2017 IEEE 25th International Requirements Engineering Conference (RE) 2017
DOI: 10.1109/re.2017.73
|View full text |Cite
|
Sign up to set email alerts
|

Users — The Hidden Software Product Quality Experts?: A Study on How App Users Report Quality Aspects in Online Reviews

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
48
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 43 publications
(48 citation statements)
references
References 18 publications
0
48
0
Order By: Relevance
“…For this, we analysed each paper content to identify foci of requirements elicitation and grouped them into categories shown in Table 1. For example, there are works focusing on elicit general requirements, including: building personas for users profiling [3] and identify Personae Non Gratae (potential system attackers or abusers) [51], collecting runtime user feedbacks, or on extraction of novel or emerging functional or nonfunctional requirements [23], such as usability, user experience [4] and awareness [75], or security and privacy requirements [5,8], or building elicitation tools for crowd. Requirements Modeling.…”
mentioning
confidence: 99%
“…For this, we analysed each paper content to identify foci of requirements elicitation and grouped them into categories shown in Table 1. For example, there are works focusing on elicit general requirements, including: building personas for users profiling [3] and identify Personae Non Gratae (potential system attackers or abusers) [51], collecting runtime user feedbacks, or on extraction of novel or emerging functional or nonfunctional requirements [23], such as usability, user experience [4] and awareness [75], or security and privacy requirements [5,8], or building elicitation tools for crowd. Requirements Modeling.…”
mentioning
confidence: 99%
“…The algorithm can be separated into three steps: First, it generates a version tree (line 2-7). Then, it processes conversations or single tweets to extract included versions (line [8][9][10][11][12][13][14][15]. Optionally, it resolves existing conflicts (line [16][17][18][19][20][21][22][23][24].…”
Section: B App and System Versionmentioning
confidence: 99%
“…Each leave is marked as an iOS app version. If the list of system version for Android includes the version 3 for l in (l sys−ios , l sys−and , l app−ios , l app−and ) do 4 for version, label in l do 5 version tree.add(version, label) 6 end 7 end process conversation or tweet (2) 8 extracted versions = [] 9 for tweet in c do 10 for token in tweet do 11 potential matches = version tree.match(token, previous token) 12 extracted versions.append(token, potential matches) 13 previous token = token (2) Process Conversation or Tweet. The matcher takes each token including a number and respectively its previous token as input.…”
Section: B App and System Versionmentioning
confidence: 99%
“…In this context, data-driven requirements engineering [15] is advocated as the proper way to go for eliciting QRs. Some recent proposals in this direction aim at exploiting end-user explicit feedback data [16][17] [18].…”
Section: Background and Related Workmentioning
confidence: 99%