Evaluating Conceptual Modeling Practices

Author(s):  
Graeme Shanks ◽  
Jasmina Nuredini ◽  
Ron Weber

This chapter examines how ontological theory can be used to predict how alternative conceptual modelling representations affect end-user understanding of these representations. Specifically, it examines how ontological theory can be used to show how part-whole relations (composites) and things and properties can be best represented to enhance understanding of these real-world phenomena. We report the outcomes of two experiments that provide evidence to support the ontologically sound representation of part-whole relations and things and properties. We also discuss the outcomes of a cognitive process tracing study that explains why the ontologically sound representation of things and properties is more easily understood. In essence, our empirical research provides evidence to support the use of ontology as a theoretical basis to guide conceptual modelling practices.

2008 ◽  
pp. 2229-2251
Author(s):  
Graeme Shanks ◽  
Jasmina Nuredini ◽  
Ron Weber

This chapter examines how ontological theory can be used to predict how alternative conceptual modelling representations affect end-user understanding of these representations. Specifically, it examines how ontological theory can be used to show how part-whole relations (composites) and things and properties can be best represented to enhance understanding of these real-world phenomena. We report the outcomes of two experiments that provide evidence to support the ontologically sound representation of partwhole relations and things and properties. We also discuss the outcomes of a cognitive process tracing study that explains why the ontologically sound representation of things and properties is more easily understood. In essence, our empirical research provides evidence to support the use of ontology as a theoretical basis to guide conceptual modelling practices.


2017 ◽  
Vol 8 (2) ◽  
pp. 563 ◽  
Author(s):  
Usman Ependi

Heuristic evaluation merupakan salah satu bentuk usability testing perangkat lunak yang dinilai oleh pengguna (evaluator). Dalam melakukan heuristic evaluation instrumen penilaian terdiri dari sepuluh (10) pernyataan dengan lima pilihan jawaban dalam skala severity ratings. Dalam penelitian ini heuristic evaluation terhadap aplikasi Depo Auto 2000 Tanjung Api-Api Palembang yang dilakukan oleh 4 evaluator.  Hasil dari heuristic evaluation dikelompokkan kedalam  masing-masing instrumen yaitu visibility of system status dengan nilai 0,75, match between system and the real world dengan nilai 0,25, user control and freedom dengan nilai 0,25, consistency and standards dengan nilai 0,75, error prevention dengan nilai 1, recognition rather than recall dengan nilai 1,25, flexibility and efficiency of use dengan nilai 0,25, Aesthetic and minimalist design dengan nilai 0,25, help users recognize, diagnose, and recover from errors dengan nilai 1 dan Help and documentation dengan nilai 0. Dari hasil heuristic evaluation yang dilakukan menunjukkan bahwa evaluator memberikan nilai 0 dan 1 aplikasi Depo Atuo 2000 Tanjung Api-Api Palembang. Hasil penilaian tersebut menunjukkan bahwa aplikasi yang buat tidak ada masalah usability dan hanya memiliki cosmetic problem sehingga aplikasi Depo Auto 2000 Tanjung Api Api Palembang  dapat dinyatakan layak untuk didistribusikan kepada pengguna akhir (end user). 


2020 ◽  
Author(s):  
Ciara Greene ◽  
Gillian Murphy

Previous research has argued that fake news may have grave consequences for health behaviour, but surprisingly, no empirical data have been provided to support this assumption. This issue takes on new urgency in the context of the coronavirus pandemic. In this large preregistered study (N = 3746) we investigated the effect of exposure to fabricated news stories about COVID-19 on related behavioural intentions. We observed small but measurable effects on some related behavioural intentions but not others – for example, participants who read a story about problems with a forthcoming contact-tracing app reported reduced willingness to download the app. We found no effects of providing a general warning about the dangers of online misinformation on response to the fake stories, regardless of the framing of the warning in positive or negative terms. We conclude with a call for more empirical research on the real-world consequences of fake news.


2021 ◽  
pp. 101891
Author(s):  
Giancarlo Guizzardi ◽  
Claudenir M. Fonseca ◽  
João Paulo A. Almeida ◽  
Tiago Prince Sales ◽  
Alessander Botti Benevides ◽  
...  

