How to do a Structured Literature Review in computer science
|
|
|
- Kelly Marianna Watkins
- 9 years ago
- Views:
Transcription
1 How to do a Structured Literature Review in computer science Anders Kofod-Petersen Version 0.2 August 13, 2014 Contents 1 Introduction 1 2 Structure of a systematic literature review 2 3 Performing a structured literature review Planning the review Conducting the review References 7 1 Introduction How to write a reference list Doing a systematic literature review is a formal way of synthesising the information available from available primary studies relevant to a set of research questions. The use of systematic literature reviews have traditionally been widespread primarily in medicine (e.g. the well known Cochrane reviews [1]). Unfortunately it has been used to a much lesser extend in computer science (for an example of how to do reviews in software engineering see: [2]). Systematic literature reviews stand apart from, in computer science the more traditional unsystematic surveys by using a strict methodological framework with a set of well defined steps carried out in accordance with a predefined protocol. Using a systematic literature review is in no way a guarantee of finding all relevant literature in a given area. However, there are several advantages in using it: A systematic literature review can map out existing solutions before a researcher attempts to tackle an area; it helps researchers in avoiding bias in their work; publishing these reviews also benefits the community by allowing others to avoid duplicating the effort; it allows researchers to identify gaps of knowledge; and it highlights the areas where additional research is required. If a systematic literature review is conducted thoroughly it fulfils the advantages described above and thereby gains scientific value. This documents attempts to give a short introduction to how to conduct a structured literature review within computer science. The examples used are taken from [3]. 1
2 2 Structure of a systematic literature review A systematic review has three main phases: i) planning, ii) conducting and iii) reporting. Each of these phases are divided into several steps. The first phase involves planning the review and can be broken down into these five steps: 1. Identification of the need for a review 2. Commissioning a review 3. Specifying the research question(s) 4. Developing a review protocol 5. Evaluating the review protocol This second phase is the actually review of the literature. It consists of five steps: 1. Identification of research 2. Selection of primary studies 3. Study quality assessment 4. Data extraction and monitoring 5. Data synthesis The last phase deals with how to disseminate the newly acquired knowledge. It consists of three steps: 1. Specifying dissemination strategy 2. Formatting the main report 3. Evaluating the report 3 Performing a structured literature review 3.1 Planning the review For the purpose of this document we can assume that a need has already been identified (step 1) and that a review has been commissioned (step 2). This description will cover steps 3 and 4 in the planning phase; as step 5 has been included in step 4. 2
3 Step 3: Specifying the research question(s) Attempting a literature review is obviously closely coupled with some specific area and/or problem. Thus, it is assumed that a specific problem (P) is tackled using some specific constraints, methods and/or approaches (C) to develop a system, application or algorithm (S). In computer science we would typically like to know what existing solutions are available, how they compare, what the strength of the evidence is and what implications these solutions have. Writing these points down gives us the following research questions: RQ1 What are the existing solutions to P? RQ2 How does the different solutions found by addressing RQ1 compare to each other with respect to C? RQ3 What is the strength of the evidence in support of the different solutions? RQ4 What implications will these findings have when creating S? Step 4: Developing a review protocol The review protocol is very important as it defines exactly how each step is to be carried out; thus, the work is reproducible. It can be beneficial to create an initial protocol and review the upcoming step whenever a step is concluded. Doing this iteratively then covers the fifth step evaluating the review protocol. Appendix?? gives an example of a complete review protocol. 3.2 Conducting the review With the developed protocol in hand it is now possible to conduct the review. This phase contains five steps: Identification of research in the literature, selecting the primary studies deemed relevant, evaluate the corpus with respect to the chosen quality parameters, extract the relevant data, and synthesise the data. Step 1: Identification of research This goal of this step is to retrieve all the literature relevant to the defined research questions. To do this a search strategy must be defined. This strategy should specify which sources to be searched and how to search them. The list of sources to be search will traditionally contain the relevant on-line digital libraries as well as a set of journals and conferences relevant to the area 1 The following list contains the most obvious general computer science archives: ACM digital library, IEEE Xplore, ISI web of knowledge, ScienceDirect, CiteSeer, SpringerLink and Wiley Inter Science. For domain specific sources it is worth contacting experts in the domain who will normally know which are the best. Once the list is complete the specific search terms can be defined as well as the procedure for searching the sources. The search strings are formed by grouping key termsinto groups. Each group contains terms that are either synonyms, different forms of the same word, or terms that have similar or related semantic meaning within the domain. Table 1 exemplifies this approach. The terms 1 Obviously off-line sources should be searched as well. However, at least in computer science most relevant sources are on-line. 3
