<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Exploring users perception on security and satisfaction requirements of context-aware applications: An Online Survey</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nelly Condori-Fernandez</string-name>
          <email>n.condori-fernandez@vu.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universidade Da Coruna, Spain Vrije Universiteit Amsterdam, the Netherlands Denisse Mun~ante Universite de Bordeaux</institution>
          ,
          <addr-line>ESTIA, F-64210 Bidart</addr-line>
          ,
          <country>France Franci</country>
          <institution>Suni Lopez Universidad Catolica San Pablo</institution>
          ,
          <addr-line>Arequipa</addr-line>
          ,
          <country country="PE">Peru</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In: A. Editor, B. Coeditor (eds.): Proceedings of the XYZ Workshop, Location, Country, DD-MMM-YYYY, published at http://ceur-ws.org</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1.1</p>
    </sec>
    <sec id="sec-2">
      <title>Introduction</title>
      <sec id="sec-2-1">
        <title>Research problem</title>
        <p>Our lives are being transformed by innovative software applications with important social, environmental, and
economic implications. For instance, context-aware software systems can be found in di erent domains such as
health-care, telecommunication, transportation, etc. It is expected that in the near future software-intensive
systems will behave autonomously thanks to the continuous sensing and monitoring. In this proposal, given the
complexity of this kind of systems, and the social implications behind emerging wearable sensing technologies,
we aim to empirically investigate some quality attributes that contribute to the social sustainability from a
consumer perspective.</p>
        <p>
          In a previous work [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], experts recognised that security and satisfaction requirements are the cornerstone to
get healthy social implications of software applications. However, do end-users perceive the same importance?
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Motivation to conduct the study</title>
        <p>
          In this live study proposal, we start from the hypothesis that users perceive the importance of some software
requirements in di erent ways due to their di erent pro les (e.g. background, preferences, experiences,
personality) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Moreover, we focus on investigating security from a user perspective because according to West
in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], security is harder to be appreciated by end-users because of end-users do not think they are at risk or
safety is an abstract concept. So, we would like to investigate this psychological phenomenon.
        </p>
        <p>
          Therefore, in order to investigate how users understand and perceive the security and satisfaction of
contextaware software applications, that are built based on the HAPPYNESS framework [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ],[
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], we investigate a set of
quality attributes related to security and satisfaction. To do that, we present the design and plan of an online
survey to be conducted with the REFSQ attendees.
        </p>
        <p>Copyright c by the paper's authors. Copying permitted for private and academic purposes.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Scenario</title>
      <p>In this section, we introduce the scenario that illustrates the context of the use of happyParking, an application
built based on the HAPPYNESS framework, that we plan to use it in our live study proposal.</p>
      <p>Frank lives in a city where the amount of parking spaces per unit is becoming scarce. Given the di culty
of nding a parking space, Frank uses a mobile application called happyParking. The application uses multiple
input sources of contextual information to provide a certain degree of probability of nding a parking spot
in di erent locations. happyParking is empowered by HAPPYNESS, and Frank uses the E4-Wristband1 for
monitoring emotional data at runtime, HAPPYNESS determine the actual QoS levels of happyParking services
from a user perspective, increasing in this way our awareness of a potential issue with the services, what could
eventually lead to actions addressing the issue.
3
3.1</p>
    </sec>
    <sec id="sec-4">
      <title>Study Design</title>
      <sec id="sec-4-1">
        <title>Hypothesis, goal and research questions</title>
        <p>
          In this study, we start from the hypothesis that educational background and type of personality are key factors
that can in uence on the perceived importance of some quality requirements [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ],[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Moreover, we focus on
investigating security from a user perspective because in contrast to the importance of security perceived by
experts {the ndings reported in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] demonstrate that security requirements (i.e., con dentiality, authenticity)
and satisfaction (in terms of trust and usefulness) were identi ed as high contributors of social sustainability{
West in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] reported that users do not think they are at risk, users are not motivated in security, safety is
an abstract concept, security is considered as a secondary task, losses perceived disproportionately to gains.
Therefore, the live study presented in this paper aims to analyse a context-aware application for the purpose
of understanding user perception with respect to security and satisfaction requirements from the viewpoint of a
service consumer in the context of smart parking, where REFSQ volunteer participants will be illustrated with
certain scenarios of use of happyParking.
        </p>
        <p>From this goal, the following research questions are derived:
RQ1: How service consumers perceive the importance of security and satisfaction of a context-aware
softwareintensive system?
RQ2: Do the educational background and personality in uence on the importance perceived of security and
satisfaction of context-aware software applications from a service consumer perspective?
