{"id":402,"date":"2020-02-20T03:18:54","date_gmt":"2020-02-20T03:18:54","guid":{"rendered":"http:\/\/marcschmalz.com\/blog\/?p=402"},"modified":"2020-02-22T20:20:13","modified_gmt":"2020-02-22T20:20:13","slug":"sawyer-annabi-2006-software-methods-as-theories","status":"publish","type":"post","link":"http:\/\/marcschmalz.com\/blog\/sawyer-annabi-2006-software-methods-as-theories\/","title":{"rendered":"Sawyer &#038; Annabi (2006) &#8211; (Software Development) Methods as Theories"},"content":{"rendered":"<h3>Citation<\/h3>\n<div class=\"content-content publication-content\">\n<div class=\"publication-cite\">\n<div class=\"tab-container\">\n<div id=\"cite-apa\" class=\"tab selected\">\n<div class=\"rendering rendering_researchoutput rendering_researchoutput_apa rendering_contributiontobookanthology rendering_apa rendering_contributiontobookanthology_apa\">Sawyer, S. B., &amp; Annabi, H. (2006).\u00a0Methods as theories: Evidence and arguments for theorizing on software development. In\u00a0<em>IFIP International Federation for Information Processing\u00a0<\/em>(Vol. 208, pp. 397-411). (IFIP International Federation for Information Processing; Vol. 208).\u00a0https:\/\/doi.org\/10.1007\/0-387-34588-4_26<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"content-sidebar publication-sidebar\"><\/div>\n<h3>Notes<\/h3>\n<p>Above is the &#8220;real&#8221; citation. I&#8217;m actually reading (and citing) a slightly different version found <a href=\"http:\/\/sawyer.syr.edu\/publications\/2006\/ifip82%2006%20annabi%20ISD.pdf\">here<\/a>.<\/p>\n<p><span style=\"font-weight: 400;\">Regarding software development, Sawyer &amp; Annabi (2006) claim:<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">Software development methods are explicit representations of:<br \/>\n(1) how people should behave,<br \/>\n(2) how groups of people should interact,<br \/>\n(3) the tasks that people should do,<br \/>\n(4) the order of these tasks,<br \/>\n(5) the tools needed to achieve these tasks,<br \/>\n(6) the proper outcomes of these tasks (including means and ways to evaluate these outcomes) and<br \/>\n(7) the means to make this all happen.<br \/>\nThe relations among these concepts are further set in (8) specific contexts, implying that the exact nature of such relations are contingent to some degree on the larger social milieu (p. 4).<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Using identity theories, we understand the behavior of individuals on software development teams are due to their identities. For most, this would presumably include an identity associated with their \u201csoftware developer\u201d role. While some frameworks attempt to examine group behavior, identity theories instead focus on the individual\u2019s identity as a member of the group and their internalization of the social meaning they assign to that group (an individual\u2019s group identities). This does not actually define which groups may be interacting, so it isn&#8217;t possible to determine what group identities may be at play for these individuals. These views encompass items 1, 2, 3, and 4 in the list above. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Item 5 implies a relationship between the standard of the software developer identity and the tools of the trade. Through the identity theory lens, it is possible to see tool selection and use as a function of the software developer role identity or to see it as self-identification with the tool (a material identity). Item 6 involves evaluation of outcomes, which is a behavior that would be associated with one or more of the individual judge\u2019s identities. Item 7 is about incentives: &#8220;The structures put in place to encourage positive, and discourage negative, behaviors and interactions&#8221; (p. 4). Incentives can activate identities and change their salience, producing changes in individual behavior. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Item 8 makes plain that the specific standard of each of these identities is formed within a social context, and that identity standards should be expected to differ at least slightly from individual to individual, as expected. It also means that different identities may become salient in these different contexts. We cannot expect that a software developer identity is the salient identity during<br \/>\n<\/span><\/p>\n<p>In this short excerpt, we have software development methods expressed indirectly in terms that imply their sources are role identities, group identities, and material identities. Software methods are a reflection of the societal meaning that each individual project team member internalizes to create their own identities, and expose common elements of identity standards.<\/p>\n<p>What seems to be missing is any relationship to the IT under development, though perhaps that is considered part of the context of the development and part of item 8. Are software development methods also an explicit representation of the way in which project team members believe such projects should be when finished? Does software development behavior change based on what is being produced, and the relationships that each member of the team have with the product under development?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this short excerpt, we have software development methods expressed indirectly in terms that imply their sources are role identities, group identities, and material identities. Software methods are a reflection of the societal meaning that each individual project team member internalizes to create their own identities, and expose common elements of identity standards. <a class=\"more-link\" href=\"http:\/\/marcschmalz.com\/blog\/sawyer-annabi-2006-software-methods-as-theories\/\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-402","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts\/402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":7,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"predecessor-version":[{"id":409,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts\/402\/revisions\/409"}],"wp:attachment":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}