The wide usage of open source software (OSS) results in an increase of bug data forming an integral part of the extensive data ecosystem. This bug report data needs to be analyzed for bug fixing and prediction of various important attributes like bug severity, priority, fix time, assignees, etc. The increased volume of bug data and different bug reporters from different geographical locations make veracity an important concern. We assume that the bug reports (i.e., different bug attributes) reported in software bug repositories are trustworthy during the bug triaging process. In reality, the bug report data are not trustworthy regarding various aspects like integrity, authenticity, and trusted origin as the bugs are reported by users who may or may not have proper knowledge of the software. In this paper, we proposed entropy-based models for veracity estimation of different bug attributes.<\/p>","DOI":"10.4018\/ijossp.315280","type":"journal-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T20:58:24Z","timestamp":1670619504000},"page":"1-21","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Veracity of Software Bug Reports using Entropy-based Measures"],"prefix":"10.4018","volume":"13","author":[{"given":"Madhu","family":"Kumari","sequence":"first","affiliation":[{"name":"Delhi College of Arts and Commerce, University of Delhi, India"}]},{"given":"V. B.","family":"Singh","sequence":"additional","affiliation":[{"name":"Jawaharlal Nehru University, India"}]},{"given":"Meera","family":"Sharma","sequence":"additional","affiliation":[{"name":"Swami Shraddhanand College, University of Delhi, India"}]}],"member":"2432","reference":[{"key":"IJOSSP.315280-0","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306337"},{"key":"IJOSSP.315280-1","doi-asserted-by":"crossref","unstructured":"Asur, S., & Huberman, B. A. (2010, August). Predicting the future with social media. In 2010 IEEE\/WIC\/ACM international conference on web intelligence and intelligent agent technology (Vol. 1, pp. 492-499). IEEE.","DOI":"10.1109\/WI-IAT.2010.63"},{"key":"IJOSSP.315280-2","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985472"},{"key":"IJOSSP.315280-3","doi-asserted-by":"publisher","DOI":"10.4018\/jossp.2012040103"},{"key":"IJOSSP.315280-4","doi-asserted-by":"publisher","DOI":"10.1109\/CONSEG.2012.6349519"},{"key":"IJOSSP.315280-5","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-014-0226-5"},{"key":"IJOSSP.315280-6","first-page":"387","article-title":"Linguistic predictors of rumor veracity on the internet.","volume":"Vol. 1","author":"A. Y.Chua","year":"2016","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists"},{"key":"IJOSSP.315280-7","unstructured":"Chung, S., & Liu, S. (2011). Predicting stock market fluctuations from Twitter. Academic Press."},{"key":"IJOSSP.315280-8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70739"},{"key":"IJOSSP.315280-9","unstructured":"Dev, D. (2015). Big data Analytics \u2013 what is that?http:\/\/hadooptutorials.co.in\/tutorials\/hadoop\/big-data-analytics-whatis-that.html"},{"key":"IJOSSP.315280-10","unstructured":"Dungs, S., Aker, A., Fuhr, N., & Bontcheva, K. (2018, August). Can rumour stance alone predict veracity? In Proceedings of the 27th International Conference on Computational Linguistics (pp. 3360-3370). Academic Press."},{"key":"IJOSSP.315280-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"IJOSSP.315280-12","doi-asserted-by":"publisher","DOI":"10.1145\/1808920.1808933"},{"key":"IJOSSP.315280-13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220566"},{"key":"IJOSSP.315280-14","doi-asserted-by":"publisher","DOI":"10.3390\/e20050372"},{"key":"IJOSSP.315280-15","doi-asserted-by":"crossref","unstructured":"Hassan, A. E. (2009, May). Predicting faults using the complexity of code changes. In 2009 IEEE 31st international conference on software engineering (pp. 78-88). IEEE. http:\/\/bugs.eclipse.org\/bugs\/ http:\/\/bugzilla.mozilla.orghttps:\/\/bz.apache.org\/ooo\/","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"IJOSSP.315280-16","doi-asserted-by":"crossref","unstructured":"Hutton, L., & Henderson, T. (2015). Making social media research reproducible. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 9, No. 4, pp. 2-7). AAAI.","DOI":"10.1609\/icwsm.v9i4.14685"},{"key":"IJOSSP.315280-17","doi-asserted-by":"publisher","DOI":"10.1109\/RAISE.2012.6227962"},{"key":"IJOSSP.315280-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.010"},{"key":"IJOSSP.315280-19","unstructured":"Kamavaram, S., & Goseva-Popstojanova, K. (2002, November). Entropy as a measure of uncertainty in software reliability. In 13th Int\u2019l Symp. Software Reliability Engineering (pp. 209-210). Academic Press."