<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Intl. Workshop on Agile Methods for Information Systems Engineering, June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Adopted in Agile Software Development</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Palash Bera</string-name>
          <email>palash.bera@slu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabiano Dalpiaz</string-name>
          <email>f.dalpiaz@uu.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yves Wautelet</string-name>
          <email>yves.wautelet@KU</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Agility in Information Systems Engineering</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Research Centre for Information Systems Engineering (LIRIS), KU Leuven</institution>
          ,
          <addr-line>Warmoesberg 26, 1000 Brussel</addr-line>
          ,
          <country country="BE">Belgium</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Richard A. Chaifetz School of Business, Saint Louis University</institution>
          ,
          <addr-line>3674 Lindell Blvd, St. Louis, MO 631086</addr-line>
          ,
          <country country="US">United States</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Utrecht University, Buys Ballot Laboratory</institution>
          ,
          <addr-line>Princetonplein 5, De Uithof, 3584CC Utrecht</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>06</volume>
      <issue>2022</issue>
      <abstract>
        <p>Roughly speaking, agile software development methods include the adoption of an iterative life cycle and of special kinds of artifacts and practices. The life cycle is the result of years of improvement in software development starting from waterfall, going through planned long iterations like in the Rational Unified Process, to finally end-up with short, unplanned sprints. The used artifacts and practices nevertheless deserve more research in order to measure development performance, to analyze their optimal uses, and to determine the opportunity of their integration in a custom agile process. This paper highlights the need for challenging the artifacts and practices from a scientific standpoint. While doing so, we briefly discusses the research conducted in the field user stories-that have often been studied in the literature in combination with conceptual modeling-, before outlining the first edition of the Agil-ISE workshop and discussing future directions.</p>
      </abstract>
      <kwd-group>
        <kwd>agile development</kwd>
        <kwd>agile practices</kwd>
        <kwd>scalability in agile</kwd>
        <kwd>user stories</kwd>
        <kwd>Agil-ISE</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        CEUR
Workshop
Proceedings
next sprint’s content only. In parallel, various artifacts and techniques (often called practices)
have been developed and been badged as compliant to agile development. Some of these (e.g.,
pair development, refactoring, user stories, etc.) have been de facto integrated into some agile
methods’ basic description, but no method integrates them all, and only the ones relevant or
needed ones should be integrated by the development team in a custom agile project [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>
        The success of Scrum and other agile software development methods used in software
development has also contributed to the popularization of the concept of agility. In parallel,
non-software development teams have started to adapt Scrum to general projects. Also, the
trend of agility has gained more abstract levels than the development of a software project only,
and entire organizations started to adopt agility as a way to adapt to environmental change; this
practice is known as enterprise, organizational or strategic agility [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The present paper and
workshop focus only on agility as a property of software engineering techniques and projects.
      </p>
      <p>
        Very handy for innovative software projects of limited size, agile methods have been facing
scalability issues. To deal with such issues, the amount of efort related to project management
has risen within the core description of agile methods. eXtreme Programming (XP) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] used a
very simple iterative canvas and was mostly focused on the adoption of a set of practices. Later
on, Scrum [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] complexified the canvas with an ex-ante sprint, a project backlog, sprint backlogs,
etc. Ultimately, the Scaled Agile Framework (SAFe) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] brings management and coordination
practices to a much more complex level by prescribing Scrum teams coordination through a
metaphor inspired by train transportation: parallel teams start and stop a Sprint when the train
is in the station (so at the same moment) only.
      </p>
      <p>Capitalizing on the agile trend, gigantic frameworks including complex project management
did appear, including lots of diferent agile-related and trendy software engineering practices and
intertwining multiple decision levels. These frameworks have gained significant popularity in
the industry. Unfortunately, these popular techniques have gained adoption without a reflection
on their nature and the development needs, thereby creating environments where the overall
software project agility is threatened . This leads to questions such as: When is agility hampered
by too much project management, team coordination or documentation? How much of these
can be considered as just enough to be agile yet dealing with unavoidable constraints? We
argue that we need to rethink what agility truly means, and how agile artifacts and practices
can be used and integrated in practice for delivering it.</p>
      <p>
        Lots of research in the information systems community has focused on the results and
satisfaction of users of software created from agile-based projects [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. More limited research,
however, challenges the intrinsic agile nature of individual artifacts or practices as well as the
impact of their integration into the development environment. By conducting
engineeringoriented studies, a more significant (i.e., agile) use can be made of the agile artifacts and practices.
