Digitala Vetenskapliga Arkivet

Change search
ExportLink to record
Permanent link

Direct link
BETA

Project

Project type/Form of grant
Grant to research environment
Title [en]
SERT- Software Engineering ReThought
Abstract [en]
SERT – Software Engineering ReThought is a groundbreaking research project with the aim to take on the next generation challenges facing companies developing software intensive systems and products. We as an engineering lab are blazing the road introducing 3:rd generation empirical software engineering – denoting close co-production of pragmatic problem solving in close collaboration with our industrial partners as we perform engineering research into topics critical for engineering and business success. SERTs formulation of 3:rd generation empirical software engineering will utilize related knowledge areas as catalysts to solve challenges. Value-based engineering, Data-driven evidence based engineering, and Human-based development will complement software engineering competence in an integrated eco-system of competence focused on the challenges at hand.All areas in software engineering, ranging from inception, realization to evolution are part of the research venture – reflecting that companies need solutions covering their entire ecosystem.
Publications (10 of 165) Show all publications
Paudel, B., Gonzalez-Huerta, J., Mendez, D. & Klotins, E. (2025). A Data-Driven Approach to Optimize Internal Software Quality and Customer Value Delivery. In: Pfahl D., Anwar H., Gonzalez Huerta J., Klünder J. (Ed.), Product-Focused Software Process Improvement. Industry-, Workshop-, and Doctoral Symposium Papers: . Paper presented at 25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024 (pp. 179-185). Springer Science+Business Media B.V., 15453
Open this publication in new window or tab >>A Data-Driven Approach to Optimize Internal Software Quality and Customer Value Delivery
2025 (English)In: Product-Focused Software Process Improvement. Industry-, Workshop-, and Doctoral Symposium Papers / [ed] Pfahl D., Anwar H., Gonzalez Huerta J., Klünder J., Springer Science+Business Media B.V., 2025, Vol. 15453, p. 179-185Conference paper, Published paper (Refereed)
Abstract [en]

The growing complexity, the ever-ending demands for new features, and the need to become faster to remain competitive force software development organizations to rethink their development and value delivery practices. While continuous delivery has become more popular, it still relies mainly on internal metrics, ad-hoc data, and expert opinions. As a result, software organizations stumble to find the balance between improving internal system quality and delivering external value. In fact, understanding and measuring customer value is on itself essential. In this PhD project, we aim for a better understanding of customer value and develop measurement instruments to be integrated with internal perspectives to drive proactive and continuous internal improvement while delivering relevant customer value. 

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15453
Keywords
Continuous Customer Value Delivery, Data-Driven Approach, Software Quality Improvement, Sales, Competitive forces, Customer values, Expert opinion, Quality value, Software development organizations, Software Quality, Software quality improvements, Value delivery
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27310 (URN)10.1007/978-3-031-78392-0_13 (DOI)001423667900013 ()2-s2.0-85211242536 (Scopus ID)9783031783913 (ISBN)
Conference
25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024
Funder
Knowledge Foundation, 20180010
Available from: 2024-12-26 Created: 2024-12-26 Last updated: 2025-09-30Bibliographically approved
Tran, H. K., Ali, N. b., Unterkalmsteiner, M. & Börstler, J. (2025). A proposal and assessment of an improved heuristic for the Eager Test smell detection. Journal of Systems and Software, 226, Article ID 112438.
Open this publication in new window or tab >>A proposal and assessment of an improved heuristic for the Eager Test smell detection
2025 (English)In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 226, article id 112438Article in journal (Refereed) Published
Abstract [en]

Context: The evidence for the prevalence of test smells at the unit testing level has relied on the accuracy of detection tools, which have seen intense research in the last two decades. The Eager Test smell, one of the most prevalent, is often identified using simplified detection rules that practitioners find inadequate.

Objective: We aim to improve the rules for detecting the Eager Test smell.

Method: We reviewed the literature on test smells to analyze the definitions and detection rules of the Eager Test smell. We proposed a novel, unambiguous definition of the test smell and a heuristic to address the limitations of the existing rules. We evaluated our heuristic against existing detection rules by manually applying it to 300 unit test cases in Java.

Results: Our review identified 56 relevant studies. We found that inadequate interpretations of original definitions of the Eager Test smell led to imprecise detection rules, resulting in a high level of disagreement in detection outcomes. Also, our heuristic detected patterns of eager and non-eager tests that existing rules missed.

