{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:23:24Z","timestamp":1725452604568},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1718377"],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["2020TL3X8X"],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2022,12]]},"abstract":"Abstract<\/jats:title>Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions. Then, requirements can be further extended, based on the analysis of the features of competing products available on the market. Understanding how this process takes place can help to identify the contribution of the different elicitation phases, thereby allowing requirements analysts to better distribute their resources. In this work, we empirically study in which way requirements get transformed from initial ideas into documented needs, and then evolve based on the inspiration coming from similar products. To this end, we select 30 subjects that act as requirements analysts, and we perform interview-based elicitation sessions with a fictional customer. After the sessions, the analysts produce a first set of requirements for the system. Then, they are required to search similar products in the app stores and extend the requirements, inspired by the identified apps. The requirements documented at each step are evaluated, to assess to which extent and in which way the initial idea evolved throughout the process. Our results show that only between 30% and 38% of the requirements produced after the interviews include content that can be fully traced to initial customer\u2019s ideas. The rest of the content is dedicated to new requirements, and up to 21% of it belongs to completely novel topics. Furthermore, up to 42% of the requirements inspired by the app stores cover additional features compared to the ones identified after the interviews. The results empirically show that requirements are not elicited in strict sense, but actually co-created through interviews, with analysts playing a crucial role in the process. In addition, we show evidence that app store-inspired elicitation can be particularly beneficial to complete the requirements.<\/jats:p>","DOI":"10.1007\/s00766-022-00383-7","type":"journal-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T21:02:29Z","timestamp":1661288549000},"page":"489-519","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["How do requirements evolve during elicitation? An empirical study combining interviews and app store analysis"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0636-5663","authenticated-orcid":false,"given":"Alessio","family":"Ferrari","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7922-4936","authenticated-orcid":false,"given":"Paola","family":"Spoletini","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Debnath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"383_CR1","doi-asserted-by":"publisher","unstructured":"Zowghi D, Coulin C (2005) In: Aurum, A., Wohlin, C. (eds.) Requirements elicitation: a survey of techniques, approaches, and tools, pp. 19\u201346. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-28244-0_2","DOI":"10.1007\/3-540-28244-0_2"},{"issue":"2","key":"383_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/TSE.2010.33","volume":"37","author":"O Dieste","year":"2010","unstructured":"Dieste O, Juristo N (2010) Systematic review and aggregation of empirical studies on elicitation techniques. IEEE Trans Softw Eng 37(2):283\u2013304","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"383_CR3","doi-asserted-by":"publisher","first-page":"2298","DOI":"10.1007\/s10664-016-9451-7","volume":"22","author":"DM Fern\u00e1ndez","year":"2017","unstructured":"Fern\u00e1ndez DM, Wagner S, Kalinowski M, Felderer M, Mafra P, Vetr\u00f2 A, Conte T, Christiansson M-T, Greer D, Lassenius C et al (2017) Naming the pain in requirements engineering. Empirical Softw Eng 22(5):2298\u20132338","journal-title":"Empirical Softw Eng"},{"issue":"2","key":"383_CR4","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s00766-020-00345-x","volume":"26","author":"C