首页 > 最新文献

Information and Software Technology最新文献

英文 中文
REARRANGE: Effort estimation approach for software clustering-based remodularisation REARRANGE:基于软件聚类的重模块化的努力估算方法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.infsof.2024.107567
Alvin Jian Jia Tan , Chun Yong Chong , Aldeida Aleti

Context:

Most research in software clustering and remodularisation typically concludes by recommending the refactoring operations without further insight into the practicality of the proposed technique. Developers might be hesitant to follow through with the refactoring suggestions due to the uncertainty in the effort needed.

Objective:

This work aims to address this gap by introducing an effoRt Estimation AppRoach foR softwAre clusteriNG-based rEmodularisation (REARRANGE) to close the loop in extant software clustering and remodularisation research by estimating the time required to carry out the suggested refactoring operations based on the history of the evolution of the software. By providing tangible estimates of refactoring effort in person-hours, we can inform developers of complex and time-consuming refactoring operations that will help prioritise refactoring efforts, allowing practitioners to weave in these activities during sprint planning.

Method:

REARRANGE builds a machine learning model to predict effort estimation based on past commit activity which extracts Software Features (lines of code, number of methods), Refactoring Features (refactoring type, source and destination) and Dependency Features (dependencies between classes). REARRANGE is then compared against sanity checks, baseline effort estimation models, and state-of-the-art software estimation models. We also attempt to cross-validate REARRANGE’s effort estimation with software developers.

Results:

Experimented through 25 open-source Java-based projects, the proposed approach estimated the refactoring effort of the test subjects with a Mean Absolute Error (MAE) of 5.47 person-hours against the MAE of the next-best approach of 453.31 person-hours. Based on a survey conducted among software developers, REARRANGE consistently delivers accurate estimates in 93.6% of cases.

Conclusion:

The lack of a direct comparison for REARRANGE highlights the need for a refactoring effort-focused estimation model that provides tangible effort estimates in person-hours for refactoring operations. Only then can developers selectively choose relevant refactoring operations while considering the available time and budget constraints, bridging the gap between software clustering research and real-world application.

背景:软件聚类和重构方面的大多数研究通常以推荐重构操作结束,而没有进一步深入了解所建议技术的实用性。目标:这项工作旨在通过引入基于软件聚类的重构估算应用方法(REARRANGE)来弥补这一不足,根据软件的演变历史来估算执行建议的重构操作所需的时间,从而弥补现有软件聚类和重构研究中的不足。方法:REARRANGE 建立了一个机器学习模型,根据过去的提交活动预测工作量,该模型提取了软件特征(代码行数、方法数量)、重构特征(重构类型、源和目标)和依赖特征(类之间的依赖关系)。然后,我们将 REARRANGE 与正确性检查、基准工作量估算模型和最先进的软件估算模型进行比较。结果:通过对 25 个基于 Java 的开源项目进行实验,我们提出的方法估算出了测试对象的重构工作量,其平均绝对误差(MAE)为 5.47 人时,而次好方法的平均绝对误差(MAE)为 453.31 人时。结论:REARRANGE 缺乏直接比较,这突出表明需要一种以重构工作量为重点的估算模型,为重构操作提供以人时为单位的实际工作量估算。只有这样,开发人员才能在考虑可用时间和预算限制的同时,有选择性地选择相关的重构操作,从而缩小软件聚类研究与实际应用之间的差距。
{"title":"REARRANGE: Effort estimation approach for software clustering-based remodularisation","authors":"Alvin Jian Jia Tan ,&nbsp;Chun Yong Chong ,&nbsp;Aldeida Aleti","doi":"10.1016/j.infsof.2024.107567","DOIUrl":"10.1016/j.infsof.2024.107567","url":null,"abstract":"<div><h3>Context:</h3><p>Most research in software clustering and remodularisation typically concludes by recommending the refactoring operations without further insight into the practicality of the proposed technique. Developers might be hesitant to follow through with the refactoring suggestions due to the uncertainty in the effort needed.</p></div><div><h3>Objective:</h3><p>This work aims to address this gap by introducing an effo<strong>R</strong>t <strong>E</strong>stimation <strong>A</strong>pp<strong>R</strong>oach fo<strong>R</strong> softw<strong>A</strong>re clusteri<strong>NG</strong>-based r<strong>E</strong>modularisation (REARRANGE) to close the loop in extant software clustering and remodularisation research by estimating the time required to carry out the suggested refactoring operations based on the history of the evolution of the software. By providing tangible estimates of refactoring effort in person-hours, we can inform developers of complex and time-consuming refactoring operations that will help prioritise refactoring efforts, allowing practitioners to weave in these activities during sprint planning.</p></div><div><h3>Method:</h3><p>REARRANGE builds a machine learning model to predict effort estimation based on past commit activity which extracts Software Features (lines of code, number of methods), Refactoring Features (refactoring type, source and destination) and Dependency Features (dependencies between classes). REARRANGE is then compared against sanity checks, baseline effort estimation models, and state-of-the-art software estimation models. We also attempt to cross-validate REARRANGE’s effort estimation with software developers.</p></div><div><h3>Results:</h3><p>Experimented through 25 open-source Java-based projects, the proposed approach estimated the refactoring effort of the test subjects with a Mean Absolute Error (MAE) of 5.47 person-hours against the MAE of the next-best approach of 453.31 person-hours. Based on a survey conducted among software developers, REARRANGE consistently delivers accurate estimates in 93.6% of cases.</p></div><div><h3>Conclusion:</h3><p>The lack of a direct comparison for REARRANGE highlights the need for a refactoring effort-focused estimation model that provides tangible effort estimates in person-hours for refactoring operations. Only then can developers selectively choose relevant refactoring operations while considering the available time and budget constraints, bridging the gap between software clustering research and real-world application.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107567"},"PeriodicalIF":3.8,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001721/pdfft?md5=bd53a5ee1cbc06cd207117c50478f517&pid=1-s2.0-S0950584924001721-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A3Test: Assertion-Augmented Automated Test case generation A3Test:断言增强自动测试案例生成
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.infsof.2024.107565
Saranya Alagarsamy, Chakkrit Tantithamthavorn, Aldeida Aleti

Context:

Test case generation is a critical yet challenging task in software development. Recently, AthenaTest – a Deep Learning (DL) approach for generating unit test cases has been proposed. However, our revisiting study reveals that AthenaTest can generate less than one-fifth of the test cases correctly, due to a lack of assertion knowledge and test signature verification.