Conclusion: Our heuristic captures the essence of the Eager Test smell more precisely; hence, it may address practitioners’ concerns regarding the adequacy of existing detection rules.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Software testing, Test case quality, Test suite quality, Quality assurance, Test smells, Unit testing, Eager test Java JUnit
National Category
Software Engineering
Research subject
Software Engineering
Identifiers
urn:nbn:se:bth-27675 (URN)10.1016/j.jss.2025.112438 (DOI)001464187400001 ()2-s2.0-105001808870 (Scopus ID)
Available from: 2025-03-31 Created: 2025-03-31 Last updated: 2025-09-30Bibliographically approved
Frattini, J., Fucci, D., Torkar, R., Montgomery, L., Unterkalmsteiner, M., Fischbach, J. & Mendez, D. (2025). Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment. Empirical Software Engineering, 30(1), Article ID 29.
Open this publication in new window or tab >>Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment
Show others...
2025 (English)In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 30, no 1, article id 29Article in journal (Refereed) Published
Abstract [en]

It is commonly accepted that the quality of requirements specifications impacts subsequent software engineering activities. However, we still lack empirical evidence to support organizations in deciding whether their requirements are good enough or impede subsequent activities. We aim to contribute empirical evidence to the effect that requirements quality defects have on a software engineering activity that depends on this requirement. We conduct a controlled experiment in which 25 participants from industry and university generate domain models from four natural language requirements containing different quality defects. We evaluate the resulting models using both frequentist and Bayesian data analysis. Contrary to our expectations, our results show that the use of passive voice only has a minor impact on the resulting domain models. The use of ambiguous pronouns, however, shows a strong effect on various properties of the resulting domain models. Most notably, ambiguous pronouns lead to incorrect associations in domain models. Despite being equally advised against by literature and frequentist methods, the Bayesian data analysis shows that the two investigated quality defects have vastly different impacts on software engineering activities and, hence, deserve different levels of attention. Our employed method can be further utilized by researchers to improve reliable, detailed empirical evidence on requirements quality. © The Author(s) 2024.

Place, publisher, year, edition, pages
Springer, 2025
Keywords
Bayesian data analysis, Experiment, Replication, Requirements engineering, Requirements quality, Data accuracy, Data assimilation, Data consistency, Spatio-temporal data, Causal inferences, Controlled experiment, Domain model, Engineering activities, Quality defects, Requirement engineering, Requirement quality, Requirements specifications, Software quality
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27175 (URN)10.1007/s10664-024-10582-1 (DOI)2-s2.0-85209711862 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2025-09-30Bibliographically approved
Fucci, D., Di Penta, M., Romano, S. & Scanniello, G. (2025). Augmenting Software Bills of Materials with Software Vulnerability Description: A Preliminary Study on GitHub. In: Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering: . Paper presented at 33rd ACM International Conference on the Foundations of Software Engineering, FSE Companion 2025, Trondheim, June 23-27, 2025 (pp. 631-635). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Augmenting Software Bills of Materials with Software Vulnerability Description: A Preliminary Study on GitHub
2025 (English)In: Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Association for Computing Machinery (ACM), 2025, p. 631-635Conference paper, Published paper (Refereed)
Abstract [en]

Software Bills of Material (SBOMs) are becoming a consolidated-and often enforced by governmental regulations-way to describe software composition. However, based on recent studies, SBOMs suffer from limited support for their consumption and lack information beyond simple dependencies, especially regarding software vulnerabilities. This paper reports the results of a preliminary study in which we augmented SBOMs of 40 open-source projects with information about Common Vulnerabilities and Exposures (CVE) exposed by project dependencies. Our augmented SBOMs have been evaluated by submitting pull requests and by asking project owners to answer a survey. Although, in most cases, augmented SBOMs were not directly accepted because owners required a continuous SBOM update, the received feedback shows the usefulness of the suggested SBOM augmentation.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
SBOM, Software repositories, VEX, Vulnerabilities management
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-28600 (URN)10.1145/3696630.3728513 (DOI)2-s2.0-105013970463 (Scopus ID)9798400712760 (ISBN)
Conference
33rd ACM International Conference on the Foundations of Software Engineering, FSE Companion 2025, Trondheim, June 23-27, 2025
Funder
Knowledge Foundation, 20230087Knowledge Foundation, 20180010
Available from: 2025-09-05 Created: 2025-09-05 Last updated: 2025-09-30Bibliographically approved
Dorner, M. (2025). Code Review as a Communication Network. (Doctoral dissertation). Karlskrona, Sweden: Blekinge Tekniska Högskola
Open this publication in new window or tab >>Code Review as a Communication Network
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Background: Modern software systems are often too large and complex for an individual developer to fully oversee, making it difficult to understand the implications of changes. Therefore, most collaborative software projects rely on code review as communication network to foster asynchronous discussions about changes before they are merged. Although prior qualitative studies have revealed that practitioners view code review as a communication network, no formal theory or empirical validation exists. Without formalization and confirmatory evidence, the theory remains uncertain, limiting its credibility, practical relevance, and future development.