},{"key":"IJOSSP.315280-20","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1230-3"},{"key":"IJOSSP.315280-21","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2016.7425811"},{"key":"IJOSSP.315280-22","doi-asserted-by":"publisher","DOI":"10.3390\/e21010091"},{"key":"IJOSSP.315280-23","doi-asserted-by":"publisher","DOI":"10.4018\/IJOSSP.2018100102"},{"key":"IJOSSP.315280-24","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463284"},{"key":"IJOSSP.315280-25","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.31"},{"key":"IJOSSP.315280-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113132"},{"key":"IJOSSP.315280-27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"IJOSSP.315280-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.03.006"},{"key":"IJOSSP.315280-29","article-title":"Is the Sample Geographic Index Diffusion Index Spam Index Geographic Index Diffusion Index Spam Index 135 Good Enough?","author":"F.Morstatter","year":"2013"},{"key":"IJOSSP.315280-30","unstructured":"Paryani, J. (2017). A Case Study On Determining The Big Data Veracity: A Method To Compute The Relevance Of Twitter Data [Doctoral dissertation]. Oklahoma State University."},{"key":"IJOSSP.315280-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67077-5_40"},{"key":"IJOSSP.315280-32","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"IJOSSP.315280-33","unstructured":"Roy, N. K. S., & Rossi, B. (2014, August). Towards an improvement of bug severity classification. In 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications (pp. 269-276). IEEE."},{"issue":"1","key":"IJOSSP.315280-34","first-page":"4","article-title":"Veracity roadmap: Is big data objective, truthful and credible?","volume":"24","author":"V.Rubin","year":"2013","journal-title":"Advances in Classification Research Online"},{"key":"IJOSSP.315280-35","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2014.63"},{"key":"IJOSSP.315280-36","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"IJOSSP.315280-37","doi-asserted-by":"publisher","DOI":"10.1145\/2528228.2528244"},{"key":"IJOSSP.315280-38","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-014-0242-5"},{"key":"IJOSSP.315280-39","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2766070"},{"key":"IJOSSP.315280-40","unstructured":"Sinha, S., Dyer, C., Gimpel, K., & Smith, N. A. (2013). Predicting the NFL using Twitter. arXiv preprint arXiv:1310.6998."},{"key":"IJOSSP.315280-41","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-010-9064-y"},{"key":"IJOSSP.315280-42","doi-asserted-by":"publisher","DOI":"10.1109\/ICMECH.2007.4279994"},{"key":"IJOSSP.315280-43","doi-asserted-by":"publisher","DOI":"10.1080\/00207720802556245"},{"key":"IJOSSP.315280-44","unstructured":"Tapia, A. H., Moore, K. A., & Johnson, N. J. (2013, May). Beyond the trustworthy tweet: A deeper understanding of microblogged data use by disaster response and humanitarian relief organizations. ISCRAM."},{"key":"IJOSSP.315280-45","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.31"},{"key":"IJOSSP.315280-46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.31"},{"key":"IJOSSP.315280-47","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14009"},{"key":"IJOSSP.315280-48","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9478-6"},{"key":"IJOSSP.315280-49","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488505"},{"key":"IJOSSP.315280-50","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2016.2557479"},{"key":"IJOSSP.315280-51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.06.021"},{"key":"IJOSSP.315280-52","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1983.5221735"},{"key":"IJOSSP.315280-53","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.144"},{"key":"IJOSSP.315280-54","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.16"},{"key":"IJOSSP.315280-55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17313-4_35"},{"key":"IJOSSP.315280-56","unstructured":"Zaman, T. R., Herbrich, R., Van Gael, J., & Stern, D. (2010, December). Predicting information spreading in twitter. In Workshop on computational social science and the wisdom of crowds, nips (Vol. 104, No. 45, pp. 17599-601). Citeseer."},{"key":"IJOSSP.315280-57","doi-asserted-by":"publisher","DOI":"10.3390\/e19050173"}],"container-title":["International Journal of Open Source Software and Processes"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=315280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T23:01:22Z","timestamp":1673910082000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJOSSP.315280"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,12,9]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijossp.315280","relation":{},"ISSN":["1942-3926","1942-3934"],"issn-type":[{"value":"1942-3926","type":"print"},{"value":"1942-3934","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,9]]}}}