lecture 2 information searchtddd89/lectures/slides/... · systematic literature review, secondary...

41
TDDD89 Lecture 2 - Information search and evaluation Ola Leifler, 2017-11-07

Upload: others

Post on 21-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

TDDD89Lecture 2 - Information search and evaluation Ola Leifler, 2017-11-07

Page 2: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Distribution of thesis groups• ML: 29% • Security: 20% • Usability, prototyping • Simulation, 3D • …

2

Page 3: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

WebReg UPG2 groups are now online

3

Page 4: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Reading in thesis groups 4

Theme Groups

Experimentation,MachineLearning:“OrgandetectionandlocalizationinRadiologicalImageVolumes”byTovaLinderandOlaJigin,Linköpingsuniversitet2017

A1,A2,A3,A4,A5

Usabilitystudy,iterativedevelopment:“SIGHTLENCE–HapticsforComputerGames”byMathiasNordvall,Linköpingsuniversitet,2012

B1,B2,B3,B4

Casestudy,softwaretesting:"ReducingRegressionTestingFeedbackCycleTimesThroughImprovedTestingTechniques"byViktorLövgren,Linköpingsuniversitet,2014.

C1

Securityevaluation:“CertificateTransparencyinTheoryandPractice”byJosefGustafsson,Linköpingsuniversitet2016

C2,C3,C4,C5

Usability+performancestudy,mobileapplication:“AnApproachtowardsuser-centricapplicationmobility”byAndreasÅhlund,Umeåuniversitet2009

D1,D2,D3,D4

Page 5: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Submissions for seminar 1• Text files OK, issues can be used for seminars 2, 4, 6:

5

Page 6: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Information search

Page 7: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Finding information

7

Page 8: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

8

Page 9: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

9

Page 10: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

10

Page 11: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

How to find information

11

”HLAactiveprobingruntimeperformancerequirementsinaWideAreaNetwork” {}

Page 12: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

12

HLA simulation

faultdetectionandlocalizationactiveprobing

latency,throughputruntimeperformancerequirements

IPnetworksinaWideAreaNetwork

Page 13: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Engineering information vs Scientific information

13

Engineering Science

Questions How to solve a problem

How to explain something

Reliability Working solutions, proven theories

Cited work

Sources White papers, software projects

Reviewed publications

Page 14: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Iterative search

14

1 2

”OnHeuristicSearch”

3

”OnAI””OnPlanning”

”FiePlanner”

”FooHeuristic”

Page 15: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Scientific publishing

15

Primarystudies Secondarystudies Textbooks

”What”

Page 16: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Scientific publishing

16

Peer-reviewedpublications

ConferenceProceedings

Journalpapers

Non-reviewedpublications

Technicalreports

Whitepapers

”How”

Page 17: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Publication types

17

Noempiricalresults.SharesexperienceonSoftwareArchitectureresearchanddevelopment.

P.Kruchten,H.Obbink,andJ.Stafford.Thepast,present,andfutureforsoftwarearchitecture.IEEESoftware,23(2):22–30,March–April2006.

Page 18: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Publication types

18

SystematicLiteratureReview,secondarystudy.Publishedataconference

T.K.PaulandM.F.Lau.Asystematicliteraturereviewonmodifiedconditionanddecisioncoverage.InProceedingsofthe29thAnnualACMSymposiumonAppliedComputing,SAC’14,pages1301–1308,NewYork,NY,USA,2014.ACM.

Page 19: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Publication types

19

C.Wohlin,P.Runeson,M.Höst,M.C.Ohlsson,B.Regnell,andA.Wesslén.ExperimentationinSoftwareEngineering.SpringerBerlinHeidelberg,2012.

GuidelinestextbookonempiricalmethodsinSoftwareEngineering

Page 20: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Publication types

20

I.Maier,T.Rompf,andM.Odersky.Deprecatingtheobserverpattern.Technicalreport,ÉcolePolytechniqueFédéraledeLausanne,2010.

Technicalreport,non-reviewedpublication.Noempiricalsupportforclaims,butsuggestionsofanarchitecture.

