SlideShare a Scribd company logo
Multilevel Collaboration between Software
Developers and the Impact of Proximity:
an Early, Preliminary Work	
  
Dawn Foster, Guido Conaldi, Riccardo De Vita
University of Greenwich
Centre for Business Network Analysis
http://www.gre.ac.uk/business/research/centres/cbna/home
Goals for Today
Very early work – seeking feedback on
•  Best approaches for incorporating
multilevel concepts.
•  Fitting a suitable model for multilevel
networks.
•  What we have done so far.
2	
  
Research Overview
How do participants who are paid by
firms collaborate within a fluid
organization?
Proximity theory as a theoretical framework:
•  to understand intraorganizational collaboration
•  within fluid organizations
•  using an open source software project, the
Linux kernel, as the empirical setting.
3	
  
Contributions
Contribute to literature on fluid organizations by:
•  Determining the impact of firm affiliation on intraorganizational
collaboration between individuals in fluid organizations.
–  Existing studies on open source mostly individual motivations.
–  Firms can influence collaboration of employees.
•  Demonstrating that proximity theory can be used to better
understand collaboration within fluid organizations.
–  Boschma’s (2005) five dimensions should further our understanding.
–  Most proximity studies are inter; Fluid boundaries blur distinction.
As fluid organizations become more common, understanding
collaboration within them is increasingly important. 4	
  
Fluid Organizations
•  In fluid organizations, the boundaries and structures allow fluid
movement within the organization as individuals collaborate to
coordinate activities (Ashkenas et al., 2002; Glance & Huberman, 1994).
•  Some fluid organizations are based on global virtual work across many
time zones by people from different backgrounds (Nurmi & Hinds, 2016)
and may include individuals from different firms and different types of
institutions (O’Mahony & Bechky, 2008).
•  Collaboration, especially within fluid organizations, crosses dimensions
of proximity, including cognitive, organizational, social, institutional and
geographical, which can be used to better understand collaboration
(Balland, 2012; Boschma, 2005; Cantner & Graf, 2006; Crescenzi,
Nathan, & Rodríguez-Pose, 2016; Knoben & Oerlemans, 2006).
5	
  
Proximity Theory
•  Social proximity: relations between actors with trust coming from friendship and
experience (Boschma 2005).
•  Institutional proximity: whether individuals collaborate more with others in a
similar institutional setting, like corporation, non-profit, university, non-affiliated,
etc. (Balland 2012; Crescenzi et al. 2013).
•  Organizational proximity: relationship within an organizational structure
(Boschma 2005) and to look at collaboration within and between orgs.
•  Cognitive proximity: similarity of frames of reference and knowledge (Knoben &
Oerlemans 2006).
•  Geographic Proximity: physical, spatial distance between actors (Boschma
2005). Online, geographical proximity is often irrelevant, but others have used a
temporal measure (time zones) (O’Leary & Cummings, 2007).
6	
  
Empirical Setting: Open Source
•  Open source frequently studied as a fluid organization (e.g. Chen
& O’Mahony, 2009; O'Mahony & Bechky, 2008; Puranam et al.,
2014)
•  Contributions by individuals, not firms (O’Mahony, 2007), but firms
are increasingly paying employees to contribute as a way to
participate (Jensen & Scacchi, 2007; Roberts et al., 2006).
•  Linux Kernel1:
–  < 8% of contributions by
unpaid software developers
–  Neutral project, competing
companies participate
–  22 million lines of code
–  14,000 developers
–  1,300 organisations
7	
  
Linux Kernel
Computer Hardware (CPU, memory, disk)
Linux Operating System (Red Hat, Ubuntu)
Applications (web browser, office)SystemonlyUserfacing
1 Corbet & Kroah-Hartman, 2016	
  
Collaboration Network
•  Network ties: Mailing Lists – ego replies to alter
–  Collaboration for code review, patch feedback, bugs & discussions
are on mailing lists before source code is accepted into repository.
•  “The mailing lists are still the primary communications space.”
•  “All of our collaboration happens over discussing patches.”
8	
  10 Mailing Lists 2015-01-27 90 days k-core>=10
Multilevel Network
•  Individual / Organizational / Mailing List Levels
–  Employers pay developers to enable firm’s products, gain
influence and set direction, share information, more.
–  Most consider affiliation with the Linux kernel community to
be more important than their employer.
–  Almost all contributions come from paid software developers.
–  Collaboration occurs in 200+ mailing lists simultaneously.
•  How does firm affiliation with an organization shape
collaboration of individuals?
•  How do mailing lists enable collaboration?
9	
  
