2019
DOI: 10.1016/j.infsof.2018.10.006
|View full text |Cite
|
Sign up to set email alerts
|

Identifying, categorizing and mitigating threats to validity in software engineering secondary studies

Abstract: Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
152
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 172 publications
(160 citation statements)
references
References 39 publications
1
152
0
2
Order By: Relevance
“…The use of such systematised guidelines for conducting the current report synthesis has been considered helpful to deal with validity concerns. Validity concerns have been gaining increasing importance associated with the growth of systematic reviews in the literature [30]. Following the study from Zhou et al [31], the main threats to validity were considered and mitigation actions included to minimise their effect, which is reflected in the specified research exclusion criteria.…”
Section: Methodsmentioning
confidence: 99%
“…The use of such systematised guidelines for conducting the current report synthesis has been considered helpful to deal with validity concerns. Validity concerns have been gaining increasing importance associated with the growth of systematic reviews in the literature [30]. Following the study from Zhou et al [31], the main threats to validity were considered and mitigation actions included to minimise their effect, which is reflected in the specified research exclusion criteria.…”
Section: Methodsmentioning
confidence: 99%
“…171 secondary studies 2018 [58] A tertiary study on technical debt 13 secondary studies 2018 [59] Identifying, categorizing and mitigating threats to validity in SE secondary studies 165 secondary studies 2018 [60] A tertiary study on model-based testing areas, tools and challenges 10 secondary studies 2018 [61] (2) Reasons for exclusions: (1) The list of secondary studies was not available. (2) Download of paper is not available.…”
Section: Survey On the Application Of Secondary Studies In Research Pmentioning
confidence: 99%
“…e rest of the authors thoroughly reviewed, improved, and agreed upon the DEF before properly starting the data extraction process. e proper use of the DEF facilitates a detailed, systematic, explicit, and consistent approach to conduct the data extraction process of an SLR study [60,61].…”
Section: Data Extraction Processmentioning
confidence: 99%
“…In this study, we have considered the five most frequently reported validity threats of software engineering research [60,86]. ese validity threats include descriptive validity, interpretive validity, theoretical validity, generalizability, and reliability.…”
Section: Validity Threatsmentioning
confidence: 99%