Objective: In this thesis, our objective is to (1) formalize the theory of code review as a communication network, (2) empirically evaluate the theory across varied perspectives, contexts, and conditions by quantifying the capability of code review to diffuse information among its participants, (3) demonstrate its practical relevance by applying the theory to the domain of tax compliance in collaborative software engineering, and (4) examine how the role of code review as a communication network for collaborative software engineering may evolve in the future.

Methods: To formalize the theory of code review as a communication network, we developed and validated a simulation model that operationalizes its core propositions about information diffusion among participants. To empirically evaluate the theory, we employed two complementary research approaches. First, we used the simulation model to conduct in silico experiments with closed-source code review systems from Microsoft, Spotify, and Trivago, as well as open-source code review systems from Android, Visual Studio Code, and React, to estimate the upper bound of information diffusion in code review. Second, through an observational study, we quantified the diffusion of information in code review across social, organizational, and architectural boundaries at Spotify. To demonstrate the practical relevance of the theory, we analyzed the code review system of a multinational enterprise as a communication network to reveal the latent collaboration structure among developers across borders, which is taxable. To explore the future of code review as a communication network, we conducted a questionnaire survey with 92 practitioners to gather their expectations and discuss how these anticipated changes may reshape our understanding of code review.

Results: By formalizing the theory of code review as a communication network modelled as a time-varying hypergraph, we were able to empirically demonstrate that traditional time-agnostic models substantially overestimate information diffusion in code review. Throughout our empirical studies, we found substential evidence supporting the theory of code review as a communication network: We confirmed that code review is capable of diffusing information quickly and widely among participants, even at a large scale. We also observed extensive information diffusion across social, organizational, and architectural boundaries at Spotify corroborating our theory. However, we also found that information diffusion patterns in open-source code review systems differ significantly, suggesting that findings from open-source environments may not directly apply to closed-source contexts. Through applying the theory of code review as a communication network in the domain of tax compliance, we were able to uncover the significant and previously unrecognized tax risks associated with collaborative software engineering within multinational enterprises. While practitioners consider code review also in the future a core practice in collaborative software engineering, we identify a potential risk that generative AI may undermine code review’s role as a human communication network.

Conclusion: Our work on understanding code review as a communication network contributes not only to theory-driven, empirical software engineering research but also lays the groundwork for practical applications, particularly in the context of tax compliance. Future research is needed to explore the evolving role of code review as a communication network.

Place, publisher, year, edition, pages
Karlskrona, Sweden: Blekinge Tekniska Högskola, 2025. p. 188
Series
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 2025:10
Keywords
code review, software engineering, tax compliance, collaborative software engineering, communication network
National Category
Software Engineering
Research subject
Software Engineering
Identifiers
urn:nbn:se:bth-28424 (URN)978-91-7295-508-0 (ISBN)
Public defence
2025-09-23, J1630, Valhallavägen 1, Karlskrona, 14:00 (English)
Opponent
Supervisors
Available from: 2025-08-22 Created: 2025-08-22 Last updated: 2025-09-30Bibliographically approved
Bauer, A. (2025). Code Review of GUI-based Tests. (Doctoral dissertation). Karlskrona: Blekinge Tekniska Högskola
Open this publication in new window or tab >>Code Review of GUI-based Tests
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Background: Modern software systems are large and complex, requiring collaboration among developers with diverse skills to manage this complexity. Code review is an essential collaborative software engineering practice in which changes are discussed before they are integrated into the codebase, enhancing code quality and promoting knowledge sharing. GUI-based testing is a technique that verifies and validates a system’s behavior through its GUI by simulating user interactions. Like production code, it requires collaboration, as tests are created, reviewed, and maintained alongside production code. Code review practices for tests differ from those for production code. Omitting reviews of tests can lower their quality and increase maintenance costs. However, practices for reviewing GUI-based tests are not well understood, as academic literature mainly focuses on production code and low-level tests.

