SlideShare a Scribd company logo
1 of 41
Download to read offline
Predictors of Customer Perceived
        SOFTWARE
          QUALITY


                           presented by
                  Nicolas Bettenburg
Software Quality
              matters!




01 / 28
Imagine the Product
     Does NOT Satisfy
     a Customers Needs ...




02 / 28
The
      company suffers
          •Maintenance costs

          •Additional expenses

          •Missed business opportunities

03 / 28
Predict customerʼs
          experiences within the
                 first 3 months!



04 / 28
What are the
          factors?


05 / 28
software platform     hardware         install location




          software updates     system size     missing information




      deployment issues       usage patterns    service contract




06 / 28
Operating                 System
         System                    Size




                    Predictors

                                           Software
Ports                                      Upgrades




                     Deployment
                        Time
Use Predictors
     to form Models



13 / 28
Software Failure
          Rare, high-impact problems
          resulting in a software change
          use logistic regression.




          Customer Interactions
          Frequent, low-impact problems,
          resulting in a customer call
          use linear regression.

14 / 28
15 / 28
Logistic Regression

                             xi β
                            e
          P (Yi = 1|xi ) =
                           1+exi β




16 / 28
Logistic Regression

                             xi β
                            e
          P (Yi = 1|xi ) =
             Binary
                           1+exi β
           Response
            Variable




16 / 28
Logistic Regression

                                   xi β
                            e
          P (Yi = 1|xi ) =
             Binary
                           1+exi β
           Response    Predictor
            Variable   Variable




16 / 28
Logistic Regression

                                        xi β
                            e
          P (Yi = 1|xi ) =
             Binary
                           1+exi β
           Response    Predictor    Logistic Model
            Variable   Variable    for one predictor
                                        Variable




16 / 28
Logistic Regression

              Failure Report




                               System Size
17 / 28
Logistic Regression

              Failure Report




                               System Size
18 / 28
Logistic Regression




19 / 28
Logistic Regression



            Beta Coefficient




19 / 28
Logistic Regression



            Beta Coefficient   Significancy Measures




19 / 28
Software Failure Model
          5.1.1 Modeling software failures
                                                                           sys
                           Estimate   Std. Err.   z-value      Pr(>|z|)    sys
             (Intercept)     −5.26        0.64     −8.18      3 ∗ 10−16    tan
            log(rtime)       −0.30        0.03     −8.85    < 2 ∗ 10−16    as
                   Upgr        1.38       0.15       9.01   < 2 ∗ 10−16
                    OX       −1.18        0.17     −6.75      2 ∗ 10−11    ah
                   WIN         1.01       0.34       2.98         0.003    ife
           log(nP ort)         0.36       0.08       4.37          10−5    bo
             nP ortN A         2.03       0.58       3.49      5 ∗ 10−4
               LARGE           0.52       0.20       2.67           0.01   cau
                    Svc        0.57       0.18       3.11           .002   fer
                     US        0.52       0.27       1.92           0.05   the
                                                                           a s
                   Table 1: Software failure regression results.           tiv
20 / 28
                                                                           ag
Software Failure Model
          5.1.1 Modeling software failures
                                                                           sys
                           Estimate   Std. Err.   z-value      Pr(>|z|)    sys
             (Intercept)     −5.26        0.64     −8.18      3 ∗ 10−16    tan
            log(rtime)       −0.30        0.03     −8.85    < 2 ∗ 10−16    as
                   Upgr        1.38       0.15       9.01   < 2 ∗ 10−16
                    OX       −1.18        0.17     −6.75      2 ∗ 10−11    ah
                   WIN         1.01       0.34       2.98         0.003    ife
           log(nP ort)         0.36       0.08       4.37          10−5    bo
             nP ortN A         2.03       0.58       3.49      5 ∗ 10−4
               LARGE           0.52       0.20       2.67           0.01   cau
                    Svc        0.57       0.18       3.11           .002   fer
                     US        0.52       0.27       1.92           0.05   the
                                                                           a s
                   Table 1: Software failure regression results.           tiv
20 / 28
                                                                           ag
Software Failure Model
          5.1.1 Modeling software failures
                                                                           sys
                           Estimate   Std. Err.   z-value      Pr(>|z|)    sys
             (Intercept)     −5.26        0.64     −8.18      3 ∗ 10−16    tan
            log(rtime)       −0.30        0.03     −8.85    < 2 ∗ 10−16    as
                   Upgr        1.38       0.15       9.01   < 2 ∗ 10−16
                    OX       −1.18        0.17     −6.75      2 ∗ 10−11    ah
                   WIN         1.01       0.34       2.98         0.003    ife
           log(nP ort)         0.36       0.08       4.37          10−5    bo
             nP ortN A         2.03       0.58       3.49      5 ∗ 10−4
               LARGE           0.52       0.20       2.67           0.01   cau
                    Svc        0.57       0.18       3.11           .002   fer
                     US        0.52       0.27       1.92           0.05   the
                                                                           a s
                   Table 1: Software failure regression results.           tiv
20 / 28
                                                                           ag
Software Failure Model
          5.1.1 Modeling software failures
                                                                     sys
                         Estimate Std. Err. z-value             e!
                                                          Pr(>|z|)
                                                             as
                                                                     sys
             (Intercept)   −5.26       0.64   −8.18     3 ∗e −16
                                                         el 10       tan
                                                      rr
            log(rtime)     −0.30       0.03   −8.85ajo 2 ∗ 10−16
                                                      <              as
                    Upgr     1.38              a m < 2 ∗ 10−16
                                       0.15 to 9.01
                     OX    −1.18       0.17e −6.75
                                      ra d              2 ∗ 10−11    ah
                    WIN      1.01 u pg 0.34    2.98          0.003   ife
           log(nP ort)       s t to
                             0.36      0.08    4.37          10−5    bo
                          fir
             nP ortN Athe    2.03      0.58    3.49      5 ∗ 10−4
                 ʼt
               LARGEbe       0.52      0.20    2.67           0.01   cau
            d on Svc         0.57      0.18    3.11           .002   fer
                     US      0.52      0.27    1.92           0.05   the
                                                                     a s
                 Table 1: Software failure regression results.       tiv
20 / 28
                                                                     ag
Linear Regression