Objective:

This paper introduces A3Test, a novel DL-based approach to the generation of test cases, enhanced with assertion knowledge and a mechanism to verify consistency of the name and signatures of the tests. A3Test aims to adapt domain knowledge from assertion generation to test case generation.

Method:

A3Test employs domain adaptation principles and introduces a verification approach to name consistency and test signatures. We evaluate its effectiveness using 5,278 focal methods from the Defects4j dataset.

Results:

Our findings indicate that A3Test outperforms AthenaTest and ChatUniTest. A3Test generates 2.16% to 395.43% more correct test cases, achieves 2.17% to 34.29% higher method coverage, and 25.64% higher line coverage. A3Test achieves 2.13% to 12.20% higher branch coverage, 2.22% to 12.20% higher mutation scores, and 2.44% to 55.56% more correct assertions compared to both ChatUniTest and AthenaTest respectively for one iteration. When generating multiple test cases per method A3Test still shows improvements and comparable efficacy to ChatUnitTest. A survey of developers reveals that the majority of the participants 70.51% agree that test cases generated by A3Test are more readable than those generated by EvoSuite.

Conclusions:

A3Test significantly enhances test case generation through its incorporation of assertion knowledge and test signature verification, contributing to the generation of correct test cases.

背景:生成测试用例是软件开发中一项关键而又具有挑战性的任务。最近,有人提出了一种用于生成单元测试用例的深度学习(DL)方法--AthenaTest。目标:本文介绍了 A3Test,一种基于深度学习的生成测试用例的新方法,它增强了断言知识和测试名称与签名一致性验证机制。方法:A3Test 采用了领域适应原则,并引入了名称一致性和测试签名的验证方法。我们使用 Defects4j 数据集中的 5278 个焦点方法对其有效性进行了评估。结果:我们的研究结果表明,A3Test 优于 AthenaTest 和 ChatUniTest。A3Test 生成的测试用例正确率提高了 2.16% 到 395.43%,方法覆盖率提高了 2.17% 到 34.29%,线路覆盖率提高了 25.64%。在一次迭代中,与 ChatUniTest 和 AthenaTest 相比,A3Test 的分支覆盖率高出 2.13% 到 12.20%,突变分数高出 2.22% 到 12.20%,断言正确率高出 2.44% 到 55.56%。当为每个方法生成多个测试用例时,A3Test 仍有改进,其功效与 ChatUnitTest 相当。对开发人员的调查显示,70.51%的参与者认为 A3Test 生成的测试用例比 EvoSuite 生成的测试用例更具可读性。
{"title":"A3Test: Assertion-Augmented Automated Test case generation","authors":"Saranya Alagarsamy,&nbsp;Chakkrit Tantithamthavorn,&nbsp;Aldeida Aleti","doi":"10.1016/j.infsof.2024.107565","DOIUrl":"10.1016/j.infsof.2024.107565","url":null,"abstract":"<div><h3>Context:</h3><p>Test case generation is a critical yet challenging task in software development. Recently, AthenaTest – a Deep Learning (DL) approach for generating unit test cases has been proposed. However, our revisiting study reveals that AthenaTest can generate less than one-fifth of the test cases correctly, due to a lack of assertion knowledge and test signature verification.</p></div><div><h3>Objective:</h3><p>This paper introduces A3Test, a novel DL-based approach to the generation of test cases, enhanced with assertion knowledge and a mechanism to verify consistency of the name and signatures of the tests. A3Test aims to adapt domain knowledge from assertion generation to test case generation.</p></div><div><h3>Method:</h3><p>A3Test employs domain adaptation principles and introduces a verification approach to name consistency and test signatures. We evaluate its effectiveness using 5,278 focal methods from the Defects4j dataset.</p></div><div><h3>Results:</h3><p>Our findings indicate that A3Test outperforms AthenaTest and ChatUniTest. A3Test generates 2.16% to 395.43% more correct test cases, achieves 2.17% to 34.29% higher method coverage, and 25.64% higher line coverage. A3Test achieves 2.13% to 12.20% higher branch coverage, 2.22% to 12.20% higher mutation scores, and 2.44% to 55.56% more correct assertions compared to both ChatUniTest and AthenaTest respectively for one iteration. When generating multiple test cases per method A3Test still shows improvements and comparable efficacy to ChatUnitTest. A survey of developers reveals that the majority of the participants 70.51% agree that test cases generated by A3Test are more readable than those generated by EvoSuite.</p></div><div><h3>Conclusions:</h3><p>A3Test significantly enhances test case generation through its incorporation of assertion knowledge and test signature verification, contributing to the generation of correct test cases.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107565"},"PeriodicalIF":3.8,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001708/pdfft?md5=76cf4413a9abbc636fe62d1466a54e41&pid=1-s2.0-S0950584924001708-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable systematic literature reviews 可持续的系统文献审查
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1016/j.infsof.2024.107551
Vinicius dos Santos , Anderson Y. Iwazaki , Katia R. Felizardo , Érica F. de Souza , Elisa Y. Nakagawa

Context:

Systematic Literature Reviews (SLR) have been recognized as an important research method for summarizing evidence in Software Engineering (SE). At the same, SLR still presents several problems, such as the high resource consumption (mainly human resources) and lack of effective impact on SE practitioners, although much research has already been done.

Objective:

The main goal of this paper is to explore the concept of sustainability in the SLR area, intending to contribute to understanding better and solving such problems in an integrated way. More specifically, this paper characterizes what sustainable SLR are, their core characteristics, critical factors (i.e., sensitive points in the SLR process), and guidelines for conducting such SLR.