As we show in Sec. 2, conceptual modeling has been used as an approach to complement agile
artifacts and practices, notably in the context of user stories. This approach allows to identify
and characterize the fundamental characteristics of artifacts and practices, their interlinking,
and the interaction with the software development environment at large. Also, this enables
further supporting the use of the agile artifacts once instantiated, in order to gather empirical
evidence of the efectiveness in practice.
      </p>
      <p>This paper focuses on an overview of the development of user stories as an example of the
research that has been conducted following the path described above. This is meant to be
illustrative rather than exhaustive. The Agil-ISE workshop aims to give voice to and to stimulate
discussion between researchers studying, questioning or developing agile artifacts and practices
through an approach following the precepts of science.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Samples of Research at the Intersection of User Stories and</title>
    </sec>
    <sec id="sec-3">
      <title>Conceptual Modeling</title>
      <p>
        Considering AI based technologies such as Natural Language Processing (NLP), several research
initiatives have been conducted recently. Many of these projects focus on the generation of
conceptual models from unstructured text of natural language requirements or structured
requirements (e.g., user stories). Honkisz et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] proposed a spreadsheet-based technique that
converts unstructured textual requirements to semi-structured format to generate process
models. Caporale [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] developed a tool that uses a predefined sentence template (“If [CONDITION],
then I do [ACTIVITY]”) to derive process models. Herchi and Abdesselam [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] automated the
transformation of textual requirements to UML class diagrams using NLP and domain ontology.
As requirements are often written in natural language and not in user stories, Vemuri et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
developed a probabilistic-based algorithm that identifies actors and use cases by learning from
the patterns in requirements.
      </p>
      <p>
        Lucassen, Robeer and colleagues [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] developed a NLP heuristics based tool, called Visual
Narrator, that automatically generates conceptual domain model from a collection of user
stories. Based on the work of [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], Mesquita et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] introduced an automated tool (US2Star)
to convert a set of user stories to i* goal models. Gunes and Aydemir [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] proposed NLP-based
techniques to extract who (role), what (action, object), and benefit information from the user
stories and develop goal models. Elallauoi et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] created algorithm to automatically generate
use case diagrams from user stories. Using NLP, the algorithm identifies the use case concepts
(i.e., actor, use case and association) from diferent parts of the user stories. A similar approach
was developed by Azzazi [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] where user stories were segmented by the use of NLP and these
segments were assigned to actors, use cases and associations.
      </p>
      <p>
        Wautelet et al. [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ] created a reference canvas and algorithms to produce a goal-based
representation and functional decomposition (called the rationale tree) out of user stories. The
rationale tree can be mapped to agent-oriented concepts to support the forward engineering
transformation process. Lucassen et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] proposed the Quality User Story framework for
assessing the syntactic, semantic, and pragmatic quality of a collection of user stories. Part
of this framework is supported by an NLP-based tool called AQUSA. Finally, Snoeck et al.
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] build-up an entire software architecture out of a set of user stories and Behavior-Driven
Development (BDD) scenarios through a set of well defined rules.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Relevant Research Venues</title>
      <p>Agil-ISE has been conceived as a response to the lack of a dedicated venue for discussing the
roots of agile artifacts and practices within the engineering of software systems. To better
characterize its positioning in the research landscape, we provide an overview of some related
events that focus on the themes of Agil-ISE.</p>
      <p>The International Conference on Agile Software Development , also known as the eXtreme
Programming (XP) conference, is a large event that mixes practice with research under the
umbrella of the Agile Alliance. Agil-ISE aims to kick-start the discussion around agility in the
information systems community and encourages the fundamental study and questioning of
agile artifacts and practices prior to their application in a real-life environment. This is largely
disconnected from the XP conference community which generally speaking focuses more on
the practicality of approaches.</p>
      <p>
        At CAISE’21, the International Workshop on Model-driven Organizational and Business Agility
emerged as a dedicated outlet for discussing aspects regarding agility of an organization.
