首页 > 最新文献

Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering最新文献

英文 中文
On the Reliability of the Area Under the ROC Curve in Empirical Software Engineering 实证软件工程中ROC曲线下面积的可靠性研究
L. Lavazza, S. Morasca, Gabriele Rotoloni
Binary classifiers are commonly used in software engineering research to estimate several software qualities, e.g., defectiveness or vulnerability. Thus, it is important to adequately evaluate how well binary classifiers perform, before they are used in practice. The Area Under the Curve (AUC) of Receiver Operating Characteristic curves has often been used to this end. However, AUC has been the target of some criticisms, so it is necessary to evaluate under what conditions and to what extent AUC can be a reliable performance metric. We analyze AUC in relation to ϕ (also known as Matthews Correlation Coefficient), often considered a more reliable performance metric, by building the lines in the ROC space with constant value of ϕ, for several values of ϕ, and computing the corresponding values of AUC. By their very definitions, AUC and ϕ depend on the prevalence ρ of a dataset, which is the proportion of its positive instances (e.g., the defective software modules). Hence, so does the relationship between AUC and ϕ. It turns out that AUC and ϕ are very well correlated, and therefore provide concordant indications, for balanced datasets (those with ρ ≃ 0.5). Instead, AUC tends to become quite large, and hence provide over-optimistic indications, for very imbalanced datasets (those with ρ ≃ 0 or ρ ≃ 1). We use examples from the software engineering literature to illustrate the analytical relationship linking AUC, ϕ, and ρ. We show that, for some values of ρ, the evaluation of performance based exclusively on AUC can be deceiving. In conclusion, this paper provides some guidelines for an informed usage and interpretation of AUC.
在软件工程研究中,二元分类器通常用于评估几种软件质量,例如,缺陷或漏洞。因此,在实践中使用二元分类器之前,充分评估它们的性能是很重要的。接收机工作特性曲线的曲线下面积(AUC)常用于此目的。然而,AUC一直是一些批评的目标,因此有必要评估在什么条件下以及在多大程度上AUC可以成为可靠的性能指标。我们分析了与ϕ(也称为马修斯相关系数)相关的AUC,通常被认为是一个更可靠的性能指标,通过在ROC空间中构建具有恒定值的ϕ的线,并计算相应的AUC值。根据它们的定义,AUC和ϕ取决于数据集的流行率ρ,即其积极实例(例如,有缺陷的软件模块)的比例。因此,AUC和φ之间的关系也是如此。事实证明,AUC和ϕ非常相关,因此为平衡数据集(ρ≃0.5)提供了一致的指示。相反,对于非常不平衡的数据集(ρ≃0或ρ≃1),AUC往往变得相当大,因此提供了过于乐观的迹象。我们使用软件工程文献中的例子来说明AUC, ϕ和ρ之间的分析关系。我们表明,对于某些ρ值,完全基于AUC的性能评价可能具有欺骗性。总之,本文为AUC的合理使用和解释提供了一些指导。
{"title":"On the Reliability of the Area Under the ROC Curve in Empirical Software Engineering","authors":"L. Lavazza, S. Morasca, Gabriele Rotoloni","doi":"10.1145/3593434.3593456","DOIUrl":"https://doi.org/10.1145/3593434.3593456","url":null,"abstract":"Binary classifiers are commonly used in software engineering research to estimate several software qualities, e.g., defectiveness or vulnerability. Thus, it is important to adequately evaluate how well binary classifiers perform, before they are used in practice. The Area Under the Curve (AUC) of Receiver Operating Characteristic curves has often been used to this end. However, AUC has been the target of some criticisms, so it is necessary to evaluate under what conditions and to what extent AUC can be a reliable performance metric. We analyze AUC in relation to ϕ (also known as Matthews Correlation Coefficient), often considered a more reliable performance metric, by building the lines in the ROC space with constant value of ϕ, for several values of ϕ, and computing the corresponding values of AUC. By their very definitions, AUC and ϕ depend on the prevalence ρ of a dataset, which is the proportion of its positive instances (e.g., the defective software modules). Hence, so does the relationship between AUC and ϕ. It turns out that AUC and ϕ are very well correlated, and therefore provide concordant indications, for balanced datasets (those with ρ ≃ 0.5). Instead, AUC tends to become quite large, and hence provide over-optimistic indications, for very imbalanced datasets (those with ρ ≃ 0 or ρ ≃ 1). We use examples from the software engineering literature to illustrate the analytical relationship linking AUC, ϕ, and ρ. We show that, for some values of ρ, the evaluation of performance based exclusively on AUC can be deceiving. In conclusion, this paper provides some guidelines for an informed usage and interpretation of AUC.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129957524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Too long; didn’t read: Automatic summarization of GitHub README.MD with Transformers 太长时间;没有读:GitHub README的自动摘要。带变压器的MD
Thu T. H. Doan, P. Nguyen, Juri Di Rocco, Davide Di Ruscio
