SlideShare a Scribd company logo
1 of 9
Download to read offline
Copyright, 2002 Niwot Ridge Consulting
Post Normal Science and eXtreme Programming
How can we come to understand the impacts
of eXtreme Programming and other Agile
methods in the absence of scientific data?
Copyright, 2002 Niwot Ridge Consulting
What is Post–Normal Science?
Post Normal
Science
Professional
Consultancy
Applied
Science
System
Uncertainty
Decision
Stakes
Low High
High
Copyright, 2002 Niwot Ridge Consulting
Three Kinds of “Science”
♦ Normal Science
– Uses standard scientific techniques and procedures
– Peer review processes ensure quality and validity
– Appropriate in situations with high levels of certainty and low
levels of risk
♦ Professional Consultancy
– Applies science through “experts”
– Appropriate for situations with less certainty, some “art” is
required and error is a matter of personal judgment.
– Quality and validity responsibility extended to “clients”
♦ Post Normal Science [Funtowicz 92]
– Community responsible for ensuring quality and validity
– Quality and validity responsibility extended to “all
stakeholders”
Copyright, 2002 Niwot Ridge Consulting
What is Normal and Post–Normal Science?
♦ Research Processes
– Ontologies – the nature of existence
– Epistemologies – the nature of knowledge
– Methodologies – the process of understanding
♦ Science is a
– Methodology
♦ Post–Normal Science is a:
– Methodology
– Epistemology
Copyright, 2002 Niwot Ridge Consulting
Post–Normal Science Domain
♦ Situations that involve post–normal science are
ones where:
– Facts are uncertain
– Stakes are high
– Decision are urgent
♦ Differences from Science and Consultancy
– Extended peer community involvement
– Extended facts including anecdotal evidence
– Public debate
Copyright, 2002 Niwot Ridge Consulting
What are the Phases of a “Revolution?”
Copyright, 2002 Niwot Ridge Consulting
What is Normal Science?
♦ Normal Science is:
– Firmly based on one or more past scientific achievements.
– Achievements that the scientific community acknowledges for
a time as supplying the foundation for its further practice
[Kuhn 70].
♦ Although normal science seems restrictive:
– When paradigms are taken for granted, the field does not
need to be built anew each time.
– “Restrictions born from confidence in a paradigm, turn out to
be essential to the development of science,” [Kuhn 70], pp.
24.
Copyright, 2002 Niwot Ridge Consulting
What is a Pre–Paradigm Phase?
Copyright, 2002 Niwot Ridge Consulting
Bibliography
[Kuhn 70] Structure of Scientific Revolutions, Thomas Kuhn,
Cambridge University Press, 1970.
[Functowicz 92] “Three Kinds of Risk Assessment and the
Emergence of Post Normal Science,” S. O. Funtowicz and J. R.
Raveyz, in Social Theories of Risk, S. Krimsky and D. Golding
editors, Greenwood Publishing Group, 1992.

More Related Content

Similar to Post Normal Science and eXtreme Programming

INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptxINTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
AkwasiOwusu6
 

Similar to Post Normal Science and eXtreme Programming (20)

Tools and Methodology for Research: Knowledge Production
Tools and Methodology for Research: Knowledge ProductionTools and Methodology for Research: Knowledge Production
Tools and Methodology for Research: Knowledge Production
 
Research paradigms
Research paradigmsResearch paradigms
Research paradigms
 
PRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En (1).ppt
PRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En (1).pptPRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En (1).ppt
PRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En (1).ppt
 
PRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En.ppt
PRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En.pptPRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En.ppt
PRECAUTIONARY_PRINCIPLE_Policy_Responses_to_En.ppt
 
Research Integrity: Philosophical Perspectives
Research Integrity: Philosophical Perspectives Research Integrity: Philosophical Perspectives
Research Integrity: Philosophical Perspectives
 
scientific.ppt
scientific.pptscientific.ppt
scientific.ppt
 
Digital Age Evidence and the Living Lab: Keynote for SICSA Madness
Digital Age Evidence and the Living Lab:  Keynote for SICSA MadnessDigital Age Evidence and the Living Lab:  Keynote for SICSA Madness
Digital Age Evidence and the Living Lab: Keynote for SICSA Madness
 
RM lecture.pptx
RM lecture.pptxRM lecture.pptx
RM lecture.pptx
 
Importance of technology
Importance of technologyImportance of technology
Importance of technology
 
Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...
Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...
Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...
 
Relationship-based knowledge mobilization: systems-based KMb and consideratio...
Relationship-based knowledge mobilization: systems-based KMb and consideratio...Relationship-based knowledge mobilization: systems-based KMb and consideratio...
Relationship-based knowledge mobilization: systems-based KMb and consideratio...
 
Scientific software engineering methods and their validity
Scientific software engineering methods and their validityScientific software engineering methods and their validity
Scientific software engineering methods and their validity
 
Challenges in research ethics
Challenges in research ethicsChallenges in research ethics
Challenges in research ethics
 
Chapter 7- Research Ethics.pptx
Chapter 7- Research Ethics.pptxChapter 7- Research Ethics.pptx
Chapter 7- Research Ethics.pptx
 
Open Science - Paradigm Shift or Revival of Old Ideas?
Open Science - Paradigm Shift or Revival of Old Ideas?Open Science - Paradigm Shift or Revival of Old Ideas?
Open Science - Paradigm Shift or Revival of Old Ideas?
 
