Change search
Link to record
Permanent link

Direct link
Publications (10 of 40) Show all publications
Frattini, J., Fucci, D., Torkar, R., Montgomery, L., Unterkalmsteiner, M., Fischbach, J. & Mendez, D. (2025). Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment. Empirical Software Engineering, 30(1), Article ID 29.
Open this publication in new window or tab >>Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment
Show others...
2025 (English)In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 30, no 1, article id 29Article in journal (Refereed) Published
Abstract [en]

It is commonly accepted that the quality of requirements specifications impacts subsequent software engineering activities. However, we still lack empirical evidence to support organizations in deciding whether their requirements are good enough or impede subsequent activities. We aim to contribute empirical evidence to the effect that requirements quality defects have on a software engineering activity that depends on this requirement. We conduct a controlled experiment in which 25 participants from industry and university generate domain models from four natural language requirements containing different quality defects. We evaluate the resulting models using both frequentist and Bayesian data analysis. Contrary to our expectations, our results show that the use of passive voice only has a minor impact on the resulting domain models. The use of ambiguous pronouns, however, shows a strong effect on various properties of the resulting domain models. Most notably, ambiguous pronouns lead to incorrect associations in domain models. Despite being equally advised against by literature and frequentist methods, the Bayesian data analysis shows that the two investigated quality defects have vastly different impacts on software engineering activities and, hence, deserve different levels of attention. Our employed method can be further utilized by researchers to improve reliable, detailed empirical evidence on requirements quality. © The Author(s) 2024.

Place, publisher, year, edition, pages
Springer, 2025
Keywords
Bayesian data analysis, Experiment, Replication, Requirements engineering, Requirements quality, Data accuracy, Data assimilation, Data consistency, Spatio-temporal data, Causal inferences, Controlled experiment, Domain model, Engineering activities, Quality defects, Requirement engineering, Requirement quality, Requirements specifications, Software quality
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27175 (URN)10.1007/s10664-024-10582-1 (DOI)2-s2.0-85209711862 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2025-01-16Bibliographically approved
Frattini, J., Unterkalmsteiner, M., Fucci, D. & Mendez, D. (2025). NLP4RE Tools: Classification, Overview and Management. In: Alessio Ferrari, Gouri Ginde (Ed.), Handbook on Natural Language Processing for Requirements Engineering: (pp. 357-380). Springer Nature
Open this publication in new window or tab >>NLP4RE Tools: Classification, Overview and Management
2025 (English)In: Handbook on Natural Language Processing for Requirements Engineering / [ed] Alessio Ferrari, Gouri Ginde, Springer Nature, 2025, p. 357-380Chapter in book (Other academic)
Abstract [en]

Tools constitute an essential contribution to natural language processing for requirements engineering (NLP4RE) research. They are executable instruments that make research usable and applicable in practice. In this chapter, we first introduce a systematic classification of NLP4RE tools. Then, we extend an existing overview with a systematic summary of 126 NLP4RE tools published between April 2019 and June 2023. Finally, we provide instructions on how to create, maintain and disseminate NLP4RE tools. The content of this chapter contributes (1) a classification scheme to improve the understanding of their types and properties, (2) a systematic overview to ease the reuse and evolution of existing tools and (3) guidelines to support a more rigorous management and dissemination. 

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Natural language processing, Open science, Requirements engineering, Tool, Engineering research, Industrial research, Classification scheme, Executables, Language processing, Natural languages, Property, Requirement engineering, Reuse
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27881 (URN)10.1007/978-3-031-73143-3_13 (DOI)2-s2.0-105004614312 (Scopus ID)9783031731433 (ISBN)9783031731426 (ISBN)
Available from: 2025-05-23 Created: 2025-05-23 Last updated: 2025-05-23Bibliographically approved
Uyaguari, F., Acuña, S. T., Castro, J. W., Fucci, D., Dieste, O. & Vegas, S. (2025). Relevant Information in TDD Experiment Reporting. ACM Transactions on Software Engineering and Methodology, 34(2), Article ID 28.
Open this publication in new window or tab >>Relevant Information in TDD Experiment Reporting
Show others...
2025 (English)In: ACM Transactions on Software Engineering and Methodology, ISSN 1049-331X, E-ISSN 1557-7392, Vol. 34, no 2, article id 28Article in journal (Refereed) Published
Abstract [en]