The ability to allow developers to share their source code and collaborate on software projects has made GitHub a widely used open source platform. Each repository in GitHub is generally equipped with a README.MD file to exhibit an overview of the main functionalities. Nevertheless, while offering useful information, README.MD is usually lengthy, requiring time and effort to read and comprehend. Thus, besides README.MD, GitHub also allows its users to add a short description called “About,” giving a brief but informative summary about the repository. This enables visitors to quickly grasp the main content and decide whether to continue reading. Unfortunately, due to various reasons–not excluding laziness–oftentimes this field is left blank by developers. This paper proposes GitSum as a novel approach to the summarization of README.MD. GitSum is built on top of BART and T5, two cutting-edge deep learning techniques, learning from existing data to perform recommendations for repositories with a missing description. We test its performance using two datasets collected from GitHub. The evaluation shows that GitSum can generate relevant predictions, outperforming a well-established baseline.
允许开发人员共享源代码并在软件项目上进行协作的能力使GitHub成为一个广泛使用的开源平台。GitHub中的每个存储库通常都配有一个README。MD文件来展示主要功能的概述。然而,在提供有用信息的同时,README。MD通常很长,需要时间和精力来阅读和理解。因此,除了README之外。此外,GitHub还允许用户添加一个名为“About”的简短描述,提供一个关于存储库的简短但信息丰富的摘要。这使访问者能够快速掌握主要内容,并决定是否继续阅读。不幸的是,由于各种原因(不排除懒惰),开发人员经常将此字段留白。本文提出GitSum作为一种新的方法来总结README.MD。GitSum建立在BART和T5这两种尖端的深度学习技术之上,从现有数据中学习,为缺少描述的存储库执行推荐。我们使用从GitHub收集的两个数据集来测试它的性能。评估表明,GitSum可以生成相关的预测,优于已建立的基线。
{"title":"Too long; didn’t read: Automatic summarization of GitHub README.MD with Transformers","authors":"Thu T. H. Doan, P. Nguyen, Juri Di Rocco, Davide Di Ruscio","doi":"10.1145/3593434.3593448","DOIUrl":"https://doi.org/10.1145/3593434.3593448","url":null,"abstract":"The ability to allow developers to share their source code and collaborate on software projects has made GitHub a widely used open source platform. Each repository in GitHub is generally equipped with a README.MD file to exhibit an overview of the main functionalities. Nevertheless, while offering useful information, README.MD is usually lengthy, requiring time and effort to read and comprehend. Thus, besides README.MD, GitHub also allows its users to add a short description called “About,” giving a brief but informative summary about the repository. This enables visitors to quickly grasp the main content and decide whether to continue reading. Unfortunately, due to various reasons–not excluding laziness–oftentimes this field is left blank by developers. This paper proposes GitSum as a novel approach to the summarization of README.MD. GitSum is built on top of BART and T5, two cutting-edge deep learning techniques, learning from existing data to perform recommendations for repositories with a missing description. We test its performance using two datasets collected from GitHub. The evaluation shows that GitSum can generate relevant predictions, outperforming a well-established baseline.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Successful Secure Software Deployment: An Empirical Study 迈向成功的安全软件部署:一个实证研究
Azzah Alghamdi, M. Niazi
Software deployment is the last stage of the software development life cycle (SDLC). It includes the execution of software in a customer environment. Nowadays, security has been integrated with the SDLC stages to produce secure software, improve software quality, and increase customer satisfaction. However, the software has become complex in recent execution environments, putting more pressure on securely deploying the software in these environments. This work extends our previous study published in [11], in which we have identified a list of best practices to address the secure software deployment challenges. In our previous study, we categorized secure software deployment challenges into five levels of importance; critical, high, medium, low, and very low level. In this study, we provided best practices to overcome critical, high, and medium level challenges. Initially, a traditional literature review was conducted to identify best practices to overcome the challenges of secure software deployment. After that, data was collected via a questionnaire from 10 software deployment professionals to identify best practices that can be used to address the identified challenges. The outcome of this research assists software organizations in overcoming the challenges of secure software deployment. In addition, this study guides software organizations toward the secure deployment of software products.