Type and relevance of study for research and/or for practice.- This study is performed through a survey
(online-questionnaire), and its objective is to test the hypothesis formulated above.
3.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Variables and metrics</title>
        <p>
          Response variables.- Security and satisfaction are operationalised regarding: i) the perceived importance of
quality attributes, which can be measured by means of 6 items formulated in 5-points ordinal scale (from "not
important" to "very important"); ii) the level of agreement on security requirements, which can reach values
from 1 (strongly disagree) to 5 (strongly agree); and iii) the perceived recommendation measured with the Net
Promoter score [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ],which can be used as an indicator of user satisfaction.
        </p>
        <p>
          Factors.- The mobile application that needs wearable sensors is identi ed as a variable that could a ect the
response variables. Our treatment is the happyParking and the E4wristband device. Personality is another
important variable identi ed in our study, which will be measured using the Big Five Inventory questionnaire
(BFI) [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. And the educational background that will be determined through the demographic questionnaire.
3.3
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Population of interest</title>
        <p>Pro le of the intended subjects.- We plan for 40 participants as a minimum number of subjects to conduct
the survey. Students, senior researchers, and practitioners are very welcome. Prior knowledge of security is not
required. We choose REFSQ'19 to run this online survey thanks to the knowledge in requirements engineering
(RE) of REFSQ's attendees.</p>
        <p>Bene ts to the subjects of participating in the
study.1https://www.empatica.com/en-eu/research/e4/</p>
        <p>Given requirements are the key leverage point for practitioners (e.g. software architects, testers) who want
to design software systems with an acceptable quality level, we think that this survey might bene t to the
participants by getting:
knowledge on how to elicit requirements (e.g. security, trust) of context-aware applications that are harder
to be perceived by end-users.
experience in running empirical studies with the exploitation of video-demos as a medium in requirements
engineering.
access to the instruments such as an online version of the BFI questionnaire, which could be used for pro ling
participants in any further human-based empirical studies.
3.4</p>
      </sec>
      <sec id="sec-4-4">
        <title>Study design</title>
        <p>The study is composed of three parts (see Figure1): (i) a pre-questionnaire that aims to collect demographic,
educational background and personality information, (ii) the online questionnaire that gathers service consumer
perceptions on security and satisfaction requirements of context-aware applications, (iii) and a post-questionnaire
that aims to evaluate the quality of the live study.</p>
        <p>Instrumentation.- The instruments to be used in the study are a demographic questionnaire (e.g., sex, age), an
educational background questionnaire (e.g., educational degree, domain expertise), a personality test, animated
demonstration videos, and a web-based questionnaire designed to assess the service consumer perceptions on
security and satisfaction requirements.</p>
        <p>Questionnaire (see Figure 1) consists of two sub-parts: First one: items that correspond to security and
satisfaction quality attributes listed in Table 1, these items (i.e., de nitions and examples of quality attributes)
are formulated as questions on an ordinal scale to measure the rst perception about the importance of security
and satisfaction quality attributes according to the rst video2.</p>
        <p>Second one: questions regarding the level of agreement on security requirements (according to the second
video3) are formulated. Additionally, questions on an ordinal scale for the re-evaluating importance of security
and satisfaction quality attributes are formulated. We include also question on a ordinal scale for collecting data
regarding the overall satisfaction.
3.4.1</p>
      </sec>
      <sec id="sec-4-5">
        <title>Procedure of live study</title>
        <p>The procedure of the study is summarized in Figure 1, which includes the estimated time required for each
activity. A rst version of the online questionnaire that we plan to use can be found at https://goo.gl/forms/
65pJEjz4RroYDq153.</p>
        <p>2https://www.youtube.com/watch?v=iJ7Og8hTtXk
3https://www.youtube.com/watch?v=xDYqzzGSw8s</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Plan of data collection and analysis</title>
      <p>
        Following our previous experience when eliciting requirements from software recon guration [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], we conceive our
study based on three-stage process, which involves the contribution from the crowd of potential service consumer
of context-aware applications, as well as from domain experts of social impact and requirements: (Stage 1) A
pilot of our study is performed with experts on social sustainability. This pilot allows us to check and improve the
survey process and its conduction. It has been already executed in October 9th, 2018 in MEGSUS workshop [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
We collected feedback from 7 participants working on topics of software sustainability. This feedback was used
to improve the study that is presented in this paper. (Stage 2) We then perform an improved design and
plan of the study with REFSQ participants, who have a strong background on Requirements Engineering. The
objectives of this stage are twofold: i) to analyse the service consumer perception on security and satisfaction
requirements of context-aware applications,by involving high-quali ed participants; ii) to evaluate the quality of
the online survey by means of a post-questionnaire. (Stage 3) Finally, we plan to perform an improved version
of the study with the potential service consumers of context-aware applications. For this stage, we are going to
use the crowd-sourcing platform: Amazon Mechanical Turk 4 for gathering the participation of end-users.
