-
Unleashing Excellence through Inclusion: Navigating the Engagement-Performance Paradox
Authors:
Nicole Radziwill,
Morgan C. Benton
Abstract:
People who feel that they do not belong (or their voice is not heard at work) commonly become disengaged, unproductive, and pessimistic. Inclusive work environments aspire to close these gaps to increase employee satisfaction while reducing absenteeism and turnover. But there is always a job to be done, and under time and resource constraints, democratic approaches can result in reduced quality an…
▽ More
People who feel that they do not belong (or their voice is not heard at work) commonly become disengaged, unproductive, and pessimistic. Inclusive work environments aspire to close these gaps to increase employee satisfaction while reducing absenteeism and turnover. But there is always a job to be done, and under time and resource constraints, democratic approaches can result in reduced quality and unacceptable delays. Teams need actionable guidance to incorporate inclusive practices that will directly impact effectiveness. This paper contributes to the literature on quality and performance management by developing a conceptual model of inclusion that directly (and positively) impacts performance, and identifies eight factors that workgroups must address to create and maintain inclusive, high performing environments.
△ Less
Submitted 13 July, 2024;
originally announced July 2024.
-
Reframing the Test Pyramid for Digitally Transformed Organizations
Authors:
Nicole Radziwill,
Graham Freeman
Abstract:
The test pyramid is a conceptual model that describes how quality checks can be organized to ensure coverage of all components of a system, at all scales. Originally conceived to help aerospace engineers plan tests to determine how material changes impact system integrity, the concept was gradually introduced into software engineering. Today, the test pyramid is typically used to illustrate that t…
▽ More
The test pyramid is a conceptual model that describes how quality checks can be organized to ensure coverage of all components of a system, at all scales. Originally conceived to help aerospace engineers plan tests to determine how material changes impact system integrity, the concept was gradually introduced into software engineering. Today, the test pyramid is typically used to illustrate that the majority of tests should be performed at the lowest (unit test) level, with fewer integration tests, and even fewer acceptance tests (which are the most expensive to produce, and the slowest to execute). Although the value of acceptance tests and integration tests increasingly depends on the integrity of the underlying data, models, and pipelines, software development and data management organizations have traditionally been siloed and quality assurance practice is not as mature in data operations as it is for software. Companies that close this gap by developing cross-organizational systems will create new competitive advantage and differentiation. By taking a more holistic view of testing that crosses these boundaries, practitioners can help their organizations close the gap.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Quality 4.0: Let's Get Digital - The many ways the fourth industrial revolution is reshaping the way we think about quality
Authors:
Nicole M. Radziwill
Abstract:
The technology landscape is richer and more promising than ever before. In many ways, cloud computing, big data, virtual reality (VR), augmented reality (AR), blockchain, additive manufacturing, artificial intelligence (AI), machine learning (ML), Internet Protocol Version 6 (IPv6), cyber-physical systems and the Internet of Things (IoT) all represent new frontiers. These technologies can help imp…
▽ More
The technology landscape is richer and more promising than ever before. In many ways, cloud computing, big data, virtual reality (VR), augmented reality (AR), blockchain, additive manufacturing, artificial intelligence (AI), machine learning (ML), Internet Protocol Version 6 (IPv6), cyber-physical systems and the Internet of Things (IoT) all represent new frontiers. These technologies can help improve product and service quality, and organizational performance. In many regions, the internet is now as ubiquitous as electricity. Components are relatively cheap. A robust ecosystem of open-source software libraries means that engineers can solve problems 100 times faster than just two decades ago. This digital transformation is leading us toward connected intelligent automation: smart, hyperconnected agents deployed in environments where humans and machines cooperate, and leverage data, to achieve shared goals. This is not the worlds first industrial revolution. In fact, it is its fourth, and the disruptive changes it will bring suggest we will need a fresh perspective on quality to adapt to it.
△ Less
Submitted 17 October, 2018;
originally announced October 2018.