Experiments are a commonly used method of research in software engineering (SE). Researchers report their experiments following detailed guidelines. However, researchers do not, in the field of test-driven development (TDD) at least, specify how they operationalized the response variables and, particularly, the measurement process. This article has three aims: (i) identify the response variable operationalization components in TDD experiments that study external quality; (ii) study their influence on the experimental results; (iii) determine if the experiment reports describe the measurement process components that have an impact on the results. We used two-part sequential mixed methods research. The first part of the research adopts a quantitative approach applying a statistical analysis of the impact of the operationalization components on the experimental results. The second part follows with a qualitative approach applying a systematic mapping study (SMS). The test suites, intervention types and measurers have an influence on the measurements and results of the statistical analysis of TDD experiments in SE. The test suites have a major impact on both the measurements and the results of the experiments. The intervention type has less impact on the results than on the measurements. While the measurers have an impact on the measurements, this is not transferred to the experimental results. On the other hand, the results of our SMS confirm that TDD experiments do not usually report either the test suites, the test case generation method, or the details of how external quality was measured. A measurement protocol should be used to ensure that the measurements made by different measurers are similar. It is necessary to report the test cases, the experimental task and the intervention type in order to be able to reproduce the measurements and statistical analyses, as well as to replicate experiments and build dependable families of experiments. 

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
code intervention, experiment, experimental task, measurement, measurer, missing information, operationalization, SMS, systematic mapping study, TDD, test cases, test-driven development, Strain measurement, Text messaging, Measure, Systematic mapping studies, Test case, Test driven development, Mapping
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27494 (URN)10.1145/3688837 (DOI)001431090600003 ()2-s2.0-85218096347 (Scopus ID)
Funder
European Regional Development Fund (ERDF), PID2021-122270OB- I00
Available from: 2025-03-03 Created: 2025-03-03 Last updated: 2025-03-06Bibliographically approved
Kosenkov, O., Elahidoost, P., Gorschek, T., Fischbach, J., Mendez, D., Unterkalmsteiner, M., . . . Mohanani, R. (2025). Systematic mapping study on requirements engineering for regulatory compliance of software systems. Information and Software Technology, 178, Article ID 107622.
Open this publication in new window or tab >>Systematic mapping study on requirements engineering for regulatory compliance of software systems
Show others...
2025 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 178, article id 107622Article, review/survey (Refereed) Published
Abstract [en]

Context: As the diversity and complexity of regulations affecting Software-Intensive Products and Services (SIPS) is increasing, software engineers need to address the growing regulatory scrutiny. We argue that, as with any other non-negotiable requirements, SIPS compliance should be addressed early in SIPS engineering—i.e., during requirements engineering (RE).

Objectives: In the conditions of the expanding regulatory landscape, existing research offers scattered insights into regulatory compliance of SIPS. This study addresses the pressing need for a structured overview of the state of the art in software RE and its contribution to regulatory compliance of SIPS.

Method: We conducted a systematic mapping study to provide an overview of the current state of research regarding challenges, principles, and practices for regulatory compliance of SIPS related to RE. We focused on the role of RE and its contribution to other SIPS lifecycle process areas. We retrieved 6914 studies published from 2017 (January 1) until 2023 (December 31) from four academic databases, which we filtered down to 280 relevant primary studies.

Results: We identified and categorized the RE-related challenges in regulatory compliance of SIPS and their potential connection to six types of principles and practices addressing challenges. We found that about 13.6% of the primary studies considered the involvement of both software engineers and legal experts in developing principles and practices. About 20.7% of primary studies considered RE in connection to other process areas. Most primary studies focused on a few popular regulation fields (privacy, quality) and application domains (healthcare, software development, avionics). Our results suggest that there can be differences in terms of challenges and involvement of stakeholders across different fields of regulation.

Conclusion: Our findings highlight the need for an in-depth investigation of stakeholders’ roles, relationships between process areas, and specific challenges for distinct regulatory fields to guide research and practice. 