Operationalizing Proximity
Using Boschma’s (2005) 5 dimensions of proximity
•  Organizational:
–  Operationalized as firm affiliation (company) or unaffiliated (hobbyist, etc.)
•  Cognitive:
–  Usually measured based on shared knowledge / technologies
–  Operationalized as contributing to areas of the source code (subsystems)
•  Geographic:
–  Usually measured based on physical location, less relevant for online
collaboration.
–  Operationalized using time zones (temporal geographic proximity)
•  Institutional:
–  Operationalized based on employment by firm, academia, or unaffiliated
•  Social:
–  Often measured using collaboration network (seems like double counting)
–  Operationalized by # of times dyad participated in same mailing list threads10	
  
Dataset
•  Subset for testing multilevel analysis – 2 years
•  Dates:
–  2013-11-01 (complete dataset: 2006-03-20 first LTS release)
–  2015-11-01 – date of 4.3 release
–  15, 30, 45, 60, 75, 90 day moving windows
•  Mailing Lists:
–  19 of the top mailing lists (over 200), excluded top mailing list
–  226,919 messages (out of 2,818,774 for top 20, all dates)
•  Source Code:
–  Linux-stable tree
–  177,113 commits (out of 603,006 for all dates)
11	
  
Relational Event Models
•  Relational event models provide a “highly flexible framework for
modeling actions within social settings, which permits likelihood-based
inference for behavioral mechanisms with complex
dependence.” (Butts, 2008, p. 155)
•  Based on relational events, or actions generated by sender directed
toward a receiver. Represented by sender, receiver, action type and
time (Butts, 2008).
•  Mailing list data with a time stamp for each message provides useful
data for relational event models.
•  Each reply to a mailing list post can be thought of as an event created
by a sender targeted at a receiver.
•  Used to explain likelihood of collaboration between 2 developers given
influence of dimensions of proximity and other effects.
12	
  
Effects: Dyadic P-Shifts, Recency
13	
  
Illustra3ons	
  by	
  	
  
Carter	
  Bu;s,	
  	
  
Sunbelt	
  2015	
  
Results - Series of difficulties
•  REM model struggled with number of events:
–  Reduced to first 500 events (1.5 days) to get the model to run
(used first 200 events as control, ran model with 300 events)
–  Takes 6+ hours to estimate 600 events (3 days) on a big server.
–  Might have to do with the way we are loading variables into the
model.
–  Possible other limitations with the REM model / Relevent software
14	
  
Preliminary Results
15	
  
Preliminary Results
•  Model not yet complete: Testing the waters now.
–  tiny number of events won’t represent whole.
–  missing variables likely to change these results.
–  need to analyze per mailing list (mailing list level)
•  Proximity looks promising as theoretical framework
–  Org prox - less likely to reply to other employees. Do they
use internal corporate channels to collaborate?
–  Cognitive prox – more likely to reply to people working in
same areas of code.
–  Geo prox – less likely to reply as tz difference increases
16	
  
Future Developments / Feedback
•  We know the Model has issues:
–  Get feedback on what we have done so far and on
fitting a suitable model for multilevel networks.
•  Multilevel: Both aspects need to be developed:
–  Multilevel analysis of networks: multiple mailing lists at the same
time (like classrooms within schools)
•  Mailing lists as levels? How do we do this?
–  Analysis of multilevel networks: complex models for networks -
modeling organizational affiliation as a level.
•  Can we treat organizations as a level, instead of as an attribute of developers?
•  Need to look at org level to see interactions by organization.
•  Relational Event Models:
–  Options for modeling large event sequences in networks. 17	
  
Thank You and Questions
Authors:	
  
	
  
Dawn	
  M.	
  Foster	
   	
  D.M.Foster@greenwich.ac.uk	
  	
  	
  	
  
	