Palomares","year":"2021","unstructured":"Palomares C, Franch X, Quer C, Chatzipetrou P, L\u00f3pez L, Gorschek T (2021) The state-of-practice in requirements elicitation: an extended interview study at 12 companies. Require Eng 26(2):273\u2013299. https:\/\/doi.org\/10.1007\/s00766-020-00345-x","journal-title":"Require Eng"},{"key":"383_CR5","doi-asserted-by":"crossref","unstructured":"Sarro F, Al-Subaihin AA, Harman M, Jia Y, Martin W, Zhang Y (2015) Feature lifecycles as they spread, migrate, remain, and die in app stores. In: 2015 IEEE 23rd International requirements engineering conference (RE), pp. 76\u201385. IEEE","DOI":"10.1109\/RE.2015.7320410"},{"issue":"4","key":"383_CR6","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s00766-018-0303-4","volume":"24","author":"X Chen","year":"2019","unstructured":"Chen X, Zou Q, Fan B, Zheng Z, Luo X (2019) Recommending software features for mobile applications based on user interface comparison. Require Eng 24(4):545\u2013559","journal-title":"Require Eng"},{"key":"383_CR7","doi-asserted-by":"publisher","first-page":"9501","DOI":"10.1109\/ACCESS.2019.2891543","volume":"7","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu L, Liu H, Li S (2019) Information recommendation based on domain knowledge in app descriptions for improving the quality of requirements. IEEE Access 7:9501\u20139514","journal-title":"IEEE Access"},{"issue":"4","key":"383_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3344158","volume":"28","author":"H Jiang","year":"2019","unstructured":"Jiang H, Zhang J, Li X, Ren Z, Lo D, Wu X, Luo Z (2019) Recommending new features from mobile app descriptions. ACM Trans Softw Eng Methodol (TOSEM) 28(4):1\u201329","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"issue":"2","key":"383_CR9","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TSE.2019.2891715","volume":"47","author":"AA Al-Subaihin","year":"2019","unstructured":"Al-Subaihin AA, Sarro F, Black S, Capra L, Harman M (2019) App store effects on software engineering practices. IEEE Trans Software Eng 47(2):300\u2013319","journal-title":"IEEE Trans Software Eng"},{"issue":"3","key":"383_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s00766-016-0251-9","volume":"21","author":"W Maalej","year":"2016","unstructured":"Maalej W, Kurtanovi\u0107 Z, Nabil H, Stanik C (2016) On the automatic classification of app reviews. Requirements Eng 21(3):311\u2013331","journal-title":"Requirements Eng"},{"issue":"9","key":"383_CR11","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/TSE.2016.2630689","volume":"43","author":"W Martin","year":"2016","unstructured":"Martin W, Sarro F, Jia Y, Zhang Y, Harman M (2016) A survey of app store analysis for software engineering. IEEE Trans Software Eng 43(9):817\u2013847","journal-title":"IEEE Trans Software Eng"},{"issue":"6","key":"383_CR12","doi-asserted-by":"publisher","first-page":"3659","DOI":"10.1007\/s10664-019-09716-7","volume":"24","author":"N Jha","year":"2019","unstructured":"Jha N, Mahmoud A (2019) Mining non-functional requirements from app store reviews. Empir Softw Eng 24(6):3659\u20133695","journal-title":"Empir Softw Eng"},{"issue":"10","key":"383_CR13","first-page":"2199","volume":"31","author":"C Wang","year":"2019","unstructured":"Wang C, Daneva M, van Sinderen M, Liang P (2019) A systematic mapping study on crowdsourced requirements engineering using user feedback. J Softw: Evol Process 31(10):2199","journal-title":"J Softw: Evol Process"},{"key":"383_CR14","doi-asserted-by":"crossref","unstructured":"Ferrari A, Spoletini P, Donati B, Zowghi D, Gnesi S (2017) Interview review: detecting latent ambiguities to improve the requirements elicitation process. In: 2017 IEEE 25th International requirements engineering conference (RE), pp. 400\u2013405. IEEE","DOI":"10.1109\/RE.2017.15"},{"key":"383_CR15","doi-asserted-by":"crossref","unstructured":"Salger F (2013) Requirements reviews revisited: residual challenges and open research questions. In: 2013 21st IEEE International Requirements Engineering Conference (RE), pp. 