软件部署是软件开发生命周期(SDLC)的最后阶段。它包括在客户环境中执行软件。如今,安全性已经与SDLC阶段集成在一起,以生产安全的软件,提高软件质量,并增加客户满意度。然而,软件在最近的执行环境中变得复杂,这给在这些环境中安全部署软件带来了更大的压力。这项工作扩展了我们之前在[11]中发表的研究,其中我们确定了解决安全软件部署挑战的最佳实践列表。在我们之前的研究中,我们将安全软件部署挑战分为五个重要级别;临界、高、中、低、极低。在本研究中,我们提供了克服关键、高级和中级挑战的最佳实践。最初,进行了传统的文献回顾,以确定克服安全软件部署挑战的最佳实践。之后,通过问卷调查从10个软件部署专业人员收集数据,以确定可用于解决已确定的挑战的最佳实践。这项研究的结果有助于软件组织克服安全软件部署的挑战。此外,本研究还指导软件组织安全部署软件产品。
{"title":"Toward Successful Secure Software Deployment: An Empirical Study","authors":"Azzah Alghamdi, M. Niazi","doi":"10.1145/3593434.3593966","DOIUrl":"https://doi.org/10.1145/3593434.3593966","url":null,"abstract":"Software deployment is the last stage of the software development life cycle (SDLC). It includes the execution of software in a customer environment. Nowadays, security has been integrated with the SDLC stages to produce secure software, improve software quality, and increase customer satisfaction. However, the software has become complex in recent execution environments, putting more pressure on securely deploying the software in these environments. This work extends our previous study published in [11], in which we have identified a list of best practices to address the secure software deployment challenges. In our previous study, we categorized secure software deployment challenges into five levels of importance; critical, high, medium, low, and very low level. In this study, we provided best practices to overcome critical, high, and medium level challenges. Initially, a traditional literature review was conducted to identify best practices to overcome the challenges of secure software deployment. After that, data was collected via a questionnaire from 10 software deployment professionals to identify best practices that can be used to address the identified challenges. The outcome of this research assists software organizations in overcoming the challenges of secure software deployment. In addition, this study guides software organizations toward the secure deployment of software products.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116011979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models 基于机器和深度学习模型的僵尸网络攻击检测研究综述
Dorieh M. Alomari, Fatima M. Anis, Maryam Alabdullatif, Hamoud Aljamaan
Botnets can be a major risk to computer networks, as they attack in dangerous and diverse ways. They are becoming increasingly challenging due to the massive amount of network devices and the obfuscation of communication protocols. This paper provides a critical review and analysis of the recent Machine Learning based models for detecting botnet attacks. It explains the used methodologies, datasets, validation methods, and detection metrics. This paper also identifies the current gaps and limitations to provide recommendations for future research directions in this field. This survey can be used as a guide for new researchers to enhance this research area.
