporting communities in an increasingly decentralized biomedical research e...
supporting communities in an increasingly decentralized biomedical research e...
 
Network Visualization & Analysis - An Overview
Network Visualization & Analysis - An OverviewNetwork Visualization & Analysis - An Overview
Network Visualization & Analysis - An Overview
 
Sgci nsf-2-22-17
Sgci nsf-2-22-17Sgci nsf-2-22-17
Sgci nsf-2-22-17
 
Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...
 
Conference talk: On the Privacy of Frequently Visited User Locations
Conference talk: On the Privacy of Frequently Visited User LocationsConference talk: On the Privacy of Frequently Visited User Locations
Conference talk: On the Privacy of Frequently Visited User Locations
 
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)DevOps Support for an Ethical Software Development Life Cycle (SDLC)
DevOps Support for an Ethical Software Development Life Cycle (SDLC)
 
The New Metrics: conference presentation
The New Metrics: conference presentationThe New Metrics: conference presentation
The New Metrics: conference presentation
 
Ucsd research-it-09-11-18
Ucsd research-it-09-11-18Ucsd research-it-09-11-18
Ucsd research-it-09-11-18
 
Modeling the Impact of R & Python Packages: Dependency and Contributor Networks
Modeling the Impact of R & Python Packages: Dependency and Contributor NetworksModeling the Impact of R & Python Packages: Dependency and Contributor Networks
Modeling the Impact of R & Python Packages: Dependency and Contributor Networks
 
SGCI - The Science Gateways Community Institute: International Collaboration ...
SGCI - The Science Gateways Community Institute: International Collaboration ...SGCI - The Science Gateways Community Institute: International Collaboration ...
SGCI - The Science Gateways Community Institute: International Collaboration ...
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Purdue unal iron hacks 2018 spring - award ceremony
Purdue unal iron hacks 2018 spring - award ceremonyPurdue unal iron hacks 2018 spring - award ceremony
Purdue unal iron hacks 2018 spring - award ceremony
 
Immersive Recommendation
Immersive RecommendationImmersive Recommendation
Immersive Recommendation
 
A Customisable Pipeline for Continuously Harvesting Socially-Minded Twitter U...
A Customisable Pipeline for Continuously Harvesting Socially-Minded Twitter U...A Customisable Pipeline for Continuously Harvesting Socially-Minded Twitter U...
A Customisable Pipeline for Continuously Harvesting Socially-Minded Twitter U...
 
Biocatalogue Talk Slides
Biocatalogue Talk SlidesBiocatalogue Talk Slides
Biocatalogue Talk Slides
 
Privacy Concerns vs. User Behavior in Community Question Answering
Privacy Concerns vs. User Behavior in Community Question AnsweringPrivacy Concerns vs. User Behavior in Community Question Answering
Privacy Concerns vs. User Behavior in Community Question Answering
 
ThesisPresentation
ThesisPresentationThesisPresentation
ThesisPresentation
 
Purdue unal iron hacks 2019 spring - award ceremony (1)
Purdue unal iron hacks 2019 spring - award ceremony (1)Purdue unal iron hacks 2019 spring - award ceremony (1)
Purdue unal iron hacks 2019 spring - award ceremony (1)
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

ICSE10 StakeNet Talk

Notas do Editor

  1. 22
  2. What is the relationship
  3. salience
  4. 15 minutes
  5. Explain why (existing methods usually don’t have specific representatives of some roles)