  
Guido	
  Conaldi 	
  	
   	
  G.Conaldi@greenwich.ac.uk	
  
	
  
Riccardo	
  De	
  Vita 	
  	
  R.DeVita@greenwich.ac.uk	
  
	
  
	
  
University	
  of	
  Greenwich,	
  Centre	
  for	
  Business	
  Network	
  Analysis	
  
h;p://www.gre.ac.uk/business/research/centres/cbna	
  
18	
  

More Related Content

What's hot

Understanding Collaboration in Fluid Organizations, a Proximity Approach
Understanding Collaboration in Fluid Organizations, a Proximity ApproachUnderstanding Collaboration in Fluid Organizations, a Proximity Approach
Understanding Collaboration in Fluid Organizations, a Proximity Approach
Dawn Foster
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
Patti Anklam
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
Christian Bokhove
 
Integrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government CommunicationIntegrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government Communication
Mike Kujawski
 
Social networks for managers
Social networks for managersSocial networks for managers
Social networks for managers
Patti Anklam
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
Toronto Metropolitan University
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
paperpublications3
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network Analysis
Olivier Serrat
 
Organizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its ApplicationsOrganizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its Applications
Sam Shah
 
Defense
DefenseDefense
Defense
ac2182
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Arsalan Khan
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
Wael Elrifai
 
ONA and the tools landscape
ONA and the tools landscapeONA and the tools landscape
ONA and the tools landscape
Patti Anklam
 
An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...
LeMeniz Infotech
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Giorgos Cheliotis
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
Fabernovel
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Xiaohan Zeng
 
Link Prediction Survey
Link Prediction SurveyLink Prediction Survey
Link Prediction Survey
Patrick Walter
 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...
Jeromy Anglim
 
Preso on social network analysis for rtp analytics unconference
Preso on social network analysis for rtp analytics unconferencePreso on social network analysis for rtp analytics unconference
Preso on social network analysis for rtp analytics unconference
Bruce Conner
 

What's hot (20)

Understanding Collaboration in Fluid Organizations, a Proximity Approach
Understanding Collaboration in Fluid Organizations, a Proximity ApproachUnderstanding Collaboration in Fluid Organizations, a Proximity Approach
Understanding Collaboration in Fluid Organizations, a Proximity Approach
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
 
Integrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government CommunicationIntegrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government Communication
 
Social networks for managers
Social networks for managersSocial networks for managers
Social networks for managers
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network Analysis
 
Organizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its ApplicationsOrganizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its Applications
 
Defense
DefenseDefense
Defense
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
ONA and the tools landscape
ONA and the tools landscapeONA and the tools landscape
ONA and the tools landscape
 
An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 
Link Prediction Survey
Link Prediction SurveyLink Prediction Survey
Link Prediction Survey
 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...
 
Preso on social network analysis for rtp analytics unconference
Preso on social network analysis for rtp analytics unconferencePreso on social network analysis for rtp analytics unconference
Preso on social network analysis for rtp analytics unconference
 

Viewers also liked

Памятка о вреде курения
Памятка о вреде куренияПамятка о вреде курения
Памятка о вреде курения
Андрей Якименко
 
LRWorld - Μάρτιος 2017 (GR/CY)
LRWorld - Μάρτιος 2017 (GR/CY)LRWorld - Μάρτιος 2017 (GR/CY)
LRWorld - Μάρτιος 2017 (GR/CY)
Zissis Ahladas
 
Modes of documentary
Modes of documentaryModes of documentary
Modes of documentary
iain bruce
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Planned child list
Planned child listPlanned child list
Planned child list
Onodera Masato
 
Task 4 - Client Fact File
Task 4 - Client Fact File Task 4 - Client Fact File
Task 4 - Client Fact File
Rebecca Coughlin
 
3Com 3C579
3Com 3C5793Com 3C579
3Com 3C579
savomir
 
Lma salary survey - commerce & industry
Lma salary survey - commerce & industryLma salary survey - commerce & industry
Lma salary survey - commerce & industry
shahaf raz
 
Sudan historical stamps
Sudan historical stampsSudan historical stamps
Sudan historical stamps
Twonilestanweer
 