Methods:

We performed a meta-ethnographic study to find key concepts of sustainable software systems and transpose them to sustainable SLR. For this, we systematically selected 16 studies about sustainable software systems and 14 distinguished studies about SLR. Following, we extracted the main keywords and metaphors, determined how both areas are correlated, and transposed them to obtain a set of core characteristics of sustainable SLR as well as critical factors and guidelines. Additionally, we validated them with specialists using the Delphi method.

Results:

We found 15 core characteristics that offer a broad view of sustainable SLR, 15 critical factors in the SLR process that should be carefully addressed when conducting and updating SLR, and also 16 guidelines to manage SLR from the sustainability perspective.

Conclusion:

The concept of sustainability in SLR can contribute to solving SLR problems in a more integrated way, while this work could change the mindset of the SLR community about the need to conduct sustainable SLR.

背景:系统文献综述(SLR)已被公认为是总结软件工程(SE)证据的重要研究方法。目标:本文的主要目标是探讨 SLR 领域的可持续发展概念,旨在为更好地理解和综合解决此类问题做出贡献。更具体地说,本文阐述了什么是可持续的 SLR、其核心特征、关键因素(即 SLR 过程中的敏感点)以及开展此类 SLR 的指导原则。方法:我们开展了一项元人种学研究,以找到可持续软件系统的关键概念,并将其移植到可持续的 SLR 中。为此,我们系统地选择了 16 项有关可持续软件系统的研究和 14 项有关可持续土地改革的杰出研究。随后,我们提取了主要的关键词和隐喻,确定了这两个领域之间的关联,并将其转换为可持续的可持续土地改革的一系列核心特征以及关键因素和指导方针。结果:我们发现了 15 个核心特征,这些特征为可持续的可持续土地恢复提供了广阔的视角;还发现了可持续土地恢复过程中的 15 个关键因素,这些因素在进行和更新可持续土地恢复时应认真对待;此外,我们还发现了从可持续角度管理可持续土地恢复的 16 条指导原则。
{"title":"Sustainable systematic literature reviews","authors":"Vinicius dos Santos ,&nbsp;Anderson Y. Iwazaki ,&nbsp;Katia R. Felizardo ,&nbsp;Érica F. de Souza ,&nbsp;Elisa Y. Nakagawa","doi":"10.1016/j.infsof.2024.107551","DOIUrl":"10.1016/j.infsof.2024.107551","url":null,"abstract":"<div><h3>Context:</h3><p>Systematic Literature Reviews (SLR) have been recognized as an important research method for summarizing evidence in Software Engineering (SE). At the same, SLR still presents several problems, such as the high resource consumption (mainly human resources) and lack of effective impact on SE practitioners, although much research has already been done.</p></div><div><h3>Objective:</h3><p>The main goal of this paper is to explore the concept of sustainability in the SLR area, intending to contribute to understanding better and solving such problems in an integrated way. More specifically, this paper characterizes what sustainable SLR are, their core characteristics, critical factors (i.e., sensitive points in the SLR process), and guidelines for conducting such SLR.</p></div><div><h3>Methods:</h3><p>We performed a meta-ethnographic study to find key concepts of sustainable software systems and transpose them to sustainable SLR. For this, we systematically selected 16 studies about sustainable software systems and 14 distinguished studies about SLR. Following, we extracted the main keywords and metaphors, determined how both areas are correlated, and transposed them to obtain a set of core characteristics of sustainable SLR as well as critical factors and guidelines. Additionally, we validated them with specialists using the Delphi method.</p></div><div><h3>Results:</h3><p>We found 15 core characteristics that offer a broad view of sustainable SLR, 15 critical factors in the SLR process that should be carefully addressed when conducting and updating SLR, and also 16 guidelines to manage SLR from the sustainability perspective.</p></div><div><h3>Conclusion:</h3><p>The concept of sustainability in SLR can contribute to solving SLR problems in a more integrated way, while this work could change the mindset of the SLR community about the need to conduct sustainable SLR.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107551"},"PeriodicalIF":3.8,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142117637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing logic-based testing with EvoDomain: A search-based domain-oriented test suite generation approach 利用 EvoDomain 增强基于逻辑的测试:基于搜索的面向领域测试套件生成方法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1016/j.infsof.2024.107564
Akram Kalaee, Saeed Parsa, Zahra Mansouri

Context

Effective software testing requires test adequacy criteria. MC/DC, a widely used logic-based testing criterion, struggles to detect domain errors caused by incorrect arithmetic operations. Domain errors occur when test requirement boundaries shift or tilt, causing unpredictable behavior and system crashes.

Objective

To address the inadequacy of MC/DC in detecting domain errors, we present EvoDomain, a search-based testing technique.

Method

EvoDomain uses a memetic algorithm combining genetic and hill-climbing algorithms, along with the DBSCAN clustering algorithm to select diversified boundary test data. The memetic algorithm is designed to efficiently enhance the search process for covering boundary test data. We compared EvoDomain with two logic-based testing approaches, a domain-oriented test suite generation approach, and random testing.

Results

Evaluations on 30 case studies show EvoDomain increases fault detection by 74.44% over MC/DC and 65.06% over RoRG. Additionally, EvoDomain improves support for different fault types by up to 68.89% for MC/DC and 66.33% for RoRG. Compared to COSMOS, which uses static analysis, EvoDomain improves the convergence effectiveness of identifying feasible subdomains by 32%. It offers high accuracy (0.99-1) and F1-score (0.99-1). EvoDomain finds the subdomains in less than 1/3 the time of Random search.

Conclusion

EvoDomain effectively generates domain-oriented test suites, enhancing the accuracy and effectiveness of fault detection.

