Change search
Link to record
Permanent link

Direct link
Publications (10 of 85) Show all publications
Paudel, B., Gonzalez-Huerta, J., Mendez, D. & Klotins, E. (2025). A Data-Driven Approach to Optimize Internal Software Quality and Customer Value Delivery. In: Pfahl D., Anwar H., Gonzalez Huerta J., Klünder J. (Ed.), Product-Focused Software Process Improvement. Industry-, Workshop-, and Doctoral Symposium Papers: . Paper presented at 25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024 (pp. 179-185). Springer Science+Business Media B.V., 15453
Open this publication in new window or tab >>A Data-Driven Approach to Optimize Internal Software Quality and Customer Value Delivery
2025 (English)In: Product-Focused Software Process Improvement. Industry-, Workshop-, and Doctoral Symposium Papers / [ed] Pfahl D., Anwar H., Gonzalez Huerta J., Klünder J., Springer Science+Business Media B.V., 2025, Vol. 15453, p. 179-185Conference paper, Published paper (Refereed)
Abstract [en]

The growing complexity, the ever-ending demands for new features, and the need to become faster to remain competitive force software development organizations to rethink their development and value delivery practices. While continuous delivery has become more popular, it still relies mainly on internal metrics, ad-hoc data, and expert opinions. As a result, software organizations stumble to find the balance between improving internal system quality and delivering external value. In fact, understanding and measuring customer value is on itself essential. In this PhD project, we aim for a better understanding of customer value and develop measurement instruments to be integrated with internal perspectives to drive proactive and continuous internal improvement while delivering relevant customer value. 

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15453
Keywords
Continuous Customer Value Delivery, Data-Driven Approach, Software Quality Improvement, Sales, Competitive forces, Customer values, Expert opinion, Quality value, Software development organizations, Software Quality, Software quality improvements, Value delivery
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27310 (URN)10.1007/978-3-031-78392-0_13 (DOI)001423667900013 ()2-s2.0-85211242536 (Scopus ID)9783031783913 (ISBN)
Conference
25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024
Funder
Knowledge Foundation, 20180010
Available from: 2024-12-26 Created: 2024-12-26 Last updated: 2025-03-14Bibliographically approved
Frattini, J., Fucci, D., Torkar, R., Montgomery, L., Unterkalmsteiner, M., Fischbach, J. & Mendez, D. (2025). Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment. Empirical Software Engineering, 30(1), Article ID 29.
Open this publication in new window or tab >>Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment
Show others...
2025 (English)In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 30, no 1, article id 29Article in journal (Refereed) Published
Abstract [en]

It is commonly accepted that the quality of requirements specifications impacts subsequent software engineering activities. However, we still lack empirical evidence to support organizations in deciding whether their requirements are good enough or impede subsequent activities. We aim to contribute empirical evidence to the effect that requirements quality defects have on a software engineering activity that depends on this requirement. We conduct a controlled experiment in which 25 participants from industry and university generate domain models from four natural language requirements containing different quality defects. We evaluate the resulting models using both frequentist and Bayesian data analysis. Contrary to our expectations, our results show that the use of passive voice only has a minor impact on the resulting domain models. The use of ambiguous pronouns, however, shows a strong effect on various properties of the resulting domain models. Most notably, ambiguous pronouns lead to incorrect associations in domain models. Despite being equally advised against by literature and frequentist methods, the Bayesian data analysis shows that the two investigated quality defects have vastly different impacts on software engineering activities and, hence, deserve different levels of attention. Our employed method can be further utilized by researchers to improve reliable, detailed empirical evidence on requirements quality. © The Author(s) 2024.

Place, publisher, year, edition, pages
Springer, 2025
Keywords
Bayesian data analysis, Experiment, Replication, Requirements engineering, Requirements quality, Data accuracy, Data assimilation, Data consistency, Spatio-temporal data, Causal inferences, Controlled experiment, Domain model, Engineering activities, Quality defects, Requirement engineering, Requirement quality, Requirements specifications, Software quality
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27175 (URN)10.1007/s10664-024-10582-1 (DOI)2-s2.0-85209711862 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2025-01-16Bibliographically approved
Thode, L., Iftikhar, U. & Mendez, D. (2025). Exploring the use of LLMs for the selection phase in systematic literature studies. Information and Software Technology, 184, Article ID 107757.
Open this publication in new window or tab >>Exploring the use of LLMs for the selection phase in systematic literature studies
2025 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 184, article id 107757Article in journal (Refereed) Published
Abstract [en]

Context: Systematic literature studies, such as secondary studies, are crucial to aggregate evidence. An essential part of these studies is the selection phase of relevant studies. This, however, is time-consuming, resource-intensive, and error-prone as it highly depends on manual labor and domain expertise. The increasing popularity of Large Language Models (LLMs) raises the question to what extent these manual study selection tasks could be supported in an automated manner.