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Compliance requirements, Regulatory compliance, Regulatory requirements engineering, Requirements engineering, Secondary research, Software compliance, Software engineering, Computer aided software engineering, Computer software reusability, Computer software selection and evaluation, Mapping, Software design, Software quality, Compliance requirement, Principles and practices, Process areas, Product and services, Regulatory requirement engineering, Regulatory requirements, Requirement engineering, Secondary researches, Application programs
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27180 (URN)10.1016/j.infsof.2024.107622 (DOI)001360553400001 ()2-s2.0-85209250611 (Scopus ID)
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2024-12-02Bibliographically approved
Peixoto, M., Gorschek, T., Mendez, D., Silva, C. & Fucci, D. (2025). The Perspective of Agile Software Developers on Data Privacy. Journal of Software: Evolution and Process, 37(2), Article ID e2755.
Open this publication in new window or tab >>The Perspective of Agile Software Developers on Data Privacy
Show others...
2025 (English)In: Journal of Software: Evolution and Process, ISSN 2047-7473, E-ISSN 2047-7481, Vol. 37, no 2, article id e2755Article in journal (Refereed) Published
Abstract [en]

Recent studies have shown that many software developers do not have sufficient knowledge and understanding of how to develop a privacy-friendly system. This may become a challenge in developing systems complying with data protection laws. To address this issue, we investigated the factors that influence developers' decision-making when developing privacy-sensitive systems.

We conducted an empirical study by means of a survey with 109 practitioners. Our data analysis is based on the principles of social cognitive theory, which includes personal, behavioral, and external environmental factors.

We identified six personal, five behavioral, and five external environment factors that affect how developers make decisions regarding privacy, including confusion between privacy and security and reliance on informal practices and organizational support gaps. These findings contribute to understanding how practitioners and companies consider privacy, showing improvements in formal training and structured support over previous studies yet highlighting persistent challenges in consistent privacy integration. 

Place, publisher, year, edition, pages
John Wiley & Sons, 2025
Keywords
empirical study, privacy, software development, Agile softwares, Data protection laws, Decisions makings, Empirical studies, Environmental factors, External environments, Sensitive systems, Social cognitive theory, Software developer, Differential privacy
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27356 (URN)10.1002/smr.2755 (DOI)001389574100001 ()2-s2.0-85212760764 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2025-01-03 Created: 2025-01-03 Last updated: 2025-05-26Bibliographically approved
Peixoto, M., Gorschek, T., Mendez, D., Fucci, D. & Silva, C. (2024). A natural language-based method to specify privacy requirements: an evaluation with practitioners. Requirements Engineering, 29(3), 279-301
Open this publication in new window or tab >>A natural language-based method to specify privacy requirements: an evaluation with practitioners
Show others...
2024 (English)In: Requirements Engineering, ISSN 0947-3602, E-ISSN 1432-010X, Vol. 29, no 3, p. 279-301Article in journal (Refereed) Published
Abstract [en]

Organisations are becoming concerned with effectively dealing with privacy-related requirements. Existing Requirements Engineering methods based on structured natural language suffer from several limitations both in eliciting and specifying privacy requirements. In our previous study, we proposed a structured natural-language approach called the “Privacy Criteria Method” (PCM), which demonstrates potential advantages over user stories. Our goal is to present a PCM evaluation that focused on the opinions of software practitioners from different companies on PCM’s ability to support the specification of privacy requirements and the quality of the privacy requirements specifications produced by these software practitioners. We conducted a multiple case study to evaluate PCM in four different industrial contexts. We gathered and analysed the opinions of 21 practitioners on PCM usage regarding Coverage, Applicability, Usefulness, and Scalability. Moreover, we assessed the syntactic and semantic quality of the PCM artifacts produced by these practitioners. PCM can aid developers in elaborating requirements specifications focused on privacy with good quality. The practitioners found PCM to be useful for their companies’ development processes. PCM is considered a promising method for specifying privacy requirements. Some slight extensions of PCM may be required to tailor the method to the characteristics of the company. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2024
Keywords
Empirical study, Privacy criteria method, Privacy requirements specification, Software development, Quality control, Requirements engineering, Semantics, Software design, Empirical studies, Engineering methods, Natural languages, Privacy requirement specification, Privacy requirements, Requirement engineering, Requirements specifications, Software practitioners, User stories, Specifications
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-26772 (URN)10.1007/s00766-024-00428-z (DOI)001272283700001 ()2-s2.0-85198939572 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-08-09 Created: 2024-08-09 Last updated: 2024-09-19Bibliographically approved
Frattini, J., Fucci, D., Torkar, R. & Mendez, D. (2024). A Second Look at the Impact of Passive Voice Requirements on Domain Modeling: Bayesian Reanalysis of an Experiment. In: Proceedings of the 2024 IEEE/ACM international workshop on methodological issues with empirical studies in software engineering, WSESE 2024: . Paper presented at 1st International Workshop on Methodological Issues with Empirical Studies in Software Engineering (WSESE), Lisbon, APR 16, 2024 (pp. 27-33). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>A Second Look at the Impact of Passive Voice Requirements on Domain Modeling: Bayesian Reanalysis of an Experiment
2024 (English)In: Proceedings of the 2024 IEEE/ACM international workshop on methodological issues with empirical studies in software engineering, WSESE 2024, Association for Computing Machinery (ACM), 2024, p. 27-33Conference paper, Published paper (Refereed)
Abstract [en]