4 chosen should by closely related to the first research question (what are the existing solutions to P?). Table 1: Search terms Group 1 Group 2 Group 3 Group 4 Term 1 Synonym 1 Synonym 2 Synonym 3 Synonym 4 Term 2 Synonym 1 Synonym 2 Synonym 3 Synonym 4 Term 3 Synonym 2 Synonym 3 Term 4 Synonym 3 Term 5 Synonym 3 Each of the, in this case four groups can be designed to retrieve different sets of the relevant literature. The primary goal is to find the literature that is the intersection of the sets (see Figure 1). Group 1 Group 3 Group 2 Group 4 Target studies Figure 1: Relevant studies Implementing this search strategy can be achieved by applying the AND ( ) and OR ( ), where the OR operator can used within the groups and the AND operator between the groups. Following the example in Table 1 the following search string will capture the structure: ([G1, T 1] [G1, T 2]) ([G2, T 1] [G2, T 2] [G2, T 3]) ([G3, T 1] [G3, T 2] [G3, T 3] [G3, T 4] [G3, T 5]) ([G4, T 1] [G4, T 2]) The set of papers constructed by applying this search strategy is now ready to go though the selection process. 4
5 Step 2: Selection of primary studies Applying the search described above will most likely return a number of articles far larger than manageable. The relevant articles should now be selected. The protocol should described exactly which criteria should be applied in this selection process. However, some points can be regarded as general and used as removal criteria: 1. Duplicates (keep the highest ranking source), 2. The same study published in different sources (keep the highest ranking source), 3. Studies published before a certain date (or even after). Applying this selection now leaves us with a set of relevant studies that can now be filtered with respect to quality. Step 3: Study quality assessment The purpose of this step is to filter away studies that are not thematically relevant to the area chosen. The protocol should define exactly which inclusion (IC) and quality criteria (QC) are employed (Table 2 gives some examples of criteria). Table 2: Inclusion and quality criteria Criteria identification IC 1 IC 2 IC 4 IC 5 QC 1 QC 2 Criteria The study s main concern is P The study is a primary study presenting empirical results The study focuses on C The study describes an S There is a clear statement of the aim of the research The study is put into context of other studies and research The criteria can be divided into: primary, secondary and quality screening criteria. In the example described in Table 2 IC 1 and 2 would be the primary; IC 3 and 4 the secondary; and QC 1 and 2 the quality criteria. The criteria can now be applied in a three stage process: 1. Abstract inclusion criteria screening, 2. Full text inclusion criteria screening, 3. Full text quality screening. Each step should be thoroughly documented as part of the final protocol. Once the set of studies have gone through this process it is (most likely) further reduced and can now go though the next step of detailed quality assessment. The final quality assessment is done to answer the third research question (What is the strength of the evidence in support of the different solutions?). To do this further quality criteria, supplementing QC 1 and 2 in Table 2 should be developed. Examples of this could be (QC 1 and 2 is duplicated as questions for completeness): 5
6 QC 1 Is there is a clear statement of the aim of the research? QC 2 Is the study is put into context of other studies and research? QC 3 Are system or algorithmic design decisions justified? QC 4 Is the test data set reproducible? QC 5 Is the study algorithm reproducible? QC 6 Is the experimental procedure throughly explained and reproducible? QC 7 Is it clearly stated in the study which other algorithms the study s algorithm(s) have been compared with? QC 8 Are the performance metrics used in the study explained and justified? QC 9 Are the test results thoroughly analysed? QC 10 Does the test evidence support the findings presented? Each of the studies under considerations should be classified according to these 10 quality criteria. The protocol should clearly specify the granularity of the score, e.g. yes (1 point), partly ( 1 2 point) or no (0 point). The protocol should further specify the threshold for studies to be accepted and if it is acceptable to have, e.g. zero points in certain criteria. All the studies have been classified and a suitable set of worthy studies has been selected. Now the data from each study can now be extracted. Step 4: Data extraction and monitoring Step 5: Data synthesis 6
7 References [1] J. P. T. Higgins and S. Green, editors. Cochrane Handbook for Systematic Reviews of Interventions Version [updated March 2011]. The Cochrane Collaboration, Available from [2] B. A. Kitchenham. Guidelines for performing systematic literature reviews in software engineering version 2.3. Technical Report EBSE , Keele University and University of Durham, [3] Terje Nesbakken Lillegraven and Arnt Christian Wolden. Design of a bayesian recommender system for tourists presenting a solution to the cold-start user problem. Master s thesis, Department of Computer and Information Science, NTNU,
1. Systematic literature review
1. Systematic literature review Details about population, intervention, outcomes, databases searched, search strings, inclusion exclusion criteria are presented here. The aim of systematic literature review
Protocol for the Systematic Literature Review on Web Development Resource Estimation
Protocol for the Systematic Literature Review on Web Development Resource Estimation Author: Damir Azhar Supervisor: Associate Professor Emilia Mendes Table of Contents 1. Background... 4 2. Research Questions...