250\u2013255. IEEE","DOI":"10.1109\/RE.2013.6636725"},{"issue":"3","key":"383_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s00766-019-00313-0","volume":"24","author":"M Bano","year":"2019","unstructured":"Bano M, Zowghi D, Ferrari A, Spoletini P, Donati B (2019) Teaching requirements elicitation interviews: An empirical study of learning from mistakes. Require Eng 24(3):259\u2013289","journal-title":"Require Eng"},{"issue":"2","key":"383_CR17","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00766-012-0163-2","volume":"19","author":"I Hadar","year":"2014","unstructured":"Hadar I, Soffer P, Kenzi K (2014) The role of domain knowledge in requirements elicitation via interviews: an exploratory study. Require Eng 19(2):143\u2013159. https:\/\/doi.org\/10.1007\/s00766-012-0163-2","journal-title":"Require Eng"},{"issue":"1","key":"383_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s10664-015-9416-2","volume":"22","author":"A Niknafs","year":"2017","unstructured":"Niknafs A, Berry DM (2017) The impact of domain knowledge on the effectiveness of requirements engineering activities. Empir Softw Eng 22(1):80\u2013133. https:\/\/doi.org\/10.1007\/s10664-015-9416-2","journal-title":"Empir Softw Eng"},{"issue":"3","key":"383_CR19","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00766-016-0249-3","volume":"21","author":"A Ferrari","year":"2016","unstructured":"Ferrari A, Spoletini P, Gnesi S (2016) Ambiguity and tacit knowledge in requirements elicitation interviews. Require Eng 21(3):333\u2013355","journal-title":"Require Eng"},{"issue":"4","key":"383_CR20","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s00766-020-00334-0","volume":"25","author":"A Ferrari","year":"2020","unstructured":"Ferrari A, Spoletini P, Bano M, Zowghi D (2020) SaPeer and ReverseSaPeer: teaching requirements elicitation interviews with role-playing and role reversal. Require Eng 25(4):417\u2013438","journal-title":"Require Eng"},{"issue":"2","key":"383_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s007660200004","volume":"7","author":"J Coughlan","year":"2002","unstructured":"Coughlan J, Macredie RD (2002) Effective communication in requirements elicitation: a comparison of methodologies. Requirements Eng 7(2):47\u201360","journal-title":"Requirements Eng"},{"key":"383_CR22","doi-asserted-by":"publisher","unstructured":"Davis A, Dieste O, Hickey A, Juristo N, Moreno AM (2006) Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review. In: 14th IEEE International requirements engineering conference (RE\u201906), pp. 179\u2013188. https:\/\/doi.org\/10.1109\/RE.2006.17","DOI":"10.1109\/RE.2006.17"},{"issue":"2","key":"383_CR23","first-page":"131","volume":"1","author":"A Distanont","year":"2012","unstructured":"Distanont A, Haapasalo H, Vaananen M, Lehto J et al (2012) The engagement between knowledge transfer and requirements engineering. Int J Manag Knowl Learn 1(2):131\u2013156","journal-title":"Int J Manag Knowl Learn"},{"issue":"3","key":"383_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3444689","volume":"54","author":"L Zhao","year":"2021","unstructured":"Zhao L, Alhoshan W, Ferrari A, Letsholo KJ, Ajagbe MA, Chioasca E-V, Batista-Navarro RT (2021) Natural language processing for requirements engineering: a systematic mapping study. ACM Comput Surv (CSUR) 54(3):1\u201341","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2","key":"383_CR25","first-page":"1","volume":"27","author":"J Dabrowski","year":"2022","unstructured":"Dabrowski J, Letier E, Perini A, Susi A (2022) Analysing app reviews for software engineering: a systematic literature review. Empir Softw Eng 27(2):1\u201363","journal-title":"Empir Softw Eng"},{"key":"383_CR26","doi-asserted-by":"publisher","unstructured":"Ferrari A, Spoletini P, Debnath S Replication package - How do requirements evolve during elicitation? An empirical study combining interviews and app store analysis. https:\/\/doi.org\/10.5281\/zenodo.6475039","DOI":"10.5281\/zenodo.6475039"},{"key":"383_CR27","doi-asserted-by":"publisher","unstructured":"Debnath S, Spoletini P, Ferrari A (2021) From ideas to expressed needs: an