Ruqaya Gilal, Mazni Omar, Mawarny Md Rejab, Abdul Rehman Gilal
{"title":"i-SYNERGY: An Integrated Predictive Model for Assessing Software Developers' Performance Under Time Pressure","authors":"Ruqaya Gilal, Mazni Omar, Mawarny Md Rejab, Abdul Rehman Gilal","doi":"10.1002/smr.70071","DOIUrl":"https://doi.org/10.1002/smr.70071","url":null,"abstract":"<div>\u0000 \u0000 <p>Human factors significantly influence software engineering (SE), where assigning unsuitable personnel to tasks is a leading cause of project failures. This challenge worsens under time pressure (TP), resulting in decreased performance and delays. Past studies have primarily focused on technical aspects, often neglecting the humanistic side, such as personality types and gender differences, in coping with TP. This study investigates the impact of personality types, gender, knowledge, and task complexity on developers' performance under TP and proposes the i-SYNERGY model. The research provides actionable insights for project planning under time-constrained conditions. Empirical data were collected through controlled experiments with SE students and generalized using industrial case studies. Myers–Briggs type indicator (MBTI) measured personality types, while the NASA task load index (TLX) assessed TP levels. Logistic regression outperformed four other models (artificial neural network [ANN], support vector machine [SVM], decision tree, and K-nearest neighbor [KNN]) with the highest prediction accuracy and was used to develop the model. Gender-specific results revealed ESTJ and ENTJ as effective under TP for males and ISFJ and ISFP for females. The i-SYNERGY model demonstrates that TP significantly reduces developer performance, but personality type, gender, knowledge and task complexity shape resilience. These results highlight the importance of aligning task assignments with individual traits to optimize performance. The proposed i-SYNERGY model offers a validated, structured framework to enhance decision-making and improve project outcomes in time-constrained environments.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145824741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Chiari, Matteo Camilli, Marcello M. Bersani, Rutger van Beusekom, Damian A. Tamburri
{"title":"Reality Check on Formal Methods in Industry: A Study of Verum Dezyne","authors":"Michele Chiari, Matteo Camilli, Marcello M. Bersani, Rutger van Beusekom, Damian A. Tamburri","doi":"10.1002/smr.70069","DOIUrl":"https://doi.org/10.1002/smr.70069","url":null,"abstract":"<p>Many of the classical questions reflecting the actionable use of formal methods in the software industry—“do they scale?” or “are they easily integrated?”—remain without a definitive answer, with many potentially adoptable formal notations being exploited in industry, but in a rather stove-piped and siloed fashion, and with rather few, sometimes anecdotal, success stories to tell. In this article, we strive to provide some more answers to the aforementioned questions on formal methods adoption in industry. We focus our study on a widely adopted formal methods framework in Europe, that is, Verum Dezyne, employed by embedded-computing and hardware-programming companies including Thermo-Fisher, Philips, and more. Results convey a rather interesting story—requiring further study into these matters—but also highlight practical insights for formal practitioners in the field, for example, that formal methods do not disrupt existing processes and scalability issues can be easily addressed by applying mainstream engineering practices, such as decomposition.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145750886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malek Al Zeibak, Mohammad Alshayeb, Malak Baslyman, Mahmood Niazi
{"title":"A Cybersecurity Maturity Model for Digitally Transformed Organizations","authors":"Malek Al Zeibak, Mohammad Alshayeb, Malak Baslyman, Mahmood Niazi","doi":"10.1002/smr.70074","DOIUrl":"https://doi.org/10.1002/smr.70074","url":null,"abstract":"<div>\u0000 \u0000 <p>Cybersecurity is a critical component of digital transformation, as the two must be integrated to enable business modernization and the adoption of innovative technologies while ensuring system security. Modern technologies introduce increasingly complex threats as more data is stored, transmitted, and processed across systems. Threats include the violation or misuse of data, such as data corruption, data theft, or a privacy violation. Determining if an organization applies the best practices requires measurements using maturity models. Several maturity models with different goals and qualities have been developed. However, no cybersecurity maturity model is related to digitally enabled or transforming organizations. The objective of this study is to develop a model that measures cybersecurity maturity for digitally transformed organizations. The model aims to provide a customizable assessment method for organizations of different sizes and domains. Two multivocal literature reviews (MLRs) were conducted to identify the available maturity models and best practices from formal and grey literature. After analyzing 165 studies, seven cybersecurity categories, as the capability areas, and 22 practice areas, were identified. Moreover, an assessment tool that supports self-assessment was developed. Finally, the model was evaluated through five case studies and expert judgments. As a result, a cybersecurity maturity model for digitally transformed organizations is developed, along with its assessment methodology and automation tool. The model evaluation showed promising results in terms of the ability to identify the maturity level.