      </p>
      <p>In the rest of the section, we introduce the plan of data collection and analysis related to Stage 2.
Execution of data collection.- The data will be collected through an online survey, nobody will be obligated
to participate, only volunteers will participate of it. To assure that, a consent document will be signed by
participants before performing the live study, in this document we will brie y explain con dentiality and privacy
terms.</p>
      <p>Execution of data validation.- To understand participants' personality, we use the Big Five Inventory (BFI)
questionnaire. Responses related to demographic, educational background and personality can be used as inputs
to identify user pro le. User pro les could allow us to improve the understanding about diverse user behaviours
and its implication in the perception of security and satisfaction requirements of context-aware applications.
5</p>
    </sec>
    <sec id="sec-6">
      <title>Threats to the validity and ethical issues</title>
      <p>
        The main threats to validity concern internal, construct and external validity [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Internal validity: concern
additional factors that may a ect an observed variables. We mitigate this threat by requesting to all participants
perform the live study in similar conditions, by using the same material (e.g. videos showing di erent situations
when a user uses happyParking).
      </p>
      <p>
        Construct validity: It concerns generalizing the result of the experiment to the concept or theory behind the
experiment.. In order to mitigate the threat related to the following two social factors: Hypothesis guessing, we
do not reveal the research goal before the study. Evaluation apprehension, as some people are afraid of being
evaluated/tested, the completion of both personality test and online questionnaire are going to be anonymous.
Regarding the threats related to the design of the study: mono-operation bias, as we include only one treatment
(happyparking app), the study could be under-representing the identi ed constructs (perceptions on security and
satisfaction). To mitigate this threat, we carefully selected the software domain (IoT applications for the smart
parking sector), which we think it is enough representative for measuring our two response variables. Moreover,
It is important to remark that we explore both variables, by formulating questions at least in two di erent scales,
such is shown in Table 1. Also we considered other relevant factors as personality, which is going to be measured
by means of the BFI questionnaire, de ned and validated in the psychology eld [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. For our analysis, we are
going to focus specially on a sub set of constructs that can have an e ect on the Technology acceptance [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] (i.e.
neuroticism, agreeableness, openness). Regarding the questions in ordinal scale (importance level) we added the
option: "No opinion" to avoid forcing respondents in choosing one level of importance.
      </p>
      <p>External validity: concern the generalization of the ndings beyond the validation settings. This threat
is partially mitigated by the fact that REFSQ attendees are diverse in terms of personality and educational
background such as master/PhD students, software architects, requirements engineers, business analysts, etc.
However, a further replication, involving participants with non-technical background such is described in stage
3 of our study, is necessary.
6</p>
    </sec>
    <sec id="sec-7">
      <title>About the researchers</title>
      <p>
        Nelly Condori-Fernandez is an assistant professor at the Universidade da Coruna(Spain) and research
associate of the Vrije Universiteit Amsterdam (The Netherlands). Her main empirically-driven research focuses
on topics related to quality requirements prioritization and requirements validation. She has a particular
interest in applying Human Computer Interaction technologies to support requirements engineering activities.
Her research interests also include software sustainability design and assessment with special emphasis on social
and technical aspects. She executed three empirical studies in the live study track of REFSQ, whose results
have been published in di erent venues (e.g. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]).
      </p>
      <p>
        Denisse Mun~ante is an assistant professor and research associate at the engineering school ESTIA (France).
Her main empirically-driven research focuses on decision-making for requirements prioritization. Her research
interest also includes security information, self-adaptive software, and model-driven engineering. She executed
two empirical studies, one of them was published in RE'17 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and the second one will be submitted to IST
Journal by the end of 2018.
      </p>
      <p>Franci Suni Lopez is a research associate of the San Pablo Catholic University of Arequipa, Peru. He has a
master in computer science. His main research focuses on using human emotions to empower the self-adaptation
capability of software services. His research interest also includes software engineering for mobile development
and self-adaptive software.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Condori-Fernandez</surname>
          </string-name>
          , N.:
          <article-title>Happyness: An emotion-aware QoS assurance framework for enhancing user experience</article-title>
          .
          <source>In: Proceedings of the 39th International Conference on Software Engineering Companion</source>
          . pp.
          <volume>235</volume>
          {
          <fpage>237</fpage>
          .