This difers from the scope of Agil-ISE, which is not interested in the agile practices of an
organization as a whole, but is rather concerned with agile artifacts and practices for information
systems engineering. These two workshops ofer complementary perspectives on agility within
the CAiSE community. Thanks to its focus at the intersection of information systems and
engineering approaches [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], CAiSE is the most suitable venue that can serve as a hub for
discussions around the Agil-ISE topics.
      </p>
      <p>
        There are related workshops that are co-located with requirements engineering conferences,
but they do not focus on agility as a goal to attain for software development. Some of these
workshops also look into how novel technologies, in particular AI, such as in the Artificial
Intelligence and Requirements Engineering workshop [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] at the IEEE International Requirements
Engineering conference, and the Natural Language Processing for Requirements Engineering
workshop [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] at the International Working Conference on Requirements Engineering: Foundation
for Software Quality . Neither of these, however, have a focus on on methods, artifacts, and
techniques used in agile information systems engineering.
      </p>
    </sec>
    <sec id="sec-5">
      <title>4. The First Edition of Agil-ISE</title>
      <p>The first edition of Agil-ISE ( https://agilise.github.io/2022/) was co-located with the 34th
International Conference on Advanced Information Systems Engineering, and it took place in
the afternoon of June 6th, 2022. We solicited submissions of short papers to reflect ongoing
research in the field.</p>
      <sec id="sec-5-1">
        <title>4.1. Workshop’s Topics of Interest</title>
        <p>The topics of interest that we defined for the first edition of the workshop aimed to provide
a comprehensive view on agile information systems engineering, with a focus on artifacts,
methods, automation, and empirical work. The non-exhaustive list of topics includes:
• Artifacts in agile ISE
• Techniques for using agile ISE artifacts
• Novel methods for agile ISE
• Conceptual models for agile ISE
• Empirical studies on ISE practices
• Automation in agile ISE, including AI, ML, NLP
• Cognitive aspects of agile ISE (e.g., shared understanding)
• Experience with transition to agile methods in ISE</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Paper Selection Process</title>
        <p>Agil-ISE 2022 featured six accepted papers, which were selected from seven submissions. Each
of the papers that were presented at the workshop were reviewed by three members of the
program committee, and the decisions were taken by the workshop co-organizers based on the
reviewers’ score. The program committee of Agil-ISE 2022 consists of the following members:
• Pär Ågerfalk, Uppsala University, Sweden
• Fatma Başak Aydemir, Boğaziçi University, Turkey
• Sjaak Brinkkemper, Utrecht University, Netherlands
• Maya Daneva, University of Twente, Netherlands
• Fabian Gilson, University of Canterbury, New Zealand
• Samedi Heng, Université de Liège, Belgium
• Soreangsey Kiv, UCLouvain, Belgium
• Jil Klünder, Leibniz Universität Hannover, Germany
• Marco Kuhrmann, Reutlingen University, Germany
• Isabelle Mirbel, Université Côte d’Azur, France
• Rahul Mohanani, Indraprastha Institute of Information Technology, India
• Sridhar Nerur, University of Texas at Arlington, USA
• Stephan Poelmans, KU Leuven, Belgium
• Marcela Ruiz, Zurich University of Applied Sciences, Switzerland
• Binny Samuel, University of Cincinnati, USA
• Thiago Rocha Silva, University of Southern Denmark, Denmark
• Konstantinos Tsilionis, KU Leuven, Belgium</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3. Workshop Program</title>
        <p>The program included two sessions. The first session focused on development methods, and it
included three presentations after the workshop introduction:</p>
        <sec id="sec-5-3-1">
          <title>Agility in Conversational Systems Engineering: Can’t we just talk instead of creating</title>
          <p>all these artefacts? The keynote address by Sjaak Brinkkemper (Utrecht University),
engaged the audience to reflect on whether there is still a need to document the IS