                E(log(Yi )) = xi β




21 / 28
Linear Regression


                E(log(Yi )) = xi β
                      Number of
                    Customer Calls




21 / 28
Linear Regression


                E(log(Yi )) = xi β
                      Number of      Predictor
                    Customer Calls   Variable




21 / 28
Linear Regression



                # Customer Calls




                                   System Size
22 / 28
Linear Regression



                # Customer Calls




                                   System Size
23 / 28
nician dispatches, and alarms within the first three months of in-
            stallation using linear regression. For example, in the case of calls,

          Customer Interactions
            the response variable Y calls is the number of calls within the first




                                                                                              2000
            three months of installation transformed using the log function to
            make errors more normally distributed. The predictor variables, xi ˜




                                                                                              1500
          Model
            are described in detail in section 4. The model is:




                                                                                      Calls

                                                                                              1000
                               E(log(Yicalls )) = xT β
                                                  ˜i




                                                                                              500
            5.2.1 Modeling customer calls




                                                                                              0
                                                                                                     2003.6

                              Estimate    Std. Err.   t value        Pr(>|t|)
                (Intercept)       0.35        0.04       7.90      3 ∗ 10−15
               log(rtime)       −0.08         0.00    −27.72     < 2 ∗ 10−16                            Figu
                      Upgr        0.73        0.02      46.78    < 2 ∗ 10−16
                       OX         0.13        0.01       9.62    < 2 ∗ 10−16            The two tren
                      WIN         0.75        0.03      25.73    < 2 ∗ 10−16         flow of calls ca
              log(nP ort)         0.10        0.01      16.82    < 2 ∗ 10−16         itations we do
                  nPortNA         0.39        0.04      10.80    < 2 ∗ 10−16         calls for new a
                  LARGE           0.30        0.01      20.78    < 2 ∗ 10−16
                       Svc        0.28        0.01      23.06    < 2 ∗ 10−16         6. VALID
                        US        0.41        0.01      28.99    < 2 ∗ 10−16            It is importa
                                                                                     that results refl
                    Table 3: Number of calls regression. R2 = .36.                   of the data coll
                                                                                        We inspecte
                                                                                     process and int
24 / 28
              Most predictors are statistically significance due to large sample      curacy. Throu
nician dispatches, and alarms within the first three months of in-
            stallation using linear regression. For example, in the case of calls,

          Customer Interactions
            the response variable Y calls is the number of calls within the first




                                                                                              2000
            three months of installation transformed using the log function to
            make errors more normally distributed. The predictor variables, xi ˜




                                                                                              1500
          Model
            are described in detail in section 4. The model is:




                                                                                      Calls

                                                                                              1000
                               E(log(Yicalls )) = xT β
                                                  ˜i




                                                                                              500
            5.2.1 Modeling customer calls




                                                                                              0
                                                                                                     2003.6