Physicspowerpoint
PhysicspowerpointPhysicspowerpoint
Physicspowerpoint
 
INI_800_Lecture_1_Introduction.pdf
INI_800_Lecture_1_Introduction.pdfINI_800_Lecture_1_Introduction.pdf
INI_800_Lecture_1_Introduction.pdf
 
Bias and the Data Lifecycle
Bias and the Data LifecycleBias and the Data Lifecycle
Bias and the Data Lifecycle
 
Topic7 research ethics (1)
Topic7 research ethics (1)Topic7 research ethics (1)
Topic7 research ethics (1)
 
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptxINTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
 

More from Glen Alleman

More from Glen Alleman (20)

Managing risk with deliverables planning
Managing risk with deliverables planningManaging risk with deliverables planning
Managing risk with deliverables planning
 
A Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMSA Gentle Introduction to the IMP/IMS
A Gentle Introduction to the IMP/IMS
 
Increasing the Probability of Project Success
Increasing the Probability of Project SuccessIncreasing the Probability of Project Success
Increasing the Probability of Project Success
 
Process Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPMProcess Flow and Narrative for Agile+PPM
Process Flow and Narrative for Agile+PPM
 
Practices of risk management
Practices of risk managementPractices of risk management
Practices of risk management
 
Principles of Risk Management
Principles of Risk ManagementPrinciples of Risk Management
Principles of Risk Management
 
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
Deliverables Based Planning, PMBOK® and 5 Immutable Principles of Project Suc...
 
From Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems EngineeringFrom Principles to Strategies for Systems Engineering
From Principles to Strategies for Systems Engineering
 
NAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guideNAVAIR Integrated Master Schedule Guide guide
NAVAIR Integrated Master Schedule Guide guide
 
Building a Credible Performance Measurement Baseline
Building a Credible Performance Measurement BaselineBuilding a Credible Performance Measurement Baseline
Building a Credible Performance Measurement Baseline
 
Integrated master plan methodology (v2)
Integrated master plan methodology (v2)Integrated master plan methodology (v2)
Integrated master plan methodology (v2)
 
IMP / IMS Step by Step
IMP / IMS Step by StepIMP / IMS Step by Step
IMP / IMS Step by Step
 
DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)DHS - Using functions points to estimate agile development programs (v2)
DHS - Using functions points to estimate agile development programs (v2)
 
Making the impossible possible
Making the impossible possibleMaking the impossible possible
Making the impossible possible
 
Heliotropic Abundance
Heliotropic AbundanceHeliotropic Abundance
Heliotropic Abundance
 
Capabilities based planning
Capabilities based planningCapabilities based planning
Capabilities based planning
 
Process Flow and Narrative for Agile
Process Flow and Narrative for AgileProcess Flow and Narrative for Agile
Process Flow and Narrative for Agile
 
Building the Performance Measurement Baseline
Building the Performance Measurement BaselineBuilding the Performance Measurement Baseline
Building the Performance Measurement Baseline
 
Program Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six SigmaProgram Management Office Lean Software Development and Six Sigma
Program Management Office Lean Software Development and Six Sigma
 
Policy and Procedure Rollout
Policy and Procedure RolloutPolicy and Procedure Rollout
Policy and Procedure Rollout
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Post Normal Science and eXtreme Programming

  • 1. Copyright, 2002 Niwot Ridge Consulting Post Normal Science and eXtreme Programming How can we come to understand the impacts of eXtreme Programming and other Agile methods in the absence of scientific data?
  • 2. Copyright, 2002 Niwot Ridge Consulting What is Post–Normal Science? Post Normal Science Professional Consultancy Applied Science System Uncertainty Decision Stakes Low High High
  • 3. Copyright, 2002 Niwot Ridge Consulting Three Kinds of “Science” ♦ Normal Science – Uses standard scientific techniques and procedures – Peer review processes ensure quality and validity – Appropriate in situations with high levels of certainty and low levels of risk ♦ Professional Consultancy – Applies science through “experts” – Appropriate for situations with less certainty, some “art” is required and error is a matter of personal judgment. – Quality and validity responsibility extended to “clients” ♦ Post Normal Science [Funtowicz 92] – Community responsible for ensuring quality and validity – Quality and validity responsibility extended to “all stakeholders”
  • 4. Copyright, 2002 Niwot Ridge Consulting What is Normal and Post–Normal Science? ♦ Research Processes – Ontologies – the nature of existence – Epistemologies – the nature of knowledge – Methodologies – the process of understanding ♦ Science is a – Methodology ♦ Post–Normal Science is a: – Methodology – Epistemology
  • 5. Copyright, 2002 Niwot Ridge Consulting Post–Normal Science Domain ♦ Situations that involve post–normal science are ones where: – Facts are uncertain – Stakes are high – Decision are urgent ♦ Differences from Science and Consultancy – Extended peer community involvement – Extended facts including anecdotal evidence – Public debate
  • 6. Copyright, 2002 Niwot Ridge Consulting What are the Phases of a “Revolution?”
  • 7. Copyright, 2002 Niwot Ridge Consulting What is Normal Science? ♦ Normal Science is: – Firmly based on one or more past scientific achievements. – Achievements that the scientific community acknowledges for a time as supplying the foundation for its further practice [Kuhn 70]. ♦ Although normal science seems restrictive: – When paradigms are taken for granted, the field does not need to be built anew each time. – “Restrictions born from confidence in a paradigm, turn out to be essential to the development of science,” [Kuhn 70], pp. 24.
  • 8. Copyright, 2002 Niwot Ridge Consulting What is a Pre–Paradigm Phase?
  • 9. Copyright, 2002 Niwot Ridge Consulting Bibliography [Kuhn 70] Structure of Scientific Revolutions, Thomas Kuhn, Cambridge University Press, 1970. [Functowicz 92] “Three Kinds of Risk Assessment and the Emergence of Post Normal Science,” S. O. Funtowicz and J. R. Raveyz, in Social Theories of Risk, S. Krimsky and D. Golding editors, Greenwood Publishing Group, 1992.