Page 21: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Publication types

21

A.Nilsson,J.Bosch,andC.Berger.Visualizingtestingactivitiestosupportcontinuousintegration:Amultiplecasestudy.InG.CantoneandM.Marchesi,editors,AgileProcessesinSoftwareEngineeringandExtremeProgramming,volume179ofLectureNotesinBusinessInformationProcessing,pages171–186.SpringerInternationalPublishing,2014.

Casestudy,reviewedpublicationinjournal

Page 22: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Publication types

22

J.Andrews,L.Briand,andY.Labiche.Ismutationanappropriatetoolfortestingexperiments?InProceedingsofthe27thInternationalConferenceonSoftwareEngineering,ICSE2005,pages402–411,May2005.IEEEComputerSociety.

Experiment,reviewedpublicationpresentedataconferenceandpublishedinproceedingsfromtheconference.

Page 23: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

What are results? 23

Type How? Quality

Procedure/technique

Formal proofs, experiments, statistical support,

Proper use of statistics

Descriptive Models

Properly accounting for reality

Experience reports

Interviews, observations, usage data

Real systems & people

Page 24: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

What are strong results?

24

Table 6. Types of research validation represented in ICSE 2002 submissions and acceptances Type of validation Submitted Accepted Ratio Acc/Sub Analysis 48 (16%) 11 (26%) 23% Evaluation 21 (7%) 1 (2%) 5% Experience 34 (11%) 8 (19%) 24% Example 82 (27%) 16 (37%) 20% Some example, can't tell whether it's toy or actual use 6 (2%) 1 (2%) 17% Persuasion 25 (8%) 0 (0.0%) 0% No mention of validation in abstract 84(28%) 6 (14%) 7%

14% TOTAL

Validation 300 -

250 200 i

100 50

o

-" ) ,Accept . t

300(100.0%) 43 (100.0%)

Validation 100%- 80% . . . . . . . . . . . . . . . . ~ : i ~ ~

20%. ~ 0% - ~'~!!i fll .

~ , . + ~ ~ <,.+" ~ oe .o" U" Accepted [] Rejected-]

_ _,,

iiiiiiiiiii!

n

Figure 5. Counts of acceptances and rejections by type of validation

4.3 What do program committees look for? The program committee looks for solid evidence to

support your result. It's not enough that your idea works for you, there must also he evidence that the idea or the technique will help someone else as well.

The statistics above show that analysis, actual experience in the field, and good use of realistic examples tend to be the most effective ways of showing why your result should be believed. Carefifl narrative, qualitative analysis can also work if the reasoning is sound.

Why should the reader believe your result? Is the paper argued persuasively? What evidence is

presented to support the claim? What kind of evidence is offered? Does it meet the usual standard of the subdiscipline?

Is the kind of evaluation you're doing described clearly and accurately? "Controlled experiment" requires more than data collection, and "case study" requires more than anecdotal discussion. Pilot studies that lay the groundwork for controlled experiments are often not publishable by themselves.

Figure 6. Distribution of acceptances and rejections by type of validation

Is the validation related to the claim? If you're claiming performance improvement, validation should analyze performance, not ease of use or generality. And conversely.

Is this such an interesting, potentially powerful idea that it should get exposure despite a shortage of concrete evidence?

Authors tend to have trouble in some specific situations. Here are some examples, with advice for staying out of trouble:

• I f you claim to improve on prior art, compare your result objectively to the prior art.

• I f you used an analysis technique, follow the rules of that analysis technique. If the technique is not a common one in soRware engineering (e.g., meta- analysis, decision theory, user studies ° or other behavioral analyses), explain the technique and standards of proof, and be clear about your adherence to the technique.

• I f you offer practical experience as evidence for your result, establish the effect your research has. I f at all possible, compare similar situations with and without your result.

733

M.Shaw.Writinggoodsoftwareengineeringresearchpapers:Minitutorial.InProceedingsofthe25thInternationalConferenceonSoftwareEngineering,ICSE’03,pages726–736,Washington,DC,USA,2003.IEEEComputerSociety.