empirical study on the evolution of requirements during elicitation. In: 29th IEEE International requirements engineering conference, RE 2021, Notre Dame, IN, USA, September 20-24, 2021, pp. 233\u2013244. https:\/\/doi.org\/10.1109\/RE51729.2021.00028","DOI":"10.1109\/RE51729.2021.00028"},{"key":"383_CR28","doi-asserted-by":"publisher","unstructured":"Harker SDP, Eason KD, Dobson JE (1993) The change and evolution of requirements as a challenge to the practice of software engineering. In: [1993] Proceedings of the IEEE International Symposium on Requirements Engineering, pp. 266\u2013272. https:\/\/doi.org\/10.1109\/ISRE.1993.324847","DOI":"10.1109\/ISRE.1993.324847"},{"key":"383_CR29","doi-asserted-by":"publisher","unstructured":"Crowne M (2002) Why software product startups fail and what to do about it. evolution of software product development in startup companies. In: IEEE International engineering management conference, pp. 338\u2013343. https:\/\/doi.org\/10.1109\/IEMC.2002.1038454","DOI":"10.1109\/IEMC.2002.1038454"},{"key":"383_CR30","doi-asserted-by":"publisher","unstructured":"Grubb AM, Chechik M (2016) Looking into the crystal ball: Requirements evolution over time. In: 2016 IEEE 24th International Requirements Engineering Conference (RE), pp. 86\u201395. https:\/\/doi.org\/10.1109\/RE.2016.45. IEEE","DOI":"10.1109\/RE.2016.45"},{"issue":"14","key":"383_CR31","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/S0950-5849(03)00100-9","volume":"45","author":"D Zowghi","year":"2003","unstructured":"Zowghi D, Gervasi V (2003) On the interplay between consistency, completeness, and correctness in requirements evolution. Inf Softw Technol 45(14):993\u20131009. https:\/\/doi.org\/10.1016\/S0950-5849(03)00100-9","journal-title":"Inf Softw Technol"},{"issue":"3","key":"383_CR32","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s00766-021-00350-8","volume":"26","author":"AM Grubb","year":"2021","unstructured":"Grubb AM, Chechik M (2021) Formal reasoning for analyzing goal models that evolve over time. Require Eng 26(3):423\u2013457","journal-title":"Require Eng"},{"key":"383_CR33","doi-asserted-by":"publisher","unstructured":"Ali R, Dalpiaz F, Giorgini P, Silva Souza V (2011) Requirements evolution: From assumptions to reality 81:372\u2013382. https:\/\/doi.org\/10.1007\/978-3-642-21759-3_27","DOI":"10.1007\/978-3-642-21759-3_27"},{"key":"383_CR34","doi-asserted-by":"crossref","unstructured":"Hayes JH, Antoniol G, Gu\u00e9h\u00e9neuc Y-G Prereqir (2008) Recovering pre-requirements via cluster analysis. In: 2008 15th Working Conference on Reverse Engineering, pp. 165\u2013174. IEEE","DOI":"10.1109\/WCRE.2008.36"},{"key":"383_CR35","doi-asserted-by":"crossref","unstructured":"Fu B, Lin J, Li L, Faloutsos C, Hong J, Sadeh N (2013) Why people hate your app: Making sense of user feedback in a mobile app store. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1276\u20131284","DOI":"10.1145\/2487575.2488202"},{"key":"383_CR36","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.ins.2021.08.050","volume":"580","author":"H Liu","year":"2021","unstructured":"Liu H, Wang Y, Liu Y, Gao S (2021) Supporting features updating of apps by analyzing similar products in app stores. Inf Sci 580:129\u2013151","journal-title":"Inf Sci"},{"key":"383_CR37","doi-asserted-by":"crossref","unstructured":"Ferrari A, Spagnolo GO, Dell\u2019Orletta F (2013) Mining commonalities and variabilities from natural language documents. In: Proceedings of the 17th International Software Product Line Conference, pp. 116\u2013120","DOI":"10.1145\/2491627.2491634"},{"key":"383_CR38","doi-asserted-by":"crossref","unstructured":"Li Y, Schulze S, Saake G (2017) Reverse engineering variability from natural language documents: A systematic literature review. In: Proceedings of the 21st International Systems and Software Product Line Conference-Volume A, pp. 133\u2013142","DOI":"10.1145\/3106195.3106207"},{"key":"383_CR39","doi-asserted-by":"crossref","unstructured":"Davril J-M, Delfosse E, Hariri N, Acher M, Cleland-Huang J, Heymans P (2013) Feature model extraction from large collections of informal product descriptions. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pp. 290\u2013300","DOI":"10.1145\/2491411.2491455"},{"key":"383_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110669","volume":"168","author":"M Auch","year":"2020","unstructured":"Auch M, Weber M, Mandl P, Wolff C (2020) Similarity-based analyses on software applications: A systematic literature review. J Syst Softw 168:110669","journal-title":"J Syst Softw"},{"key":"383_CR41","doi-asserted-by":"publisher","unstructured":"Carre\u00f1o LVG, Winbladh K (2013) Analysis of user comments: an approach for software requirements evolution. In: 2013 35th International conference on software engineering (ICSE), pp. 582\u2013591. https:\/\/doi.org\/10.1109\/ICSE.2013.6606604","DOI":"10.1109\/ICSE.2013.6606604"},{"key":"383_CR42","doi-asserted-by":"crossref","unstructured":"Pagano D, Maalej W (2013) User feedback in the appstore: an empirical study. In: 2013 21st IEEE International requirements engineering conference (RE), pp. 125\u2013134 . IEEE","DOI":"10.1109\/RE.2013.6636712"},{"key":"383_CR43","doi-asserted-by":"publisher","unstructured":"Guzman E, Ibrahim M, Glinz M (2017) A little bird told me: Mining tweets for requirements and software evolution. In: 2017 IEEE 25th International requirements engineering conference (RE), pp. 11\u201320. https:\/\/doi.org\/10.1109\/RE.2017.88","DOI":"10.1109\/RE.2017.88"},{"key":"383_CR44","doi-asserted-by":"publisher","unstructured":"Khan J, Liu L, Wen L, Ali R (2019) Crowd intelligence in requirements engineering: Current status and future directions, pp. 245\u2013261. https:\/\/doi.org\/10.1007\/978-3-030-15538-4_18","DOI":"10.1007\/978-3-030-15538-4_18"},{"key":"383_CR45","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.is.2018.08.003","volume":"86","author":"I Morales-Ramirez","year":"2019","unstructured":"Morales-Ramirez I, Kifetew FM, Perini A (2019) Speech-acts based analysis for requirements discovery from online discussions. Inf Syst 86:94\u2013112. https:\/\/doi.org\/10.1016\/j.is.2018.08.003","journal-title":"Inf Syst"},{"issue":"1","key":"383_CR46","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MS.2005.16","volume":"22","author":"J Robertson","year":"2005","unstructured":"Robertson J (2005) Requirements analysts must also be inventors. IEEE Softw 22(1):48. https:\/\/doi.org\/10.1109\/MS.2005.16","journal-title":"IEEE Softw"},{"key":"383_CR47","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231945","author":"J Lemos","year":"2012","unstructured":"Lemos J, Alves C, Duboc L, Rodrigues G (2012) A systematic mapping study on creativity in requirements engineering. Proceed ACM Symposium on Appl Comput. https:\/\/doi.org\/10.1145\/2245276.2231945","journal-title":"Proceed ACM Symposium on Appl Comput"},{"key":"383_CR48","doi-asserted-by":"publisher","unstructured":"Maiden N, Jones S, Pitts IK, Neill R, Zachos K, Milne A (2010) Requirements engineering as creative problem solving: a research agenda for idea finding, pp. 57\u201366. https:\/\/doi.org\/10.1109\/RE.2010.16","DOI":"10.1109\/RE.2010.16"},{"key":"383_CR49","volume-title":"Handbook of creativity","author":"RJ Sternberg","year":"1999","unstructured":"Sternberg RJ (1999) Handbook of creativity. Cambridge University Press, Cambridge, UK"},{"issue":"3","key":"383_CR50","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.infsof.2008.09.002","volume":"51","author":"L Nguyen","year":"2009","unstructured":"Nguyen L, Shanks G (2009) A framework for understanding creativity in requirements engineering. Inf Softw Technol 51(3):655\u2013662. https:\/\/doi.org\/10.1016\/j.infsof.2008.09.002","journal-title":"Inf Softw Technol"},{"key":"383_CR51","doi-asserted-by":"publisher","unstructured":"Maiden N, Robertson S (2005) Integrating creativity into requirements processes: Experiences with an air traffic management system. In: 13th IEEE International Conference on Requirements Engineering (RE\u201905), pp. 105\u2013114. https:\/\/doi.org\/10.1109\/RE.2005.34","DOI":"10.1109\/RE.2005.34"},{"key":"383_CR52","doi-asserted-by":"publisher","unstructured":"Herrmann