engineering process, or whether the automated analysis of conversations could replace
the artifacts we currently create.</p>
        </sec>
        <sec id="sec-5-3-2">
          <title>Rapid Software Prototyping from Business Artifacts. This paper by Wahler and col</title>
          <p>leagues argue for the role of model-driven engineering in the context of agile information
systems engineering. They study whether business artifacts such as spreadsheets can be
a starting point to automatically generate a prototype.</p>
          <p>Watch your (Development) Steps. De Brock’s position paper sketches an approach for
integrating requirements engineering with agile software development. The proposed
method, which focuses on functional requirements, combines natural language and
graphical notations into an end-to-end approach from user wishes to implementation.</p>
          <p>
            The second session focuses on the study of notations, with a strong focus on user stories [
            <xref ref-type="bibr" rid="ref26">26</xref>
            ],
which are the most used notation for expressing requirements in agile software development [
            <xref ref-type="bibr" rid="ref27">27</xref>
            ].
This session included four presentations and a workshop wrap-up session:
          </p>
        </sec>
        <sec id="sec-5-3-3">
          <title>On Identifying Similar User Stories to Support Agile Estimation based on Historical</title>
          <p>Data. Duszkiewicz and colleagues propose initial steps toward the construction of a tool
that automatically estimates the efort for implementing a user story based on similar
user stories that can be found in previous projects.</p>
        </sec>
        <sec id="sec-5-3-4">
          <title>Controlled Experiments on User Stories’ Modeling: Past, Present, and Future. Tsilionis</title>
          <p>and colleagues review the existing experiments that study the relationship between user
stories and conceptual modeling. Based on the past experience of the community, the
paper puts forward a planned experiment concerning ambiguity in user stories.</p>
        </sec>
        <sec id="sec-5-3-5">
          <title>The Efectiveness of Conceptual Models Auto-generated from a Set of User Stories</title>
        </sec>
        <sec id="sec-5-3-6">
          <title>Written as BDD Scenarios: A Proposed Study. Gupta and Poels describe and illus</title>
          <p>trate their research concerning the automated generation, via NLP tools, of conceptual
models from user stories complemented with acceptance criteria.</p>
        </sec>
        <sec id="sec-5-3-7">
          <title>Building a Software Architecture out of User Stories and BDD Scenarios: Research</title>
          <p>Agenda. Heng and colleagues propose techniques for transforming user stories and BDD
scenarios to diferent types of agent architectures, and to object-oriented architectures,
with the goal of investigating the transition from requirements to architectures.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion and Outlook</title>
      <p>This paper motivated the importance of challenging agile artifacts and practices in a scientific
way and introduced the Agil-ISE workshop, which aims to serve as a community building and
gathering event for researchers in the years to come.</p>
      <p>
        The evolution of the workshop topics will depend on the research conducted by the
community. We will nevertheless continue to promote the fundamental study and questioning of agile
artifacts and practices. For now, we envision that a few directions will play an increasingly
prominent role:
• Conceptual frameworks. While the information systems community (within the umbrella
of the Association for Information Systems: https://aisnet.org/) has a strong emphasis
on theories (see, e.g., [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]), researchers in information systems engineering take a more
practical approach in which technological innovation takes the priority, as shown in
Section 2. We invite the Agil-ISE community to conduct research towards conceptual
frameworks and theories on top of which tools and technologies can be built;
• Informal artifacts. Two principles of the agile manifesto are “Individuals and interactions
over processes and tools” and “Working software over comprehensive documentation”.