Page 25: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Strong results

25

Realsystems&&properanalysis

Page 26: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

How to evaluate papers• Relevance = f(title, year, abstract, citations) • The more specific the paper, the less citations? • Literature reviews: meta studies • Publication types: journals, conferences, book chapters • Refer to the main results of the paper, not that which is written in

the introduction

26

Page 27: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

What about white papers/other stuff?• Use to support existence: ”There are several implementations of

Flux controllers” • Not to support claims and propositions: ”Flux controllers are more

user friendly than Flax controllers”

27

Page 28: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Evaluation of paper

28

”Softwareproductlinesarerelatedsoftwareproductsthatarecustomizedtodifferentcustomers[1]”

[1]Kästner,C.,Apel,S.,andKuhlemann,M.Granularityinsoftwareproductlines.InProceedingsofthe30thInternationalConferenceonSoftwareEngineering,ICSE’08,pages311–320,NewYork,USA,2008.

Notthemainresultof[1]

[2]Pohl,K.,Böckle,G.,andvanderLinden,F.J.(2005).Softwareproductlineengineering:foundations,principlesandtechniques.SpringerScience&BusinessMedia.

UsebookbyPohletal.instead[2]

Page 29: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Theory• Analysis: what is this? Classifications, taxonomies, ontologies • Explanations: why does something happen? • Predictions: what will happen?

29

Page 30: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Plagiarism & copyright

30

Page 31: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

31

noplagiat.bibl.liu.se

Page 32: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

32

Plagiarism+copyrightviolation

Usingimagewithoutreference

Copyrightviolation

Usingimagewithreference

OK!

Usingown/CCimagewithreference

Page 33: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Using references

33

Page 34: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

References

34

[1]hasstudiedsoftwaredesignpatterns

Oderskyetal.havestudiedsoftwaredesignpatterns[1].

Oderskyetal.(2010)havestudiedsoftwaredesignpatterns.

Page 35: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Paraphrasing

35

OveraquarteroftheICSE2002abstractsgivenoindicationofhowthepaper'sresultsarevalidated,ifatall[1].

[1]M.Shaw.Writinggoodsoftwareengineeringresearchpapers:Minitutorial.InProceedingsofthe25thInternationalConferenceonSoftwareEngineering,ICSE’03,pages726–736,Washington,DC,USA,2003.IEEEComputerSociety.

4. W h y should the reader believe your result?

Show evidence that your result is valid--that it actually helps to solve the problem you set out to solve.

4.1. What kinds of validation do software engineers do?

Software engineers offer several kinds of evidence in support of their research results. It is essential to select a form of validation that is appropriate for the type of

research result and the method used to obtain the result. As an obvious example, a formal model should be supported by rigorous derivation and proof, not by one or two simple examples. On the other hand, a simple example derived from a practical system may play a major role in validating a new type of development method. Table 5 lists the types of research validation that are used in software engineering research papers and provides specific examples. In this table, the examples are keyed to the type of result they apply to.

Table 5. Types of software engineering research validation Type of validation Examples Analysis

Evaluation

Experience

Example

Persuasion

I have analyzed my result and find it satisfactory through rigorous analysis, e.g . . . . For a formal model ... rigorous derivation and proof For an empirical model ... data on use in controlled situation For a controlled experiment ... carefully designed experiment with statistically significant

results Given the stated criteria, my result...

For a descriptive model ... adequately describes phenomena of interest ... For a qualitative model ... accounts for the phenomena of interest... For an empirical model ... is able to predict ... because ..., or

... generates results that fit actual data ... Includes feasibility studies, pilot projects My result has been used on real examples by someone other than me, and the evidence of its

correctness/usefulness/effectiveness is ... For a qualitative model ... narrative For an empirical model or tool ... data, usually statistical, on practice For a notation or technique ... comparison of systems in actual use

Here's an example of how it works on For a technique or procedure ...a "slice of life" example based on a real system ... For a technique or procedure ...a system that I have been developing ... For a technique or procedure ... a toy example, perhaps motivated by reality

The "slice of life" example is most likely to be convincing, especially if accompanied by an explanation of why the simplified example retains the essence of the problem being solved. Toy or textbook examples often fail to provide persuasive validation, (except for standard examples used as model problems by the field).