                              Estimate    Std. Err.   t value        Pr(>|t|)
                (Intercept)       0.35        0.04       7.90      3 ∗ 10−15
               log(rtime)       −0.08         0.00    −27.72     < 2 ∗ 10−16                            Figu
                      Upgr        0.73        0.02      46.78    < 2 ∗ 10−16
                       OX         0.13        0.01       9.62    < 2 ∗ 10−16            The two tren
                      WIN         0.75        0.03      25.73    < 2 ∗ 10−16         flow of calls ca
              log(nP ort)         0.10        0.01      16.82    < 2 ∗ 10−16         itations we do
                  nPortNA         0.39        0.04      10.80    < 2 ∗ 10−16         calls for new a
                  LARGE           0.30        0.01      20.78    < 2 ∗ 10−16
                       Svc        0.28        0.01      23.06    < 2 ∗ 10−16         6. VALID
                        US        0.41        0.01      28.99    < 2 ∗ 10−16            It is importa
                                                                                     that results refl
                    Table 3: Number of calls regression. R2 = .36.                   of the data coll
                                                                                        We inspecte
                                                                                     process and int
24 / 28
              Most predictors are statistically significance due to large sample      curacy. Throu
nician dispatches, and alarms within the first three months of in-
               stallation using linear regression. For example, in the case of calls,

          Customer Interactions
               the response variable Y calls is the number of calls within the first




                                                                                                 2000
               three months of installation transformed using the log function to
               make errors more normally distributed. The predictor variables, xi ˜




                                                                                                 1500
          Modelare described in detail in section 4. The model is:




                                                                                         Calls

                                                                                                 1000
                                  E(log(Yicalls )) = xT β
                                                     ˜i




                                                                                                 500
                5.2.1 Modeling customer calls
                                                                                ly!




                                                                                                 0
                               Estimate Std. Err.   t value              ra te                          2003.6


                                                                        uPr(>|t|)
                   (Intercept)     0.35     0.04       7.90 acc3 ∗ 10−15
                  log(rtime)     −0.08               ted
                                            0.00 −27.72 < 2 ∗ 10−16
                                                  ic 46.78 < 2 ∗ 10−16                                     Figu
                         Upgr
                          OX
                                   0.73
                                             red 9.62 < 2 ∗ 10−16
                                            0.02
                                   0.13 e p0.01                                            The two tren
                         WIN
                                ca  n b 0.03 25.73 < 2 ∗ 10−16
                                   0.75                                                 flow of calls ca
                 log(nP ort)lls 0.10        0.01      16.82 < 2 ∗ 10−16                 itations we do
                          ca                          10.80 < 2 ∗ 10−16                 calls for new a
                      er
                     nPortNA       0.39     0.04

             s tom Svc
                     LARGE         0.30     0.01      20.78 < 2 ∗ 10−16
                                                      23.06 < 2 ∗ 10−16                 6. VALID
          cu               US
                                   0.28
                                   0.41
                                            0.01
                                            0.01      28.99 < 2 ∗ 10−16                    It is importa
                                                                                        that results refl
                       Table 3: Number of calls regression. R2 = .36.                   of the data coll
                                                                                           We inspecte
                                                                                        process and int
24 / 28
                 Most predictors are statistically significance due to large sample      curacy. Throu
Points that I liked about
                            the paper:


          • Clear and suitable models constructed
          • Emphasize on customerʼs perception of
           a software
          • Applicability to the real world
25 / 28
Points that I disliked:


          • Evaluation of customer calls model
           lacks insights
          • Amount of effort needed to replicate the
           study
          • Terms are often misused and mixed
26 / 28
Audris Mockus
          Empirical estimates of software availability of
          deployed systems.
          2006 IEEE International Symposium on Empirical Software Engineering




          Audris Mockus, David Weiss
          Interval quality: relating customer perceived
          quality to process quality.
          2008 International Conference on Software Engineering




          Nachiappan Nagappan, Brendan Murphy, Victor Basili
          The influence of organizational structure on
          software quality: an empirical case study.
          2008 International Conference on Software Engineering

27 / 28
28 / 28
28 / 28
28 / 28
28 / 28
28 / 28
DISCUSSION



28 / 28

More Related Content

Similar to Predictors of Customer Perceived Software Quality in 40 Characters

SPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARKTsuyoshi Horigome
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionAlejandro Correa Bahnsen, PhD
 
SPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARKTsuyoshi Horigome
 
Sudarshana Hore_2015 Intern MISO
Sudarshana Hore_2015 Intern MISOSudarshana Hore_2015 Intern MISO
Sudarshana Hore_2015 Intern MISOSudarshana Hore
 
SPICE MODEL of SST271 in SPICE PARK
SPICE MODEL of SST271 in SPICE PARKSPICE MODEL of SST271 in SPICE PARK
SPICE MODEL of SST271 in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of 1N5818 (Standard Model) in SPICE PARK
SPICE MODEL of 1N5818 (Standard Model) in SPICE PARKSPICE MODEL of 1N5818 (Standard Model) in SPICE PARK
SPICE MODEL of 1N5818 (Standard Model) in SPICE PARKTsuyoshi Horigome
 