背景有效的软件测试需要测试充分性标准。MC/DC 是一种广泛使用的基于逻辑的测试标准,但却难以检测到由不正确的算术运算引起的领域错误。为了解决 MC/DC 在检测域错误方面的不足,我们提出了基于搜索的测试技术 EvoDomain。该记忆算法旨在有效增强边界测试数据的搜索过程。我们将 EvoDomain 与两种基于逻辑的测试方法、一种面向领域的测试套件生成方法和随机测试进行了比较。结果对 30 个案例的评估表明,EvoDomain 比 MC/DC 提高了 74.44% 的故障检测率,比 RoRG 提高了 65.06%。此外,EvoDomain 对不同故障类型的支持能力提高了 68.89%(MC/DC)和 66.33%(RoRG)。与使用静态分析的 COSMOS 相比,EvoDomain 将识别可行子域的收敛效率提高了 32%。它的准确率(0.99-1)和 F1 分数(0.99-1)都很高。EvoDomain 找到子域的时间不到随机搜索的 1/3。结论 EvoDomain 能有效生成面向领域的测试套件,提高故障检测的准确性和有效性。
{"title":"Enhancing logic-based testing with EvoDomain: A search-based domain-oriented test suite generation approach","authors":"Akram Kalaee,&nbsp;Saeed Parsa,&nbsp;Zahra Mansouri","doi":"10.1016/j.infsof.2024.107564","DOIUrl":"10.1016/j.infsof.2024.107564","url":null,"abstract":"<div><h3>Context</h3><p>Effective software testing requires test adequacy criteria. MC/DC, a widely used logic-based testing criterion, struggles to detect domain errors caused by incorrect arithmetic operations. Domain errors occur when test requirement boundaries shift or tilt, causing unpredictable behavior and system crashes.</p></div><div><h3>Objective</h3><p>To address the inadequacy of MC/DC in detecting domain errors, we present EvoDomain, a search-based testing technique.</p></div><div><h3>Method</h3><p>EvoDomain uses a memetic algorithm combining genetic and hill-climbing algorithms, along with the DBSCAN clustering algorithm to select diversified boundary test data. The memetic algorithm is designed to efficiently enhance the search process for covering boundary test data. We compared EvoDomain with two logic-based testing approaches, a domain-oriented test suite generation approach, and random testing.</p></div><div><h3>Results</h3><p>Evaluations on 30 case studies show EvoDomain increases fault detection by 74.44% over MC/DC and 65.06% over RoRG. Additionally, EvoDomain improves support for different fault types by up to 68.89% for MC/DC and 66.33% for RoRG. Compared to COSMOS, which uses static analysis, EvoDomain improves the convergence effectiveness of identifying feasible subdomains by 32%. It offers high accuracy (0.99-1) and F1-score (0.99-1). EvoDomain finds the subdomains in less than 1/3 the time of Random search.</p></div><div><h3>Conclusion</h3><p>EvoDomain effectively generates domain-oriented test suites, enhancing the accuracy and effectiveness of fault detection.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107564"},"PeriodicalIF":3.8,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001691/pdfft?md5=07f3cb29ae612025010607deae6b1c2b&pid=1-s2.0-S0950584924001691-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142128298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceived impact of agile principles: Insights from a survey-based study on agile software development project success 感知敏捷原则的影响:基于调查的敏捷软件开发项目成功研究的启示
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-25 DOI: 10.1016/j.infsof.2024.107552
Yulianus Palopak, Sun-Jen Huang

Context

Agile methodology has emerged as a fundamental framework guiding software development projects, emphasizing values and principles for achieving successful project outcomes. Despite the widespread recognition of the importance of agile principles, there remains a gap in empirical research investigating their actual impact on agile project success.

Objective

This research aims to examine the relationship between agile principles and project outcomes and provide empirical evidence supporting the importance of agile principles in achieving success in agile software development (ASD) projects.

Method

A total of 298 Agile project practitioners participated in an online survey between August and September 2023 to test this study's research model using the partial least square structural equation modeling (PLS-SEM) method.

Results

We find a significant relationship between adopting agile principles and project success, with regular delivery, technical excellence, team member proactivity, and customer collaboration showing the highest impact on Agile project success. However, process simplicity was found not to be significant in the study.

Conclusions

Our analysis verifies the importance of Agile principles and suggests areas for further study to successfully understand their impact on Agile projects. The findings contribute to the ongoing discourse on agile principles and their impact on software development project success, opening avenues for future research and the refinement of agile methodologies. These insights could assist organizations in optimizing Agile practices and decision-making, leading to more successful and efficient software development projects.

背景敏捷方法论已成为指导软件开发项目的基本框架,强调实现成功项目成果的价值观和原则。尽管人们普遍认识到敏捷原则的重要性,但在调查敏捷原则对敏捷项目成功的实际影响的实证研究方面仍存在空白。本研究旨在考察敏捷原则与项目成果之间的关系,并提供实证证据支持敏捷原则在敏捷软件开发(ASD)项目中取得成功的重要性。方法2023年8月至9月期间,共有298名敏捷项目从业人员参与了在线调查,使用偏最小二乘法结构方程建模(PLS-SEM)方法检验了本研究的研究模型。结果我们发现,采用敏捷原则与项目成功之间存在显著关系,其中定期交付、技术卓越、团队成员积极主动和客户协作对敏捷项目成功的影响最大。结论我们的分析验证了敏捷原则的重要性,并提出了进一步研究的领域,以成功了解这些原则对敏捷项目的影响。研究结果为目前关于敏捷原则及其对软件开发项目成功的影响的讨论做出了贡献,为未来的研究和敏捷方法的完善开辟了道路。这些见解可以帮助企业优化敏捷实践和决策,从而提高软件开发项目的成功率和效率。
{"title":"Perceived impact of agile principles: Insights from a survey-based study on agile software development project success","authors":"Yulianus Palopak,&nbsp;Sun-Jen Huang","doi":"10.1016/j.infsof.2024.107552","DOIUrl":"10.1016/j.infsof.2024.107552","url":null,"abstract":"<div><h3>Context</h3><p>Agile methodology has emerged as a fundamental framework guiding software development projects, emphasizing values and principles for achieving successful project outcomes. Despite the widespread recognition of the importance of agile principles, there remains a gap in empirical research investigating their actual impact on agile project success.</p></div><div><h3>Objective</h3><p>This research aims to examine the relationship between agile principles and project outcomes and provide empirical evidence supporting the importance of agile principles in achieving success in agile software development (ASD) projects.</p></div><div><h3>Method</h3><p>A total of 298 Agile project practitioners participated in an online survey between August and September 2023 to test this study's research model using the partial least square structural equation modeling (PLS-SEM) method.</p></div><div><h3>Results</h3><p>We find a significant relationship between adopting agile principles and project success, with regular delivery, technical excellence, team member proactivity, and customer collaboration showing the highest impact on Agile project success. However, process simplicity was found not to be significant in the study.</p></div><div><h3>Conclusions</h3><p>Our analysis verifies the importance of Agile principles and suggests areas for further study to successfully understand their impact on Agile projects. The findings contribute to the ongoing discourse on agile principles and their impact on software development project success, opening avenues for future research and the refinement of agile methodologies. These insights could assist organizations in optimizing Agile practices and decision-making, leading to more successful and efficient software development projects.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107552"},"PeriodicalIF":3.8,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A socio-technical perspective on software vulnerabilities: A causal analysis 从社会技术角度看软件漏洞:因果分析
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.infsof.2024.107553
Carlos Paradis , Rick Kazman , Mike Konrad

