Defect Bash - Literature Review: July 2013
Defect Bash - Literature Review: July 2013
net/publication/268685502
CITATION READS
1 2,035
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mika Mäntylä on 24 November 2014.
Keywords: Defect Bash, Literature Review, Software Quality, Software Testing, Verification and Validation.
Abstract: Defect bash is a co-located testing session performed by a group of people. We performed a systematic
review of the academic and grey literature, i.e. informally published writings, of the defect bash. Altogether,
we found 44 items (17 academic and 27 grey literature sources) that were identified useful for the review.
Based on the review the definition of defect bash is presented, benefits and limitations of using defect bash
are given. Finally, the process of doing defect bash is outlined. This review provides initial understanding
on how defect bash could be useful in achieving the software quality and lays foundation for further
academic studies of this topic.
125
ENASE2013-8thInternationalConferenceonEvaluationofNovelSoftwareApproachestoSoftwareEngineering
one relevant page was found. Thus, going deeper in Ramesh, 2008), the defect bash is defined as “an ad
the Google search results would have increased the hoc testing done by people performing different
workload with very small likelihood of finding roles in the same time duration during the
relevant results. Out of the 200 results 36 results integration testing phase, to bring out all types of
were related to research needs and only 27 results defects that may have been left out by planned
from Google are used as references in this article testing. It is not based on any written testing case”.
because some results are duplicated. Classification The definition in Wikipedia (2012) is “a bug
of grey literature results according to the definition bash is a procedure where all the developers, testers,
on the types of grey literature by GreyNet program managers, usability researchers, designers,
International (2012) show the following: we found documentation folks, and even sometimes marketing
four types of grey literature (27): 3 discussion people, put aside their regular day-to-day duties and
forums, 12 blogs, and 12 company websites. pound on the product to get as many eyes on the
66 items were found in Google Scholar (10 April product as possible”.
2013). Among 66 items from Google Scholar, 30 ALLInterviews (2012) and QTP (2012) have the
items were unrelated or unavailable (broken links, or same definition of “it is an ad hoc testing where
books we did not have access); In 20 items defect people performing different roles in an organization
bash only as a term was mentioned, without test the product together at the same time. The
information on definition, benefits and limitations of testing by all the participants during defect bashing
defect bash. This left us with 17 items (academic is not based on written test cases. What is to be
articles and books) containing information on tested is left to an individual's decision and creativity.
definition, benefits and limitations. Totally 44 This is usually done when the software is close to
references are used for this article as in Table 1. being ready to release”.
The classification is done based on the major Combing the above 3 definitions, we can define
content of each reference; this means that one the defect bash as follows: It is a temporally and
reference may contain different kinds of spatially co-located group testing session, done by
information, i.e., definition, benefits and limitation, people from different roles during the integration
and process of doing bug bash. One reference may testing phase or close to software release to bring
be used in several places of this article. out all types of defects that may have been left out by
planned testing. It is not based on written test-cases.
3 DEFINITION
4 BENEFITS AND LIMITATIONS
Several definitions for defect bash were found. Next
we present three definitions that appeared as the 4.1 Benefits
most popular, i.e. these definitions were used in
several places. Table 2 presents the benefits of the defect bash. We
In Desikan and Ramesh’s book (Desikan and can see the most frequently mentioned benefit from
126
DefectBash-LiteratureReview
defect bashing is finding defects in a short time aspects are also claimed to help in team building
before the software is released. It can also bring out inside a company.
both functional and non-functional defects. The life
cycle of the bugs can be minimized as the reports 4.2 Limitations
can be verified and assigned during the defects bash.
Defect bash acts as a basic sort of usability as Though many benefits are declared in the literature,
well as acceptance testing. People can pound the still there are limitations of defect bash as below by
system from the load in the defect bash. Additionally, them:
defect bash can be used to break the system instead Limitation 1: Defect bash might cause too
of trying to conclude the system works. many duplicate defect reports. The quality of defect
Defect bash brings different people from reports can be low. Time is wasted in investigating,
different roles together in the organization for testing. diagnosing and logging the same problem several
The boundaries between roles are minimized in a co- times (Anonymous 4, 2011; Berkun, 2008; Lyndsay,
located session. Different roles also help validating 2011).
the software from end user perspective. The end Limitation 2: The blog (Lyndsay, 2011) claims
users using a software product will be quite different that in defect bash there isn’t much opportunity to
from each other in many aspects such as learn from each other. This is because many people
understanding about the product, the manner of use the system for the first time, at the same time.
using the software. Defect bash can bring in people Also the limited time period disables learning. We
who have different levels of product understanding think that the defect bash in the first time would be
to test the product together randomly, which can similar to what Lyndsay observed. However after
simulate the different approaches of the end users. It more experience both organizer and participants will
is also recognized that fresh eyes have less bias and learn how to do a defect bash more efficiently.
that fresh eyes can uncover new defects. Limitation 3: Defect bash can only predict
Learning and competitions are also mentioned as customer behavior for the first few hours (Lyndsay,
benefits of a defect bash. The built-in competitive 2011). Thus, it cannot offer information of long-term
instinct of participants should be stimulated to product use. We think that usage by different users
achieve this. Defect bash also helps in learning the even once or short period is better than nothing, and
product and learning from each other. It can be used we maybe should not expect too many feedbacks on
as unofficial demo. The learning and competition customer behaviors from defect bash as Lindsay’s
Table 2: Benefits and the references mentioning it.