Objective: We aim to advance the understanding and practice of code review of GUI-based tests by (a) identifying code review guidelines; (b) investigating the specific practices, challenges, and information needs; (c) finding empirical evidence supporting the proposed guidelines; and (d) providing an outlook on how code review may evolve in the future.

Methods: First, we conduct a literature review of white and gray literature to identify guidelines for source and test code, and synthesize them for GUI-based tests. Next, we perform qualitative interviews with software testing professionals to identify practices, challenges, and information needs when reviewing GUI-based tests. To find empirical evidence for the proposed guidelines, we mine open-source software repositories. Finally, we conduct a questionnaire survey to gather practitioners’ expectations about the future importance of code reviews.

Results: We synthesized 33 guidelines for GUI-based tests from literature sources. In analyzing code review comments from open-source repositories, we found empirical evidence supporting 25 out of the 33 proposed guidelines. Practitioners acknowledge the importance of code reviews, but lack defined practices for reviewing GUI-based tests. We identified four practices, six challenges, and four information needs related to reviewing GUI-based tests. The survey results indicate that code review will remain an essential practice with an anticipated increase in code review activities, including those for GUI-based tests.

Conclusion: This thesis advances the understanding and practice of code review for GUI-based tests to improve both review effectiveness and the quality of the tests underreview. We present a set of empirically grounded guidelines derived from literature and refined through the analysis of code review comments of open-source repositories. Our research investigates current practices for reviewing GUI-based tests, highlighting the specific challenges and information needs that distinguish these reviews from those for production code. Finally, we highlight the relevance of our research for the future.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2025. p. 204
Series
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 2025:14
Keywords
Code review, software inspection, GUI testing, GUI-based testing, guidelines, best practices
National Category
Software Engineering
Research subject
Software Engineering
Identifiers
urn:nbn:se:bth-28772 (URN)978-91-7295-515-8 (ISBN)
Public defence
2025-11-24, J1630, Valhallavägen 1, Karlskrona, 09:00 (English)
Opponent
Supervisors
Available from: 2025-10-28 Created: 2025-10-16 Last updated: 2025-10-28Bibliographically approved
Al-Saedi, A. A., Boeva, V. & Casalicchio, E. (2025). Contribution Prediction in Federated Learning via Client Behavior Evaluation. Future Generation Computer Systems, 166, Article ID 107639.
Open this publication in new window or tab >>Contribution Prediction in Federated Learning via Client Behavior Evaluation
2025 (English)In: Future Generation Computer Systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 166, article id 107639Article in journal (Refereed) Published
Abstract [en]

Federated learning (FL), a decentralized machine learning framework that allows edge devices (i.e., clients) to train a global model while preserving data/client privacy, has become increasingly popular recently. In FL, a shared global model is built by aggregating the updated parameters in a distributed manner. To incentivize data owners to participate in FL, it is essential for service providers to fairly evaluate the contribution of each data owner to the shared model during the learning process. To the best of our knowledge, most existing solutions are resource-demanding and usually run as an additional evaluation procedure. The latter produces an expensive computational cost for large data owners. In this paper, we present simple and effective FL solutions that show how the clients’ behavior can be evaluated during the training process with respect to reliability, and this is demonstrated for two existing FL models, Cluster Analysis-based Federated Learning (CA-FL) and Group-Personalized FL (GP-FL), respectively. In the former model, CA-FL, the frequency of each client to be selected as a cluster representative and in that way to be involved in the building of the shared model is assessed. This can eventually be considered as a measure of the respective client data reliability. In the latter model, GP-FL, we calculate how many times each client changes a cluster it belongs to during FL training, which can be interpreted as a measure of the client's unstable behavior, i.e., it can be considered as not very reliable. We validate our FL approaches on three LEAF datasets and benchmark their performance to two baseline contribution evaluation approaches. The experimental results demonstrate that by applying the two FL models we are able to get robust evaluations of clients’ behavior during the training process. These evaluations can be used for further studying, comparing, understanding, and eventually predicting clients’ contributions to the shared global model.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Behavior monitoring; Clustering analysis, Contribution evaluation, Eccentricity analysis, Federated learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-26080 (URN)10.1016/j.future.2024.107639 (DOI)001407806400001 ()2-s2.0-85211047272 (Scopus ID)
Funder
Knowledge Foundation, 20220068Knowledge Foundation, 20180010
Available from: 2024-04-05 Created: 2024-04-05 Last updated: 2025-09-30Bibliographically approved
Tomic, S., Alégroth, E. & Isaac, M. (2025). Evaluation of the Choice of LLM in a Multi-Agent Solution for GUI-Test Generation. In: Fasolino A.R., Panichella S., Aleti A., Mesbah A. (Ed.), 2025 IEEE Conference on Software Testing, Verification and Validation, ICST 2025: . Paper presented at 18th IEEE Conference on Software Testing, Verification and Validation, ICST 2025, Naples, March 31- April 4, 2025 (pp. 487-497). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Evaluation of the Choice of LLM in a Multi-Agent Solution for GUI-Test Generation
2025 (English)In: 2025 IEEE Conference on Software Testing, Verification and Validation, ICST 2025 / [ed] Fasolino A.R., Panichella S., Aleti A., Mesbah A., Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 487-497Conference paper, Published paper (Refereed)
Abstract [en]