Rapid Detection of Constant-Packet-Rate Flows
Rapid Detection of Constant-Packet-Rate FlowsRapid Detection of Constant-Packet-Rate Flows
Rapid Detection of Constant-Packet-Rate FlowsAcademia Sinica
 
A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...
A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...
A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...aurkoiitk
 
Tackling the Management Challenges of Server Consolidation on Multi-core Systems
Tackling the Management Challenges of Server Consolidation on Multi-core SystemsTackling the Management Challenges of Server Consolidation on Multi-core Systems
Tackling the Management Challenges of Server Consolidation on Multi-core SystemsThe Linux Foundation
 
SPICE MODEL of J270 in SPICE PARK
SPICE MODEL of J270 in SPICE PARKSPICE MODEL of J270 in SPICE PARK
SPICE MODEL of J270 in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARK
SPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARKSPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARK
SPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of SST4416 in SPICE PARK
SPICE MODEL of SST4416 in SPICE PARKSPICE MODEL of SST4416 in SPICE PARK
SPICE MODEL of SST4416 in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARKTsuyoshi Horigome
 
The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...
The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...
The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...Positive Hack Days
 
SPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of CRH01 (Standard Model) in SPICE PARK
SPICE MODEL of CRH01 (Standard Model) in SPICE PARKSPICE MODEL of CRH01 (Standard Model) in SPICE PARK
SPICE MODEL of CRH01 (Standard Model) in SPICE PARKTsuyoshi Horigome
 
2N4416のスパイスモデル
2N4416のスパイスモデル2N4416のスパイスモデル
2N4416のスパイスモデルTsuyoshi Horigome
 

Similar to Predictors of Customer Perceived Software Quality in 40 Characters (20)

SPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Professional+BDP Model) in SPICE PARK
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
 
SPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK1828 (Standard+BDS Model) in SPICE PARK
 
Sudarshana Hore_2015 Intern MISO
Sudarshana Hore_2015 Intern MISOSudarshana Hore_2015 Intern MISO
Sudarshana Hore_2015 Intern MISO
 
SPICE MODEL of SST271 in SPICE PARK
SPICE MODEL of SST271 in SPICE PARKSPICE MODEL of SST271 in SPICE PARK
SPICE MODEL of SST271 in SPICE PARK
 
SPICE MODEL of 1N5818 (Standard Model) in SPICE PARK
SPICE MODEL of 1N5818 (Standard Model) in SPICE PARKSPICE MODEL of 1N5818 (Standard Model) in SPICE PARK
SPICE MODEL of 1N5818 (Standard Model) in SPICE PARK
 
Rapid Detection of Constant-Packet-Rate Flows
Rapid Detection of Constant-Packet-Rate FlowsRapid Detection of Constant-Packet-Rate Flows
Rapid Detection of Constant-Packet-Rate Flows
 
P Charts
P ChartsP Charts
P Charts
 
A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...
A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...
A Study on the Short Run Relationship b/w Major Economic Indicators of US Eco...
 
Tackling the Management Challenges of Server Consolidation on Multi-core Systems
Tackling the Management Challenges of Server Consolidation on Multi-core SystemsTackling the Management Challenges of Server Consolidation on Multi-core Systems
Tackling the Management Challenges of Server Consolidation on Multi-core Systems
 
SPICE MODEL of J270 in SPICE PARK
SPICE MODEL of J270 in SPICE PARKSPICE MODEL of J270 in SPICE PARK
SPICE MODEL of J270 in SPICE PARK
 
SPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Professional+BDP Model) in SPICE PARK
 
SPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARK
SPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARKSPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARK
SPICE MODEL of SSM3J113TU (Standard+BDS Model) in SPICE PARK
 
SPICE MODEL of SST4416 in SPICE PARK
SPICE MODEL of SST4416 in SPICE PARKSPICE MODEL of SST4416 in SPICE PARK
SPICE MODEL of SST4416 in SPICE PARK
 
SPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK2992 (Standard+BDS Model) in SPICE PARK
 
The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...
The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...
The System of Automatic Searching for Vulnerabilities or how to use Taint Ana...
 