Interviewing and Follow-Up Messages
Interviewing and Follow-Up MessagesInterviewing and Follow-Up Messages
Interviewing and Follow-Up Messages
FaHaD .H. NooR
 

Viewers also liked (10)

Памятка о вреде курения
Памятка о вреде куренияПамятка о вреде курения
Памятка о вреде курения
 
LRWorld - Μάρτιος 2017 (GR/CY)
LRWorld - Μάρτιος 2017 (GR/CY)LRWorld - Μάρτιος 2017 (GR/CY)
LRWorld - Μάρτιος 2017 (GR/CY)
 
Modes of documentary
Modes of documentaryModes of documentary
Modes of documentary
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Planned child list
Planned child listPlanned child list
Planned child list
 
Task 4 - Client Fact File
Task 4 - Client Fact File Task 4 - Client Fact File
Task 4 - Client Fact File
 
3Com 3C579
3Com 3C5793Com 3C579
3Com 3C579
 
Lma salary survey - commerce & industry
Lma salary survey - commerce & industryLma salary survey - commerce & industry
Lma salary survey - commerce & industry
 
Sudan historical stamps
Sudan historical stampsSudan historical stamps
Sudan historical stamps
 
Interviewing and Follow-Up Messages
Interviewing and Follow-Up MessagesInterviewing and Follow-Up Messages
Interviewing and Follow-Up Messages
 

Similar to Multilevel Collaboration between Software Developers and the Impact of Proximity: an Early, Preliminary Work

Collaboration between Software Developers and the Impact of Proximity
Collaboration between Software Developers  and the Impact of ProximityCollaboration between Software Developers  and the Impact of Proximity
Collaboration between Software Developers and the Impact of Proximity
Dawn Foster
 
Coordination Dynamics in Free/Libre and Open Source Software
Coordination Dynamics in Free/Libre and Open Source SoftwareCoordination Dynamics in Free/Libre and Open Source Software
Coordination Dynamics in Free/Libre and Open Source Software
Andrea Wiggins
 
Operationalisation of Collaboration Sunbelt 2015
Operationalisation of Collaboration Sunbelt 2015Operationalisation of Collaboration Sunbelt 2015
Operationalisation of Collaboration Sunbelt 2015
Dawn Foster
 
Howison si2 keynote
Howison si2 keynoteHowison si2 keynote
Howison si2 keynote
James Howison
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
IRJET Journal
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
Saqib Shehzad
 
Share Point Summit 2010 - Selling SharePoint to Decision Makers
Share Point Summit 2010 - Selling SharePoint to Decision MakersShare Point Summit 2010 - Selling SharePoint to Decision Makers
Share Point Summit 2010 - Selling SharePoint to Decision Makers
Rich Blank
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
Daniel Katz
 
Ecosystems_10.01.10
Ecosystems_10.01.10Ecosystems_10.01.10
Ecosystems_10.01.10
MidMarket Place
 
Recommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a modelRecommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a model
Marcel Blattner, PhD
 
Co-creation of Learning and Social CRM
Co-creation of Learning and Social CRMCo-creation of Learning and Social CRM
Co-creation of Learning and Social CRM
Darshan Desai
 
Quality, Cost, and Governance of Open Source Software
Quality, Cost, and Governance of Open Source SoftwareQuality, Cost, and Governance of Open Source Software
Quality, Cost, and Governance of Open Source Software
Girl Geek Dinners Milano
 
Ona For Community Roundtable
Ona For Community RoundtableOna For Community Roundtable
Ona For Community Roundtable
Patti Anklam
 
Data Collaboration Stack
Data Collaboration StackData Collaboration Stack
Data Collaboration Stack
Pierre Brunelle
 
Toward a System Building Agenda for Data Integration(and Dat.docx
Toward a System Building Agenda for Data Integration(and Dat.docxToward a System Building Agenda for Data Integration(and Dat.docx
Toward a System Building Agenda for Data Integration(and Dat.docx
juliennehar
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015
Marianne Sweeny
 
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...
Tom Mens
 
Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!
Tom Mens
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
Lora Aroyo
 
Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...
Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...
Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...
Maarten de Laat, LOOK, Open Universiteit, The Netherlands
 

Similar to Multilevel Collaboration between Software Developers and the Impact of Proximity: an Early, Preliminary Work (20)