-
Quality and Innovation with Blockchain Technology
Authors:
Morgan C. Benton,
Nicole M. Radziwill
Abstract:
In recent years, hype surrounding the proliferation of blockchain-based technology has been significant. Apart from the creation of bitcoin and other cryptocurrencies, it has been difficult to determine what practical utility might lie in the adoption of blockchain, mainly because there are so few in existence at present. Even so, interest in the technology has increased tremendously. This paper i…
▽ More
In recent years, hype surrounding the proliferation of blockchain-based technology has been significant. Apart from the creation of bitcoin and other cryptocurrencies, it has been difficult to determine what practical utility might lie in the adoption of blockchain, mainly because there are so few in existence at present. Even so, interest in the technology has increased tremendously. This paper is a primer for software quality professionals. It briefly describes the history of blockchain technology, attempts to define and disambiguate terminology, fosters a general understanding of how blockchain works, and discusses how and why software quality professionals might want to invest time and energy in learning about, implementing, or using blockchain-based technologies in their own organizations -- or alternatively, improving the quality of blockchain technology itself.
△ Less
Submitted 5 October, 2017;
originally announced October 2017.
-
Design for X (DfX) in the Internet of Things (IoT)
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
Designing quality in is a cornerstone of modern quality management philosophies. Design for X (DfX) techniques provide guidelines, heuristics, and metrics to ensure that a particular quality attribute exists in a design. Although hundreds of papers have been published on DfX approaches, few researchers have explored systematically applying multiple DfX in a particular problem context. As the Inter…
▽ More
Designing quality in is a cornerstone of modern quality management philosophies. Design for X (DfX) techniques provide guidelines, heuristics, and metrics to ensure that a particular quality attribute exists in a design. Although hundreds of papers have been published on DfX approaches, few researchers have explored systematically applying multiple DfX in a particular problem context. As the Internet of Things (IoT) evolves, boundaries between people, computers, and objects will become less distinct, underscoring the need for more holistic design. Using mixed methods, this paper examines the utility of DfX in the emerging IoT ecosystem. We identify DfX that are applicable to IoT-related design, and find gaps that demand further research and development. The results from this study can be used to help designers and quality managers select or develop appropriate DfX to use in designing components for the Internet of Things (IoT), supporting actionable strategies for quality and customer satisfaction.
△ Less
Submitted 8 July, 2017;
originally announced July 2017.
-
Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a mapping using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity Enh…
▽ More
There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a mapping using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity Enhancement Act of 2014. This mapping can be easily adopted by organizations that are already using the NIST CSF for cybersecurity risk management to plan, manage, and continually improve cybersecurity operations. If an organization is not using the NIST CSF, this mapping may still be useful for linking elements in accounting systems that are associated with cybersecurity operations and risk management to a quality cost model.
△ Less
Submitted 9 July, 2017;
originally announced July 2017.
-
Evaluating Quality of Chatbots and Intelligent Conversational Agents
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
Chatbots are one class of intelligent, conversational software agents activated by natural language input (which can be in the form of text, voice, or both). They provide conversational output in response, and if commanded, can sometimes also execute tasks. Although chatbot technologies have existed since the 1960s and have influenced user interface development in games since the early 1980s, chat…
▽ More
Chatbots are one class of intelligent, conversational software agents activated by natural language input (which can be in the form of text, voice, or both). They provide conversational output in response, and if commanded, can sometimes also execute tasks. Although chatbot technologies have existed since the 1960s and have influenced user interface development in games since the early 1980s, chatbots are now easier to train and implement. This is due to plentiful open source code, widely available development platforms, and implementation options via Software as a Service (SaaS). In addition to enhancing customer experiences and supporting learning, chatbots can also be used to engineer social harm - that is, to spread rumors and misinformation, or attack people for posting their thoughts and opinions online. This paper presents a literature review of quality issues and attributes as they relate to the contemporary issue of chatbot development and implementation. Finally, quality assessment approaches are reviewed, and a quality assessment method based on these attributes and the Analytic Hierarchy Process (AHP) is proposed and examined.
△ Less
Submitted 15 April, 2017;
originally announced April 2017.
-
Improving Testability and Reuse by Transitioning to Functional Programming
Authors:
Morgan C. Benton,
Nicole M. Radziwill
Abstract:
Declarative styles such as functional programming (FP) are rapidly gaining ground on their imperative cousins, including procedural and object-oriented programming. The shift is subtle because it is happening within the context of multiparadigm programming languages such as JavaScript. FP is better suited to modern processes like test-driven development (TDD), and architectures like massively para…
▽ More
Declarative styles such as functional programming (FP) are rapidly gaining ground on their imperative cousins, including procedural and object-oriented programming. The shift is subtle because it is happening within the context of multiparadigm programming languages such as JavaScript. FP is better suited to modern processes like test-driven development (TDD), and architectures like massively parallel, cloud-based computing. This article describes the technical details that characterize the shift from imperative to FP and implications for software quality management, particularly reuse and testability.