The quality of requirements specifications may impact subsequent, dependent software engineering (SE) activities. However, empirical evidence of this impact remains scarce and too often superficial as studies abstract from the phenomena under investigation too much. 1Wo of these abstractions are caused by the lack of frameworks for causal inference and frequentist methods which reduce complex data to binary results. In this study, we aim to demonstrate (1) the use of a causal framework and (2) contrast frequentist methods with more sophisticated Bayesian statistics for causal inference. To this end, we reanalyze the only known controlled experiment investigating the impact of passive voice on the subsequent activity of domain modeling. We follow a framework for statistical causal inference and employ Bayesian data analysis methods to re-investigate the hypotheses of the original study. Our results reveal that the effects observed by the original authors turned out to be much less significant than previously assumed. This study supports the recent call to action in SE research to adopt Bayesian data analysis, including causal frameworks and Bayesian statistics, for more sophisticated causal inference.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
Requirements Engineering, Requirements Quality, Controlled experiment, Bayesian Data Analysis
National Category
Software Engineering Probability Theory and Statistics
Identifiers
urn:nbn:se:bth-26968 (URN)10.1145/3643664.3618211 (DOI)001293147200006 ()2-s2.0-85190677315 (Scopus ID)9798400705670 (ISBN)
Conference
1st International Workshop on Methodological Issues with Empirical Studies in Software Engineering (WSESE), Lisbon, APR 16, 2024
Funder
Knowledge Foundation, 20180010
Available from: 2024-10-03 Created: 2024-10-03 Last updated: 2025-01-16Bibliographically approved
Frattini, J., Fucci, D. & Vegas, S. (2024). Crossover Designs in Software Engineering Experiments: Review of the State of Analysis. In: International Symposium on Empirical Software Engineering and Measurement: . Paper presented at 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2024, Barcelona, Oct 24-25 2024 (pp. 482-488). IEEE Computer Society
Open this publication in new window or tab >>Crossover Designs in Software Engineering Experiments: Review of the State of Analysis
2024 (English)In: International Symposium on Empirical Software Engineering and Measurement, IEEE Computer Society, 2024, p. 482-488Conference paper, Published paper (Refereed)
Abstract [en]

Experimentation is an essential method for causal inference in any empirical discipline. Crossover-design experiments are common in Software Engineering (SE) research. In these, subjects apply more than one treatment in different orders. This design increases the amount of obtained data and deals with subject variability but introduces threats to internal validity like the learning and carryover effect. Vegas et al. reviewed the state of practice for crossover designs in SE research and provided guidelines on how to address its threats during data analysis while still harnessing its benefits. In this paper, we reflect on the impact of these guidelines and review the state of analysis of crossover-design experiments in SE publications between 2015 and March 2024. To this end, by conducting a forward snowballing of the guidelines, we survey 136 publications reporting 67 crossover-design experiments and evaluate their data analysis against the provided guidelines. The results show that the validity of data analyses has improved compared to the original state of analysis. Still, despite the explicit guidelines, only 29.5% of all threats to validity were addressed properly. While the maturation and the optimal sequence threats are properly addressed in 35.8% and 38.8% of all studies in our sample respectively, the carryover threat is only modeled in about 3% of the observed cases. The lack of adherence to the analysis guidelines threatens the validity of the conclusions drawn from crossover-design experiments. © 2024 Owner/Author.