僵尸网络可能是计算机网络的主要风险,因为它们以危险和多样化的方式进行攻击。由于大量的网络设备和通信协议的混乱,它们变得越来越具有挑战性。本文对最近用于检测僵尸网络攻击的基于机器学习的模型进行了批判性的回顾和分析。它解释了使用的方法、数据集、验证方法和检测指标。本文还指出了目前的差距和局限性,为该领域未来的研究方向提供了建议。这一调查可以作为新研究者加强这一研究领域的指导。
{"title":"A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models","authors":"Dorieh M. Alomari, Fatima M. Anis, Maryam Alabdullatif, Hamoud Aljamaan","doi":"10.1145/3593434.3593967","DOIUrl":"https://doi.org/10.1145/3593434.3593967","url":null,"abstract":"Botnets can be a major risk to computer networks, as they attack in dangerous and diverse ways. They are becoming increasingly challenging due to the massive amount of network devices and the obfuscation of communication protocols. This paper provides a critical review and analysis of the recent Machine Learning based models for detecting botnet attacks. It explains the used methodologies, datasets, validation methods, and detection metrics. This paper also identifies the current gaps and limitations to provide recommendations for future research directions in this field. This survey can be used as a guide for new researchers to enhance this research area.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Energy Consumption and Performance of WebAssembly Binaries across Programming Languages and Runtimes in IoT 物联网中跨编程语言和运行时WebAssembly二进制文件的能耗和性能研究
Linus Wagner, Maximilian Mayer, Andrea Marino, Alireza Soldani Nezhad, Hugo Zwaan, I. Malavolta
Context. WebAssembly (WASM) is a low-level bytecode format that is gaining traction among Internet of Things (IoT) devices. Because of IoT devices’ resources limitations, using WASM is becoming a popular technique for virtualization on IoT devices. However, it is unclear if the promises of WASM regarding its efficient use of energy and performance gains hold true. Goal. This study aims to determine how different source programming languages and runtime environments affect the energy consumption and performance of WASM binaries. Method. We perform a controlled experiment where we compile three benchmarking algorithms from four different programming languages (i.e., C, Rust, Go, and JavaScript) to WASM and run them using two different WASM runtimes on a Raspberry Pi 3B. Results. The source programming language significantly influences the performance and energy consumption of WASM binaries. We did not find evidence of the impact of the runtime environment. However, certain combinations of source programming language and runtime environment leads to a significant improvement of its energy consumption and performance. Conclusions. IoT developers should choose the source programming language wisely to benefit from better performance and a reduction in energy consumption. Specifically, Javy-compiled JavaScript should be avoided, while C and Rust are better options. We found no conclusive results for the choice of the WASM runtime.
上下文。WebAssembly (WASM)是一种低级字节码格式,在物联网(IoT)设备中越来越受欢迎。由于物联网设备的资源限制,使用WASM正在成为物联网设备虚拟化的一种流行技术。然而,目前尚不清楚WASM关于有效利用能源和提高性能的承诺是否属实。的目标。本研究旨在确定不同的源编程语言和运行时环境如何影响WASM二进制文件的能耗和性能。方法。我们进行了一个对照实验,我们从四种不同的编程语言(即C, Rust, Go和JavaScript)编译三种基准测试算法到WASM,并在树莓派3B上使用两种不同的WASM运行时运行它们。结果。源编程语言对WASM二进制文件的性能和能耗有显著影响。我们没有发现运行时环境影响的证据。但是,源编程语言和运行时环境的某些组合会导致其能耗和性能的显著改善。结论。物联网开发人员应该明智地选择源编程语言,以从更好的性能和降低能耗中受益。具体来说,应该避免使用java编译的JavaScript,而C和Rust是更好的选择。对于WASM运行时的选择,我们没有发现决定性的结果。
{"title":"On the Energy Consumption and Performance of WebAssembly Binaries across Programming Languages and Runtimes in IoT","authors":"Linus Wagner, Maximilian Mayer, Andrea Marino, Alireza Soldani Nezhad, Hugo Zwaan, I. Malavolta","doi":"10.1145/3593434.3593454","DOIUrl":"https://doi.org/10.1145/3593434.3593454","url":null,"abstract":"Context. WebAssembly (WASM) is a low-level bytecode format that is gaining traction among Internet of Things (IoT) devices. Because of IoT devices’ resources limitations, using WASM is becoming a popular technique for virtualization on IoT devices. However, it is unclear if the promises of WASM regarding its efficient use of energy and performance gains hold true. Goal. This study aims to determine how different source programming languages and runtime environments affect the energy consumption and performance of WASM binaries. Method. We perform a controlled experiment where we compile three benchmarking algorithms from four different programming languages (i.e., C, Rust, Go, and JavaScript) to WASM and run them using two different WASM runtimes on a Raspberry Pi 3B. Results. The source programming language significantly influences the performance and energy consumption of WASM binaries. We did not find evidence of the impact of the runtime environment. However, certain combinations of source programming language and runtime environment leads to a significant improvement of its energy consumption and performance. Conclusions. IoT developers should choose the source programming language wisely to benefit from better performance and a reduction in energy consumption. Specifically, Javy-compiled JavaScript should be avoided, while C and Rust are better options. We found no conclusive results for the choice of the WASM runtime.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Data-Driven Software Change Identification via Code Representation Learning 基于代码表示学习的自动数据驱动软件变更识别
