scholarly journals How statically-typed functional programmers write code

2021 ◽  
Vol 5 (OOPSLA) ◽  
pp. 1-30
Author(s):  
Justin Lubin ◽  
Sarah E. Chasins

How working statically-typed functional programmers write code is largely understudied. And yet, a better understanding of developer practices could pave the way for the design of more useful and usable tooling, more ergonomic languages, and more effective on-ramps into programming communities. The goal of this work is to address this knowledge gap: to better understand the high-level authoring patterns that statically-typed functional programmers employ. We conducted a grounded theory analysis of 30 programming sessions of practicing statically-typed functional programmers, 15 of which also included a semi-structured interview. The theory we developed gives insight into how the specific affordances of statically-typed functional programming affect domain modeling, type construction, focusing techniques, exploratory and reasoning strategies, and expressions of intent. We conducted a set of quantitative lab experiments to validate our findings, including that statically-typed functional programmers often iterate between editing types and expressions, that they often run their compiler on code even when they know it will not successfully compile, and that they make textual program edits that reliably signal future edits that they intend to make. Lastly, we outline the implications of our findings for language and tool design. The success of this approach in revealing program authorship patterns suggests that the same methodology could be used to study other understudied programmer populations.

Author(s):  
Stephen Dann

This paper delivers a new Twitter content classification framework based sixteen existing Twitter studies and a grounded theory analysis of a personal Twitter history. It expands the existing understanding of Twitter as a multifunction tool for personal, profession, commercial and phatic communications with a split level classification scheme that offers broad categorization and specific sub categories for deeper insight into the real world application of the service.


Author(s):  
Peter Rich

Qualitative research methods have long set an example of rich description, in which data and researchers’ hermeneutics work together to inform readers of findings in specific contexts. Among published works, insight into the analytical process is most often represented in the form of methodological propositions or research results. This paper presents a third type of qualitative report, one in which the researcher’s process of coding, finding themes, and arriving at findings is the focus. Grounded theory analysis methods were applied to the interpretation of a single interview. The resulting document provides a narrative of the process one researcher followed when attempting to apply recommended methodological procedures to a single interview, providing a peek inside the black box of analysis often left unopened in final reports.


1999 ◽  
Vol 16 (2) ◽  
pp. 111-126 ◽  
Author(s):  
Leonie Wilson ◽  
Tony Ward ◽  
Leon Bakker

AbstractDriving-while-disqualified (DWD) offenders represent a significant proportion of the driving offender population, and contribute to a significant drain on governmental and societal resources. The reoffence or relapse process of recidivist DWD offending has been somewhat neglected in the past, and this paper represents a first attempt at developing an empirically generated model of this phenomenon. In this study, we undertook a grounded theory analysis of offence chain information obtained from 28 male recidivist DWD offenders. The grounded theory analysis resulted in the development of a 15-stage model of the relapse process of recidivist DWD offenders. The model identifies and describes the sequence of psychological, behavioural, and environmental factors, including mediating variables that contribute to DWD reoffending. The model was then applied to 14 new offence chains to examine its level of saturation, content validity, and inter-rater reliability. The results suggest that the model has provisional validity and adequate inter-rater reliability, and achieved a high level of saturation. The strengths and value of the model are discussed, as are its clinical and research implications.


2021 ◽  
pp. 69-94
Author(s):  
Yusuf Moosa Motara

AbstractThere is currently no way to model the high-level structural design of a functional system. Given the strong links between functional programming and mathematics, it is hypothesised that the language of mathematics can provide insight into how a functional system might be modelled. The approach is successful and both philosophy and the language of mathematics are used to identify the necessary modelling concepts and briefly outline some modelling notation alongside a small case study.


2018 ◽  
Vol 26 (4) ◽  
pp. 454-471 ◽  
Author(s):  
Simon N. Foley ◽  
Vivien Rooney

Purpose In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit their security needs. Design/methodology/approach Recognizing that the codes uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed and machine learning is used to build a Bayesian network-based policy from the subsequent (grounded theory) analysis of the interview data. Findings Using a running example – based on a social psychology research study centered around photograph sharing – the paper demonstrates that in principle, qualitative research techniques can be used in a systematic manner to elicit security policy requirements. Originality/value While in principle qualitative research techniques can be used to elicit user requirements, the originality of this paper is a systematic methodology and its mapping into what is actionable, that is, providing a means to generate a machine-interpretable security policy at the end of the elicitation process.


