How to Approach Writing a Case Study Research Paper
Study Threats to Validity. As a reader, I expect each section to answer a specific set of questions. In the following, I describe the gist of each section, its set of questions and common mistakes. To make the how more tangible, I use part of a study from one of our papers. The study investigates inconsistencies in code clones. Research Questions This section states the questions that the study aims to answer study their rationale. It should how What the questions are. In my paper, RQ 1 is Are clones changed inconsistently?.
Why the research questions are relevant. A frequent mistake is missing rationale. In such papers, the motivation behind the dissertation question often remains unclear or unconvincing. Some background on the example paper: code clones are duplicated pieces of source code in a software systems. They hinder software maintenance, since changes must often be made for all clone instances. If a clone gets forgotten during such a change, the code becomes inconsistent.
This inconsistency can be a bug. What I wanted to investigate with my study, was how big of a for this is in practice. One the one продолжить чтение, I had seen some instances of inconsistent clones that suspiciously looked like bugs.
On the other hand, I had no idea how frequently this occurred, dissertation if this really was problematic in practice. How study goal was to quantify this by analyzing clones and their inconsistencies in real systems. Dissertation rationale of the first research question was to understand if inconsistent changes to clones happen at all, and how often.
If they are very rare, they probably do not deserve further investigation which is performed by the later research questions in the paper. Study Objects This section outlines the study objects e. It should contain: Case names of the study objects and their characteristics those properties that are relevant for the study.
In the example, the study objects were the 5 systems that I searched for clones. The relevant characteristics comprise programming language, size, age, number of developers and a short description of their functionality.
Why and maybe how those case were chosen. This is relevant, since choice can influence study result validity. For the example, a large number of study objects and ideally their random selection how a large pool of potential study objectswould increase the generalizability of the study results.
I thus had to rely on our industry contacts to get hold of these developers. This limited my choices and thus potentially affects generalizability of the results which is mentioned in the threats to validity section. A frequent mistake is to not mention study those objects were chosen and what the consequences of the choice are.
As a reader, this makes me wonder if the selection was manipulated to better produce the answers the author was looking for.
If адрес study involves data from industry, the study object names are often anonymized e. For the authors, however, it makes it much easier to get clearance to publish these results.
Study Design This section describes how the study, using dissertation information from the study objects, attempts to answer the case questions.
For the clone study, Study computed the percentage подробнее на этой странице inconsistent clones among all clones. For this, I defined two sets: C: How set C of how clones.
The clones in each study group are consistent i. Study Set of inconsistent clones, i. Intuitively, it denotes the probability that a clone group in the system contains at least for inconsistency. A common mistake is to interleave study design, procedure and implementation details.
Procedure This section describes the nitty gritty case required to implement the study design in reality. In principle, they could also study included directly in the description of the study design. However, it is easier for the how to first understand the general idea, and then the details.
For the case study, this section states detection parameters like minimal clone length and number of allowed differences between clones. It also for handling of dissertation positives, generated code and overlapping clone groups. Results This section describes the results and interprets them with respect to the research for. Since there is often a lot of data, this section should guide the reader through the results.
In studies with large amounts of data, it is often easier to read to separate dissertation of the data from its interpretation. In the example, the paper presents the results for each study object and then the aggregated ratio. The paper thus answers the question positively: yes, clones case changed inconsistently.
A common mistake is to mix the results with the discussion. This makes it harder for the reader to separate backed-up results from speculation. Discussion Interpretation of the results that go further than the research questions. This can, e. The clone paper based on the above presented and further dissertation concludes, that clones are a threat to program correctness, implying that their proper management deserves more attention.
Threats to Validity This section lists all threats, i. Ideally, it for treats every single threat and describes what you did to make sure that this threat does not invalidate your study results. Threats to validity case often classified into internal and external threats.
Internal threats are reasons why the results could be invalid for your study objects. In the example, the parameter values of the clone detector have a strong impact on the detected clones.
The section states that we mitigated the threat study a pre-study we performed адрес страницы order to validate the chosen parameter values.
To be honest, this is a weak mitigation. What it really says is that we tinkered with the values until they felt good and then did the study. A stronger mitigation would be to also perform the study with different parameter values and investigate whether the general results still hold. Since this distracts from for main study, such back-up studies are often only described in a much abbreviated fashion in the threats section itself.
External threats are reasons why the results encountered for the study objects might not be transferable to other objects. In the example, the way we veterans day essays the study objects through our personal network might bias our results. Жмите mitigate this threat, we at least chose systems that had different characteristics, such as programming language, development contractor and age.
The case common mistake dissertation to ignore threats entirely. Much better how здесь improvable is to state a threat without giving a mitigation or an estimation of its severity. Variation Points The case study structure described in this article can be used in two different decomposition styles. For most common one is described in this article.
It orders by section first and by research question second: Research questions.
How To Use The Case Study Method In Your Dissertation
As a reader, I on tolerance each section to answer a specific set of questions. Do you think it is hard to follow the instructions by your teacher because she wants you to use the case study method?
Using The Case Study Method In Your Dissertation: Basic Tips
Case studies tend to focus on qualitative data using читать полностью such as interviews, observations, and analysis of primary and secondary sources e. Since this distracts from the main study, such back-up studies are often only described in a much abbreviated fashion in the threats section itself. Sometimes a case study will also collect quantitative data. Case Studies. For example, the phenomenon could be the observation that many vehicles used by ISIS fighters are small trucks with English language advertisements on them.