Automated testing, particularly for GUI-based systems, remains a costly and labor-intensive process and prone to errors. Despite advancements in automation, manual testing still dominates in industrial practice, resulting in delays, higher costs, and increased error rates. Large Language Models (LLMs) have shown great potential to automate tasks traditionally requiring human intervention, leveraging their cognitive-like abilities for test generation and evaluation. In this study, we present PathFinder, a Multi-Agent LLM (MALLM) framework that incorporates four agents responsible for (a) perception and summarization, (b) decision-making, (c) input handling and extraction, and (d) validation, which work collaboratively to automate exploratory web-based GUI testing. The goal of this study is to assess how different LLMs, applied to different agents, affect the efficacy of automated exploratory GUI testing. We evaluate PathFinder with three models, Mistral-Nemo, Gemma2, and Llama3.1, on four e-commerce websites. Thus, 27 permutations of the LLMs, across three agents (excluding the validation agent), to test the hypothesis that a solution with multiple agents, each using different LLMs, is more efficacious (efficient and effective) than a multi-agent solution where all agents use the same LLM. The results indicate that the choice of LLM constellation (combination of LLMs) significantly impacts efficacy, suggesting that a single LLM across agents may yield the best balance of efficacy (measured by F1-score). Hypothesis to explain this result include, but are not limited to: improved decision-making consistency and reduced task coordination discrepancies. The contributions of this study are an architecture for MALLM-based GUI testing, empirical results on its performance, and novel insights into how LLM selection impacts the efficacy of automated testing. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Series
IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW, ISSN 2159-4848
Keywords
AI-Assisted Software Testing, Automated Testing, Large Language Models (LLMs), MALLM, Multi-Agent Systems, Ability testing, Autonomous agents, C (programming language), Intelligent agents, Model checking, Software testing, GUI testing, Language model, Large language model, Multi agent, Multi-agent LLM, Multiagent systems (MASs), Software testings, Test generations, Automatic test pattern generation
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-28172 (URN)10.1109/ICST62969.2025.10989038 (DOI)001506893900043 ()2-s2.0-105007519090 (Scopus ID)9798331508142 (ISBN)
Conference
18th IEEE Conference on Software Testing, Verification and Validation, ICST 2025, Naples, March 31- April 4, 2025
Funder
Vinnova, 2024- 00242Knowledge Foundation, 20180010
Available from: 2025-06-23 Created: 2025-06-23 Last updated: 2025-09-30Bibliographically approved
Yu, L., Alégroth, E., Chatzipetrou, P. & Gorschek, T. (2025). Experience with Large Language Model Applications for Information Retrieval from Enterprise Proprietary Data. In: Dietmar Pfahl, Javier Gonzalez Huerta, Jil Klünder, Hina Anwar (Ed.), Product-Focused Software Process Improvement: . Paper presented at 25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024 (pp. 92-107). Springer, 15452
Open this publication in new window or tab >>Experience with Large Language Model Applications for Information Retrieval from Enterprise Proprietary Data
2025 (English)In: Product-Focused Software Process Improvement / [ed] Dietmar Pfahl, Javier Gonzalez Huerta, Jil Klünder, Hina Anwar, Springer, 2025, Vol. 15452, p. 92-107Conference paper, Published paper (Refereed)
Abstract [en]

Large Language Models (LLMs) offer promising capabilities for information retrieval and processing. However, the LLM deployment for querying proprietary enterprise data poses unique challenges, particularly for companies with strict data security policies. This study shares our experience in setting up a secure LLM environment within a FinTech company and utilizing it for enterprise information retrieval while adhering to data privacy protocols. 