Objectives: In this manuscript, we report on our effort to explore and evaluate the use of state-of-the-art LLMs to automate the selection phase in systematic literature studies.

Method: We evaluated LLMs for the selection phase using two published systematic literature studies in software engineering as ground truth. Three prompts were designed and applied across five LLMs to the studies’ titles and abstracts based on their inclusion and exclusion criteria. Additionally, we analyzed combining two LLMs to replicate a practical selection phase. We analyzed recall and precision and reflected upon the accuracy of the LLMs, and whether the ground truth studies were conducted by early career scholars or by more advanced ones.

Results: Our results show a high average recall of up to 98% combined with a precision of 27% in a single LLM approach and an average recall of 99% with a precision of 27% in a two-model approach replicating a two-reviewer procedure. Further the Llama 2 models showed the highest average recall 98% across all prompt templates and datasets while GPT4-turbo had the highest average precision 72%.

Conclusions: Our results demonstrate how LLMs could support a selection phase in the future. We recommend a two LLM-approach to archive a higher recall. However, we also critically reflect upon how further studies are required using other models and prompts on more datasets to strengthen the confidence in our presented approach. © 2025 The Authors

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Automation, Large language models, Systematic literature studies
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27884 (URN)10.1016/j.infsof.2025.107757 (DOI)001491965200001 ()2-s2.0-105004904751 (Scopus ID)
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile CommunicationsKnowledge Foundation, 20180010Knowledge Foundation, 20220235
Available from: 2025-05-23 Created: 2025-05-23 Last updated: 2025-06-02Bibliographically approved
Frattini, J., Unterkalmsteiner, M., Fucci, D. & Mendez, D. (2025). NLP4RE Tools: Classification, Overview and Management. In: Alessio Ferrari, Gouri Ginde (Ed.), Handbook on Natural Language Processing for Requirements Engineering: (pp. 357-380). Springer Nature
Open this publication in new window or tab >>NLP4RE Tools: Classification, Overview and Management
2025 (English)In: Handbook on Natural Language Processing for Requirements Engineering / [ed] Alessio Ferrari, Gouri Ginde, Springer Nature, 2025, p. 357-380Chapter in book (Other academic)
Abstract [en]

Tools constitute an essential contribution to natural language processing for requirements engineering (NLP4RE) research. They are executable instruments that make research usable and applicable in practice. In this chapter, we first introduce a systematic classification of NLP4RE tools. Then, we extend an existing overview with a systematic summary of 126 NLP4RE tools published between April 2019 and June 2023. Finally, we provide instructions on how to create, maintain and disseminate NLP4RE tools. The content of this chapter contributes (1) a classification scheme to improve the understanding of their types and properties, (2) a systematic overview to ease the reuse and evolution of existing tools and (3) guidelines to support a more rigorous management and dissemination. 

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Natural language processing, Open science, Requirements engineering, Tool, Engineering research, Industrial research, Classification scheme, Executables, Language processing, Natural languages, Property, Requirement engineering, Reuse
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27881 (URN)10.1007/978-3-031-73143-3_13 (DOI)2-s2.0-105004614312 (Scopus ID)9783031731433 (ISBN)9783031731426 (ISBN)
Available from: 2025-05-23 Created: 2025-05-23 Last updated: 2025-05-23Bibliographically approved
Kosenkov, O., Unterkalmsteiner, M., Mendez, D. & Fischbach, J. (2025). Regulatory Requirements Engineering in Large Enterprises: An Interview Study on the European Accessibility Act. In: Dietmar Pfahl, Javier Gonzalez Huerta, Jil Klünder, Hina Anwar (Ed.), Product-Focused Software Process Improvement: . Paper presented at 25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024 (pp. 204-220). Springer Science+Business Media B.V., 15452
Open this publication in new window or tab >>Regulatory Requirements Engineering in Large Enterprises: An Interview Study on the European Accessibility Act
2025 (English)In: Product-Focused Software Process Improvement / [ed] Dietmar Pfahl, Javier Gonzalez Huerta, Jil Klünder, Hina Anwar, Springer Science+Business Media B.V., 2025, Vol. 15452, p. 204-220Conference paper, Published paper (Refereed)
Abstract [en]

Context: Regulations, such as the European Accessibility Act (EAA), impact the engineering of software products and services. Managing that impact while providing meaningful inputs to development teams is one of the emerging requirements engineering (RE) challenges.

