56 research outputs found
Requirements-based Simulation Execution for Virtual Validation of Autonomous Systems
The complexity of software is rapidly increasing in many domains. Therefore, simulations have become established as a testing tool in recent years. Especially the virtual validation of autonomous systems leads to increasingly complex simulation environments. Nevertheless, the scenarios and the simulation results are not linked to the requirements. To close this gap, we develop a lightweight approach that allows the user to extract functional information. Simulation results can then be presented in different levels of detail in the original requirements. This replaces difficult translations of requirements and allows permanent comparison at all test levels
How Can Personality Influence Perception on Security of Context-Aware Applications?
[Context and Motivation] Our lives are being transformed by context-aware software applications with important social, environmental, and economic implications. [Question/Problem] Experts recognized that quality attributes, e.g. security, are the cornerstone to get healthy social implications of these applications. However, do end-users (service consumers) perceive these attributes as so important? [Methodology] To answer this question, we designed a survey, to understand how end-users perceive security of context-aware software applications and how the users’ personality traits might influence their perceptions. To this end, we did a web-based survey that embeds two animated-demonstration videos in order to present i) the functionality of a context-aware mobile app, and ii) some vulnerabilities of the mobile app. It involved 48 subjects divided in two groups: subjects with software engineering (SE) background (Group A) and subjects without any SE background (Group B). [Results] Our study found that the importance of confidentiality and integrity is more clearly perceived by subjects with SE backgrounds (Group A). Accountability is more difficult to be perceived by subjects. And this difficulty can be even more pronounced for subjects without any SE background (Group B). Our findings suggest that importance preferences on security are influenced by personality types. For instance, open-minded people have a higher propensity to perceive the importance of confidentiality and integrity. Whilst, people with a high level of agreeableness hold quite different perceptions regarding the importance of authenticity and accountability. Analyzing the level of association between personality and the perceived importance on security, we found that the importance perceptions on confidentiality are influenced by the personality of subjects from Group B. And, the changes (positive an negative) in the importance perception on confidentiality are very strongly influenced by personality, even more so by the personality of subjects from Group B.</p
A Systematic Literature Review of Requirements Engineering Education
Requirements engineering (RE) has established itself as a core software engineering discipline. It is well acknowledged that good RE leads to higher quality software and considerably reduces the risk of failure or budget-overspending of software development projects. It is of vital importance to train future software engineers in RE and educate future requirements engineers to adequately manage requirements in various projects. To this date, there exists no central concept of what RE education shall comprise. To lay a foundation, we report on a systematic literature review of the feld and provide a systematic map describing the current state of RE education. Doing so allows us to describe how the educational landscape has changed over the last decade. Results show that only a few established author collaborations exist and that RE education research is predominantly published in venues other than the top RE research venues (i.e., in venues other than the RE conference and journal). Key trends in RE instruction of the past decade include involvement of real or realistic stakeholders, teaching predominantly elicitation as an RE activity, and increasing student factors such as motivation or communication skills. Finally, we discuss open opportunities in RE education, such as training for security requirements and supply chain risk management, as well as developing a pedagogical foundation grounded in evidence of effective instructional approaches
Unveiling the Life Cycle of User Feedback: Best Practices from Software Practitioners
User feedback has grown in importance for organizations to improve software
products. Prior studies focused primarily on feedback collection and reported a
high-level overview of the processes, often overlooking how practitioners
reason about, and act upon this feedback through a structured set of
activities. In this work, we conducted an exploratory interview study with 40
practitioners from 32 organizations of various sizes and in several domains
such as e-commerce, analytics, and gaming. Our findings indicate that
organizations leverage many different user feedback sources. Social media
emerged as a key category of feedback that is increasingly critical for many
organizations. We found that organizations actively engage in a number of
non-trivial activities to curate and act on user feedback, depending on its
source. We synthesize these activities into a life cycle of managing user
feedback. We also report on the best practices for managing user feedback that
we distilled from responses of practitioners who felt that their organization
effectively understood and addressed their users' feedback. We present
actionable empirical results that organizations can leverage to increase their
understanding of user perception and behavior for better products thus reducing
user attrition.Comment: 2024 IEEE/ACM 46th International Conference on Software Engineerin
Beyond Traditional Feedback Channels: Extracting Requirements-Relevant Feedback from TikTok and YouTube
The increasing importance of videos as a medium for engagement,
communication, and content creation makes them critical for organizations to
consider for user feedback. However, sifting through vast amounts of video
content on social media platforms to extract requirements-relevant feedback is
challenging. This study delves into the potential of TikTok and YouTube, two
widely used social media platforms that focus on video content, in identifying
relevant user feedback that may be further refined into requirements using
subsequent requirement generation steps. We evaluated the prospect of videos as
a source of user feedback by analyzing audio and visual text, and metadata