Review Protocol Agile Software Development
Review Protocol Agile Software Development Tore Dybå 1. Background The concept of Agile Software Development has sparked a lot of interest in both industry and academia. Advocates of agile methods consider
Performing systematic literature review in software engineering
Central Page 441 of 493 Performing systematic literature review in software engineering Zlatko Stapić Faculty of Organization and Informatics University of Zagreb Pavlinska 2, 42000 Varaždin, Croatia [email protected]
A Systematic Review Process for Software Engineering
A Systematic Review Process for Software Engineering Paula Mian, Tayana Conte, Ana Natali, Jorge Biolchini and Guilherme Travassos COPPE / UFRJ Computer Science Department Cx. Postal 68.511, CEP 21945-970,
18/11/2013. Getting the Searches off to a good start: Scoping the Literature and Devising a Search Strategy
Getting the Searches off to a good start: Scoping the Literature and Devising a Search Strategy Sheila Fisken Liaison Librarian Information Services University of Edinburgh [email protected] Chaotic
EMPIRICAL EVALUATION IN SOFTWARE PRODUCT LINE ENGINEERING
EMPIRICAL EVALUATION IN SOFTWARE PRODUCT LINE ENGINEERING Alvin Ahnassay, Ebrahim Bagheri, Dragan Gasevic Laboratory for Systems, Software and Semantics, Ryerson University Abstract: Context: Software
GUIDELINES FOR REVIEWING QUANTITATIVE DESCRIPTIVE STUDIES
GUIDELINES FOR REVIEWING QUANTITATIVE DESCRIPTIVE STUDIES These guidelines are intended to promote quality and consistency in CLEAR reviews of selected studies that use statistical techniques and other
Article Four Different Types of Evidence / Literature Reviews
Article Four Different Types of Evidence / Literature Reviews The rapid growth in the number of reviews undertaken can partly be explained by the current emphasis on evidence-based practice. Healthcare
A Systematic Mapping Study on Legacy System Modernization
A Systematic Mapping Study on Legacy System Modernization Everton de Vargas Agilar Rodrigo Bonifácio de Almeida Edna Dias Canedo Computer Centre Computer Science Department Faculty of Gama University of
ChangingPractice. Appraising Systematic Reviews. Evidence Based Practice Information Sheets for Health Professionals. What Are Systematic Reviews?