Context:

Software development organizations are composed of people working together towards a common goal. These people are connected in networks. The effectiveness of these networks seems like it would be an essential consideration for the effectiveness of the organization as a whole, but does network effectiveness actually matter?

Objective:

In this paper, we seek to understand whether causal relationships exist between the maintenance effort spent on files implicated in software vulnerabilities and suboptimal social behaviors – social smells – within that project’s developer community.

Methods:

To gain insight into this question, we chose to study OpenSSL and over 100 of its published vulnerabilities. We performed a socio-technical analysis on OpenSSL to understand whether social smells could be causally linked to the effort to maintain files implicated in vulnerabilities.

Results:

Our results indicate that this is the case: Social smells are, in fact, causally linked to the maintenance effort surrounding files implicated in software vulnerabilities.

Conclusion:

This result has significant implications for the management of software projects. These insights may motivate and help to guide project managers and architects to also focus on team communications, and not merely on technical quality measures such as bug rates or feature velocity. Social interactions among a project’s team members matter, and smells can be measured and monitored.

背景:软件开发组织是由为共同目标而工作的人员组成的。这些人通过网络联系在一起。这些网络的有效性似乎对整个组织的有效性至关重要,但网络的有效性是否真的重要呢?目的:在本文中,我们试图了解在软件漏洞文件上花费的维护精力与该项目开发者社区中的次优社会行为(社会气味)之间是否存在因果关系。我们对 OpenSSL 进行了社会技术分析,以了解社会气味是否与维护涉及漏洞的文件的努力有因果关系:结论:这一结果对软件项目的管理具有重要意义。这些见解可能会激励并帮助指导项目经理和架构师关注团队交流,而不仅仅是错误率或功能速度等技术质量指标。项目团队成员之间的社交互动非常重要,而且可以对社交互动进行测量和监控。
{"title":"A socio-technical perspective on software vulnerabilities: A causal analysis","authors":"Carlos Paradis ,&nbsp;Rick Kazman ,&nbsp;Mike Konrad","doi":"10.1016/j.infsof.2024.107553","DOIUrl":"10.1016/j.infsof.2024.107553","url":null,"abstract":"<div><h3>Context:</h3><p>Software development organizations are composed of people working together towards a common goal. These people are connected in networks. The effectiveness of these networks seems like it would be an essential consideration for the effectiveness of the organization as a whole, but does network effectiveness actually matter?</p></div><div><h3>Objective:</h3><p>In this paper, we seek to understand whether causal relationships exist between the maintenance effort spent on files implicated in software vulnerabilities and suboptimal social behaviors – social smells – within that project’s developer community.</p></div><div><h3>Methods:</h3><p>To gain insight into this question, we chose to study OpenSSL and over 100 of its published vulnerabilities. We performed a socio-technical analysis on OpenSSL to understand whether social smells could be causally linked to the effort to maintain files implicated in vulnerabilities.</p></div><div><h3>Results:</h3><p>Our results indicate that this is the case: Social smells are, in fact, causally linked to the maintenance effort surrounding files implicated in software vulnerabilities.</p></div><div><h3>Conclusion:</h3><p>This result has significant implications for the management of software projects. These insights may motivate and help to guide project managers and architects to also focus on team communications, and not merely on technical quality measures such as bug rates or feature velocity. Social interactions among a project’s team members matter, and smells can be measured and monitored.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107553"},"PeriodicalIF":3.8,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lot of talk and a badge: An exploratory analysis of personal achievements in GitHub 滔滔不绝与徽章对 GitHub 中个人成就的探索性分析
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.infsof.2024.107561
Fabio Calefato, Luigi Quaranta, Filippo Lanubile

Context:

GitHub has introduced a new gamification element through personal achievements, whereby badges are unlocked and displayed on developers’ personal profile pages in recognition of their development activities.

Objective:

In this paper, we present an exploratory analysis using mixed methods to study the diffusion of personal badges in GitHub, in addition to the effects and reactions to their introduction.

Method:

First, we conduct an observational study by mining longitudinal data from more than 6,000 developers and performed correlation and regression analysis. Then, we conduct a survey and analyze over 300 GitHub community discussions on the topic of personal badges to gauge how the community responded to the introduction of the new feature.

Results:

We find that most of the developers sampled own at least a badge, but we also observe an increasing number of users who choose to keep their profile private and opt out of displaying badges. Additionally, badges are generally poorly correlated with developers’ skills and dispositions such as timeliness and desire to collaborate. We also find that, except for the Starstruck badge (reflecting the number of followers), their introduction does not have an effect. Finally, the reaction of the community has been in general mixed, as developers find them appealing in principle but without a clear purpose and hardly reflecting their abilities in the current form.