Psychotherapy ◽  
2016 ◽  
Vol 53 (1) ◽  
pp. 78-89 ◽  
Author(s):  
Tomas Rihacek ◽  
Ester Danelova

2018 ◽  
Vol 9 (01) ◽  
Author(s):  
Naina Kapoor ◽  
Shifa Rahman ◽  
Tejinder Kaur

Research on happiness seems to be blooming in current academics. Psychology's engagement with psychopathology left no space for this concept to come to the fore. With rapid changes in the academic world, together with the shift in the focus towards more positive concepts has resulted in a renewed interest in the concept of happiness. The domain of qualitative research seeks to explore the diverse human experiences and the present study uses this domain to understand the subjective meaning of happiness in adolescent students. Using a qualitative approach, twenty adolescents were asked to share their life experiences using a semi structured interview schedule. A grounded theory analysis revealed that happiness forms a core concern for an individual where it depends not only on the cultural norm involving an individual where social relationships form an important part, but also goals and aims (s) he/she wishes to achieve in life. It exists in temporality but is impacted by the larger dimension of meaning in life which is relatively stable and covers a huge expanse of an individual's existence. Finding happiness in life involves both personal goals such as self growth and attainment of peace, and also professional goals like fulfilment of one's academic aim. Happiness is also seen as being impacted by an individual's past happenings, belief in selfworth and social responsibility. Analysis of the findings thus points to the fact that meaning of happiness varies across individuals, however, the essence remains the same for a given culture. The consideration of the emic approach not only creates sound knowledge, but also leads to a holistic understanding of human affairs.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Elizabeth Ford ◽  
Natalie Edelman ◽  
Laura Somers ◽  
Duncan Shrewsbury ◽  
Marcela Lopez Levy ◽  
...  

Abstract Background Well-established electronic data capture in UK general practice means that algorithms, developed on patient data, can be used for automated clinical decision support systems (CDSSs). These can predict patient risk, help with prescribing safety, improve diagnosis and prompt clinicians to record extra data. However, there is persistent evidence of low uptake of CDSSs in the clinic. We interviewed UK General Practitioners (GPs) to understand what features of CDSSs, and the contexts of their use, facilitate or present barriers to their use. Methods We interviewed 11 practicing GPs in London and South England using a semi-structured interview schedule and discussed a hypothetical CDSS that could detect early signs of dementia. We applied thematic analysis to the anonymised interview transcripts. Results We identified three overarching themes: trust in individual CDSSs; usability of individual CDSSs; and usability of CDSSs in the broader practice context, to which nine subthemes contributed. Trust was affected by CDSS provenance, perceived threat to autonomy and clear management guidance. Usability was influenced by sensitivity to the patient context, CDSS flexibility, ease of control, and non-intrusiveness. CDSSs were more likely to be used by GPs if they did not contribute to alert proliferation and subsequent fatigue, or if GPs were provided with training in their use. Conclusions Building on these findings we make a number of recommendations for CDSS developers to consider when bringing a new CDSS into GP patient records systems. These include co-producing CDSS with GPs to improve fit within clinic workflow and wider practice systems, ensuring a high level of accuracy and a clear clinical pathway, and providing CDSS training for practice staff. These recommendations may reduce the proliferation of unhelpful alerts that can result in important decision-support being ignored.


2021 ◽  
pp. 147490412110109
Author(s):  
Henrike Terhart

Teachers trained in one country are often not allowed to serve as teachers in another country because their teacher’s license is not recognised as equivalent. The barriers these teachers have to overcome in order to work in their profession again are high and often require further (full) teacher training at the university. The paper provides insights into the conditions for teachers who participate in (re-)qualification programmes in Germany and Europe. By linking the theoretical concepts of a biographical approach to teacher professionalisation and transnationalisation in education, the results of an interview study with teachers who have participated in a programme for refugee teachers at a university in Germany are presented. The Grounded Theory analysis reconstructs the strategies of internationally educated teachers managing to keep up their hope to be able to work as teachers again and thus counter the formal de-professionalisation they are facing.


Sign in / Sign up

Export Citation Format

Share Document