Supplement 1, 2000 ChangingPractice Evidence Based Practice Information Sheets for Health Professionals Appraising Systematic Reviews The series Changing Practice has been designed to support health professionals
SOFTWARE MULTI-SOURCING RISKS MANAGEMENT FROM VENDOR S PERSPECTIVE: A SYSTEMATIC LITERATURE REVIEW PROTOCOL
SOFTWARE MULTI-SOURCING RISKS MANAGEMENT FROM VENDOR S PERSPECTIVE: A SYSTEMATIC LITERATURE REVIEW PROTOCOL 1 Muhammad Yaseen, 2 Siffat Ullah Khan, 3 Asad Ullah Alam 1 Institute of Information Technology,
A SYSTEMATIC LITERATURE REVIEW ON AGILE PROJECT MANAGEMENT
LAPPEENRANTA UNIVERSITY OF TECHNOLOGY Department of Software Engineering and Information Management MASTER S THESIS A SYSTEMATIC LITERATURE REVIEW ON AGILE PROJECT MANAGEMENT Tampere, April 2, 2013 Sumsunnahar
Components and Functions of Crowdsourcing Systems
Fakultät Wirtschaftswissenschaften Lehrstuhl für Wirtschaftsinformatik, insbes. Informationsmanagement Components and Functions of Crowdsourcing Systems A Systematic Literature Review Lars Hetmank Dresden,
Guidelines for performing Systematic Literature Reviews in Software Engineering
Guidelines for performing Systematic Literature Reviews in Software Engineering Version 2.3 EBSE Technical Report EBSE-2007-01 Software Engineering Group School of Computer Science and Mathematics Keele
Human Factors in Software Development: A Systematic Literature Review
Human Factors in Software Development: A Systematic Literature Review Master of Science Thesis in Computer Science and Engineering Laleh Pirzadeh Department of Computer Science and Engineering Division
Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) Protocol (A Systematic Literature Review)
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 24-31 Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) Protocol (A Systematic
Information and Software Technology
Information and Software Technology 53 (2011) 317 343 Contents lists available at ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Measuring and predicting
Systematic reviews and meta-analysis
Evidence-Based Medicine And Healthcare Singapore Med J 2005 Vol 46(6) : 270 CME Article Systematic reviews and meta-analysis S Green ABSTRACT Systematic reviews form a potential method for overcoming the
Information and Software Technology
Information and Software Technology 55 (2013) 1341 1354 Contents lists available at SciVerse ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Systematic
Information and Software Technology
Information and Software Technology 52 (2010) 792 805 Contents lists available at ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Systematic literature
World Health Organization
March 1, 2005 Proposed Networks to Support Health Decision-Making and Health Policy Formulation in Low and Lower Middle Income Countries & Considerations for Implementation World Health Organization A
A Systematic Review of Automated Software Engineering
A Systematic Review of Automated Software Engineering Gegentana Master of Science Thesis in Program Software Engineering and Management Report No. 2011:066 ISSN:1651-4769 University of Gothenburg Department
Current State of Evidence-Based Software Engineering
Current State of Evidence-Based Software Engineering Barbara Kitchenham 1 Kitchenham 2007 Agenda Background Aims Method Results Conclusions 2 1 Background At ICSE04 Kitchenham, Dybå, and Jørgensen, proposed
Phone: 020 79115334 Email: [email protected]
Title Registration for a Systematic Review: Post-basic technical and vocational education and training (TVET) interventions to improve employability and employment of TVET graduates in low- and middle-income
Evidence-Based Software Engineering. Barbara Kitchenham Tore Dybå (SINTEF) Magne Jørgensen (Simula Laboratory)
1 Evidence-Based Software Engineering Barbara Kitchenham Tore Dybå (SINTEF) Magne Jørgensen (Simula Laboratory) Agenda The evidence-based paradigm Evidence-Based Software Engineering (EBSE) Goals Procedures
Extending Software Engineering Collaboration towards the Intersection of Software and Art
Extending Software Engineering Collaboration towards the Intersection of Software and Art PhD defence presentation, NTNU March 11, 2011 Salah Uddin Ahmed Outline Motivation and Research Context Software
Evaluation of the Search-Based Optimization Techniques to Schedule and Staff Software Projects: a Systematic Literature Review
Evaluation of the Search-Based Optimization Techniques to Schedule and Staff Software Projects: a Systematic Literature Review Daniela C. C. Peixoto a,, Geraldo Robson Mateus a, Rodolfo F. Resende a a
Systematic Mapping of Value-based Software Engineering - A Systematic Review of Valuebased Requirements Engineering