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145739537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mapping Study on JavaScript Quality Attributes and Metrics","authors":"Ioannis Zozas, Stamatia Bibi, Apostolos Ampatzoglou, Elvira-Maria Arvanitou, Pantelis Angelidis, Markos Tsipouras","doi":"10.1002/smr.70073","DOIUrl":"https://doi.org/10.1002/smr.70073","url":null,"abstract":"<div>\u0000 \u0000 <p>Although JavaScript dominates modern software development, research on its quality attributes remains scarce, despite the fundamental differences that distinguish it from other languages. This motivates dedicated research related to JavaScript quality attributes and metrics. This paper aims to identify (a) the quality attributes of the JavaScript language that are mainly studied and (b) the quality metrics that are used to quantify them. Additionally, the paper provides information on the tools that can be used to measure quality metrics. To achieve these goals, we have conducted a mapping study on seven journals and eight conferences of high quality. A total of 142 primary studies, published between 2002 and February 2025, have been selected and analyzed, to identify and classify software metrics to high-level quality attributes, as described in ISO/IEC 25010:2011. Maintainability, Security, Reliability, and Usability quality attributes are the most studied ones. Furthermore, 78 generic and 48 JavaScript-specific metrics were identified. A wide dispersion of metrics has been identified for assessing each quality attribute, based on different development tasks. Moreover, a variety of tools and benchmarks were identified. A clear research trend in JavaScript quality assessment related to issues that involve software reuse, code testing, and dynamic code analysis has been identified. Yet differences among primary studies in quality assessment and quantification, along with tool adoption indicate the need for further exploration of these recurring topics.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Liedtke, Richard Messnarz, Damjan Ekert, Alexander Much
{"title":"A Multilevel Approach to TARA: Proposals for Attack Feasibility in Interference-Free Scenarios","authors":"Thomas Liedtke, Richard Messnarz, Damjan Ekert, Alexander Much","doi":"10.1002/smr.70060","DOIUrl":"https://doi.org/10.1002/smr.70060","url":null,"abstract":"<div>\u0000 \u0000 <p>Automotive SPICE for Cybersecurity incorporates the Cybersecurity Risk Management process (MAN.7), aligning with the Risk Assessment methods defined in ISO/SAE 21434:2021 (Clause 15). Both standards provide guidance on conducting Threat Analysis and Risk Assessments (TARA). However, they do not specify how to integrate the determination of attack feasibility when multiple TARAs emerge across different development phases. This paper explores how the concept of freedom from interference can facilitate a unified approach to determining attack feasibility in such scenarios.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Asset Management Roles and Responsibilities for Projects Using AHP and WASPAS","authors":"Runhan Zhang, Shah Nazir","doi":"10.1002/smr.70070","DOIUrl":"https://doi.org/10.1002/smr.70070","url":null,"abstract":"<div>\u0000 \u0000 <p>Effective management of software assets in their whole lifespan is the main goal of software asset management (SAM) and is a contemporary organizational practice. It includes a range of tasks such as purchasing, implementing, and maintaining software inside a company. SAM seeks to minimize the risks and expenses related to software ownership while ensuring that software resources are used as efficiently as possible to support business activities. Recently, a great increase in the use of this technique has occurred, especially in large-scale enterprises where the complexity and diversity of software assets have faced major hurdles. The proposed study presents an overview of the analysis of the recent approaches and hurdles in the area of SAM. Because big software companies have access to a multitude of resources and experience, maximizing the reuse of software assets inside these organizations is a common topic of academic and industrial study. Through the integration of several important attributes from previous research endeavors, the current study seeks to determine the most common attributes for the research. The study aims to contribute to the area by integrating the Analytical Hierarchy Process (AHP) along with the Weighted Aggregated Sum Product Assessment (WASPAS) approaches to give a rigorous and systematic way to analyze and rate the prominent qualities for selection of the most appropriate choice among the available alternatives.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vasil Shteriyanov, Rimma Dzhusupova, Jan Bosch, Helena Holmström Olsson