Problem: Enterprises conduct Regulatory Impact Analysis (RIA) to consider the effects of regulations on software products offered and formulate requirements at an enterprise level. Despite its practical relevance, we are unaware of any studies on this large-scale regulatory RE process.

Methodology: We conducted an exploratory interview study of RIA in three large enterprises. We focused on how they conduct RIA, emphasizing cross-functional interactions, and using the EAA as an example.

Results: RIA, as a regulatory RE process, is conducted to address the needs of executive management and central functions. It involves coordination between different functions and levels of enterprise hierarchy. Enterprises use artifacts to support interpretation and communication of the results of RIA. Challenges to RIA are mainly related to the execution of such coordination and managing the knowledge involved.

Conclusion: RIA in large enterprises demands close coordination of multiple stakeholders and roles. Applying interpretation and compliance artifacts is one approach to support such coordination. However, there are no established practices for creating and managing such artifacts. 

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15452
Keywords
Compliance requirements, Enterprise requirements engineering, Impact Analysis, Large-scale agile, Requirements engineering, Software regulatory compliance, Human resource management, Compliance requirement, Enterprise requirement engineering, Enterprise requirements, Large-scales, Regulatory impact analysis, Requirement engineering
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27325 (URN)10.1007/978-3-031-78386-9_14 (DOI)001423664600014 ()2-s2.0-85211892202 (Scopus ID)9783031783852 (ISBN)
Conference
25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024
Note

Available from: 2024-12-30 Created: 2024-12-30 Last updated: 2025-03-14Bibliographically approved
Kosenkov, O., Elahidoost, P., Gorschek, T., Fischbach, J., Mendez, D., Unterkalmsteiner, M., . . . Mohanani, R. (2025). Systematic mapping study on requirements engineering for regulatory compliance of software systems. Information and Software Technology, 178, Article ID 107622.
Open this publication in new window or tab >>Systematic mapping study on requirements engineering for regulatory compliance of software systems
Show others...
2025 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 178, article id 107622Article, review/survey (Refereed) Published
Abstract [en]

Context: As the diversity and complexity of regulations affecting Software-Intensive Products and Services (SIPS) is increasing, software engineers need to address the growing regulatory scrutiny. We argue that, as with any other non-negotiable requirements, SIPS compliance should be addressed early in SIPS engineering—i.e., during requirements engineering (RE).

Objectives: In the conditions of the expanding regulatory landscape, existing research offers scattered insights into regulatory compliance of SIPS. This study addresses the pressing need for a structured overview of the state of the art in software RE and its contribution to regulatory compliance of SIPS.

Method: We conducted a systematic mapping study to provide an overview of the current state of research regarding challenges, principles, and practices for regulatory compliance of SIPS related to RE. We focused on the role of RE and its contribution to other SIPS lifecycle process areas. We retrieved 6914 studies published from 2017 (January 1) until 2023 (December 31) from four academic databases, which we filtered down to 280 relevant primary studies.

Results: We identified and categorized the RE-related challenges in regulatory compliance of SIPS and their potential connection to six types of principles and practices addressing challenges. We found that about 13.6% of the primary studies considered the involvement of both software engineers and legal experts in developing principles and practices. About 20.7% of primary studies considered RE in connection to other process areas. Most primary studies focused on a few popular regulation fields (privacy, quality) and application domains (healthcare, software development, avionics). Our results suggest that there can be differences in terms of challenges and involvement of stakeholders across different fields of regulation.

Conclusion: Our findings highlight the need for an in-depth investigation of stakeholders’ roles, relationships between process areas, and specific challenges for distinct regulatory fields to guide research and practice. 