Benefit References mentioning the benefit
Anonymous 1, 2010; Anonymous 2, 2010; Anonymous 3, 2011;
Finding many defects, bring out both functional Aranda and Venolia, 2009; Crudden and Lawson, 2011;
and non-functional defects, also shortening the life Desikan and Ramesh, 2008; Haynes, 2009; Karla, 2007;
cycle of the bugs Liangshi, 2010; MarkusN, 2012; Powell, 2009; QTP, 2012;
Sagynov, 2011b; Sahay, 2006; Sande, 2009; Spagnuolo, 2007
The competitive instinct of participants are Haynes, 2009; Birkinshaw and Goddard, 2009; Wong, 2011;
stimulated and good for team building Yüksel, Tüzün, Gelirli, and Bıyıklı, 2009
Saving money (no need to hire group externals) Crudden and Lawson, 2011
Help in rapid evolution of test scripts Bach, 1998
Acting as acceptance testing and usability testing Anonymous 1, 2010; Anonymous 4, 2011; Karla, 2007
Make software more valuable while enhancement
Anonymous 1, 2010; Crudden and Lawson, 2011
done
Cross boundary testing Desikan and Ramesh, 2008
Berkun, 2008; Crudden and Lawson, 2011; Desikan and Ramesh,
Learn your product and team building
2008; Haynes, 2009; Spagnuolo, 2007; Khan and ElMadi, 2011
Anonymous 1, 2010; Crudden and Lawson, 2011; Desikan and
Fresh eyes have less bias
Ramesh, 2008
Users in different levels Desikan and Ramesh, 2008
Not wait for documentation Desikan and Ramesh, 2008
Testing is also to break system Desikan and Ramesh, 2008
127
ENASE2013-8thInternationalConferenceonEvaluationofNovelSoftwareApproachestoSoftwareEngineering
128
DefectBash-LiteratureReview
129
ENASE2013-8thInternationalConferenceonEvaluationofNovelSoftwareApproachestoSoftwareEngineering
REFERENCES .com/99tests-bug-bash/.
Aranda, J., Venolia, G., 2009. The secret life of bugs:
ALLInterviews, 2012. What is meant by defect bash? In going past the errors and omissions in software
link: http://www.allinterview.com/showanswers/23853 repositories. In IEEE 2009. Article ID: 978-1-4244-
.html. 3452-7/09.
Anonymous 1, 2010. How to do a test bug bash for your Bach, J.A., 1998. Microdynamics of process evolution. In
software project? In link: http://bettersoftwaretesting. IEEE Computer Society, February 1998.
blogspot.com/2010/10/how-to-do-test-bug-bash-for- Bach, J.A., 2003. Exploratory testing explained. In link:
your.html. http://www.satisfice.com/articles/et-article.pdf.
Anonymous 2, 2010. The WDK community bug bash Berkun, S., 2008. How to run a bug bash? In link:
contest 2010 is over. In link: http://www.osronline. http://www.scottberkun.com/blog/2008/how-to-run-a-
com/page.cfm?name=bugbash. bug-bash/.
Anonymous 3, 2011. Bug bash aftermath. In link: Birkinshaw, J., Goddard, J., 2009. The management
http://seleniumhq.wordpress.com/2011/01/31/bug- spectrum. In Journal Compilation, London Business
bash-aftermath/ School.
Anonymous 4, 2011. Software bug bash tips. In link: Chetanas, 2011. What is defect bash? In link: http://
http://programmers.stackexchange.com/questions/470 www.testingken.com/forum/showthread.php?t=346.
07/software-bug-bash-tips. Crowhurst, C., 2011. Bug bash 2011 – A direct response.
Anonymous 5, 2012. Bug bash on Uhuru software. In link: In link: http://www.marketingarchitects.com/2011/
https://www.odesk.com/o/jobs/job/Bug-Bash-on- 05/bug-bash-2011-a-direct-response/.
Uhuru-Software_~~7390d00ba7cef979/. Cruden, K., Lawson, N., 2011. The Power of the bug bash.
Anonymous 6, 2012. 99tests Bug bash. In link: http://99tests In link: http://www.agilequalityassurance.com/2010/
130
DefectBash-LiteratureReview
04/the-power-of-the-bug-bash/. Pruitt, J., Adlin, T., 2005. The personal lifecycle: Keeping
Desikan, S., Ramesh, G., 2008. Software testing, principle people in mind throughout product design.
and practices. Dorling Kindersley (India) Pvt. QTP Tutorials and Interview Questions, 2012. In link:
Ltd.123-126. ISBN 978-81-7758-121-8. http://qtp.blogspot.fi/2010/03/bug-bash-defect-bash.