Image compression
Image compressionImage compression
Image compression
 
SPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SK2718 (Professional+BDP Model) in SPICE PARK
 
SPICE MODEL of CRH01 (Standard Model) in SPICE PARK
SPICE MODEL of CRH01 (Standard Model) in SPICE PARKSPICE MODEL of CRH01 (Standard Model) in SPICE PARK
SPICE MODEL of CRH01 (Standard Model) in SPICE PARK
 
2N4416のスパイスモデル
2N4416のスパイスモデル2N4416のスパイスモデル
2N4416のスパイスモデル
 

More from Nicolas Bettenburg

10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...Nicolas Bettenburg
 
Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...
Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...
Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...Nicolas Bettenburg
 
Think Locally, Act Gobally - Improving Defect and Effort Prediction Models
Think Locally, Act Gobally - Improving Defect and Effort Prediction ModelsThink Locally, Act Gobally - Improving Defect and Effort Prediction Models
Think Locally, Act Gobally - Improving Defect and Effort Prediction ModelsNicolas Bettenburg
 
Mining Development Repositories to Study the Impact of Collaboration on Softw...
Mining Development Repositories to Study the Impact of Collaboration on Softw...Mining Development Repositories to Study the Impact of Collaboration on Softw...
Mining Development Repositories to Study the Impact of Collaboration on Softw...Nicolas Bettenburg
 
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source CodeUsing Fuzzy Code Search to Link Code Fragments in Discussions to Source Code
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source CodeNicolas Bettenburg
 
A Lightweight Approach to Uncover Technical Information in Unstructured Data
A Lightweight Approach to Uncover Technical Information in Unstructured DataA Lightweight Approach to Uncover Technical Information in Unstructured Data
A Lightweight Approach to Uncover Technical Information in Unstructured DataNicolas Bettenburg
 
Managing Community Contributions: Lessons Learned from a Case Study on Andro...
Managing Community Contributions:  Lessons Learned from a Case Study on Andro...Managing Community Contributions:  Lessons Learned from a Case Study on Andro...
Managing Community Contributions: Lessons Learned from a Case Study on Andro...Nicolas Bettenburg
 
Studying the impact of Social Structures on Software Quality
Studying the impact of Social Structures on Software QualityStudying the impact of Social Structures on Software Quality
Studying the impact of Social Structures on Software QualityNicolas Bettenburg
 
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
An Empirical Study on Inconsistent Changes to Code Clones at Release LevelAn Empirical Study on Inconsistent Changes to Code Clones at Release Level
An Empirical Study on Inconsistent Changes to Code Clones at Release LevelNicolas Bettenburg
 
An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...
An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...
An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...Nicolas Bettenburg
 
Finding Paths in Large Spaces - A* and Hierarchical A*
Finding Paths in Large Spaces - A* and Hierarchical A*Finding Paths in Large Spaces - A* and Hierarchical A*
Finding Paths in Large Spaces - A* and Hierarchical A*Nicolas Bettenburg
 
Automatic Identification of Bug Introducing Changes
Automatic Identification of Bug Introducing ChangesAutomatic Identification of Bug Introducing Changes
Automatic Identification of Bug Introducing ChangesNicolas Bettenburg
 
Cloning Considered Harmful Considered Harmful
Cloning Considered Harmful Considered HarmfulCloning Considered Harmful Considered Harmful
Cloning Considered Harmful Considered HarmfulNicolas Bettenburg
 
Extracting Structural Information from Bug Reports.
Extracting Structural Information from Bug Reports.Extracting Structural Information from Bug Reports.
Extracting Structural Information from Bug Reports.Nicolas Bettenburg
 
Computing Accuracy Precision And Recall
Computing Accuracy Precision And RecallComputing Accuracy Precision And Recall
Computing Accuracy Precision And RecallNicolas Bettenburg
 
Duplicate Bug Reports Considered Harmful ... Really?
Duplicate Bug Reports Considered Harmful ... Really?Duplicate Bug Reports Considered Harmful ... Really?
Duplicate Bug Reports Considered Harmful ... Really?Nicolas Bettenburg
 
The Quality of Bug Reports in Eclipse ETX'07
The Quality of Bug Reports in Eclipse ETX'07The Quality of Bug Reports in Eclipse ETX'07
The Quality of Bug Reports in Eclipse ETX'07Nicolas Bettenburg
 

More from Nicolas Bettenburg (20)

10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
10 Year Impact Award Presentation - Duplicate Bug Reports Considered Harmful ...
 
Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...
Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...
Ph.D. Dissertation - Studying the Impact of Developer Communication on the Qu...
 
Think Locally, Act Gobally - Improving Defect and Effort Prediction Models
Think Locally, Act Gobally - Improving Defect and Effort Prediction ModelsThink Locally, Act Gobally - Improving Defect and Effort Prediction Models
Think Locally, Act Gobally - Improving Defect and Effort Prediction Models
 
Mining Development Repositories to Study the Impact of Collaboration on Softw...
Mining Development Repositories to Study the Impact of Collaboration on Softw...Mining Development Repositories to Study the Impact of Collaboration on Softw...
Mining Development Repositories to Study the Impact of Collaboration on Softw...
 