Tjaša Heričko
Changes to a software project are inevitable as the software requires continuous adaptations, improvements, and corrections throughout maintenance. Identifying the purpose and impact of changes made to the codebase is critical in software engineering. However, manually identifying and characterizing software changes can be a time-consuming and tedious process that adds to the workload of software engineers. To address this challenge, several attempts have been made to automatically identify and demystify intents of software changes based on software artifacts such as commit change logs, issue reports, change messages, source code files, and software documentation. However, these existing approaches have their limitations. These include a lack of data, limited performance, and an inability to evaluate compound changes. This paper presents a doctoral research proposal that aims to automate the process of identifying commit-level changes in software projects using software repository mining and code representation learning models. The research background, state-of-the-art, research objectives, research agenda, and threats to validity are discussed.
软件项目的变更是不可避免的,因为软件需要在整个维护过程中不断地调整、改进和修正。在软件工程中,确定对代码库所做更改的目的和影响是至关重要的。然而,手动识别和描述软件更改可能是一个耗时且乏味的过程,增加了软件工程师的工作量。为了应对这一挑战,已经进行了一些尝试,以根据软件工件(如提交更改日志、问题报告、更改消息、源代码文件和软件文档)自动识别和揭示软件更改的意图。然而,这些现有的方法有其局限性。这些问题包括缺乏数据、有限的性能以及无法评估复合变化。本文提出了一项博士研究计划,旨在使用软件存储库挖掘和代码表示学习模型来自动化识别软件项目中提交级更改的过程。讨论了研究背景、研究现状、研究目标、研究议程以及有效性面临的威胁。
{"title":"Automatic Data-Driven Software Change Identification via Code Representation Learning","authors":"Tjaša Heričko","doi":"10.1145/3593434.3593505","DOIUrl":"https://doi.org/10.1145/3593434.3593505","url":null,"abstract":"Changes to a software project are inevitable as the software requires continuous adaptations, improvements, and corrections throughout maintenance. Identifying the purpose and impact of changes made to the codebase is critical in software engineering. However, manually identifying and characterizing software changes can be a time-consuming and tedious process that adds to the workload of software engineers. To address this challenge, several attempts have been made to automatically identify and demystify intents of software changes based on software artifacts such as commit change logs, issue reports, change messages, source code files, and software documentation. However, these existing approaches have their limitations. These include a lack of data, limited performance, and an inability to evaluate compound changes. This paper presents a doctoral research proposal that aims to automate the process of identifying commit-level changes in software projects using software repository mining and code representation learning models. The research background, state-of-the-art, research objectives, research agenda, and threats to validity are discussed.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perceived Trust in Blockchain Systems: An Interview-based Survey 区块链系统中的感知信任:基于访谈的调查
Huikun Liu, Yanze Wang, Zhaowei Jiang, He Zhang, Jingyue Li, Sigurd Eileras, Haakon Pelsholen Busterud
Blockchain systems have received increased interest over the past few years, and several new fields of use, such as supply chain systems, are being investigated. Since blockchain is still a new technology, various papers have explored how to apply it to support use cases outside the limited scope of digital currencies. Systems require solid technological implementation and perceived trust among users to ensure their interests and successful usage in practice. This study aimed to understand what graphic user interface (GUI) elements of a blockchain-based system make users trust that their best interests, such as security and privacy, are maintained in the systems. As a case study, we developed a few blockchain-based supply chain GUI mockups with different elements that reflect the security and privacy features of the system. We then conducted 30 interviews in Norway and China to collect the users’ opinions on whether the information presented in the GUIs helps them trust the system. The results show that users want access to as much information and data as the system can provide. The users’ trust in the system increases if the GUI features give users the impression that the inner workings of the blockchain-based system are transparent. However, users prefer the information presented as more conceptual than technical in the first place. However, users appreciate the possibility of clicking on the conceptual explanation and getting more in-depth blockchain-related technical information if needed.