(i.e., description/title) from 6276 videos of 20 popular products across
various industries. We employed state-of-the-art deep learning
transformer-based models, and classified 3097 videos consisting of requirements
relevant information. We then clustered relevant videos and found multiple
requirements relevant feedback themes for each of the 20 products. This
feedback can later be refined into requirements artifacts. We found that
product ratings (feature, design, performance), bug reports, and usage tutorial
are persistent themes from the videos. Video-based social media such as TikTok
and YouTube can provide valuable user insights, making them a powerful and
novel resource for companies to improve customer-centric development
Requirements Engineering that Balances Agility of Teams and System-level Information Needs at Scale
Context: Motivated by their success in software development, large-scale systems development companies are increasingly adopting agile methods and their practices. Such companies need to accommodate different development cycles of hardware and software and are usually subject to regulation and safety concerns. Also, for such companies, requirements engineering is an essential activity that involves upfront and detailed analysis which can be at odds with agile development methods. Objective: The overall aim of this thesis is to investigate the challenges and solution candidates of performing effective requirements engineering in an agile environment, based on empirical evidence. Illustrated with studies on safety and system-level information needs, we explore RE challenges and solutions in large-scale agile development, both in general and from the teams’ perspectives. Method: To meet our aim, we performed a secondary study and a series of empirical studies based on case studies. We collected qualitative data using interviews, focus groups and workshops to derive challenges and potential solutions from industry. Findings: Our findings show that there are numerous challenges of conducting requirements engineering in agile development especially where systems development is concerned. The challenges discovered sprout from an integration problem of working with agile methods while relying on established plan-driven processes for the overall system. We highlight the communication challenge of crossing the boundary of agile methods and system-level (or plan-driven) development, which also proves the coexistence of both methods. Conclusions: Our results highlight the painful areas of requirements engineering in agile development and propose solutions that can be explored further. This thesis contributes to future research, by establishing a holistic map of challenges and candidate solutions that can be further developed to make RE more efficient within agile environments
Mining app reviews to support software engineering
The thesis studies how mining app reviews can support software engineering.
App reviews —short user reviews of an app in app stores— provide a potentially rich source of information to help software development teams maintain and evolve their products. Exploiting this information is however difficult due to the large number of reviews and the difficulty in extracting useful actionable information from short informal texts.
A variety of app review mining techniques have been proposed to classify reviews and to extract information such as feature requests, bug descriptions, and user sentiments but the usefulness of these techniques in practice is still unknown. Research in this area has grown rapidly, resulting in a large number of scientific publications (at least 182 between 2010 and 2020) but nearly no independent evaluation and description of how diverse techniques fit together to support specific software engineering tasks have been performed so far.
The thesis presents a series of contributions to address these limitations. We first report the findings of a systematic literature review in app review mining exposing the breadth and limitations of research in this area. Using findings from the literature review, we then present a reference model that relates features of app review mining tools to specific software engineering tasks supporting requirements engineering, software maintenance and evolution.
We then present two additional contributions extending previous evaluations of app review mining techniques. We present a novel independent evaluation of opinion mining techniques using an annotated dataset created for our experiment. Our evaluation finds lower effectiveness than initially reported by the techniques authors. A final part of the thesis, evaluates approaches in searching for app reviews pertinent to a particular feature. The findings show a general purpose search technique is more effective than the state-of-the-art purpose-built app review mining techniques; and suggest their usefulness for requirements elicitation.
Overall, the thesis contributes to improving the empirical evaluation of app review mining techniques and their application in software engineering practice. Researchers and developers of future app mining tools will benefit from the novel reference model, detailed experiments designs, and publicly available datasets presented in the thesis
Opinion Mining for Software Development: A Systematic Literature Review
Opinion mining, sometimes referred to as sentiment analysis, has gained increasing attention in software engineering (SE) studies.
SE researchers have applied opinion mining techniques in various contexts, such as identifying developers’ emotions expressed in
code comments and extracting users’ critics toward mobile apps. Given the large amount of relevant studies available, it can take
considerable time for researchers and developers to figure out which approaches they can adopt in their own studies and what perils
these approaches entail.
We conducted a systematic literature review involving 185 papers. More specifically, we present 1) well-defined categories of opinion
mining-related software development activities, 2) available opinion mining approaches, whether they are evaluated when adopted in
other studies, and how their performance is compared, 3) available datasets for performance evaluation and tool customization, and 4)
concerns or limitations SE researchers might need to take into account when applying/customizing these opinion mining techniques.
The results of our study serve as references to choose suitable opinion mining tools for software development activities, and provide
critical insights for the further development of opinion mining techniques in the SE domain
- …