Collaboration between Software Developers and the Impact of Proximity
Collaboration between Software Developers  and the Impact of ProximityCollaboration between Software Developers  and the Impact of Proximity
Collaboration between Software Developers and the Impact of Proximity
 
Coordination Dynamics in Free/Libre and Open Source Software
Coordination Dynamics in Free/Libre and Open Source SoftwareCoordination Dynamics in Free/Libre and Open Source Software
Coordination Dynamics in Free/Libre and Open Source Software
 
Operationalisation of Collaboration Sunbelt 2015
Operationalisation of Collaboration Sunbelt 2015Operationalisation of Collaboration Sunbelt 2015
Operationalisation of Collaboration Sunbelt 2015
 
Howison si2 keynote
Howison si2 keynoteHowison si2 keynote
Howison si2 keynote
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
 
Share Point Summit 2010 - Selling SharePoint to Decision Makers
Share Point Summit 2010 - Selling SharePoint to Decision MakersShare Point Summit 2010 - Selling SharePoint to Decision Makers
Share Point Summit 2010 - Selling SharePoint to Decision Makers
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 4 - Professor...
 
Ecosystems_10.01.10
Ecosystems_10.01.10Ecosystems_10.01.10
Ecosystems_10.01.10
 
Recommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a modelRecommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a model
 
Co-creation of Learning and Social CRM
Co-creation of Learning and Social CRMCo-creation of Learning and Social CRM
Co-creation of Learning and Social CRM
 
Quality, Cost, and Governance of Open Source Software
Quality, Cost, and Governance of Open Source SoftwareQuality, Cost, and Governance of Open Source Software
Quality, Cost, and Governance of Open Source Software
 
Ona For Community Roundtable
Ona For Community RoundtableOna For Community Roundtable
Ona For Community Roundtable
 
Data Collaboration Stack
Data Collaboration StackData Collaboration Stack
Data Collaboration Stack
 
Toward a System Building Agenda for Data Integration(and Dat.docx
Toward a System Building Agenda for Data Integration(and Dat.docxToward a System Building Agenda for Data Integration(and Dat.docx
Toward a System Building Agenda for Data Integration(and Dat.docx
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015
 
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...
 
Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!Software Ecosystem Evolution. It's complex!
Software Ecosystem Evolution. It's complex!
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...
Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...
Network Awareness Tool - Learning Analytics in the workplace: 
Detecting and ...
 

More from Dawn Foster

CHAOSS Metrics Overview and Examples
CHAOSS Metrics Overview and ExamplesCHAOSS Metrics Overview and Examples
CHAOSS Metrics Overview and Examples
Dawn Foster
 
Be a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in KubernetesBe a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in Kubernetes
Dawn Foster
 
Overcoming Imposter Syndrome to Become a Conference Speaker!
Overcoming Imposter Syndrome to Become a Conference Speaker!Overcoming Imposter Syndrome to Become a Conference Speaker!
Overcoming Imposter Syndrome to Become a Conference Speaker!
Dawn Foster
 
How to Be a Good Corporate Citizen in Open Source
How to Be a Good Corporate Citizen in Open SourceHow to Be a Good Corporate Citizen in Open Source
How to Be a Good Corporate Citizen in Open Source
Dawn Foster
 
Open Source Collaboration and Companies: Finding the Right Balance
Open Source Collaboration and Companies: Finding the Right BalanceOpen Source Collaboration and Companies: Finding the Right Balance
Open Source Collaboration and Companies: Finding the Right Balance
Dawn Foster
 
Navigating Open Source Risk
Navigating Open Source RiskNavigating Open Source Risk
Navigating Open Source Risk
Dawn Foster
 
Measuring Project Health at VMware
Measuring Project Health at VMwareMeasuring Project Health at VMware
Measuring Project Health at VMware
Dawn Foster
 
Navigating Open Source Risk
Navigating Open Source RiskNavigating Open Source Risk
Navigating Open Source Risk
Dawn Foster
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
Dawn Foster
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
Dawn Foster
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
Dawn Foster
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
Dawn Foster
 
Is this Open Source Project Healthy or Lifeless?
Is this Open Source Project Healthy or Lifeless?Is this Open Source Project Healthy or Lifeless?
Is this Open Source Project Healthy or Lifeless?
Dawn Foster
 