A, Mich L, Berry DM (2018) Creativity techniques for requirements elicitation: Comparing four-step epmcreate-based processes. In: 2018 IEEE 7th International workshop on empirical requirements engineering (EmpiRE), pp. 1\u20137. https:\/\/doi.org\/10.1109\/EmpiRE.2018.00008","DOI":"10.1109\/EmpiRE.2018.00008"},{"key":"383_CR53","doi-asserted-by":"publisher","unstructured":"Mahaux M, Nguyen L, Gotel O, Mich L, Mavin A, Schmid K (2013) Collaborative creativity in requirements engineering: analysis and practical advice. In: IEEE 7th International conference on research challenges in information Science (RCIS). https:\/\/doi.org\/10.1109\/RCIS.2013.6577678","DOI":"10.1109\/RCIS.2013.6577678"},{"key":"383_CR54","doi-asserted-by":"publisher","unstructured":"Grube PP, Schmid K (2008) Selecting creativity techniques for innovative requirements engineering. In: 2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering - Beyond Mere Descriptions and with More Fun and Games, pp. 32\u201336 . https:\/\/doi.org\/10.1109\/MERE.2008.6","DOI":"10.1109\/MERE.2008.6"},{"key":"383_CR55","doi-asserted-by":"publisher","unstructured":"Svensson RB, Taghavianfar M (2015) Selecting creativity techniques for creative requirements: an evaluation of four techniques using creativity workshops. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE), pp. 66\u201375. https:\/\/doi.org\/10.1109\/RE.2015.7320409","DOI":"10.1109\/RE.2015.7320409"},{"key":"383_CR56","doi-asserted-by":"publisher","unstructured":"Horkoff J, Maiden N, Lockerbie J (2015) Creativity and goal modeling for software requirements engineering. C &C \u201915, pp. 165\u2013168. ACM, New York, NY. https:\/\/doi.org\/10.1145\/2757226.2764544","DOI":"10.1145\/2757226.2764544"},{"key":"383_CR57","unstructured":"Horkoff J, Maiden NAM (2016) Creative leaf: a creative iStar modeling tool. In: Proceedings of the Ninth International I* Workshop. CEUR Workshop Proceedings, vol. 1674, pp. 25\u201330. CEUR-WS.org, Sun Site Central Europe"},{"key":"383_CR58","unstructured":"Dalpiaz F Requirements Data Sets (user Stories). http:\/\/dx.doi.org\/10.17632\/7zbk8zsd8y.1"},{"key":"383_CR59","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/07421222.2004.11045795","volume":"21","author":"M Pitts","year":"2004","unstructured":"Pitts M, Browne G (2004) Stopping behavior of systems analysts during information requirements elicitation. J Manag Inf Syst 21:203\u2013226. https:\/\/doi.org\/10.1080\/07421222.2004.11045795","journal-title":"J Manag Inf Syst"},{"key":"383_CR60","doi-asserted-by":"crossref","unstructured":"Gervasi V, Gacitua R, Rouncefield M, Sawyer P, Kof L, Ma L, Piwek P, De\u00a0Roeck A, Willis A, Yang H, et al. (2013) Unpacking tacit knowledge for requirements engineering. In: Managing Requirements Knowledge, pp. 23\u201347. Springer, Berlin Heidelberg","DOI":"10.1007\/978-3-642-34419-0_2"},{"key":"383_CR61","doi-asserted-by":"publisher","unstructured":"Sutcliffe A, Sawyer P (2013) Requirements elicitation: towards the unknown unknowns. In: 2013 21st IEEE International requirements engineering conference (RE), pp. 92\u2013104. https:\/\/doi.org\/10.1109\/RE.2013.6636709","DOI":"10.1109\/RE.2013.6636709"},{"issue":"9","key":"383_CR62","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1016\/j.jss.2012.04.075","volume":"85","author":"C Pacheco","year":"2012","unstructured":"Pacheco C, Garcia I (2012) A systematic literature review of stakeholder identification methods in requirements elicitation. J Syst Softw 85(9):2171\u20132181. https:\/\/doi.org\/10.1016\/j.jss.2012.04.075","journal-title":"J Syst Softw"},{"issue":"12","key":"383_CR63","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/32.106986","volume":"17","author":"JCSP Leite","year":"1991","unstructured":"Leite JCSP, Freeman PA (1991) Requirements validation through viewpoint resolution. IEEE Trans Software Eng 17(12):1253\u20131269","journal-title":"IEEE Trans Software Eng"},{"key":"383_CR64","doi-asserted-by":"crossref","unstructured":"Glinz M (2007) On non-functional