Conclusions:

We provide recommendations to the designers of the GitHubplatform on how to improve the current implementation of personal badges as both a gamification mechanism and as sources of reliable cues for assessing the abilities of developers.

背景:GitHub 通过个人成就引入了新的游戏化元素,开发者的个人档案页面上会解锁并显示徽章,以表彰他们的开发活动。方法:首先,我们通过挖掘 6000 多名开发者的纵向数据进行观察研究,并进行相关性和回归分析。结果:我们发现大多数抽样调查的开发者至少拥有一个徽章,但我们也观察到越来越多的用户选择保持个人资料私密,不显示徽章。此外,徽章与开发人员的技能和性格(如及时性和合作意愿)的相关性普遍较低。我们还发现,除了 "追星族 "徽章(反映关注者数量)外,其他徽章的引入并没有产生影响。结论:我们向 GitHub 平台的设计者提出了建议,如何改善目前个人徽章作为游戏化机制和评估开发者能力的可靠线索的实施情况。
{"title":"A lot of talk and a badge: An exploratory analysis of personal achievements in GitHub","authors":"Fabio Calefato,&nbsp;Luigi Quaranta,&nbsp;Filippo Lanubile","doi":"10.1016/j.infsof.2024.107561","DOIUrl":"10.1016/j.infsof.2024.107561","url":null,"abstract":"<div><h3>Context:</h3><p><span>GitHub</span> has introduced a new gamification element through personal achievements, whereby badges are unlocked and displayed on developers’ personal profile pages in recognition of their development activities.</p></div><div><h3>Objective:</h3><p>In this paper, we present an exploratory analysis using mixed methods to study the diffusion of personal badges in <span>GitHub</span>, in addition to the effects and reactions to their introduction.</p></div><div><h3>Method:</h3><p>First, we conduct an observational study by mining longitudinal data from more than 6,000 developers and performed correlation and regression analysis. Then, we conduct a survey and analyze over 300 <span>GitHub</span> community discussions on the topic of personal badges to gauge how the community responded to the introduction of the new feature.</p></div><div><h3>Results:</h3><p>We find that most of the developers sampled own at least a badge, but we also observe an increasing number of users who choose to keep their profile private and opt out of displaying badges. Additionally, badges are generally poorly correlated with developers’ skills and dispositions such as timeliness and desire to collaborate. We also find that, except for the <span>Starstruck</span> badge (reflecting the number of followers), their introduction does not have an effect. Finally, the reaction of the community has been in general mixed, as developers find them appealing in principle but without a clear purpose and hardly reflecting their abilities in the current form.</p></div><div><h3>Conclusions:</h3><p>We provide recommendations to the designers of the <span>GitHub</span>platform on how to improve the current implementation of personal badges as both a gamification mechanism and as sources of reliable cues for assessing the abilities of developers.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107561"},"PeriodicalIF":3.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001666/pdfft?md5=7dc16813d20c4c9c7f058e8d063fcd37&pid=1-s2.0-S0950584924001666-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree DCM-GIFT:基于灰度图像和特征选择树的安卓恶意软件动态分类方法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.infsof.2024.107560
Jinfu Chen , Zian Zhao , Saihua Cai , Xiao Chen , Bilal Ahmad , Luo Song , Kun Wang

Context:

The boom of Android market makes mobile products more popular and convenient. However, in the face of the complex Android application market, how to efficiently and accurately identify malware has become one of the focuses of research. Various new types of disguised malware lurk in the web pages, links and major application malls. Therefore, people’s privacy and property security have become a major obstacle to the continued development of mobile devices.

Objective:

Most of the existing malware classification methods are fixed on one or several types of characteristics of Android devices, such as static characteristics, dynamic characteristics and traffic characteristics. Single feature detection or fixed feature fusion models limit the dimension of detection software, and also cause imbalanced classification results. This paper proposes an Android Malware Dynamic Classification Method based on Gray-scale Image and Feature-selection Tree (DCM-GIFT), which aims to improve and stabilize the precision of Android software classification and enhance the robustness of malware classification.

Method:

In this paper, we construct gray-scale images for the original Android traffic to retain the characteristics of the time series and spatial structure of the original network traffic. At the same time, we take the dynamic information and static information of Android software as auxiliary features to build a feature selection tree. The feature-selection algorithm helps the classifier dynamically select the optimal feature fusion scheme, and the resulting fusion feature vector will be trained and predicted using machine learning clusters for model training.

Results:

We evaluate the performance of DCM-GIFT on multiple datasets published at the Canadian Institute for Cybersecurity, the area under the accuracy, precision, recall and F1measure. The results show that the proposed DCM-GIFT model has significantly better prediction performance compared to other software classification models.

Conclusion:

It can be concluded that: (1) In terms of accuracy, precision, recall and F1measure, the DCM-GIFT model has a higher average value. (2) The DCM-GIFT model effectively solves the problem of imbalanced classification results in Android software. (3) The DCM-GIFT model achieves the goal of dynamic feature fusion and significantly improves the utilization of system resources.