We conducted three workshops and 30 interviews with industrial engineers to gather data and requirements. The interviews further enriched the insights collected from the workshops. We report the steps to deploy an LLM solution in an industrial sandboxed environment and lessons learned from the experience. These lessons contain LLM configuration (e.g., chunk_size and top_k settings), local document ingestion, and evaluating LLM outputs.

Our lessons learned serve as a practical guide for practitioners seeking to use private data with LLMs to achieve better usability, improve user experiences, or explore new business opportunities. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

Place, publisher, year, edition, pages
Springer, 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15452
Keywords
AI, Artificial intelligence, Data security, Information retrieval, Large Language Model, LLM, Sandbox environment, Data privacy, Fintech, Enterprise data, Language model, Model application, Modeling environments, Privacy protocols, Security policy, Structured Query Language
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27326 (URN)10.1007/978-3-031-78386-9_7 (DOI)001423664600007 ()2-s2.0-85211960724 (Scopus ID)9783031783852 (ISBN)
Conference
25th International Conference on Product-Focused Software Process Improvement, PROFES 2024, Tartu, Dec 2-4, 2024
Funder
Knowledge Foundation, 20180010
Available from: 2024-12-28 Created: 2024-12-28 Last updated: 2025-09-30Bibliographically approved
Paudel, B., Gonzalez-Huerta, J., Zabardast, E. & Klotins, E. (2025). Exploring the Relationship between Technical Debt and Lead Time: An Industrial Case Study. In: Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025: . Paper presented at 32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Monteral, March, 4-7, 2025 (pp. 693-703). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Exploring the Relationship between Technical Debt and Lead Time: An Industrial Case Study
2025 (English)In: Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 693-703Conference paper, Published paper (Refereed)
Abstract [en]

Background: Software companies must balance fast delivery and quality, a trade-off that often introduces technical debt and wastes developer's time. Technical debt tends to increase as software evolves, which is assumed to slow down development and maintenance activities. However, the potential relationship between technical debt and lead time lacks empirical evidence.

Objective: This paper reports an empirical study to explore the potential relationship between technical debt and lead time in resolving Jira tickets. We further aim to measure the extent to which technical debt can explain the variation in lead time.

Method: We conducted an industrial case study to explore this relationship in six components, each of which was analyzed individually. Technical debt was measured using SonarQube and normalized with the component's size. Lead times to resolve Jira tickets were collected from Jira and averaged monthly.

Results: The study found little to no correlation between technical debt and lead time to resolve Jira tickets in five components, with technical debt explaining a variation in lead time ranging from 0% to 41%. However, it is less than 30% in most of the components.

Conclusion: Technical debt alone does not fully explain the variation in lead time. There should be some other confounding variables (e.g., size and complexity of the changes, number of teams involved, priorities, component ownership) affecting lead time or a residual effect, i.e., interest, that might manifest later. Further investigation into those confounding variables is essential. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Case Study, Industrial Study, Lead Time, Technical Debt, Computer software maintenance, Software design, Software quality, Case-studies, Development activity, Empirical studies, Industrial case study, Leadtime, Maintenance activity, Software company, Technical debts, Trade off, Industrial research
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-28084 (URN)10.1109/SANER64311.2025.00071 (DOI)001506888600063 ()2-s2.0-105007291171 (Scopus ID)9798331535100 (ISBN)
Conference
32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Monteral, March, 4-7, 2025
Funder
Knowledge Foundation, 20180010
Available from: 2025-06-13 Created: 2025-06-13 Last updated: 2025-10-21Bibliographically approved
Principal InvestigatorGorschek, Tony
Coordinating organisation
Blekinge Institute of Technology
Funder
Period
2018-09-01 - 2026-09-01
National Category
Software Engineering
Identifiers
DiVA, id: project:2307Project, id: 20180010

Search in DiVA

Software Engineering

Search outside of DiVA

GoogleGoogle Scholar

Link to external project page

SERT Web