在过去的几年中,区块链系统受到了越来越多的关注,并且正在研究一些新的使用领域,例如供应链系统。由于区块链仍然是一项新技术,各种论文都在探索如何将其应用于支持数字货币有限范围之外的用例。系统需要坚实的技术实施和用户之间的感知信任,以确保他们的利益和在实践中成功使用。本研究旨在了解基于区块链的系统的图形用户界面(GUI)元素使用户相信他们的最佳利益(如安全和隐私)在系统中得到维护。作为案例研究,我们开发了几个基于区块链的供应链GUI模型,其中包含反映系统安全和隐私特征的不同元素。然后,我们在挪威和中国进行了30次访谈,以收集用户对gui中呈现的信息是否有助于他们信任系统的意见。结果表明,用户希望访问系统所能提供的尽可能多的信息和数据。如果GUI功能给用户的印象是基于区块链的系统的内部工作是透明的,那么用户对系统的信任就会增加。然而,用户首先更喜欢概念性的信息,而不是技术性的信息。然而,如果需要,用户可以点击概念解释并获得更深入的区块链相关技术信息。
{"title":"Perceived Trust in Blockchain Systems: An Interview-based Survey","authors":"Huikun Liu, Yanze Wang, Zhaowei Jiang, He Zhang, Jingyue Li, Sigurd Eileras, Haakon Pelsholen Busterud","doi":"10.1145/3593434.3593521","DOIUrl":"https://doi.org/10.1145/3593434.3593521","url":null,"abstract":"Blockchain systems have received increased interest over the past few years, and several new fields of use, such as supply chain systems, are being investigated. Since blockchain is still a new technology, various papers have explored how to apply it to support use cases outside the limited scope of digital currencies. Systems require solid technological implementation and perceived trust among users to ensure their interests and successful usage in practice. This study aimed to understand what graphic user interface (GUI) elements of a blockchain-based system make users trust that their best interests, such as security and privacy, are maintained in the systems. As a case study, we developed a few blockchain-based supply chain GUI mockups with different elements that reflect the security and privacy features of the system. We then conducted 30 interviews in Norway and China to collect the users’ opinions on whether the information presented in the GUIs helps them trust the system. The results show that users want access to as much information and data as the system can provide. The users’ trust in the system increases if the GUI features give users the impression that the inner workings of the blockchain-based system are transparent. However, users prefer the information presented as more conceptual than technical in the first place. However, users appreciate the possibility of clicking on the conceptual explanation and getting more in-depth blockchain-related technical information if needed.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects 从边界对象的角度研究DevOps中的软件工程工件
Christoph Matthies, R. Heinrich, Rebekka Wohlrab
Software engineering artifacts are central to DevOps, enabling the collaboration of teams involved with integrating the development and operations domains. However, collaboration around DevOps artifacts has yet to receive detailed research attention. We apply the sociological concept of Boundary Objects to describe and evaluate the specific software engineering artifacts that enable a cross-disciplinary understanding. Using this focus, we investigate how different DevOps stakeholders can collaborate efficiently using common artifacts. We performed a multiple case study and conducted twelve semi-structured interviews with DevOps practitioners in nine companies. We elicited participants’ collaboration practices, focusing on the coordination of stakeholders and the use of engineering artifacts as a means of translation. This paper presents a consolidated overview of four categories of DevOps Boundary Objects and eleven stakeholder groups relevant to DevOps. To help practitioners assess cross-disciplinary knowledge management strategies, we detail how DevOps Boundary Objects contribute to four areas of DevOps knowledge and propose derived dimensions to evaluate their use.