背景:安卓市场的蓬勃发展使移动产品更加普及和便捷。然而,面对纷繁复杂的安卓应用市场,如何高效、准确地识别恶意软件成为研究的重点之一。各种新型伪装的恶意软件潜伏在网页、链接和各大应用商城中。因此,人们的隐私和财产安全已成为移动设备持续发展的一大障碍。目标:现有的恶意软件分类方法大多固定在安卓设备的一类或几类特征上,如静态特征、动态特征和流量特征等。单一特征检测或固定特征融合模型限制了检测软件的维度,也会造成分类结果的不平衡。本文提出了一种基于灰度图像和特征选择树(DCM-GIFT)的安卓恶意软件动态分类方法,旨在提高和稳定安卓软件分类的精度,增强恶意软件分类的鲁棒性。同时,将安卓软件的动态信息和静态信息作为辅助特征,构建特征选择树。结果:我们在加拿大网络安全研究所发布的多个数据集上评估了DCM-GIFT的性能,包括准确率、精确率、召回率和F1measure下的区域。结果表明,与其他软件分类模型相比,所提出的 DCM-GIFT 模型具有明显更好的预测性能:(1) 在准确度、精确度、召回率和 F1measure 方面,DCM-GIFT 模型的平均值更高。(2)DCM-GIFT 模型有效解决了安卓软件分类结果不平衡的问题。(3) DCM-GIFT 模型实现了动态特征融合的目标,显著提高了系统资源的利用率。
{"title":"DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree","authors":"Jinfu Chen ,&nbsp;Zian Zhao ,&nbsp;Saihua Cai ,&nbsp;Xiao Chen ,&nbsp;Bilal Ahmad ,&nbsp;Luo Song ,&nbsp;Kun Wang","doi":"10.1016/j.infsof.2024.107560","DOIUrl":"10.1016/j.infsof.2024.107560","url":null,"abstract":"<div><h3>Context:</h3><p>The boom of Android market makes mobile products more popular and convenient. However, in the face of the complex Android application market, how to efficiently and accurately identify malware has become one of the focuses of research. Various new types of disguised malware lurk in the web pages, links and major application malls. Therefore, people’s privacy and property security have become a major obstacle to the continued development of mobile devices.</p></div><div><h3>Objective:</h3><p>Most of the existing malware classification methods are fixed on one or several types of characteristics of Android devices, such as static characteristics, dynamic characteristics and traffic characteristics. Single feature detection or fixed feature fusion models limit the dimension of detection software, and also cause imbalanced classification results. This paper proposes an Android Malware Dynamic Classification Method based on Gray-scale Image and Feature-selection Tree (DCM-GIFT), which aims to improve and stabilize the precision of Android software classification and enhance the robustness of malware classification.</p></div><div><h3>Method:</h3><p>In this paper, we construct gray-scale images for the original Android traffic to retain the characteristics of the time series and spatial structure of the original network traffic. At the same time, we take the dynamic information and static information of Android software as auxiliary features to build a feature selection tree. The feature-selection algorithm helps the classifier dynamically select the optimal feature fusion scheme, and the resulting fusion feature vector will be trained and predicted using machine learning clusters for model training.</p></div><div><h3>Results:</h3><p>We evaluate the performance of DCM-GIFT on multiple datasets published at the Canadian Institute for Cybersecurity, the area under the accuracy, precision, recall and <span><math><mrow><mi>F</mi><msub><mrow><mn>1</mn></mrow><mrow><mi>m</mi><mi>e</mi><mi>a</mi><mi>s</mi><mi>u</mi><mi>r</mi><mi>e</mi></mrow></msub></mrow></math></span>. The results show that the proposed DCM-GIFT model has significantly better prediction performance compared to other software classification models.</p></div><div><h3>Conclusion:</h3><p>It can be concluded that: (1) In terms of accuracy, precision, recall and <span><math><mrow><mi>F</mi><msub><mrow><mn>1</mn></mrow><mrow><mi>m</mi><mi>e</mi><mi>a</mi><mi>s</mi><mi>u</mi><mi>r</mi><mi>e</mi></mrow></msub></mrow></math></span>, the DCM-GIFT model has a higher average value. (2) The DCM-GIFT model effectively solves the problem of imbalanced classification results in Android software. (3) The DCM-GIFT model achieves the goal of dynamic feature fusion and significantly improves the utilization of system resources.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107560"},"PeriodicalIF":3.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bringing architecture-based adaption to the mainstream 将基于架构的适应性纳入主流
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.infsof.2024.107550
Negar Ghorbani, Joshua Garcia, Sam Malek

Software architecture has been shown to provide an appropriate level of granularity for representation of a managed software system and reasoning about the impact of adaptation choices on its properties. Software architecture-based adaptability is the ability to adapt a software system in terms of its architectural elements, such as its components and their interfaces. Despite its promise, architecture-based adaptation has remained largely elusive, mainly because it involves heavy engineering effort of making non-trivial changes to the manner in which a software system is implemented. In this paper, we present Acadia—a framework that automatically enables architecture-based adaptation of practically any Java 9+ application without requiring any changes to the implementation of the application itself. Acadia builds on the Java Platform Module System (JPMS), which has brought extensive support for architecture-based development to Java 9 and subsequent versions. Acadia extends JPMS with the ability to provide and maintain a representation of an application’s architecture and make changes to it at runtime. The results of our experimental evaluation, conducted on three large open-source Java applications, indicate that Acadia is able to efficiently apply dynamic changes to the architecture of these applications without requiring any changes to their implementation.