These principles are challenged by scaled agile frameworks such as SAFe, which ofer
heavy methodological guidance. We expect the Agil-ISE community to study how agile
principles can be maintained in scaled projects by making efective use the informal
artifacts (user story maps, whiteboard sketches, Kanban boards, …) that are created;
• Advanced AI techniques. The advancements in AI (led by the quick progress in machine
and deep learning) are not going to stop, and they will inevitably shape the research in the
Agil-ISE field. We expect the use of these techniques not only to support the tasks listed
in Section 2, but also to enable information retrieval using communication modalities
that difer from pure text, e.g., informal diagrams and conversations.
      </p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>We would like to thank Samedi Heng for setting up and for maintaining the workshop’s website,
our program committee members for their diligent and thorough work, and Geert Poels for
initiating the conversation around organizing this workshop at CAiSE’22.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fowler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Highsmith</surname>
          </string-name>
          , et al.,
          <article-title>The agile manifesto</article-title>
          ,
          <source>Software development 9</source>
          (
          <year>2001</year>
          )
          <fpage>28</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Eilers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Simmert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Peters</surname>
          </string-name>
          ,
          <article-title>Doing agile vs. being agile-understanding their efects to improve agile work</article-title>
          ,
          <source>in: Proc. of the International Conference on Information Systems</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wautelet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Poelmans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kolp</surname>
          </string-name>
          ,
          <article-title>Using an ontology for systematic practice adoption in agile methods: Expert system and practitioners-based validation</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>195</volume>
          (
          <year>2022</year>
          )
          <fpage>116520</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Denning</surname>
          </string-name>
          ,
          <article-title>The next frontier for Agile: Strategic management</article-title>
          ,
          <source>Strategy &amp; Leadership</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Beck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hendrickson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fowler</surname>
          </string-name>
          ,
          <article-title>Planning extreme programming</article-title>
          ,
          <source>Addison-Wesley Professional</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Schwaber</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Sutherland,</surname>
          </string-name>
          <article-title>The scrum guide</article-title>
          ,
          <source>Scrum Alliance</source>
          <volume>21</volume>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Richard</surname>
          </string-name>
          , D. Lefingwell,
          <article-title>Safe 5.0 distilled: Achieving business agility with the scaled agile framework</article-title>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Diegmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dreesen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Binzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rosenkranz</surname>
          </string-name>
          ,
          <article-title>Journey towards agility: Three decades of research on agile information systems development</article-title>
          ,
          <source>in: Proc. of the International Conference on Information Systems</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Honkisz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kluza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Wiśniewski</surname>
          </string-name>
          ,
          <article-title>A concept for generating business process models from natural language description</article-title>
          ,
          <source>in: Proc. of the International Conference on Knowledge Science, Engineering and Management</source>
          , Springer,
          <year>2018</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Caporale</surname>
          </string-name>
          ,
          <article-title>A tool for natural language oriented business process modeling</article-title>
          , in: C.
          <string-name>
            <surname>Hochreiner</surname>
          </string-name>
          , S. Schulte (Eds.),
          <source>Proc. of the ZEUS Workshop</source>
          , volume
          <volume>1562</volume>
          ,
          <string-name>
            <surname>CEUR</surname>
          </string-name>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Herchi</surname>
          </string-name>
          , W. Abdessalem,
          <article-title>From user requirements to uml class diagram</article-title>
          ,
          <source>in: Proc. of the International Conference on Computer Related Knowledge</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vemuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fathi</surname>
          </string-name>
          ,
          <article-title>Automated use case diagram generation from textual user requirement documents</article-title>
          ,
          <source>in: Proc. of the Canadian Conference on Electrical and Computer Engineering</source>
          , IEEE,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lucassen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Robeer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. M. E. Van Der Werf</surname>
          </string-name>
          , S. Brinkkemper,
          <article-title>Extracting conceptual models from user stories with visual narrator</article-title>
          ,
          <source>Requirements Engineering</source>
          <volume>22</volume>
          (
          <year>2017</year>
          )
          <fpage>339</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jaqueira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lucena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alencar</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. M.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Aranha</surname>
          </string-name>
