{"id":"https://openalex.org/W2048713687","doi":"https://doi.org/10.1145/2786805.2803200","title":"I heart hacker news: expanding qualitative research findings by analyzing social news websites","display_name":"I heart hacker news: expanding qualitative research findings by analyzing social news websites","publication_year":2015,"publication_date":"2015-08-26","ids":{"openalex":"https://openalex.org/W2048713687","doi":"https://doi.org/10.1145/2786805.2803200","mag":"2048713687"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2786805.2803200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060033622","display_name":"Titus Barik","orcid":"https://orcid.org/0000-0002-4877-0739"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Titus Barik","raw_affiliation_strings":["ABB Research, USA"],"affiliations":[{"raw_affiliation_string":"ABB Research, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115076637","display_name":"Brittany Johnson","orcid":"https://orcid.org/0000-0002-0271-9647"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brittany Johnson","raw_affiliation_strings":["North Carolina State University, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052426710","display_name":"Emerson Murphy-Hill","orcid":"https://orcid.org/0000-0003-3921-9416"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emerson Murphy-Hill","raw_affiliation_strings":["North Carolina State University, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.505,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":16,"citation_normalized_percentile":{"value":0.976218,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"882","last_page":"885"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9967,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8930851},{"id":"https://openalex.org/keywords/replication","display_name":"Replication","score":0.6875513},{"id":"https://openalex.org/keywords/replicate","display_name":"Replicate","score":0.49766567},{"id":"https://openalex.org/keywords/theme","display_name":"Theme (computing)","score":0.4937323},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical Research","score":0.45590395}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8930851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74628115},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.6875513},{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.67439294},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.59717894},{"id":"https://openalex.org/C2781162219","wikidata":"https://www.wikidata.org/wiki/Q26250693","display_name":"Replicate","level":2,"score":0.49766567},{"id":"https://openalex.org/C33566652","wikidata":"https://www.wikidata.org/wiki/Q1065927","display_name":"Theme (computing)","level":2,"score":0.4937323},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4918506},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47936895},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.45590395},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38239998},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.37878624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29403877},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.14029843},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.10944867},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.104391515},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2786805.2803200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"1252995,1217700"}],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1564623840","https://openalex.org/W1984080818","https://openalex.org/W2021436267","https://openalex.org/W2031459347","https://openalex.org/W2040801501","https://openalex.org/W2051204868","https://openalex.org/W2064068790","https://openalex.org/W2078393527","https://openalex.org/W2096110600","https://openalex.org/W2097116556","https://openalex.org/W2097737237","https://openalex.org/W2113533445","https://openalex.org/W2147226379","https://openalex.org/W397180395","https://openalex.org/W4245365421","https://openalex.org/W614149592"],"related_works":["https://openalex.org/W4388523091","https://openalex.org/W4253026353","https://openalex.org/W4230748207","https://openalex.org/W4221167770","https://openalex.org/W4220767635","https://openalex.org/W3013364101","https://openalex.org/W2378141881","https://openalex.org/W2111659373","https://openalex.org/W2053915529","https://openalex.org/W2025865172"],"abstract_inverted_index":{"Grounded":[0],"theory":[1,68],"is":[2,13,48],"an":[3],"important":[4],"research":[5,69],"method":[6],"in":[7,109,127],"empirical":[8],"software":[9],"engineering,":[10],"but":[11],"it":[12,22],"also":[14,112],"time":[15],"consuming,":[16],"tedious,":[17],"and":[18,71,96],"complex.":[19],"This":[20],"makes":[21],"difficult":[23],"for":[24],"researchers":[25],"to":[26,63,106,147],"assess":[27,42],"if":[28],"threats,":[29,44],"such":[30,43,59],"as":[31,60],"missing":[32],"themes":[33,108],"or":[34],"sample":[35],"bias,":[36],"have":[37],"inadvertently":[38],"materialized.":[39],"To":[40],"better":[41],"our":[45],"new":[46,114],"idea":[47],"that":[49,91,120],"we":[50,118,138],"can":[51,102],"automatically":[52],"extract":[53],"knowledge":[54,145],"from":[55,141],"social":[56,99],"news":[57,100],"websites,":[58],"Hacker":[61,87],"News,":[62],"easily":[64],"replicate":[65],"existing":[66,107],"grounded":[67],"---":[70],"then":[72],"compare":[73],"the":[74,128,142],"results.":[75],"We":[76,89],"conduct":[77],"a":[78,93,124,135],"replication":[79,95,150],"study":[80,130],"on":[81,131],"static":[82],"analysis":[83,97],"tool":[84,132],"adoption":[85],"using":[86,98],"News.":[88],"confirm":[90],"even":[92],"basic":[94],"websites":[101],"offer":[103],"additional":[104],"insights":[105],"studies,":[110],"while":[111],"identifying":[113],"themes.":[115],"For":[116],"example,":[117],"identified":[119],"security":[121],"was":[122],"not":[123],"theme":[125],"discovered":[126],"original":[129],"adoption.":[133],"As":[134],"long-term":[136],"vision,":[137],"consider":[139],"techniques":[140],"discipline":[143],"of":[144],"discovery":[146],"make":[148],"this":[149],"process":[151],"more":[152],"automatic.":[153]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2048713687","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-03-20T15:50:02.982604","created_date":"2016-06-24"}