A classification schema for reporting threats to validity and possible mitigation actions is proposed, which authors of secondary studies can use for identifying and categorizing threats tovalidity and corresponding mitigation actions, while readers of secondary Studies can use the checklist for assessing the validity of the reported results.
Abstract:
Context Secondary studies are vulnerable to threats to validity. Although, mitigating these threats is crucial for the credibility of these studies, we currently lack a systematic approach to identify, categorize and mitigate threats to validity for secondary studies. Objective In this paper, we review the corpus of secondary studies, with the aim to identify: (a) the trend of reporting threats to validity, (b) the most common threats to validity and corresponding mitigation actions, and (c) possible categories in which threats to validity can be classified. Method To achieve this goal we employ the tertiary study research method that is used for synthesizing knowledge from existing secondary studies. In particular, we collected data from more than 100 studies, published until December 2016 in top quality software engineering venues (both journals and conference). Results Our results suggest that in recent years, secondary studies are more likely to report their threats to validity. However, the presentation of such threats is rather ad hoc, e.g., the same threat may be presented with a different name, or under a different category. To alleviate this problem, we propose a classification schema for reporting threats to validity and possible mitigation actions. Both the classification of threats and the associated mitigation actions have been validated by an empirical study, i.e., Delphi rounds with experts. Conclusion Based on the proposed schema, we provide a checklist, which authors of secondary studies can use for identifying and categorizing threats to validity and corresponding mitigation actions, while readers of secondary studies can use the checklist for assessing the validity of the reported results.
TL;DR: A Systematic Mapping Study on digital sources that can be used to address the data analytics needs of the labor market and aims to connect different skill types, needs and goals of labor market with the utilization of digital sources and data analysis methods.
TL;DR: This paper aims to investigate the current state of research on SoS architecting by synthesizing the demographic data, assessing the quality and the coverage of architecting activities and software quality attributes by the research, and distilling a concept map that reflects a community-wide understanding of the concept of SoS.
TL;DR: The SLR study revealed that while ML algorithms have phenomenal capabilities of identifying the software requirements on SO, they still are confronted with various open problems/issues that will eventually limit their practical applications and performances.
TL;DR: In this paper , the authors conducted a systematic mapping study on software engineering approaches for building, operating, and maintaining AI-based systems and identified multiple SE approaches for AIbased systems, which they classified according to the SWEBOK areas.
TL;DR: A systematic literature review of 72 studies on software security patch management published from 2002 to March 2020 reveals that two-thirds of the common challenges have not been directly addressed in the solutions and that most of them address the challenges in one stage of the process.
TL;DR: In this article, buku ini mencakup lebih dari 50 studi kasus, memberikan perhatian untuk analisis kuantitatif, membahas lebah lengkap penggunaan desain metode campuran penelitian, and termasuk wawasan metodologi baru.
TL;DR: An instrument to assess the quality of reports of randomized clinical trials (RCTs) in pain research is described and its use to determine the effect of rater blinding on the assessments of quality is described.
TL;DR: A reporting guideline is described, the Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015 (PRISMA-P 2015), which consists of a 17-item checklist intended to facilitate the preparation and reporting of a robust protocol for the systematic review.
Q1. What are the contributions in "Identifying, categorizing and mitigating threats to validity in software engineering secondary studies" ?
In this paper, the authors review the corpus of secondary studies, with the aim to identify: ( a ) the trend of reporting threats to validity, ( b ) the most common threats to validity and corresponding mitigation actions, and ( c ) possible categories in which threats to validity can be classified. To achieve this goal the authors employ the tertiary study research method that is used for synthesizing knowledge from existing secondary studies. To alleviate this problem, the authors propose a classification schema for reporting threats to validity and possible mitigation actions. Conclusion: Based on the proposed schema, the authors provide a checklist, which authors of secondary studies can use for identifying and categorizing threats to validity and corresponding mitigation actions, while readers of secondary studies can use the checklist for assessing the validity of the reported results. Their results suggest that in recent years, secondary studies are more likely to report their threats to validity.
Q2. What is the common threat to the validity of a dataset?
Threats to Data ValidityName DescriptionSmall sample size A small sample threatens the validity of the dataset, since results may be: (a) prone to bias (data might come from a small community), (b) not statistically significant, and (c) not safe to generalize.
Q3. What can lead to the omission of important studies?
Missing non-English papersExploring studies written in a specific language can lead to the omission of important studies (or number of studies) written in other languages.
Q4. What is the literature review of the iottware project?
Software aradigms, assessment types and non-functional requirements in modelased integration testing: a systematic literature review.
Q5. What is the significance of the study selection criteria?
Study selection validityStudy selection validity is recognized as the major threat in secndary studies during the early phases of the research.
Q6. What is the way to determine the validity of the study?
The selection of classification schema is biased 0% 0% 0% 42.9% 57.1% 0% The interpretation of results is not objective 0% 0% 0% 14.3% 85.7% 0% Research Validity Lack of repeatability 0% 0% 0% 14.3% 85.7% 0% A not fitting research method has been selected 0% 0% 0% 14.3% 85.7% 0% Answering the RQs cannot fulfill the goal 0% 0% 0% 14.3% 85.7% 0% Lack of comparable studies 0% 0% 14.3% 14.3% 57.1% 14.3% Researchers are not familiar with the research field 0% 0% 0% 28.6% 57.1% 14.3% Lack of generalizability 0% 0% 0% 28.6% 71.4% 0%Fig. 5a. Mitigation Actions for Study Selection Threats to Validity.
Q7. Why did e validate the set of secondary studies?
To mitigate the risk of losing relevant studies e validated their set of secondary studies by cross-checking them against apers in other tertiary studies (serving as a gold standard).