          ,
          <article-title>Using i* models to enrich user stories</article-title>
          ,
          <source>in: Proc. of the International i* Workshop</source>
          , volume CEUR
          <volume>978</volume>
          ,
          <year>2013</year>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Mesquita</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jacqueira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Agra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lucena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alencar</surname>
          </string-name>
          ,
          <article-title>Us2startool: Generation i* models from user stories</article-title>
          ,
          <source>in: Proc. of the International i* Workshop</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Gunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Aydemir</surname>
          </string-name>
          ,
          <article-title>Automated goal model extraction from user stories using nlp</article-title>
          ,
          <source>in: Proc. of the IEEE International Requirements Engineering Conference</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Elallaoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nafil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Touahni</surname>
          </string-name>
          ,
          <article-title>Automatic transformation of user stories into UML use case diagrams using NLP techniques</article-title>
          ,
          <source>Procedia Computer Science</source>
          <volume>130</volume>
          (
          <year>2018</year>
          )
          <fpage>42</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Azzazi</surname>
          </string-name>
          ,
          <article-title>A framework using NLP to automatically convert user-stories into use cases in software projects</article-title>
          ,
          <source>International Journal of Computer Science and Network Security</source>
          <volume>17</volume>
          (
          <year>2017</year>
          )
          <fpage>71</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wautelet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kolp</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Mirbel</surname>
          </string-name>
          ,
          <article-title>Unifying and extending user story models</article-title>
          ,
          <source>in: Proc. of the International Conference on Advanced Information Systems Engineering</source>
          , volume
          <volume>8484</volume>
          <source>of LNCS</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>211</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wautelet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Kolp, User-story driven development of multi-agent systems: A process fragment for agile methods</article-title>
          ,
          <source>Computer Languages, Systems Structures</source>
          <volume>50</volume>
          (
          <year>2017</year>
          )
          <fpage>159</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lucassen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M. E. van der</given-names>
            <surname>Werf</surname>
          </string-name>
          , S. Brinkkemper,
          <article-title>Improving agile requirements: the Quality User Story framework and tool</article-title>
          , Requirements engineering
          <volume>21</volume>
          (
          <year>2016</year>
          )
          <fpage>383</fpage>
          -
          <lpage>403</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Snoeck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wautelet</surname>
          </string-name>
          ,
          <string-name>
            <surname>Agile</surname>
            <given-names>MERODE</given-names>
          </string-name>
          :
          <article-title>A model-driven software engineering method for user-centric and value-based development</article-title>
          ,
          <source>Software and Systems Modeling</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jarke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Pham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Klamma</surname>
          </string-name>
          ,
          <article-title>Evolution of the caise author community: A social network analysis, in: Seminal contributions to information systems engineering</article-title>
          , Springer,
          <year>2013</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <article-title>Requirements engineering in the days of artificial intelligence</article-title>
          ,
          <source>IEEE Software 37</source>
          (
          <year>2020</year>
          )
          <fpage>7</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ferrari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Franch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Palomares</surname>
          </string-name>
          ,
          <article-title>Natural language processing for requirements engineering: The best is yet to come</article-title>
          ,
          <source>IEEE software 35</source>
          (
          <year>2018</year>
          )
          <fpage>115</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Cohn</surname>
          </string-name>
          ,
          <article-title>User stories applied: For agile software development</article-title>
          ,
          <string-name>
            <surname>Addison-Wesley Professional</surname>
          </string-name>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lucassen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dalpiaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M. E. van der</given-names>
            <surname>Werf</surname>
          </string-name>
          , S. Brinkkemper,
          <article-title>The use and efectiveness of user stories in practice</article-title>
          ,
          <source>in: Proc. of the International Working Conference on Requirements Engineering: Foundation for Software Quality</source>
          , Springer,
          <year>2016</year>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>222</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>R.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <article-title>Evaluating and developing theories in the information systems discipline</article-title>
          ,
          <source>Journal of the Association for Information Systems</source>
          <volume>13</volume>
          (
          <year>2012</year>
          )
          <article-title>2</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>