Collaboration in Linux Kernel Mailing Lists
Collaboration in Linux Kernel Mailing Lists Collaboration in Linux Kernel Mailing Lists
Collaboration in Linux Kernel Mailing Lists
Dawn Foster
 
Be a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in KubernetesBe a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in Kubernetes
Dawn Foster
 
Being a Good Corporate Citizen in Open Source
Being a Good Corporate Citizen in Open SourceBeing a Good Corporate Citizen in Open Source
Being a Good Corporate Citizen in Open Source
Dawn Foster
 
Building Community for your Company’s OSS Projects
Building Community for your Company’s OSS ProjectsBuilding Community for your Company’s OSS Projects
Building Community for your Company’s OSS Projects
Dawn Foster
 
Building Community for your Company’s OSS Project
Building Community for your Company’s OSS ProjectBuilding Community for your Company’s OSS Project
Building Community for your Company’s OSS Project
Dawn Foster
 
How to be a terrible hiring manager
How to be a terrible hiring managerHow to be a terrible hiring manager
How to be a terrible hiring manager
Dawn Foster
 
A week in the Life of Kubernetes
A week in the Life of KubernetesA week in the Life of Kubernetes
A week in the Life of Kubernetes
Dawn Foster
 

More from Dawn Foster (20)

CHAOSS Metrics Overview and Examples
CHAOSS Metrics Overview and ExamplesCHAOSS Metrics Overview and Examples
CHAOSS Metrics Overview and Examples
 
Be a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in KubernetesBe a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in Kubernetes
 
Overcoming Imposter Syndrome to Become a Conference Speaker!
Overcoming Imposter Syndrome to Become a Conference Speaker!Overcoming Imposter Syndrome to Become a Conference Speaker!
Overcoming Imposter Syndrome to Become a Conference Speaker!
 
How to Be a Good Corporate Citizen in Open Source
How to Be a Good Corporate Citizen in Open SourceHow to Be a Good Corporate Citizen in Open Source
How to Be a Good Corporate Citizen in Open Source
 
Open Source Collaboration and Companies: Finding the Right Balance
Open Source Collaboration and Companies: Finding the Right BalanceOpen Source Collaboration and Companies: Finding the Right Balance
Open Source Collaboration and Companies: Finding the Right Balance
 
Navigating Open Source Risk
Navigating Open Source RiskNavigating Open Source Risk
Navigating Open Source Risk
 
Measuring Project Health at VMware
Measuring Project Health at VMwareMeasuring Project Health at VMware
Measuring Project Health at VMware
 
Navigating Open Source Risk
Navigating Open Source RiskNavigating Open Source Risk
Navigating Open Source Risk
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
 
Collaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company AffiliationCollaborative Leadership: Governance Beyond Company Affiliation
Collaborative Leadership: Governance Beyond Company Affiliation
 
Is this Open Source Project Healthy or Lifeless?
Is this Open Source Project Healthy or Lifeless?Is this Open Source Project Healthy or Lifeless?
Is this Open Source Project Healthy or Lifeless?
 
Collaboration in Linux Kernel Mailing Lists
Collaboration in Linux Kernel Mailing Lists Collaboration in Linux Kernel Mailing Lists
Collaboration in Linux Kernel Mailing Lists
 
Be a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in KubernetesBe a Good Corporate Citizen in Kubernetes
Be a Good Corporate Citizen in Kubernetes
 
Being a Good Corporate Citizen in Open Source
Being a Good Corporate Citizen in Open SourceBeing a Good Corporate Citizen in Open Source
Being a Good Corporate Citizen in Open Source
 
Building Community for your Company’s OSS Projects
Building Community for your Company’s OSS ProjectsBuilding Community for your Company’s OSS Projects
Building Community for your Company’s OSS Projects
 
Building Community for your Company’s OSS Project
Building Community for your Company’s OSS ProjectBuilding Community for your Company’s OSS Project
Building Community for your Company’s OSS Project
 
How to be a terrible hiring manager
How to be a terrible hiring managerHow to be a terrible hiring manager
How to be a terrible hiring manager
 
