An Exploratory Study on the Evidence of Hackathons' Role in Solving OSS
Newcomers' Challenges
- URL: http://arxiv.org/abs/2305.09546v1
- Date: Tue, 16 May 2023 15:40:19 GMT
- Title: An Exploratory Study on the Evidence of Hackathons' Role in Solving OSS
Newcomers' Challenges
- Authors: Ahmed Samir Imam Mahmoud, Alexander Nolte and Dietmar Pfahl
- Abstract summary: We aim to understand and discuss the challenges newcomers face when joining an OSS project.
We collect evidence on how hackathons were used to address those challenges.
- Score: 54.56931759953522
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Background: OSS projects face various challenges. One major challenge is to
onboard and integrate newcomers to the project. Aim: We aim to understand and
discuss the challenges newcomers face when joining an OSS project and present
evidence on how hackathons can mitigate those challenges. Method: We conducted
two searches on digital libraries to (1) explore challenges faced by newcomers
to join OSS projects, and (2) collect evidence on how hackathons were used to
address them. We defined four evidence categories (positive, inconclusive, and
no evidence) to classify evidence how hackathons address challenges. In
addition, we investigated whether a hackathon event was related to an OSS
project or not. Result: We identified a range of newcomer challenges that were
successfully addressed using hackathons. However, not all of the solutions we
identified were applied in the context of OSS. Conclusion: There seems to be
potential in using hackathons to overcome newcomers' challenges in OSS projects
and allow them to integrate faster into the project.
Related papers
- A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features [6.814841205623832]
This paper investigates the perspectives of OSS maintainers on vulnerability management and platform security features.
We find that supply chain mistrust and lack of automation for vulnerability management are the most challenging.
barriers to adopting platform security features include a lack of awareness and the perception that they are not necessary.
arXiv Detail & Related papers (2024-09-12T00:15:03Z) - Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report [1.099532646524593]
Training new cybersecurity professionals is a challenging task due to the broad scope of the area.
We propose a solution: integrating a real-world bug bounty programme into cybersecurity curriculum.
We let students choose to participate in a bug bounty programme as an option for the semester assignment in a secure coding course.
arXiv Detail & Related papers (2024-04-18T09:53:49Z) - Characterizing Usability Issue Discussions in Open Source Software
Projects [13.901618206448049]
Usability is one of the most neglected concerns in open source software (OSS)
There is little knowledge about the extent to which OSS community members engage in usability issue discussions.
arXiv Detail & Related papers (2023-08-19T01:47:08Z) - Chatbots in a Botnet World [0.0]
The research demonstrates thirteen coding tasks that generally qualify as stages in the MITRE ATT&CK framework.
The experimental prompts generate examples of keyloggers, logic bombs, obfuscated worms, and payment-fulfilled ransomware.
arXiv Detail & Related papers (2022-12-18T16:08:40Z) - One-off Events? An Empirical Study of Hackathon Code Creation and Reuse [69.98625403567553]
We aim to understand the evolution of code used in and created during hackathon events.
We collected information about 22,183 hackathon projects from DevPost.
arXiv Detail & Related papers (2022-07-03T11:49:52Z) - Unsupervised Person Re-Identification: A Systematic Survey of Challenges
and Solutions [64.68497473454816]
Unsupervised person Re-ID has drawn increasing attention for its potential to address the scalability issue in person Re-ID.
Unsupervised person Re-ID is challenging primarily due to lacking identity labels to supervise person feature learning.
This survey review recent works on unsupervised person Re-ID from the perspective of challenges and solutions.
arXiv Detail & Related papers (2021-09-01T00:01:35Z) - NAS-FAS: Static-Dynamic Central Difference Network Search for Face
Anti-Spoofing [94.89405915373857]
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems.
Existing methods rely on expert-designed networks, which may lead to a sub-optimal solution for task FAS.
Here we propose the first FAS method based on neural search (NAS), called FAS-FAS, to discover the well-suited task-aware networks.
arXiv Detail & Related papers (2020-11-03T23:34:40Z) - RocketQA: An Optimized Training Approach to Dense Passage Retrieval for
Open-Domain Question Answering [55.280108297460636]
In open-domain question answering, dense passage retrieval has become a new paradigm to retrieve relevant passages for finding answers.
We propose an optimized training approach, called RocketQA, to improve dense passage retrieval.
We make three major technical contributions in RocketQA, namely cross-batch negatives, denoised hard negatives and data augmentation.
arXiv Detail & Related papers (2020-10-16T06:54:05Z) - Planning to Explore via Self-Supervised World Models [120.31359262226758]
Plan2Explore is a self-supervised reinforcement learning agent.
We present a new approach to self-supervised exploration and fast adaptation to new tasks.
Without any training supervision or task-specific interaction, Plan2Explore outperforms prior self-supervised exploration methods.
arXiv Detail & Related papers (2020-05-12T17:59:45Z) - Experiences and Lessons Learned Creating and Validating Concept
Inventories for Cybersecurity [0.0]
Cybersecurity Concept Inventory (CCI) is for students who have recently completed any first course in cybersecurity.
The Cybersecurity Curriculum Assessment (CCA) is for students who have recently completed an undergraduate major or track in cybersecurity.
Each assessment tool comprises 25 multiple-choice questions (MCQs) of various difficulties that target the same five core concepts.
arXiv Detail & Related papers (2020-04-10T22:40:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.