I thought hard about this, and I believe passionately that ... For a technique ... if you do it the following way, then ... For a system ... a system constructed like this would ... For a model ... this example shows how my idea works

Validation purely by persuasion is rarely sufficient for a research paper. Note, though, that i f the original question was about feasibility, a working system, even without analysis, can suffice

Blatant assertion No serious attempt to evaluate result. This is highly unlikely to be acceptable

4.2 Which of these are most common? Alas, well over a quarter of the ICSE 2002 abstracts

give no indication of how the paper's results are validated, i f at all. Even when the abstract mentions that the result was applied to an example, it was not always clear whether the example was a textbook example, or a report on use in the field, or something in between.

The most successful kinds of validation were based on analysis and real-world experience. Well-chosen examples were also successful. Persuasion was not persuasive, and narrative evaluation was only slightly more successful. Table 6 gives the distribution of submissions to ICSE 2002, based on reading the abstracts (but not the papers), followed by graphs of the counts and distributions. Figures 5 and 6 show these counts and distributions.

732

Page 36: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Citations

36

BansiyaandDavisclaimthattheQMOODmodelmayaddress”differentweightings,otherperspectives,andnewgoalsandobjectives”[1]

[1]J.BansiyaandC.Davis.Ahierarchicalmodelforobject-orienteddesignqualityassessment.IEEETransactionsonSoftwareEngineering,28(1):4–17,Jan2002.

!""#$%&"'( )* ! +'($,-. /-0!1(&2!"$)- $( 3$'4'+ ") 1#)5)"'*2'6$%$2$"78 #'&(!%$2$"78 !-+ &-+'#("!-+!%$2$"7. 9:$2' 2)40)&12$-, $( 0)-($+'#'+ ,))+ *)# &-+'#("!-+!%$2$"78 '6"'-+;$%$2$"78 !-+ #'&(!%$2$"78 :$,:'# 5'!(&#'( )* 0)&12$-, !#'3$'4'+ ") !+3'#('27 $-*2&'-0' ":'(' <&!2$"7 !""#$%&"'(.=):'($)- $( 3$'4'+ ") :!3' ! ($,-$*$0!-" '**'0" )- !+'($,->( &-+'#("!-+!%27 !-+ #'&(!%$2$"7.

?%@'0"( 0)55&-$0!"' %7 5'((!,' 1!(($-, !-+8 ":'#'*)#'85'((!,$-, +$#'0"27 $-*2&'-0'( *&-0"$)-!2$"7 !-+ '**'0"$3';-'(( !-+ :'21( 1#)5)"'( #'&(!%$2$"7. 9:$2' ":' &(' )*$-:'#$"!-0' 1#)5)"'( $-"'#-!2 #'&(!%$2$"78 *&-0"$)-!2$"78'6"'-+$%$2$"78 !-+ '**'0"$3'-'((8 $" :!( ":' 1)"'-"$!2 ")!+3'#('27 $-*2&'-0' *2'6$%$2$"7 !-+ &-+'#("!-+!%$2$"7. A$5$;2!#278 4:$2' ":' 0!#'*&2 &(' )* )%@'0" 0)51)($"$)- 0!-($,-$*$0!-"27 $-0#'!(' $-"'#-!2 #'&(!%$2$"78 *&-0"$)-!2$"78!-+ *2'6$%$2$"78 $"( '60'(($3' !-+ $-0)##'0" &(!,' 0!- 5!B'! +'($,- :!#+'# ") &-+'#("!-+. C:' &(' )* 0)51)($"$)- 5!7!2() $-*2&'-0' '**'0"$3'-'(( !-+ '6"'-+$%$2$"7. 9:$2' ":' &(')* 1)275)#1:$(5 $( 3$'4'+ ") $-0#'!(' ":' *2'6$%$2$"78'6"'-+$%$2$"78 '**'0"$3'-'((8 !-+ *&-0"$)-!2$"7 !""#$%&"'( )*! +'($,-8 $" $( !2() 3$'4'+ ") 5!B' +'($,-( :!#+'# ")&-+'#("!-+. =)512'6$"7 $( 3$'4'+ !( !- $-+$0!"$)- )* ":'&-+'#("!-+!%$2$"7 )* ! +'($,-. D- ,'-'#!28 ":' 5)#' 0)512'6

! +'($,-8 ":' :!#+'# $" $( ") &-+'#("!-+8 4:$0: 0!- !2()$-*2&'-0' ":' +'($,-( *2'6$%$2$"7 !-+ #'&(!%$2$"7.