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Compliance requirements, Regulatory compliance, Regulatory requirements engineering, Requirements engineering, Secondary research, Software compliance, Software engineering, Computer aided software engineering, Computer software reusability, Computer software selection and evaluation, Mapping, Software design, Software quality, Compliance requirement, Principles and practices, Process areas, Product and services, Regulatory requirement engineering, Regulatory requirements, Requirement engineering, Secondary researches, Application programs
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27180 (URN)10.1016/j.infsof.2024.107622 (DOI)001360553400001 ()2-s2.0-85209250611 (Scopus ID)
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2024-12-02Bibliographically approved
Peixoto, M., Gorschek, T., Mendez, D., Silva, C. & Fucci, D. (2025). The Perspective of Agile Software Developers on Data Privacy. Journal of Software: Evolution and Process, 37(2), Article ID e2755.
Open this publication in new window or tab >>The Perspective of Agile Software Developers on Data Privacy
Show others...
2025 (English)In: Journal of Software: Evolution and Process, ISSN 2047-7473, E-ISSN 2047-7481, Vol. 37, no 2, article id e2755Article in journal (Refereed) Published
Abstract [en]

Recent studies have shown that many software developers do not have sufficient knowledge and understanding of how to develop a privacy-friendly system. This may become a challenge in developing systems complying with data protection laws. To address this issue, we investigated the factors that influence developers' decision-making when developing privacy-sensitive systems.

We conducted an empirical study by means of a survey with 109 practitioners. Our data analysis is based on the principles of social cognitive theory, which includes personal, behavioral, and external environmental factors.

We identified six personal, five behavioral, and five external environment factors that affect how developers make decisions regarding privacy, including confusion between privacy and security and reliance on informal practices and organizational support gaps. These findings contribute to understanding how practitioners and companies consider privacy, showing improvements in formal training and structured support over previous studies yet highlighting persistent challenges in consistent privacy integration. 

Place, publisher, year, edition, pages
John Wiley & Sons, 2025
Keywords
empirical study, privacy, software development, Agile softwares, Data protection laws, Decisions makings, Empirical studies, Environmental factors, External environments, Sensitive systems, Social cognitive theory, Software developer, Differential privacy
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27356 (URN)10.1002/smr.2755 (DOI)001389574100001 ()2-s2.0-85212760764 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2025-01-03 Created: 2025-01-03 Last updated: 2025-05-26Bibliographically approved
Dorner, M., Mendez, D., Wnuk, K., Zabardast, E. & Czerwonka, J. (2025). The upper bound of information diffusion in code review. Empirical Software Engineering, 30(1), Article ID 2.
Open this publication in new window or tab >>The upper bound of information diffusion in code review
Show others...
2025 (English)In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 30, no 1, article id 2Article in journal (Refereed) Published
Abstract [en]

Background

Code review, the discussion around a code change among humans, forms a communication network that enables its participants to exchange and spread information. Although reported by qualitative studies, our understanding of the capability of code review as a communication network is still limited.

Objective

In this article, we report on a first step towards understanding and evaluating the capability of code review as a communication network by quantifying how fast and how far information can spread through code review: the upper bound of information diffusion in code review.

Method

In an in-silico experiment, we simulate an artificial information diffusion within large (Microsoft), mid-sized (Spotify), and small code review systems (Trivago) modelled as communication networks. We then measure the minimal topological and temporal distances between the participants to quantify how far and how fast information can spread in code review.

Results

An average code review participants in the small and mid-sized code review systems can spread information to between 72 % and 85 % of all code review participants within four weeks independently of network size and tooling; for the large code review systems, we found an absolute boundary of about 11 000 reachable participants. On average (median), information can spread between two participants in code review in less than five hops and less than five days.

Conclusion

We found evidence that the communication network emerging from code review scales well and spreads information fast and broadly, corroborating the findings of prior qualitative work. The study lays the foundation for understanding and improving code review as a communication network.