A week in the Life of Kubernetes
A week in the Life of KubernetesA week in the Life of Kubernetes
A week in the Life of Kubernetes
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Multilevel Collaboration between Software Developers and the Impact of Proximity: an Early, Preliminary Work

  • 1. Multilevel Collaboration between Software Developers and the Impact of Proximity: an Early, Preliminary Work   Dawn Foster, Guido Conaldi, Riccardo De Vita University of Greenwich Centre for Business Network Analysis http://www.gre.ac.uk/business/research/centres/cbna/home
  • 2. Goals for Today Very early work – seeking feedback on •  Best approaches for incorporating multilevel concepts. •  Fitting a suitable model for multilevel networks. •  What we have done so far. 2  
  • 3. Research Overview How do participants who are paid by firms collaborate within a fluid organization? Proximity theory as a theoretical framework: •  to understand intraorganizational collaboration •  within fluid organizations •  using an open source software project, the Linux kernel, as the empirical setting. 3  
  • 4. Contributions Contribute to literature on fluid organizations by: •  Determining the impact of firm affiliation on intraorganizational collaboration between individuals in fluid organizations. –  Existing studies on open source mostly individual motivations. –  Firms can influence collaboration of employees. •  Demonstrating that proximity theory can be used to better understand collaboration within fluid organizations. –  Boschma’s (2005) five dimensions should further our understanding. –  Most proximity studies are inter; Fluid boundaries blur distinction. As fluid organizations become more common, understanding collaboration within them is increasingly important. 4  
  • 5. Fluid Organizations •  In fluid organizations, the boundaries and structures allow fluid movement within the organization as individuals collaborate to coordinate activities (Ashkenas et al., 2002; Glance & Huberman, 1994). •  Some fluid organizations are based on global virtual work across many time zones by people from different backgrounds (Nurmi & Hinds, 2016) and may include individuals from different firms and different types of institutions (O’Mahony & Bechky, 2008). •  Collaboration, especially within fluid organizations, crosses dimensions of proximity, including cognitive, organizational, social, institutional and geographical, which can be used to better understand collaboration (Balland, 2012; Boschma, 2005; Cantner & Graf, 2006; Crescenzi, Nathan, & Rodríguez-Pose, 2016; Knoben & Oerlemans, 2006). 5  
  • 6. Proximity Theory •  Social proximity: relations between actors with trust coming from friendship and experience (Boschma 2005). •  Institutional proximity: whether individuals collaborate more with others in a similar institutional setting, like corporation, non-profit, university, non-affiliated, etc. (Balland 2012; Crescenzi et al. 2013). •  Organizational proximity: relationship within an organizational structure (Boschma 2005) and to look at collaboration within and between orgs. •  Cognitive proximity: similarity of frames of reference and knowledge (Knoben & Oerlemans 2006). •  Geographic Proximity: physical, spatial distance between actors (Boschma 2005). Online, geographical proximity is often irrelevant, but others have used a temporal measure (time zones) (O’Leary & Cummings, 2007). 6  
  • 7. Empirical Setting: Open Source •  Open source frequently studied as a fluid organization (e.g. Chen & O’Mahony, 2009; O'Mahony & Bechky, 2008; Puranam et al., 2014) •  Contributions by individuals, not firms (O’Mahony, 2007), but firms are increasingly paying employees to contribute as a way to participate (Jensen & Scacchi, 2007; Roberts et al., 2006). •  Linux Kernel1: –  < 8% of contributions by unpaid software developers –  Neutral project, competing companies participate –  22 million lines of code –  14,000 developers –  1,300 organisations 7   Linux Kernel Computer Hardware (CPU, memory, disk) Linux Operating System (Red Hat, Ubuntu) Applications (web browser, office)SystemonlyUserfacing 1 Corbet & Kroah-Hartman, 2016  
  • 8. Collaboration Network •  Network ties: Mailing Lists – ego replies to alter –  Collaboration for code review, patch feedback, bugs & discussions are on mailing lists before source code is accepted into repository. •  “The mailing lists are still the primary communications space.” •  “All of our collaboration happens over discussing patches.” 8  10 Mailing Lists 2015-01-27 90 days k-core>=10