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source CodeUsing Fuzzy Code Search to Link Code Fragments in Discussions to Source Code
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code
 
A Lightweight Approach to Uncover Technical Information in Unstructured Data
A Lightweight Approach to Uncover Technical Information in Unstructured DataA Lightweight Approach to Uncover Technical Information in Unstructured Data
A Lightweight Approach to Uncover Technical Information in Unstructured Data
 
Managing Community Contributions: Lessons Learned from a Case Study on Andro...
Managing Community Contributions:  Lessons Learned from a Case Study on Andro...Managing Community Contributions:  Lessons Learned from a Case Study on Andro...
Managing Community Contributions: Lessons Learned from a Case Study on Andro...
 
Mud flash
Mud flashMud flash
Mud flash
 
Studying the impact of Social Structures on Software Quality
Studying the impact of Social Structures on Software QualityStudying the impact of Social Structures on Software Quality
Studying the impact of Social Structures on Software Quality
 
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
An Empirical Study on Inconsistent Changes to Code Clones at Release LevelAn Empirical Study on Inconsistent Changes to Code Clones at Release Level
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
 
An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...
An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...
An Empirical Study on the Risks of Using Off-the-Shelf Techniques for Process...
 
Fuzzy Logic in Smart Homes
Fuzzy Logic in Smart HomesFuzzy Logic in Smart Homes
Fuzzy Logic in Smart Homes
 
Finding Paths in Large Spaces - A* and Hierarchical A*
Finding Paths in Large Spaces - A* and Hierarchical A*Finding Paths in Large Spaces - A* and Hierarchical A*
Finding Paths in Large Spaces - A* and Hierarchical A*
 
Automatic Identification of Bug Introducing Changes
Automatic Identification of Bug Introducing ChangesAutomatic Identification of Bug Introducing Changes
Automatic Identification of Bug Introducing Changes
 
Cloning Considered Harmful Considered Harmful
Cloning Considered Harmful Considered HarmfulCloning Considered Harmful Considered Harmful
Cloning Considered Harmful Considered Harmful
 
Approximation Algorithms
Approximation AlgorithmsApproximation Algorithms
Approximation Algorithms
 
Extracting Structural Information from Bug Reports.
Extracting Structural Information from Bug Reports.Extracting Structural Information from Bug Reports.
Extracting Structural Information from Bug Reports.
 
Computing Accuracy Precision And Recall
Computing Accuracy Precision And RecallComputing Accuracy Precision And Recall
Computing Accuracy Precision And Recall
 
Duplicate Bug Reports Considered Harmful ... Really?
Duplicate Bug Reports Considered Harmful ... Really?Duplicate Bug Reports Considered Harmful ... Really?
Duplicate Bug Reports Considered Harmful ... Really?
 
The Quality of Bug Reports in Eclipse ETX'07
The Quality of Bug Reports in Eclipse ETX'07The Quality of Bug Reports in Eclipse ETX'07
The Quality of Bug Reports in Eclipse ETX'07
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Predictors of Customer Perceived Software Quality in 40 Characters