Master Thesis Software Engineering Thesis no: MSE-200:40 December 200 Systematic Mapping of Value-based Software Engineering - A Systematic Review of Valuebased Requirements Engineering Naseer Jan and
I. INTRODUCTION NOESIS ONTOLOGIES SEMANTICS AND ANNOTATION
Noesis: A Semantic Search Engine and Resource Aggregator for Atmospheric Science Sunil Movva, Rahul Ramachandran, Xiang Li, Phani Cherukuri, Sara Graves Information Technology and Systems Center University
Systematic Mapping Studies in Software Engineering
Systematic Mapping Studies in Software Engineering Kai Petersen,2, Robert Feldt, Shahid Mujtaba,2, Michael Mattsson School of Engineering, Blekinge Institute of Technology, Box 520 SE-372 25 Ronneby (kai.petersen
A Systematic Literature Review on Fault Prediction Performance in Software Engineering
1 A Systematic Literature Review on Fault Prediction Performance in Software Engineering Tracy Hall, Sarah Beecham, David Bowes, David Gray and Steve Counsell Abstract Background: The accurate prediction
ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.4 ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT Marijus Bernotas, Remigijus Laurutis, Asta Slotkienė Information
USE OF INFORMATION SOURCES AMONGST POSTGRADUATE STUDENTS IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING A CITATION ANALYSIS YIP SUMIN
USE OF INFORMATION SOURCES AMONGST POSTGRADUATE STUDENTS IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING A CITATION ANALYSIS YIP SUMIN A dissertation submitted in partial fulfillment of requirements for the
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs Using LibQUAL+ R to Identify Commonalities in Customer Satisfaction: The Secret to Success? Journal
Data Flow Organising action on Research Methods and Data Management
Data Flow Organising action on Research Methods and Data Management Research Methods Support for Collaborative Crop Research Program (CCRP) Projects Funded by the McKnight Foundation Data Flow Organising
Lean software development measures - A systematic mapping
Master Thesis Software Engineering Thesis no: 1MSE:2013-01 July 2013 Lean software development measures - A systematic mapping Markus Feyh School of Engineering Blekinge Institute of Technology SE-371
KEY PERFORMANCE INDICATORS (KPIS): DEFINE AND ACT
KEY PERFORMANCE INDICATORS (KPIS): DEFINE AND ACT Integrating KPIs into your company s strategy By Jacques Warren WHITE PAPER ABOUT JACQUES WARREN Jacques Warren has been working in online marketing for
Cloud Computing Organizational Benefits
Master Thesis Software Engineering January 2012 Cloud Computing Organizational Benefits A Managerial Concern Mandala Venkata Bhaskar Reddy and Marepalli Sharat Chandra School of Computing Blekinge Institute
A Systematic Review of Fault Prediction Performance in Software Engineering
Tracy Hall Brunel University A Systematic Review of Fault Prediction Performance in Software Engineering Sarah Beecham Lero The Irish Software Engineering Research Centre University of Limerick, Ireland
A Systematic Literature Review of Software Process Improvement for Small and Medium Web Companies
A Systematic Literature Review of Software Process Improvement for Small and Medium Web Companies Muhammad Sulayman PhD Student Department of Computer Science The University of Auckland [email protected]
Vuk Vuković Faculty of Economics Subotica, University of Novi Sad, Serbia [email protected]
WCM SYSTEMS AS SUPPORT TO INTELLECTUAL CAPITAL MANAGEMENT Jelica Trninić Faculty of Economics Subotica, University of Novi Sad, Serbia [email protected] Vuk Vuković Faculty of Economics Subotica, University
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
SOPLE-DE: An Approach to Design Service-Oriented Product Line Architectures
SOPLE-DE: An Approach to Design -Oriented Product Line Architectures Flávio M. Medeiros, Eduardo S. de Almeida 2, and Silvio R.L. Meira Federal University of Pernambuco (UFPE) 2 Federal University of Bahia
A systematic literature review on green software metrics
A systematic literature review on green software metrics Paolo Bozzelli Department of Computer Science VU University Amsterdam The Netherlands [email protected] Qing Gu Department of Computer Science
Submission of scientific peer-reviewed open literature for the approval of pesticide active substances under Regulation (EC) No 1107/2009 1, 2
GUIDANCE OF EFSA - DRAFT Submission of scientific peer-reviewed open literature for the approval of pesticide active substances under Regulation (EC) No 1107/2009 1, 2 ABSTRACT European Food Safety Authority
An IT Service Taxonomy for Elaborating IT Service Catalog