Place, publisher, year, edition, pages
IEEE Computer Society, 2024
Series
International Symposium on Empirical Software Engineering and Measurement, ISSN 1949-3770, E-ISSN 1949-3789
Keywords
Crossover, Design, Experimentation, Literature Survey, Carry-over effects, Causal inferences, Crossover design, Design experiments, Learning effects, Software engineering experiments, Software engineering research, Design of experiments
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27253 (URN)10.1145/3674805.3690754 (DOI)2-s2.0-85210601622 (Scopus ID)9798400710476 (ISBN)
Conference
18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2024, Barcelona, Oct 24-25 2024
Funder
Knowledge Foundation, 20180010European Regional Development Fund (ERDF)
Available from: 2024-12-17 Created: 2024-12-17 Last updated: 2025-01-16Bibliographically approved
Elahidoost, P., Unterkalmsteiner, M., Fucci, D., Liljenberg, P. & Fischbach, J. (2024). Designing NLP-Based Solutions for Requirements Variability Management: Experiences from a Design Science Study at Visma. In: Daniel Mendez, Ana Moreira (Ed.), Requirements Engineering: Foundation for Software Qualit. Paper presented at 30th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2024, Winterthur 8 April through 12 April 2024 (pp. 191-204). Springer Science+Business Media B.V.
Open this publication in new window or tab >>Designing NLP-Based Solutions for Requirements Variability Management: Experiences from a Design Science Study at Visma
Show others...
2024 (English)In: Requirements Engineering: Foundation for Software Qualit / [ed] Daniel Mendez, Ana Moreira, Springer Science+Business Media B.V., 2024, p. 191-204Conference paper, Published paper (Refereed)
Abstract [en]

Context and motivation: In this industry-academia collaborative project, a team of researchers, supported by a software architect, business analyst, and test engineer explored the challenges of requirement variability in a large business software development company. Question/ problem: Following the design science paradigm, we studied the problem of requirements analysis and tracing in the context of contractual documents, with a specific focus on managing requirements variability. This paper reports on the lessons learned from that experience, highlighting the strategies and insights gained in the realm of requirements variability management.Principal ideas/results: This experience report outlines the insights gained from applying design science in requirements engineering research in industry. We show and evaluate various strategies to tackle the issue of requirement variability. Contribution: We report on the iterations and how the solution development evolved in parallel with problem understanding. From this process, we derive five key lessons learned to highlight the effectiveness of design science in exploring solutions for requirement variability in contract-based environments. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2024
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 14588
Keywords
Industry-academia collaboration, Lessons learned, Requirements variability management, Computer software selection and evaluation, Design, Industrial research, Project management, Software architecture, Software design, Software testing, Business analysts, Collaborative programs, Design science, Lesson learned, Requirement variability management, Requirements variability, Science studies, Software architects, Variability management, Requirements engineering
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-26155 (URN)10.1007/978-3-031-57327-9_12 (DOI)001209314200012 ()2-s2.0-85190698479 (Scopus ID)9783031573262 (ISBN)
Conference
30th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2024, Winterthur 8 April through 12 April 2024
Funder
Knowledge Foundation, 20180010
Available from: 2024-04-30 Created: 2024-04-30 Last updated: 2024-05-30Bibliographically approved
Fucci, D., Alégroth, E., Felderer, M. & Johannesson, C. (2024). Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions. Journal of Systems and Software, 214, Article ID 112062.
Open this publication in new window or tab >>Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions
2024 (English)In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 214, article id 112062Article in journal (Refereed) Published
Abstract [en]

Background: Recent years have seen a surge in cyber-attacks, which can be prevented or mitigated using software security activities. OWASP SAMM is a maturity model providing a versatile way for companies to assess their security posture and plan for improvements. Objective: We perform an initial SAMM assessment in collaboration with a company in the financial domain. Our objective is to assess a holistic inventory of the company security-related activities, focusing on how different roles perform the assessment and how they perceive the instrument used in the process. Methodology: We perform a case study to collect data using SAMM in a lightweight and novel manner through assessment using an online survey with 17 participants and a focus group with seven participants. Results: We show that different roles perceive maturity differently and that the two assessments deviate only for specific practices making the lightweight approach a viable and efficient solution in industrial practice. Our results indicate that the questions included in the SAMM assessment tool are answered easily and confidently across most roles. Discussion: Our results suggest that companies can productively use a lightweight SAMM assessment. We provide nine lessons learned for guiding industrial practitioners in the evaluation of their current security posture as well as for academics wanting to utilize SAMM as a research tool in industrial settings. Editor's note: Open Science material was validated by the Journal of Systems and Software Open Science Board. © 2024 The Author(s)

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Industry-academia collaboration, OWASP SAMM, Software security, Cybersecurity, Industrial research, Petroleum reservoir evaluation, Cyber-attacks, Evaluating software, Financial domains, Maturity model, Open science, Security activities, Stakeholder perception, Network security
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-26188 (URN)10.1016/j.jss.2024.112062 (DOI)001237888500001 ()2-s2.0-85192019707 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-05-13 Created: 2024-05-13 Last updated: 2024-06-19Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-0679-4361

Search in DiVA

Show all publications