  • 1. Predictors of Customer Perceived SOFTWARE QUALITY presented by Nicolas Bettenburg
  • 2. Software Quality matters! 01 / 28
  • 3. Imagine the Product Does NOT Satisfy a Customers Needs ... 02 / 28
  • 4. The company suffers •Maintenance costs •Additional expenses •Missed business opportunities 03 / 28
  • 5. Predict customerʼs experiences within the first 3 months! 04 / 28
  • 6. What are the factors? 05 / 28
  • 7. software platform hardware install location software updates system size missing information deployment issues usage patterns service contract 06 / 28
  • 8. Operating System System Size Predictors Software Ports Upgrades Deployment Time
  • 9. Use Predictors to form Models 13 / 28
  • 10. Software Failure Rare, high-impact problems resulting in a software change use logistic regression. Customer Interactions Frequent, low-impact problems, resulting in a customer call use linear regression. 14 / 28
  • 12. Logistic Regression xi β e P (Yi = 1|xi ) = 1+exi β 16 / 28
  • 13. Logistic Regression xi β e P (Yi = 1|xi ) = Binary 1+exi β Response Variable 16 / 28
  • 14. Logistic Regression xi β e P (Yi = 1|xi ) = Binary 1+exi β Response Predictor Variable Variable 16 / 28
  • 15. Logistic Regression xi β e P (Yi = 1|xi ) = Binary 1+exi β Response Predictor Logistic Model Variable Variable for one predictor Variable 16 / 28
  • 16. Logistic Regression Failure Report System Size 17 / 28
  • 17. Logistic Regression Failure Report System Size 18 / 28
  • 19. Logistic Regression Beta Coefficient 19 / 28
  • 20. Logistic Regression Beta Coefficient Significancy Measures 19 / 28
  • 21. Software Failure Model 5.1.1 Modeling software failures sys Estimate Std. Err. z-value Pr(>|z|) sys (Intercept) −5.26 0.64 −8.18 3 ∗ 10−16 tan log(rtime) −0.30 0.03 −8.85 < 2 ∗ 10−16 as Upgr 1.38 0.15 9.01 < 2 ∗ 10−16 OX −1.18 0.17 −6.75 2 ∗ 10−11 ah WIN 1.01 0.34 2.98 0.003 ife log(nP ort) 0.36 0.08 4.37 10−5 bo nP ortN A 2.03 0.58 3.49 5 ∗ 10−4 LARGE 0.52 0.20 2.67 0.01 cau Svc 0.57 0.18 3.11 .002 fer US 0.52 0.27 1.92 0.05 the a s Table 1: Software failure regression results. tiv 20 / 28 ag
  • 22. Software Failure Model 5.1.1 Modeling software failures sys Estimate Std. Err. z-value Pr(>|z|) sys (Intercept) −5.26 0.64 −8.18 3 ∗ 10−16 tan log(rtime) −0.30 0.03 −8.85 < 2 ∗ 10−16 as Upgr 1.38 0.15 9.01 < 2 ∗ 10−16 OX −1.18 0.17 −6.75 2 ∗ 10−11 ah WIN 1.01 0.34 2.98 0.003 ife log(nP ort) 0.36 0.08 4.37 10−5 bo nP ortN A 2.03 0.58 3.49 5 ∗ 10−4 LARGE 0.52 0.20 2.67 0.01 cau Svc 0.57 0.18 3.11 .002 fer US 0.52 0.27 1.92 0.05 the a s Table 1: Software failure regression results. tiv 20 / 28 ag
  • 23. Software Failure Model 5.1.1 Modeling software failures sys Estimate Std. Err. z-value Pr(>|z|) sys (Intercept) −5.26 0.64 −8.18 3 ∗ 10−16 tan log(rtime) −0.30 0.03 −8.85 < 2 ∗ 10−16 as Upgr 1.38 0.15 9.01 < 2 ∗ 10−16 OX −1.18 0.17 −6.75 2 ∗ 10−11 ah WIN 1.01 0.34 2.98 0.003 ife log(nP ort) 0.36 0.08 4.37 10−5 bo nP ortN A 2.03 0.58 3.49 5 ∗ 10−4 LARGE 0.52 0.20 2.67 0.01 cau Svc 0.57 0.18 3.11 .002 fer US 0.52 0.27 1.92 0.05 the a s Table 1: Software failure regression results. tiv 20 / 28 ag
  • 24. Software Failure Model 5.1.1 Modeling software failures sys Estimate Std. Err. z-value e! Pr(>|z|) as sys (Intercept) −5.26 0.64 −8.18 3 ∗e −16 el 10 tan rr log(rtime) −0.30 0.03 −8.85ajo 2 ∗ 10−16 < as Upgr 1.38 a m < 2 ∗ 10−16 0.15 to 9.01 OX −1.18 0.17e −6.75 ra d 2 ∗ 10−11 ah WIN 1.01 u pg 0.34 2.98 0.003 ife log(nP ort) s t to 0.36 0.08 4.37 10−5 bo fir nP ortN Athe 2.03 0.58 3.49 5 ∗ 10−4 ʼt LARGEbe 0.52 0.20 2.67 0.01 cau d on Svc 0.57 0.18 3.11 .002 fer US 0.52 0.27 1.92 0.05 the a s Table 1: Software failure regression results. tiv 20 / 28 ag
  • 25. Linear Regression E(log(Yi )) = xi β 21 / 28
  • 26. Linear Regression E(log(Yi )) = xi β Number of Customer Calls 21 / 28
  • 27. Linear Regression E(log(Yi )) = xi β Number of Predictor Customer Calls Variable 21 / 28
  • 28. Linear Regression # Customer Calls System Size 22 / 28
  • 29. Linear Regression # Customer Calls System Size 23 / 28