软件工程工件是DevOps的核心,它支持集成开发和操作领域的团队之间的协作。然而,围绕DevOps工件的协作还没有得到详细的研究关注。我们应用边界对象的社会学概念来描述和评估特定的软件工程工件,从而实现跨学科的理解。利用这一重点,我们将研究不同的DevOps涉众如何使用公共工件进行高效协作。我们进行了多个案例研究,并对9家公司的DevOps从业者进行了12次半结构化访谈。我们引出参与者的协作实践,关注涉众的协调和工程工件作为翻译手段的使用。本文综合介绍了四类DevOps边界对象和11个与DevOps相关的利益相关者群体。为了帮助从业者评估跨学科的知识管理策略,我们详细介绍了DevOps边界对象如何对DevOps知识的四个领域做出贡献,并提出了派生维度来评估它们的使用。
{"title":"Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects","authors":"Christoph Matthies, R. Heinrich, Rebekka Wohlrab","doi":"10.1145/3593434.3593441","DOIUrl":"https://doi.org/10.1145/3593434.3593441","url":null,"abstract":"Software engineering artifacts are central to DevOps, enabling the collaboration of teams involved with integrating the development and operations domains. However, collaboration around DevOps artifacts has yet to receive detailed research attention. We apply the sociological concept of Boundary Objects to describe and evaluate the specific software engineering artifacts that enable a cross-disciplinary understanding. Using this focus, we investigate how different DevOps stakeholders can collaborate efficiently using common artifacts. We performed a multiple case study and conducted twelve semi-structured interviews with DevOps practitioners in nine companies. We elicited participants’ collaboration practices, focusing on the coordination of stakeholders and the use of engineering artifacts as a means of translation. This paper presents a consolidated overview of four categories of DevOps Boundary Objects and eleven stakeholder groups relevant to DevOps. To help practitioners assess cross-disciplinary knowledge management strategies, we detail how DevOps Boundary Objects contribute to four areas of DevOps knowledge and propose derived dimensions to evaluate their use.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using InnerSource for Improving Internal Reuse: An Industrial Case Study 使用InnerSource提高内部重用:一个工业案例研究
Xingru Chen, M. Usman, Deepika Badampudi
Background: InnerSource consists of the use of open source development techniques within the corporation. It helps improve software reuse through increased transparency and inter-team collaboration. Companies need to understand their context and specific needs before deciding to adopt any specific InnerSource practices since they cannot apply all InnerSource practices at once. Aim: This study aims to support the case company in assessing its readiness for adopting InnerSource practices to improve its internal reuse, identify and prioritize the improvement areas, and identify suitable solutions. Method: We performed a case study using a questionnaire and a workshop to check the current and desired status of adopting InnerSource practices and collect potential solutions. Results: The study participants identified that the company needs to prioritize the improvements related to the discoverability, communication channels, and ownership of the reusable assets. In addition, they identified certain InnerSource practices as solutions for the prioritized improvement areas, such as better structured repositories for storing and searching the reusable assets and standardized documentation of the reusable assets. Conclusion: The questionnaire instrument aids the case company in identifying the improvement areas related to InnerSource and reuse practices. InnerSource practices could improve the development and maintenance of reusable assets. Keywords: InnerSource, software reuse, readiness
背景:InnerSource包括在公司内部使用开放源码开发技术。它通过增加透明度和团队间协作来帮助改进软件重用。在决定采用任何特定的InnerSource实践之前,公司需要了解他们的环境和特定的需求,因为他们不能一次应用所有的InnerSource实践。目的:本研究旨在支持案例公司评估其采用InnerSource实践的准备情况,以改善其内部重用,识别和优先考虑改进领域,并确定合适的解决方案。方法:我们使用问卷调查和研讨会进行案例研究,以检查采用InnerSource实践的当前和期望状态,并收集潜在的解决方案。结果:研究参与者确定公司需要优先考虑与可发现性、沟通渠道和可重用资产所有权相关的改进。此外,他们确定了特定的InnerSource实践作为优先改进领域的解决方案,例如用于存储和搜索可重用资产的更好的结构化存储库,以及可重用资产的标准化文档。结论:问卷工具帮助案例公司识别与内源和重用实践相关的改进领域。InnerSource实践可以改进可重用资产的开发和维护。关键词:InnerSource,软件复用,就绪