Dolan, R.J., Matthews, J.M., 1993. Maximizing the utility html.
of customer product testing: beta test design and Sagynov, E., 2011a. CUBRID bug bash event! In link:
management. J PROD INNOV MANAG 1993;10:318- http://www.cubrid.org/blog/news/cubrid-bug-bash-
330. Elsevier Science Publishing. event/.
Enns, N., 2004. It is bug bash day on 28 April 2004. In Sagynov, E., 2011b. CUBRID bug bash event results. In
link: http://blogs.msdn.com/b/windowsmobile/archive/ link: http://www.cubrid.org/blog/cubrid-life/cubrid-
2004/04/28/122435.aspx. bug-bash-event-results/
Fitzgerald, K., 2012. Sakai bug bashes. In link: Saukkoriipi, S., Tervonen I., 2012. Team exploratory
https://confluence.sakaiproject.org/display/3AK/Bug+ testing sessions. In International Scholarly Research
Bashes. Network, ISRN Software Engineering, Volume 2012,
George, C., 2013. Team exploratory testing: our first Article ID 324838.
experiences... In link: http://mostly-testing.blogspot.fi/ Sahay, A., 2006. Microsoft, Appin launch security bug
2013/01/team-exploratory-testing-our-first.html. bash 2006. In link http://press.xtvworld.com/
GreyNet International, 2012. http://www.greynet.org/ article12437.html.
greysourceindex/documenttypes.html. Sakai, 2012. QAE QA. Call for bug bash. In link:
Grubbs, J.C., 2012. Chicago open source bug bash. In https://oae-community.sakaiproject.org/~oae-qa#l=
link: http://www.meetup.com/chicago-open-source- Bug-Bashes/Bug-Bashes.
bug-bash/. Sande, S., 2009. Bug-bashing Bento 2.0v5 is now
Haynes, D., 2009. The search for software robustness. In available for download. In link: http://www.tuaw.
Excerpt from Pacific NW Software Quality com/2009/08/19/bug-bashing-bento-2-0v5-is-now-
Conference. available-for-download/.
Kalra, P., 2007. Bug bash. In link: http://rivr.sulekha. Slaughter, J., Rahman, M., 2011. Information security plan
com/bugbash_265217_blog. for flight simulator applications. In International
Kaner, C., Fiedler, R.L., 2011. Black box software testing. Journal of Computer Science & Technology (IJCSIT),
Introduction to test design. A survey of test techniques. Vol 3, No 3, June 2011. DOI: 10.5121/ijcsit.
In BBST Test Design. In http://www.testingeducation. 2011.3301.
org/BBST/testdesign/BBSTTestDesign2011pfinal.pdf. Spagnuolo, C., 2007. The bug bash sprint. In link:
Kitchenham, B., Charters, S., 2007. Guidelines for http://edgehopper.com/the-bug-bash-sprint/
performing systematic literature reviews in software Wang, L., 2011. Master project. Best practice for testing in
engineering. Software Engineering Group, School of development and testing groups. In
Computer Science and Mathematics, Keele University, [http://etd.dtu.dk/thesis/277238/]
Tech. Rep. EBSE-2007-01, July 2007. Whittaker, J.A., 2012. The 10-minute test plan. In IEEE
Khan, M.S.A., ElMadi, A., 2011. Data warehouse testing Software by IEEE Computer Society. Article ID: 0740
– an exploratory study. Software engineering master -7459/12.
thesis no: MSE-2011-65. In School of Computing Wiegers, Karl Eugene. Peer reviews in software: A
Blekinge Institute of Technology SE-371 79 practical guide. Boston: Addison-Wesley, 2002.
Karlskrona, Sweden. Wikipedia, 2012. Bug bash. In link:
Liangshi, 2010. Ce shi za gan, bug bash. In link: http://en.wikipedia.org/wiki/Bug_bash#cite_note-0.
http://www.51testinzg.com/html/63/n-225363.html. Williams, G., 1998. Usability process challenges in a web
Lyndsay, J., 2011. Known ways of managing ET #2 – bug product cycle. In HCT’98 Conference Companion.
bash. In link: http://workroomprds.blogspot.fi/2011 Yüksel, H.M., Tüzün, E., Gelirli, E.., Bıyıklı, E., 2009.
/12/known-ways-of-managing-et-02-bug-bash.html. Using continuous integration and automated test
Marick, B., 1997. Class Testing mistakes. In http:// techniques for a robust C4ISR system. In IEEE 2009.
www.csi-chennai.org/swtws/ws-swt/mistakes.pdf. Article D: 978-1-4244-5023-7.
MarkusN, 2012. Big bug bashing for GRASS 6! In link:
http://gfoss.blogspot.fi/2012/08/big-bug-bashing-for-
grass-6.html.
Mey, C.V., 2012. Shipping greatness. Practical lessons on
building and launching outstanding software, learned
on the job at Google and Amazon. By O’Reilly Media.
Nindel-Edwards, J., Steinke, G., 2006. A full life cycle
defect process model that supports defect tracking,
software product cycles and test iterations. In
Communications of the IIMA 2006 Volume 6 Issue 1.
Powell, C., 2009. ABAKAS bug bash. In link:
http://blog.abakas.com/2009/01/bug-bash.html.
131