Place, publisher, year, edition, pages
Springer, 2025
Keywords
Code review, Simulation, Information diffusion, Communication network
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:bth-27028 (URN)10.1007/s10664-024-10442-y (DOI)001335071300002 ()2-s2.0-85206942985 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2024-11-04Bibliographically approved
Peixoto, M., Gorschek, T., Mendez, D., Fucci, D. & Silva, C. (2024). A natural language-based method to specify privacy requirements: an evaluation with practitioners. Requirements Engineering, 29(3), 279-301
Open this publication in new window or tab >>A natural language-based method to specify privacy requirements: an evaluation with practitioners
Show others...
2024 (English)In: Requirements Engineering, ISSN 0947-3602, E-ISSN 1432-010X, Vol. 29, no 3, p. 279-301Article in journal (Refereed) Published
Abstract [en]

Organisations are becoming concerned with effectively dealing with privacy-related requirements. Existing Requirements Engineering methods based on structured natural language suffer from several limitations both in eliciting and specifying privacy requirements. In our previous study, we proposed a structured natural-language approach called the “Privacy Criteria Method” (PCM), which demonstrates potential advantages over user stories. Our goal is to present a PCM evaluation that focused on the opinions of software practitioners from different companies on PCM’s ability to support the specification of privacy requirements and the quality of the privacy requirements specifications produced by these software practitioners. We conducted a multiple case study to evaluate PCM in four different industrial contexts. We gathered and analysed the opinions of 21 practitioners on PCM usage regarding Coverage, Applicability, Usefulness, and Scalability. Moreover, we assessed the syntactic and semantic quality of the PCM artifacts produced by these practitioners. PCM can aid developers in elaborating requirements specifications focused on privacy with good quality. The practitioners found PCM to be useful for their companies’ development processes. PCM is considered a promising method for specifying privacy requirements. Some slight extensions of PCM may be required to tailor the method to the characteristics of the company. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2024
Keywords
Empirical study, Privacy criteria method, Privacy requirements specification, Software development, Quality control, Requirements engineering, Semantics, Software design, Empirical studies, Engineering methods, Natural languages, Privacy requirement specification, Privacy requirements, Requirement engineering, Requirements specifications, Software practitioners, User stories, Specifications
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-26772 (URN)10.1007/s00766-024-00428-z (DOI)001272283700001 ()2-s2.0-85198939572 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-08-09 Created: 2024-08-09 Last updated: 2024-09-19Bibliographically approved
Frattini, J., Fucci, D., Torkar, R. & Mendez, D. (2024). A Second Look at the Impact of Passive Voice Requirements on Domain Modeling: Bayesian Reanalysis of an Experiment. In: Proceedings of the 2024 IEEE/ACM international workshop on methodological issues with empirical studies in software engineering, WSESE 2024: . Paper presented at 1st International Workshop on Methodological Issues with Empirical Studies in Software Engineering (WSESE), Lisbon, APR 16, 2024 (pp. 27-33). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>A Second Look at the Impact of Passive Voice Requirements on Domain Modeling: Bayesian Reanalysis of an Experiment
2024 (English)In: Proceedings of the 2024 IEEE/ACM international workshop on methodological issues with empirical studies in software engineering, WSESE 2024, Association for Computing Machinery (ACM), 2024, p. 27-33Conference paper, Published paper (Refereed)
Abstract [en]

The quality of requirements specifications may impact subsequent, dependent software engineering (SE) activities. However, empirical evidence of this impact remains scarce and too often superficial as studies abstract from the phenomena under investigation too much. 1Wo of these abstractions are caused by the lack of frameworks for causal inference and frequentist methods which reduce complex data to binary results. In this study, we aim to demonstrate (1) the use of a causal framework and (2) contrast frequentist methods with more sophisticated Bayesian statistics for causal inference. To this end, we reanalyze the only known controlled experiment investigating the impact of passive voice on the subsequent activity of domain modeling. We follow a framework for statistical causal inference and employ Bayesian data analysis methods to re-investigate the hypotheses of the original study. Our results reveal that the effects observed by the original authors turned out to be much less significant than previously assumed. This study supports the recent call to action in SE research to adopt Bayesian data analysis, including causal frameworks and Bayesian statistics, for more sophisticated causal inference.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
Requirements Engineering, Requirements Quality, Controlled experiment, Bayesian Data Analysis
National Category
Software Engineering Probability Theory and Statistics
Identifiers
urn:nbn:se:bth-26968 (URN)10.1145/3643664.3618211 (DOI)001293147200006 ()2-s2.0-85190677315 (Scopus ID)9798400705670 (ISBN)
Conference
1st International Workshop on Methodological Issues with Empirical Studies in Software Engineering (WSESE), Lisbon, APR 16, 2024
Funder
Knowledge Foundation, 20180010
Available from: 2024-10-03 Created: 2024-10-03 Last updated: 2025-01-16Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0619-6027

Search in DiVA

Show all publications