C!%2' E (:)4( ":' $-*2&'-0' )* '!0: )* ":' +'($,-1#)1'#"$'( )- ":' <&!2$"7 !""#$%&"'(. F- &1 !##)4 (75%)2G! H $-+$0!"'( ":!" ":' +'($,- 1#)1'#"7 :!( ! 1)($"$3'$-*2&'-0' )- ":' <&!2$"7 !""#$%&"'8 !-+ ! +)4- !##)4(75%)2 G" H $-+$0!"'( ":!" ":' +'($,- 1#)1'#"7 :!( ! -',!"$3'$-*2&'-0' )- ":' <&!2$"7 !""#$%&"'.

!"#"$ %&'()*'+( *)& ,'+-.(&/ 0123 4&/'(+ 5126&1*'&/ *278.9'*: ;**1'<8*&/

I!('+ &1)- ":' +'($,- 1#)1'#"7 ") <&!2$"7 !""#$%&"'#'2!"$)-(:$1 5!"#$6 $- C!%2' E8 ":' #'2!"$3' ($,-$*$0!-0' )*$-+$3$+&!2 +'($,- 1#)1'#"$'( ":!" $-*2&'-0' ! <&!2$"7!""#$%&"' $( 4'$,:"'+ 1#)1)#"$)-!227 () ":!" ":' 0)51&"'+3!2&'( )* !22 <&!2$"7 !""#$%&"'( :!3' ":' (!5' #!-,'. F #!-,')* ! ") #" 4!( ('2'0"'+ *)# ":' 0)51&"'+ 3!2&'( )* ":'<&!2$"7 !""#$%&"'(.

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

!"# $%&'('() *(+ ,+*-.'() ./% 01+%2

C:' OP??Q <&!2$"7 5)+'2 !22)4( 0:!-,'( ") %' '!($275!+' ") ":' 5)+'2 ") !++#'(( +$**'#'-" 4'$,:"$-,(8 )":'#1'#(1'0"$3'(8 !-+ -'4 ,)!2( !-+ )%@'0"$3'(. F" ":' 2)4'("2'3'28 ":' 5'"#$0( &('+ ") !(('(( +'($,- 1#)1'#"$'( 5!7 %'0:!-,'+8 )# ! +$**'#'-" ('" )* +'($,- 1#)1'#"$'( 5!7 %' &('+") !(('(( <&!2$"7 !""#$%&"'(8 )# '3'- ":' ('" )* <&!2$"7!""#$%&"'( ") %' !(('(('+ 0!- %' 0:!-,'+. C:' $-*2&'-0'#'2!"$)-(:$1( *#)5 +'($,- 1#)1'#"$'( ") <&!2$"7 !""#$%&"'(

!" #$$$ %&'()'*%#+() +( )+,%-'&$ $(.#($$&#(./ 0+12 34/ (+2 !/ 5'(6'&7 3""3

%'81$ 9:;<=>? @;AB=C< DEB :;<=>? FBEG;BA=;<

%'81$ HIJKL=AM 'AAB=NJA;<O:;<=>? FBEG;BAM &;LKA=E?<P=G<

Page 37: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Managing references

37

Page 38: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

38

Page 39: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

39

Page 40: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Writing about what you’ve read• Take notes of what you’ve read • Consider what needs to be in your report. Do not write everything

you’ve read in your report. Remember to have a strong connection to your main method/results

40

Page 41: Lecture 2 Information SearchTDDD89/lectures/slides/... · Systematic Literature Review, secondary study. Published at a conference T. K. Paul and M. F. Lau. A systematic literature

Summary• Start learning about the subject, then find proper support for your

claims. Use different sources for learning and as references to support specific claims.

• There are different types of academic publications and results. Use each type of publication as appropriate.

• Do not plagiarize or copy images or text. • Use proper reference management software when writing your

thesis.

41