△ Less
Submitted 21 June, 2016;
originally announced June 2016.
-
Bot or Not? Deciphering Time Maps for Tweet Interarrivals
Authors:
Nicole M. Radziwill,
Morgan C. Benton
Abstract:
This exploratory study used the R Statistical Software to perform Monte Carlo simulation of time maps, which characterize events based on the elapsed time since the last event and the time that will transpire until the next event, and compare them to time maps from real Twitter users. Time maps are used to explore differences in the interarrival patterns of Tweets between human users, humans who u…
▽ More
This exploratory study used the R Statistical Software to perform Monte Carlo simulation of time maps, which characterize events based on the elapsed time since the last event and the time that will transpire until the next event, and compare them to time maps from real Twitter users. Time maps are used to explore differences in the interarrival patterns of Tweets between human users, humans who use scheduling services like TweetDeck and HootSuite, and non-human (bot) users. The results indicate that there are differences between the tweet interarrival patterns across these categories of users, and that time maps could potentially be used to automate the detection of bot accounts on Twitter. This could enhance social media intelligence capabilities, help bot developers build more human-like Twitter bots to avoid detection, or both.
△ Less
Submitted 20 May, 2016;
originally announced May 2016.
-
A Case-Based Look at Integrating Social Context into Software Quality
Authors:
Nicole Radziwill,
Morgan Benton,
Kenneth Boadu,
Wilson Perdomo
Abstract:
Ensuring high-quality software requires considering the social climate within which the applications will be deployed and used. This can be done by designing quality goals and objectives that are consistent with changing social and ethical landscapes. Using principles of technological determinism, this article presents three cases that illustrate why it is becoming even more important to integrate…
▽ More
Ensuring high-quality software requires considering the social climate within which the applications will be deployed and used. This can be done by designing quality goals and objectives that are consistent with changing social and ethical landscapes. Using principles of technological determinism, this article presents three cases that illustrate why it is becoming even more important to integrate these concerns into software design and quality assurance. With these examples in mind, this article explains how to consider technological determinism in software design and quality assurance practices to achieve this enhanced sensitivity on a practical level.
△ Less
Submitted 8 December, 2015;
originally announced December 2015.
-
The Ethics of Hacking: Should It Be Taught?
Authors:
Nicole Radziwill,
Jessica Romano,
Diane Shorter,
Morgan Benton
Abstract:
Poor software quality can adversely affect application security by increasing the potential for a malicious breach of a system. Because computer security and cybersecurity are becoming such relevant topics for practicing software engineers, the need for educational opportunities in this area is steadily increasing. Universities and colleges have recognized this, and have started to offer programs…
▽ More
Poor software quality can adversely affect application security by increasing the potential for a malicious breach of a system. Because computer security and cybersecurity are becoming such relevant topics for practicing software engineers, the need for educational opportunities in this area is steadily increasing. Universities and colleges have recognized this, and have started to offer programs in cybersecurity. At face value, these new programs may not appear controversial, but developing their curriculum requires answering a complex ethical question: Should programs teach hacking to their students? Even though there are different types of hackers, media reports of cybersecurity incidents tend to reserve the "hacker" label for cyber criminals, which overlooks the value in hacking (and, by extension, teaching students to hack). This article examines the full spectrum of hacking behavior, as well as arguments for and against including hacking in education programs, and recommends that hacking skills be considered an essential component of an education and practice in software quality assurance.
△ Less
Submitted 8 December, 2015;
originally announced December 2015.
-
The first SPIE software Hack Day
Authors:
Sarah Kendrew,
Casey Deen,
Nicole Radziwill,
Steve Crawford,
James Gilbert,
Michael Gully-Santiago,
Petr Kubanek
Abstract:
We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montreal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to…
▽ More
We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montreal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.
△ Less
Submitted 6 August, 2014;
originally announced August 2014.