软件架构已被证明可为管理软件系统的表示和推理适应性选择对其属性的影响提供适当的粒度。基于软件架构的适应性是指根据软件系统的架构元素(如组件及其接口)对其进行适应的能力。尽管前景广阔,但基于架构的适应性在很大程度上仍然难以实现,主要原因是这涉及到对软件系统的实现方式进行非同小可的更改,工程量巨大。在本文中,我们介绍了Acadia--一种可自动实现对几乎所有Java 9+应用程序进行基于架构的适配的框架,而无需对应用程序本身的实现进行任何更改。Acadia 以 Java 平台模块系统(JPMS)为基础,JPMS 为 Java 9 及其后续版本带来了对基于架构的开发的广泛支持。Acadia 对 JPMS 进行了扩展,能够提供并维护应用程序的架构表示,并在运行时对其进行更改。我们在三个大型开源 Java 应用程序上进行的实验评估结果表明,Acadia 能够有效地对这些应用程序的架构进行动态更改,而无需对其实现进行任何更改。
{"title":"Bringing architecture-based adaption to the mainstream","authors":"Negar Ghorbani,&nbsp;Joshua Garcia,&nbsp;Sam Malek","doi":"10.1016/j.infsof.2024.107550","DOIUrl":"10.1016/j.infsof.2024.107550","url":null,"abstract":"<div><p>Software architecture has been shown to provide an appropriate level of granularity for representation of a managed software system and reasoning about the impact of adaptation choices on its properties. Software architecture-based adaptability is the ability to adapt a software system in terms of its architectural elements, such as its components and their interfaces. Despite its promise, architecture-based adaptation has remained largely elusive, mainly because it involves heavy engineering effort of making non-trivial changes to the manner in which a software system is implemented. In this paper, we present <span>Acadia</span>—a framework that automatically enables architecture-based adaptation of practically any Java 9+ application without requiring any changes to the implementation of the application itself. <span>Acadia</span> builds on the <em>Java Platform Module System (JPMS)</em>, which has brought extensive support for architecture-based development to Java 9 and subsequent versions. <span>Acadia</span> extends JPMS with the ability to provide and maintain a representation of an application’s architecture and make changes to it at runtime. The results of our experimental evaluation, conducted on three large open-source Java applications, indicate that <span>Acadia</span> is able to efficiently apply dynamic changes to the architecture of these applications without requiring any changes to their implementation.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107550"},"PeriodicalIF":3.8,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How do software practitioners perceive human-centric defects? 软件从业人员如何看待以人为本的缺陷?
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.infsof.2024.107549
Vedant Chauhan , Chetan Arora , Hourieh Khalajzadeh , John Grundy

Context:

Human-centric software design and development prioritises the way users prefer to complete their jobs, rather than expecting users to adapt to the software. Software users can have different genders, ages, cultures, languages, disabilities, socioeconomic statuses, and educational backgrounds, among many other differences. Due to the inherently varied nature of these differences and their impact on software usage, preferences and issues of users can vary, resulting in user-specific defects that we term as ‘human-centric defects’ (HCDs).

Objective:

This research aims to understand the perception and current management practices of such HCDs by software practitioners, identify key challenges in reporting, understanding and fixing them, and provide recommendations to improve HCDs management in software engineering.

Methods:

We conducted a survey and interviews with software engineering practitioners to gauge their knowledge and experience on HCDs and the defect tracking process.

Results:

We analysed fifty (50) survey- and ten (10) interview-responses from SE practitioners and identified that there are multiple gaps in the current management of HCDs in software engineering practice. There is a lack of awareness regarding human-centric aspects, causing them to be lost or under-appreciated during software development. Our results revealed that handling HCDs could be improved by following a better feedback process with end-users, a more descriptive taxonomy, and suitable automation.

Conclusion:

HCDs, given their diverse end-user base, present a major challenge to software practitioners. In the software engineering domain, research on HCDs has been limited and requires effort from research and practice communities to create awareness and support for human-centric aspects.

背景:以人为本的软件设计和开发优先考虑用户完成工作的方式,而不是期望用户适应软件。软件用户可能具有不同的性别、年龄、文化、语言、残疾、社会经济地位和教育背景等诸多差异。目标:本研究旨在了解软件从业人员对这类缺陷的看法和当前的管理实践,确定报告、理解和修复这类缺陷的主要挑战,并为改进软件工程中的缺陷管理提供建议。方法:我们对软件工程从业人员进行了调查和访谈,以了解他们对人类缺陷和缺陷跟踪过程的认识和经验。结果:我们分析了五十(50)份调查问卷和十(10)份来自 SE 从业人员的访谈回复,发现目前在软件工程实践中对人类缺陷的管理存在多种漏洞。由于缺乏对以人为本方面的认识,导致在软件开发过程中忽略或不重视这些方面。我们的研究结果表明,通过与最终用户建立更好的反馈流程、采用更具描述性的分类方法和适当的自动化手段,可以改善对 HCD 的处理。在软件工程领域,有关人机交互问题的研究还很有限,需要研究界和实践界努力提高对以人为本方面的认识和支持。
{"title":"How do software practitioners perceive human-centric defects?","authors":"Vedant Chauhan ,&nbsp;Chetan Arora ,&nbsp;Hourieh Khalajzadeh ,&nbsp;John Grundy","doi":"10.1016/j.infsof.2024.107549","DOIUrl":"10.1016/j.infsof.2024.107549","url":null,"abstract":"<div><h3>Context:</h3><p>Human-centric software design and development prioritises the way users prefer to complete their jobs, rather than expecting users to adapt to the software. Software users can have different genders, ages, cultures, languages, disabilities, socioeconomic statuses, and educational backgrounds, among many other differences. Due to the inherently varied nature of these differences and their impact on software usage, preferences and issues of users can vary, resulting in user-specific defects that we term as <em>‘human-centric defects’ (HCDs)</em>.</p></div><div><h3>Objective:</h3><p>This research aims to understand the perception and current management practices of such HCDs by software practitioners, identify key challenges in reporting, understanding and fixing them, and provide recommendations to improve HCDs management in software engineering.</p></div><div><h3>Methods:</h3><p>We conducted a survey and interviews with software engineering practitioners to gauge their knowledge and experience on HCDs and the defect tracking process.</p></div><div><h3>Results:</h3><p>We analysed fifty (50) survey- and ten (10) interview-responses from SE practitioners and identified that there are multiple gaps in the current management of HCDs in software engineering practice. There is a lack of awareness regarding human-centric aspects, causing them to be lost or under-appreciated during software development. Our results revealed that handling HCDs could be improved by following a better feedback process with end-users, a more descriptive taxonomy, and suitable automation.</p></div><div><h3>Conclusion:</h3><p>HCDs, given their diverse end-user base, present a major challenge to software practitioners. In the software engineering domain, research on HCDs has been limited and requires effort from research and practice communities to create awareness and support for human-centric aspects.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"176 ","pages":"Article 107549"},"PeriodicalIF":3.8,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S095058492400154X/pdfft?md5=31ebde54765e3c996c418b4582749ef2&pid=1-s2.0-S095058492400154X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Software Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1