requirements. In: 15th IEEE International Requirements Engineering Conference (RE 2007), pp. 21\u201326. IEEE","DOI":"10.1109\/RE.2007.45"},{"key":"383_CR65","unstructured":"Chung L, Nixon BA, Yu E, Mylopoulos J (2012) Non-functional Requirements in Software Engineering vol. 5, Springer Science & Business Media"},{"key":"383_CR66","unstructured":"Baricco A (2019) The Game, Einaudi Editore"},{"key":"383_CR67","doi-asserted-by":"crossref","unstructured":"Dumitru H, Gibiec M, Hariri N, Cleland-Huang J, Mobasher B, Castro-Herrera C, Mirakhorli M (2011) On-demand feature recommendations derived from mining public product descriptions. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 181\u2013190","DOI":"10.1145\/1985793.1985819"},{"key":"383_CR68","doi-asserted-by":"crossref","unstructured":"Slavin R, Wang X, Hosseini MB, Hester J, Krishnan R, Bhatia J, Breaux TD, Niu J (2016)Toward a framework for detecting privacy policy violations in android application code. In: Proceedings of the 38th International conference on software engineering, pp. 25\u201336","DOI":"10.1145\/2884781.2884855"},{"key":"383_CR69","doi-asserted-by":"publisher","first-page":"35429","DOI":"10.1109\/ACCESS.2020.2974911","volume":"8","author":"M Hatamian","year":"2020","unstructured":"Hatamian M (2020) Engineering privacy in smartphone apps: a technical guideline catalog for app developers. IEEE Access 8:35429\u201335445","journal-title":"IEEE Access"},{"issue":"1","key":"383_CR70","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1080\/09537325.2019.1634804","volume":"32","author":"M Cristofaro","year":"2020","unstructured":"Cristofaro M (2020) E-business evolution: an analysis of mobile applications\u2019 business models. Technol Anal Strategic Manag 32(1):88\u2013103","journal-title":"Technol Anal Strategic Manag"},{"issue":"3","key":"383_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3241743","volume":"27","author":"K-J Stol","year":"2018","unstructured":"Stol K-J, Fitzgerald B (2018) The ABC of software engineering research. ACM Trans Software Eng Methodol (TOSEM) 27(3):1\u201351","journal-title":"ACM Trans Software Eng Methodol (TOSEM)"},{"key":"383_CR72","doi-asserted-by":"crossref","unstructured":"Svahnberg M, Aurum A, Wohlin C (2008) Using students as subjects-an empirical evaluation. In: Proceedings of the Second ACM-IEEE International symposium on empirical software engineering and measurement, pp. 288\u2013290","DOI":"10.1145\/1414004.1414055"},{"issue":"1","key":"383_CR73","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/s10664-017-9523-3","volume":"23","author":"D Falessi","year":"2018","unstructured":"Falessi D, Juristo N, Wohlin C, Turhan B, M\u00fcnch J, Jedlitschka A, Oivo M (2018) Empirical software engineering experts on the use of students and professionals in experiments. Empir Softw Eng 23(1):452\u2013489","journal-title":"Empir Softw Eng"},{"key":"383_CR74","doi-asserted-by":"crossref","unstructured":"Salman I, Misirli AT, Juristo N (2015) Are students representatives of professionals in software engineering experiments? In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 666\u2013676. IEEE","DOI":"10.1109\/ICSE.2015.82"},{"key":"383_CR75","first-page":"103","volume":"3","author":"H Abdi","year":"2007","unstructured":"Abdi H et al (2007) Bonferroni and Sid\u00e1k corrections for multiple comparisons. Encycloped Measure Statistics 3:103\u2013107","journal-title":"Encycloped Measure Statistics"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-022-00383-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00766-022-00383-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-022-00383-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T14:29:08Z","timestamp":1669300148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00766-022-00383-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":75,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["383"],"URL":"https:\/\/doi.org\/10.1007\/s00766-022-00383-7","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"24 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}