  • 30. nician dispatches, and alarms within the first three months of in- stallation using linear regression. For example, in the case of calls, Customer Interactions the response variable Y calls is the number of calls within the first 2000 three months of installation transformed using the log function to make errors more normally distributed. The predictor variables, xi ˜ 1500 Model are described in detail in section 4. The model is: Calls 1000 E(log(Yicalls )) = xT β ˜i 500 5.2.1 Modeling customer calls 0 2003.6 Estimate Std. Err. t value Pr(>|t|) (Intercept) 0.35 0.04 7.90 3 ∗ 10−15 log(rtime) −0.08 0.00 −27.72 < 2 ∗ 10−16 Figu Upgr 0.73 0.02 46.78 < 2 ∗ 10−16 OX 0.13 0.01 9.62 < 2 ∗ 10−16 The two tren WIN 0.75 0.03 25.73 < 2 ∗ 10−16 flow of calls ca log(nP ort) 0.10 0.01 16.82 < 2 ∗ 10−16 itations we do nPortNA 0.39 0.04 10.80 < 2 ∗ 10−16 calls for new a LARGE 0.30 0.01 20.78 < 2 ∗ 10−16 Svc 0.28 0.01 23.06 < 2 ∗ 10−16 6. VALID US 0.41 0.01 28.99 < 2 ∗ 10−16 It is importa that results refl Table 3: Number of calls regression. R2 = .36. of the data coll We inspecte process and int 24 / 28 Most predictors are statistically significance due to large sample curacy. Throu
  • 31. nician dispatches, and alarms within the first three months of in- stallation using linear regression. For example, in the case of calls, Customer Interactions the response variable Y calls is the number of calls within the first 2000 three months of installation transformed using the log function to make errors more normally distributed. The predictor variables, xi ˜ 1500 Model are described in detail in section 4. The model is: Calls 1000 E(log(Yicalls )) = xT β ˜i 500 5.2.1 Modeling customer calls 0 2003.6 Estimate Std. Err. t value Pr(>|t|) (Intercept) 0.35 0.04 7.90 3 ∗ 10−15 log(rtime) −0.08 0.00 −27.72 < 2 ∗ 10−16 Figu Upgr 0.73 0.02 46.78 < 2 ∗ 10−16 OX 0.13 0.01 9.62 < 2 ∗ 10−16 The two tren WIN 0.75 0.03 25.73 < 2 ∗ 10−16 flow of calls ca log(nP ort) 0.10 0.01 16.82 < 2 ∗ 10−16 itations we do nPortNA 0.39 0.04 10.80 < 2 ∗ 10−16 calls for new a LARGE 0.30 0.01 20.78 < 2 ∗ 10−16 Svc 0.28 0.01 23.06 < 2 ∗ 10−16 6. VALID US 0.41 0.01 28.99 < 2 ∗ 10−16 It is importa that results refl Table 3: Number of calls regression. R2 = .36. of the data coll We inspecte process and int 24 / 28 Most predictors are statistically significance due to large sample curacy. Throu
  • 32. nician dispatches, and alarms within the first three months of in- stallation using linear regression. For example, in the case of calls, Customer Interactions the response variable Y calls is the number of calls within the first 2000 three months of installation transformed using the log function to make errors more normally distributed. The predictor variables, xi ˜ 1500 Modelare described in detail in section 4. The model is: Calls 1000 E(log(Yicalls )) = xT β ˜i 500 5.2.1 Modeling customer calls ly! 0 Estimate Std. Err. t value ra te 2003.6 uPr(>|t|) (Intercept) 0.35 0.04 7.90 acc3 ∗ 10−15 log(rtime) −0.08 ted 0.00 −27.72 < 2 ∗ 10−16 ic 46.78 < 2 ∗ 10−16 Figu Upgr OX 0.73 red 9.62 < 2 ∗ 10−16 0.02 0.13 e p0.01 The two tren WIN ca n b 0.03 25.73 < 2 ∗ 10−16 0.75 flow of calls ca log(nP ort)lls 0.10 0.01 16.82 < 2 ∗ 10−16 itations we do ca 10.80 < 2 ∗ 10−16 calls for new a er nPortNA 0.39 0.04 s tom Svc LARGE 0.30 0.01 20.78 < 2 ∗ 10−16 23.06 < 2 ∗ 10−16 6. VALID cu US 0.28 0.41 0.01 0.01 28.99 < 2 ∗ 10−16 It is importa that results refl Table 3: Number of calls regression. R2 = .36. of the data coll We inspecte process and int 24 / 28 Most predictors are statistically significance due to large sample curacy. Throu
  • 33. Points that I liked about the paper: • Clear and suitable models constructed • Emphasize on customerʼs perception of a software • Applicability to the real world 25 / 28
  • 34. Points that I disliked: • Evaluation of customer calls model lacks insights • Amount of effort needed to replicate the study • Terms are often misused and mixed 26 / 28
  • 35. Audris Mockus Empirical estimates of software availability of deployed systems. 2006 IEEE International Symposium on Empirical Software Engineering Audris Mockus, David Weiss Interval quality: relating customer perceived quality to process quality. 2008 International Conference on Software Engineering Nachiappan Nagappan, Brendan Murphy, Victor Basili The influence of organizational structure on software quality: an empirical case study. 2008 International Conference on Software Engineering 27 / 28