2018 ◽  
Vol 8 (9) ◽  
pp. 1275-1306 ◽  
Author(s):  
Rosemary Hunter

The various feminist judgment projects (FJPs) have explored through the imagined rewriting of judgments a range of ways in which a feminist perspective may be applied to the practice of judging. But how do these imagined judgments compare to what actual feminist judges do? This article presents the results of the author’s empirical research to date on ‘real world’ feminist judging. Drawing on case study and interview data it explores the how, when and where of feminist judging, that is, the feminist resources, tools and techniques judges have drawn upon, the stages in the hearing and decision-making process at which these resources, tools and techniques have been deployed, and the areas of law in which they have been applied. The article goes on to consider observed and potential limits on feminist judicial practice, before drawing conclusions about the comparison between ‘real world’ feminist judging and the practices of FJPs. Los proyectos de sentencias feministas, a través de la reelaboración imaginaria de sentencias judiciales, han explorado multitud de vías en las que las perspectivas feministas se podrían aplicar a la práctica judicial. Pero ¿qué resulta de la comparación entre dichas sentencias y la práctica real de las juezas feministas? Este artículo presenta los resultados de la investigación empírica de la autora. Se analiza el cómo, el cuándo y el dónde de la labor judicial feminista, es decir, los recursos, herramientas y técnicas feministas que las juezas han utilizado, las fases de audiencia y toma de decisión en las que se han utilizado y las áreas del derecho en que se han aplicado. Además, se toman en consideración los límites observados y potenciales de la práctica judicial feminista, y se extraen conclusiones sobre la comparación entre la labor judicial feminista en el “mundo real” y la práctica de los proyectos de tribunales feministas.


2014 ◽  
Vol 6 (4) ◽  
pp. 16-30 ◽  
Author(s):  
Réal A. Carbonneau ◽  
Rustam Vahidov ◽  
Gregory E. Kersten

Quantitative analysis of negotiation concession behavior is performed based on empirical data with the purpose of providing simple and intuitive decision support in electronic negotiations. Previous work on non-linear concave preferences and subsequent concession crossover provides a theoretical basis for the model. The authors propose a model which quantifies the remaining concession potential for each issue and a generalization of the model which permits the memory/decay of past concessions. These models permit the analysis of negotiators' concession behavior. Using the proposed models, it was possible to quantitatively determine that negotiators in the authors' negotiation case exhibit concession crossover issues and thus have a tendency to give concessions on issues with the most remaining concession potential. This finding provides empirical evidence of concession crossover in actual concessions and the corresponding model permits the design of a simple and intuitive prediction methodology, which could be used in real world negotiations by decision support systems or automated negotiation agents.


2011 ◽  
Vol 23 (2) ◽  
pp. 57-80 ◽  
Author(s):  
Brian Bishop ◽  
Kevin McDaid

The reliability of end-user developed spreadsheets is poor. Research studies find that 94% of ‘real-world’ spreadsheets contain errors. Although some research has been conducted in the area of spreadsheet testing, little is known about the behaviour or processes of individuals during the debugging task. In this paper, the authors investigate the performance and behaviour of expert and novice end-users in the debugging of an experimental spreadsheet. To achieve this aim, a spreadsheet debugging experiment was conducted, with professional and student participants requested to debug a spreadsheet seeded with errors. The work utilises a novel approach for acquiring experimental data through the unobtrusive recording of participants’ actions using a custom built VBA tool. Based on findings from the experiment, a debugging tool is developed, and its effects on debugging performance are investigated.


Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

This chapter presents an approach for designing secure Data Warehouses (DWs) that accomplish the conceptual modeling of secure DWs independently from the target platform where the DW has to be implemented, because our complete approach follows the Model Driven Architecture (MDA) and the Model Driven Security (MDS). In most of real world DW projects, the security aspects are issues that usually rely on the DBMS administrators. We argue that the design of these security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a Multidimensional (MD) model. In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suits the user security requirements.


Author(s):  
Villarroel Rodolfo ◽  
Fernández-Medina Eduardo ◽  
Trujillo Juan ◽  
Piattini Mario

This chapter presents an approach for designing secure Data Warehouses (DWs) that accomplish the conceptual modeling of secure DWs independently from the target platform where the DW has to be implemented, because our complete approach follows the Model Driven Architecture (MDA) and the Model Driven Security (MDS). In most of real world DW projects, the security aspects are issues that usually rely on the DBMS administrators. We argue that the design of these security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a Multidimensional (MD) model. In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suits the user security requirements.


Author(s):  
Erica Gralla ◽  
Zoe Szajnfarber

It has long been recognized that games are useful in engineering education, and more recently they have also become a common setting for empirical research. Games are useful for both teaching and research because they mimic aspects of reality and require participants to reason within that realistic context, and they allow researchers to study phenomena empirically that are hard to observe in reality. This paper explores what can be learned by students and by researchers, based on the authors’ experience with two sets of games. These games vary in both the experience level of the participants and the “fidelity” or realism of the game itself. Our experience suggests that what can be learned by participants and by researchers depends on both these dimensions. For teaching purposes, inexperienced participants may struggle to connect lessons from medium-fidelity games to the real world. On the other hand, experienced participants may learn more from medium-fidelity games that provide the time and support to practice and reflect on new skills. For research purposes, high-fidelity games are best due to their higher ecological validity, even with inexperienced participants, although experienced participants may enable strong validity in medium-fidelity settings. These findings are based on experience with two games, but provide promising directions for future research.


Sign in / Sign up

Export Citation Format

Share Document