  • 9. Multilevel Network •  Individual / Organizational / Mailing List Levels –  Employers pay developers to enable firm’s products, gain influence and set direction, share information, more. –  Most consider affiliation with the Linux kernel community to be more important than their employer. –  Almost all contributions come from paid software developers. –  Collaboration occurs in 200+ mailing lists simultaneously. •  How does firm affiliation with an organization shape collaboration of individuals? •  How do mailing lists enable collaboration? 9  
  • 10. Operationalizing Proximity Using Boschma’s (2005) 5 dimensions of proximity •  Organizational: –  Operationalized as firm affiliation (company) or unaffiliated (hobbyist, etc.) •  Cognitive: –  Usually measured based on shared knowledge / technologies –  Operationalized as contributing to areas of the source code (subsystems) •  Geographic: –  Usually measured based on physical location, less relevant for online collaboration. –  Operationalized using time zones (temporal geographic proximity) •  Institutional: –  Operationalized based on employment by firm, academia, or unaffiliated •  Social: –  Often measured using collaboration network (seems like double counting) –  Operationalized by # of times dyad participated in same mailing list threads10  
  • 11. Dataset •  Subset for testing multilevel analysis – 2 years •  Dates: –  2013-11-01 (complete dataset: 2006-03-20 first LTS release) –  2015-11-01 – date of 4.3 release –  15, 30, 45, 60, 75, 90 day moving windows •  Mailing Lists: –  19 of the top mailing lists (over 200), excluded top mailing list –  226,919 messages (out of 2,818,774 for top 20, all dates) •  Source Code: –  Linux-stable tree –  177,113 commits (out of 603,006 for all dates) 11  
  • 12. Relational Event Models •  Relational event models provide a “highly flexible framework for modeling actions within social settings, which permits likelihood-based inference for behavioral mechanisms with complex dependence.” (Butts, 2008, p. 155) •  Based on relational events, or actions generated by sender directed toward a receiver. Represented by sender, receiver, action type and time (Butts, 2008). •  Mailing list data with a time stamp for each message provides useful data for relational event models. •  Each reply to a mailing list post can be thought of as an event created by a sender targeted at a receiver. •  Used to explain likelihood of collaboration between 2 developers given influence of dimensions of proximity and other effects. 12  
  • 13. Effects: Dyadic P-Shifts, Recency 13   Illustra3ons  by     Carter  Bu;s,     Sunbelt  2015  
  • 14. Results - Series of difficulties •  REM model struggled with number of events: –  Reduced to first 500 events (1.5 days) to get the model to run (used first 200 events as control, ran model with 300 events) –  Takes 6+ hours to estimate 600 events (3 days) on a big server. –  Might have to do with the way we are loading variables into the model. –  Possible other limitations with the REM model / Relevent software 14  
  • 16. Preliminary Results •  Model not yet complete: Testing the waters now. –  tiny number of events won’t represent whole. –  missing variables likely to change these results. –  need to analyze per mailing list (mailing list level) •  Proximity looks promising as theoretical framework –  Org prox - less likely to reply to other employees. Do they use internal corporate channels to collaborate? –  Cognitive prox – more likely to reply to people working in same areas of code. –  Geo prox – less likely to reply as tz difference increases 16  
  • 17. Future Developments / Feedback •  We know the Model has issues: –  Get feedback on what we have done so far and on fitting a suitable model for multilevel networks. •  Multilevel: Both aspects need to be developed: –  Multilevel analysis of networks: multiple mailing lists at the same time (like classrooms within schools) •  Mailing lists as levels? How do we do this? –  Analysis of multilevel networks: complex models for networks - modeling organizational affiliation as a level. •  Can we treat organizations as a level, instead of as an attribute of developers? •  Need to look at org level to see interactions by organization. •  Relational Event Models: –  Options for modeling large event sequences in networks. 17  
  • 18. Thank You and Questions Authors:     Dawn  M.  Foster    D.M.Foster@greenwich.ac.uk           Guido  Conaldi      G.Conaldi@greenwich.ac.uk     Riccardo  De  Vita    R.DeVita@greenwich.ac.uk       University  of  Greenwich,  Centre  for  Business  Network  Analysis   h;p://www.gre.ac.uk/business/research/centres/cbna   18