{"title":"Using InnerSource for Improving Internal Reuse: An Industrial Case Study","authors":"Xingru Chen, M. Usman, Deepika Badampudi","doi":"10.1145/3593434.3593466","DOIUrl":"https://doi.org/10.1145/3593434.3593466","url":null,"abstract":"Background: InnerSource consists of the use of open source development techniques within the corporation. It helps improve software reuse through increased transparency and inter-team collaboration. Companies need to understand their context and specific needs before deciding to adopt any specific InnerSource practices since they cannot apply all InnerSource practices at once. Aim: This study aims to support the case company in assessing its readiness for adopting InnerSource practices to improve its internal reuse, identify and prioritize the improvement areas, and identify suitable solutions. Method: We performed a case study using a questionnaire and a workshop to check the current and desired status of adopting InnerSource practices and collect potential solutions. Results: The study participants identified that the company needs to prioritize the improvements related to the discoverability, communication channels, and ownership of the reusable assets. In addition, they identified certain InnerSource practices as solutions for the prioritized improvement areas, such as better structured repositories for storing and searching the reusable assets and standardized documentation of the reusable assets. Conclusion: The questionnaire instrument aids the case company in identifying the improvement areas related to InnerSource and reuse practices. InnerSource practices could improve the development and maintenance of reusable assets. Keywords: InnerSource, software reuse, readiness","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123592138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralised Autonomous Organisations for Public Procurement 分散的公共采购自治组织
Felix Monteiro, Miguel Correia
Blockchain has been recognised as a technological breakthrough with the ability to support new decentralised security-based solutions in sectors such as information technology and finance. Blockchain allows different communities to create Decentralised Autonomous Organisations (DAOs), which are self-organised democratic organisations controlled by smart contracts. This paper presents a new DAO model for the procurement of services by public organisations, such as government agencies. To demonstrate the advantages of this solution, this work looks specifically at current public procurement systems that resort to third-party contractors that manage these negotiations. Third parties lack the transparency, security, and democratic representation that a DAO can provide. We present the implementation of a DAO as a set of smart contracts executed on Ethereum-compatible permissionless blockchains, supported by a consensus algorithm, replacing third-party contractors.
区块链被认为是一项技术突破,能够在信息技术和金融等领域支持新的分散的基于安全的解决方案。区块链允许不同的社区创建分散的自治组织(dao),这些组织是由智能合约控制的自组织民主组织。本文提出了一种新的DAO模型,用于公共组织(如政府机构)的服务采购。为了证明这一解决方案的优势,本工作专门研究了目前求助于管理这些谈判的第三方承包商的公共采购系统。第三方缺乏DAO所能提供的透明度、安全性和民主代表性。我们将DAO的实现作为一组在以太坊兼容的无许可区块链上执行的智能合约,由共识算法支持,取代第三方承包商。
{"title":"Decentralised Autonomous Organisations for Public Procurement","authors":"Felix Monteiro, Miguel Correia","doi":"10.1145/3593434.3593519","DOIUrl":"https://doi.org/10.1145/3593434.3593519","url":null,"abstract":"Blockchain has been recognised as a technological breakthrough with the ability to support new decentralised security-based solutions in sectors such as information technology and finance. Blockchain allows different communities to create Decentralised Autonomous Organisations (DAOs), which are self-organised democratic organisations controlled by smart contracts. This paper presents a new DAO model for the procurement of services by public organisations, such as government agencies. To demonstrate the advantages of this solution, this work looks specifically at current public procurement systems that resort to third-party contractors that manage these negotiations. Third parties lack the transparency, security, and democratic representation that a DAO can provide. We present the implementation of a DAO as a set of smart contracts executed on Ethereum-compatible permissionless blockchains, supported by a consensus algorithm, replacing third-party contractors.","PeriodicalId":178596,"journal":{"name":"Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1