Master Thesis Software Engineering Thesis no: MSE-2009-34 December 2009 An IT Service Taxonomy for Elaborating IT Service Catalog Md Forhad Rabbi School of Engineering Blekinge Institute of Technology
Cloud Migration Research: A Systematic Review
This is an author s copy of the paper, which has been accepted for publication in a future issue of IEEE TRANSACTIONS ON CLOUD COMPUTING 1 Cloud Research: A Systematic Review Pooyan Jamshidi, Aakash Ahmad,
Pedagogical use of multiple choice tests Students create their own tests
Pedagogical use of multiple choice tests Students create their own tests Svend Andreas Horgen 1 1 Sør-Trøndelag University College, Trondheim, Norway, [email protected] Formative use of multiple choice
Social Media Monitoring, Planning and Delivery
Social Media Monitoring, Planning and Delivery G-CLOUD 4 SERVICES September 2013 V2.0 Contents 1. Service Overview... 3 2. G-Cloud Compliance... 12 Page 2 of 12 1. Service Overview Introduction CDS provide
9 Research Questions Resolved
217 9 Research Questions Resolved "All truths are easy to understand once they are discovered; the point is to discover them." Galileo Galilei. 9.1 Main Contributions In section 1.6 the thesis introduced
arxiv:1506.04135v1 [cs.ir] 12 Jun 2015
Reducing offline evaluation bias of collaborative filtering algorithms Arnaud de Myttenaere 1,2, Boris Golden 1, Bénédicte Le Grand 3 & Fabrice Rossi 2 arxiv:1506.04135v1 [cs.ir] 12 Jun 2015 1 - Viadeo
Using Provenance to Improve Workflow Design
Using Provenance to Improve Workflow Design Frederico T. de Oliveira, Leonardo Murta, Claudia Werner, Marta Mattoso COPPE/ Computer Science Department Federal University of Rio de Janeiro (UFRJ) {ftoliveira,
INTERNATIONAL FRAMEWORK FOR ASSURANCE ENGAGEMENTS CONTENTS
INTERNATIONAL FOR ASSURANCE ENGAGEMENTS (Effective for assurance reports issued on or after January 1, 2005) CONTENTS Paragraph Introduction... 1 6 Definition and Objective of an Assurance Engagement...
Social Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets
Social Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets D7.5 Dissemination Plan Project ref. no H2020 141111 Project acronym Start date of project (dur.) Document due Date
Department of Music, University of Jyväskylä
Music, Mind & Technology Master's Degree Program me Curriculum 2014-2016 1. PROGRAMME DESCRIPTION Music, Mind and Technology is a master's degree program, which consists of 120 ECTS credits and requires
Row Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
Secondary Data Analysis: A Method of which the Time Has Come
Qualitative and Quantitative Methods in Libraries (QQML) 3:619 626, 2014 Secondary Data Analysis: A Method of which the Time Has Come Melissa P. Johnston, PhD School of Library and Information Studies,
Using a Protocol Template for Case Study Planning
Using a Protocol Template for Case Study Planning Pearl Brereton School of Computing and Mathematics, Keele University, Keele, Staffordshire ST5 5BG, UK [email protected] Barbara Kitchenham
PEER REVIEW HISTORY ARTICLE DETAILS VERSION 1 - REVIEW. Tatyana A Shamliyan. I do not have COI. 30-May-2012
PEER REVIEW HISTORY BMJ Open publishes all reviews undertaken for accepted manuscripts. Reviewers are asked to complete a checklist review form (see an example) and are provided with free text boxes to
The BYU- Idaho social Work program is Accredited by the Council on Social Work Education (CSWE).
The BYU- Idaho social Work program is Accredited by the Council on Social Work Education (CSWE). The data presented below and the format are largely due to CSWE s requirements for accreditation. Program
Assessing study quality: critical appraisal. MRC/CSO Social and Public Health Sciences Unit
Assessing study quality: critical appraisal MRC/CSO Social and Public Health Sciences Unit Assessing study quality: why? Why critical appraise? Evidence informed decision-making assumes people make better
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review Susan M. Mitchell and Carolyn B. Seaman Information Systems Department,
White Paper What Solutions Architects Should Know About The TOGAF ADM
White Paper What Solutions Architects Should Know About The TOGAF ADM WP0015 October 2011 The Open Group Architecture Framework 1 (TOGAF) is the most widely referenced architecture framework currently
POLICY GUIDELINE ON INFORMATION SHARING
POLICY GUIDELINE ON INFORMATION SHARING September 2006 Royal Government of Bhutan Ministry of Information & Communications TABLE OF CONTENTS 1.0 BACKGROUND... 2 2.0 NEED FOR INFORMATION SHARING... 3 3.0
PCORI Methodology Standards: Academic Curriculum. 2016 Patient-Centered Outcomes Research Institute. All Rights Reserved.
