Proceedings of the 5th International Conference on Mobile Software Engineering and Systems 2018
DOI: 10.1145/3197231.3197259
|View full text |Cite
|
Sign up to set email alerts
|

Acceptance testing of mobile applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…In the context of software testing, gamification has been applied in both professional (e.g., [37,40]) and educational (e.g., [5,21,22,51]) settings. Previous attempts to gamify software testing education have focused on specific aspects such as mutation testing [21] or security testing [22].…”
Section: Gamification Of Software Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of software testing, gamification has been applied in both professional (e.g., [37,40]) and educational (e.g., [5,21,22,51]) settings. Previous attempts to gamify software testing education have focused on specific aspects such as mutation testing [21] or security testing [22].…”
Section: Gamification Of Software Testingmentioning
confidence: 99%
“…For this, gamification has been integrated into integrated development environments [47], browsers [23], and continuous integration [3], with results suggesting that gamification can improve test automation. There have also been attempts to gamify aspects of testing such as test-to-code traceability [37] or acceptance testing [40]. While we also address continuous integration, our gamification approach aims to influence testing behavior directly, rather than the adoption of tools, and we use more different gamification elements.…”
Section: Related Workmentioning
confidence: 99%
“…As most of users' information is digitalised, privacy is an important aspect to be considered during the development of ICTs for the protection of users' personal information [54][55][56]. According to the literature, privacy can be protected by analysing and eliciting privacy requirements from the early stages of a software lifecycle until the late design phases [29][30][31][32][33][34][35][36][37][38][39]. In addition, several methods have been suggested to software developers for the accomplishment of this task [40][41][42][43][44].…”
Section: Privacy Requirementsmentioning
confidence: 99%
“…As they report, this technique conflicts with privacy as users' information can be compromised. Regarding the same privacy issue, Scherr et al [36] suggest a technique which protect users' faces. Specifically, they mention that the use of an animated emoji based on users' various expressions would support privacy protection, as users' characteristics will not be recorded.…”
Section: Introductionmentioning
confidence: 99%
“…"Acceptance Testing of Mobile Applications: Automated Emotion Tracking for Large User Groups," by Simon Scherr, Frank Elberzhager, and Konstatin Holl, describes an approach for using emotion to support mobile-app acceptance testing. 6 Their tool translates a user's facial expression into an emoji and provides the emoji to the app developer. This approach lets developers consider real users and real scenarios rather than more-contrived laboratory settings.…”
Section: Sentiment and Emotionmentioning
confidence: 99%