          <string-name>
            <surname>ICSE-C '</surname>
          </string-name>
          <article-title>17</article-title>
          , IEEE Press, Piscataway, NJ, USA (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Condori-Fernandez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daneva</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wieringa</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A survey on empirical requirements engineering research practices</article-title>
          .
          <source>In: Proceedings of the Workshops RE4SuSy</source>
          , REEW, CreaRE, RePriCo,
          <source>IWSPM and the Conference Related Empirical Study, Empirical Fair and Doctoral Symposium</source>
          . pp.
          <volume>282</volume>
          {
          <fpage>295</fpage>
          .
          <source>ICB-Research Report No. 52</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Condori-Fernandez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lago</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Characterizing the contribution of quality requirements to software sustainability</article-title>
          .
          <source>J. Sys. Soft</source>
          .
          <volume>137</volume>
          ,
          <issue>289</issue>
          {
          <fpage>305</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Condori-Fernandez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suni Lopez</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Using emotions to empower the self-adaptation capability of software services</article-title>
          .
          <source>In: Proceedings of the 2Nd International Workshop on Emotion Awareness in Software Engineering</source>
          . pp.
          <volume>15</volume>
          {
          <fpage>21</fpage>
          . SEmotion '17, IEEE Press, Piscataway, NJ, USA (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>John</surname>
            ,
            <given-names>O.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The big ve trait taxonomy: History, measurement, and theoretical perspectives</article-title>
          . In: Pervin,
          <string-name>
            <given-names>L.A.</given-names>
            ,
            <surname>John</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.P</surname>
          </string-name>
          . (eds.)
          <source>Handbook of Personality: Theory and Research</source>
          , pp.
          <volume>102</volume>
          {
          <fpage>138</fpage>
          . Guilford Press, New York, second edn. (
          <year>1999</year>
          ), http://darkwing.uoregon.edu/\~{}sanjay/pubs/bigfive.pdf
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Kifetew</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          , Mun~ante,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Perini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Susi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Siena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Busetta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Valerio</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          :
          <article-title>Gamifying collaborative prioritization: Does pointsi cation work?</article-title>
          <source>In: 25th IEEE International RE Conference</source>
          , Lisbon, Portugal. pp.
          <volume>322</volume>
          {
          <issue>331</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7] Mun~ante,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Siena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kifetew</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.M.</given-names>
            ,
            <surname>Susi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Stade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.J.C.</given-names>
            ,
            <surname>Sey</surname>
          </string-name>
          , N.:
          <article-title>Gathering requirements for software con guration from the crowd</article-title>
          .
          <source>In: IEEE 25th International RE 2017 Workshops</source>
          , Lisbon, Portugal. pp.
          <volume>176</volume>
          {
          <issue>181</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O</given-names>
            <surname> zbek</surname>
          </string-name>
          , V., Umit Aln ac k, Koc,
          <string-name>
            <given-names>F.</given-names>
            , Akk l c, M.E.,
            <surname>Kas</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
          :
          <article-title>The impact of personality on technology acceptance: A study on smart phone users</article-title>
          .
          <source>Procedia - Social and Behavioral Sciences</source>
          <volume>150</volume>
          ,
          <volume>541</volume>
          {551 (sep
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Runeson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Host, M.:
          <article-title>Guidelines for conducting and reporting case study research in software engineering</article-title>
          .
          <source>Empirical Software Engineering</source>
          <volume>14</volume>
          (
          <issue>2</issue>
          ),
          <volume>131</volume>
          {
          <fpage>164</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Shaw</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Net promoter</article-title>
          .
          <source>Journal of Database Marketing &amp; Customer Strategy Management</source>
          <volume>15</volume>
          (
          <issue>3</issue>
          ),
          <volume>138</volume>
          {140 (Jun
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Suni-Lopez</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Condori-Fernandez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , Mun~ante, D.:
          <article-title>End-user perceptions on social sustainability in context-aware applications: Validation of an experiment design</article-title>
          .
          <source>In: 4th International Workshop on MEGSUS, ESEIW 2018 Workshops</source>
          , Oulu, Finland (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>West</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The psychology of security</article-title>
          .
          <source>Commun. ACM</source>
          <volume>51</volume>
          (
          <issue>4</issue>
          ),
          <volume>34</volume>
          {
          <fpage>40</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Wieringa</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Condori-Fernandez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daneva</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mutschler</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pastor</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Lessons learned from evaluating a checklist for reporting experimental and observational research</article-title>
          .
          <source>In: Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement</source>
          . pp.
          <volume>157</volume>
          {
          <issue>160</issue>
          (Sep
          <year>2012</year>
          ). https://doi.org/10.1145/2372251.2372279
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>