PCORI Methodology Standards: Academic Curriculum 2016 Patient-Centered Outcomes Research Institute. All Rights Reserved. Module 5: Step 3 Search the Literature Category 11: Systematic Reviews Prepared
Single and Multiple-Case Study Designs IS493
1 2 Research Strategies Basic oppositions Survey research versus Case study quantitative versus qualitative The whole gamut Experiment Survey Archival analysis Historical research Case study 3 Basic Conditions
Assessing the effectiveness of medical therapies finding the right research for each patient: Medical Evidence Matters
Title Assessing the effectiveness of medical therapies finding the right research for each patient: Medical Evidence Matters Presenter / author Roger Tritton Director, Product Management, Dialog (A ProQuest
Seagull Intersection Layout. Island Point Road - A Case Study. Authors: John Harper, Wal Smart, Michael de Roos
Seagull Intersection Layout. Island Point Road - A Case Study Authors: John Harper, Wal Smart, Michael de Roos Presented by Mr John Harper, Road Safety and Traffic Services Manager Phone: 4221 2456 Mobile:
Agile Method Implementation
Agile Method Implementation A literature review exploring challenges and solutions when implementing agile Bachelor of Science Thesis in the Program of Software Engineering and Management Sabah Nouri Mohammed
ASKING CLINICAL QUESTIONS
MODULE 1: ASKING CLINICAL QUESTIONS There are two main types of clinical questions: background questions and foreground questions. Background questions are those which apply to the clinical topic for all
Empirical Evidence in Global Software Engineering: A Systematic Review
Empirical Evidence in Global Software Engineering: A Systematic Review DARJA SMITE, CLAES WOHLIN, TONY GORSCHEK, ROBERT FELDT IN THE JOURNAL OF EMPIRICAL SOFTWARE ENGINEERING DOI: 10.1007/s10664-009-9123-y
Guidance for the format and content of the protocol of non-interventional post-authorisation safety studies
26 September 2012 EMA/623947/2012 Patient Health Protection Guidance for the format and content of the protocol of non-interventional post-authorisation Introduction From 10 January 2013, marketing authorisation
User Manual: Version 5.0. System for the Unified Management, Assessment and Review of Information
User Manual: Version 5.0 System for the Unified Management, Assessment and Review of Information Welcome to Joanna Briggs Institute s User Manual for Sumari - System for the Unified Management, Assessment
4. A course must be pursued continuously except by where a break in study is approved by the College.
BIRKBECK, UNIVERSITY OF LONDON REGULATIONS FOR THE DEGREES OF MPhil AND PhD 1 Programme of Study 1. The length of a research degree is determined for each student individually by the authorities of the
Bachelor of Public Administration Curriculum
2010 Bachelor of Public Administration Curriculum From the beginning of the academic year 2010 1 Contents Preamble 1. Aims and scope of the degree programme 1.1. Aims 1.2. ECTS credits 1.3. Titles 1.4.
Visual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
Identifying and Prioritizing Research Gaps. Tim Carey, M.D., M.P.H. Amica Yon, Pharm.D. Chris Beadles, M.D. Roberta Wines, M.P.H.
Identifying and Prioritizing Research Gaps Tim Carey, M.D., M.P.H. Amica Yon, Pharm.D. Chris Beadles, M.D. Roberta Wines, M.P.H. 1 Importance: Why We Need to Identify and Prioritize Research Gaps from
Galileo Pre-K Online:
Galileo Pre-K Online: Aligned with the Head Start and the Office of Head Start Monitoring Protocol by Jason K. Feld, Ph.D. Assessment Technology, Incorporated 6700 E. Speedway Boulevard Tucson, Arizona
Information Visualization for Agile Development in Large Scale Organizations
Master Thesis Software Engineering September 2012 Information Visualization for Agile Development in Large Scale Organizations Numan Manzoor and Umar Shahzad School of Computing School of Computing Blekinge
Mobile Payment in Saudi Arabia
Mobile Payment in Saudi Arabia A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Sciences in Software Engineering At the College of Computer & Information Sciences
BPMN Business Process Modeling Notation
BPMN (BPMN) is a graphical notation that describes the logic of steps in a business process. This notation has been especially designed to coordinate the sequence of processes and messages that flow between
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
6 The Literature Review
6 The Literature Review The literature review is important because: It describes how the proposed research is related to prior research in statistics. It shows the originality and relevance of your research
Information and Software Technology
Information and Software Technology 53 (2011) 693 706 Contents lists available at ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Barriers in the selection