{"title":"Enhancing OCR-based Engineering Diagram Analysis by Integrating Diverse External Legends with VLMs","authors":"Vasil Shteriyanov, Rimma Dzhusupova, Jan Bosch, Helena Holmström Olsson","doi":"10.1002/smr.70072","DOIUrl":"https://doi.org/10.1002/smr.70072","url":null,"abstract":"<p>Manual analysis of diagrams and legend sheets in engineering projects is time consuming and needs automation. The lack of standardized legend formats complicates creating a general method for automated information extraction. Existing approaches require training and custom rules for each project. This study proposes a novel solution combining optical character recognition with vision language models and multimodal prompt engineering to automate information extraction from diverse legend sheets without training. It integrates legend information with information extracted from diagrams, unlike studies that only focus on diagrams. Our study shows that VLMs, guided by multimodal prompts, can accurately extract information from diverse legend sheets, enabling automatic information extraction in diagrams across engineering projects. We validate our method through a case study involving the extraction of instruments from piping and instrumentation diagrams (P&IDs) and their legends across three projects with varied formats and standards. The proposed method achieved 100% accuracy in legend classification and information extraction, and 99.68% precision and 95.91% recall in generating instrument listings. The results demonstrate the effectiveness of our approach, significantly enhancing the accuracy and efficiency of information extraction from diagrams. This method can be adapted to different legend formats and diagrams, providing a versatile solution for various industries.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karthik Shivashankar, Kristian Marison Haugerud, Antonio Martini
{"title":"Enhancing Task Prioritization in Software Development Issues Tracking System","authors":"Karthik Shivashankar, Kristian Marison Haugerud, Antonio Martini","doi":"10.1002/smr.70068","DOIUrl":"https://doi.org/10.1002/smr.70068","url":null,"abstract":"<div>\u0000 \u0000 <p>Modern software development faces a critical bottleneck in manually prioritizing the overwhelming volume of issues generated in platforms like Jira and GitHub. This labor-intensive process leads to delays, increased costs, inconsistent handling, and developer burnout, worsened by the lack of standardized priority labels. This paper investigates the potential of automated issue priority classification using state-of-the-art Transformer models to alleviate this burden. We evaluate the performance of models like BERT, DeBERTa, and ModernBERT, comparing them against general large language models (LLMs) such as GPT-3.5, Qwen2.5-3B and Llama-3.2-3B, using curated datasets derived from public Jira and GitHub repositories. Our research addresses the effectiveness of these models for their generalization capabilities on out-of-distribution projects, the impact of fine-tuning, and performs a detailed performance comparison across different priority levels and model types. Results demonstrate that Transformer models, particularly ModernBERT, achieve high classification performance (e.g., accuracy > 81%), significantly outperforming the evaluated general LLMs (accuracy <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>≈</mo>\u0000 </mrow>\u0000 <annotation>$$ approx $$</annotation>\u0000 </semantics></math> 75%) for this specific task. We find that binary classification is more effective than multilabel approaches, models generalize well to unseen projects, and performance is further enhanced by fine-tuning. Key contributions include the provision of cleaned, labeled datasets and a comprehensive evaluation confirming the viability and benefits of using specialized Transformer models for automated issue priority suggestion, offering a path to improved efficiency and resource allocation in software development workflows.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio Della Porta, Stefano Lambiase, Gemma Catolino, Filomena Ferrucci, Fabio Palomba
{"title":"A Novel, Tool-Supported Catalog of Community Smell Symptoms","authors":"Antonio Della Porta, Stefano Lambiase, Gemma Catolino, Filomena Ferrucci, Fabio Palomba","doi":"10.1002/smr.70067","DOIUrl":"https://doi.org/10.1002/smr.70067","url":null,"abstract":"<div>\u0000 \u0000 <p>Software development is a multifaceted endeavor, requiring a profound grasp of both social dynamics and technical intricacies. Poor collaboration often leads to the accumulation of <i>social debt</i>, manifesting as unforeseen project costs due to sub-optimal team interactions. <i>Community smells</i> have emerged as indicators of these socio-technical inefficiencies and potential social debt. While previous research has focused on automated detection of community smells through analyzing developer communication patterns, our study offers a complementary approach. We emphasize the critical role of project managers in assessing socio-technical dynamics and propose a novel, tool-supported catalog of symptoms. This catalog can be used for manual inspections to identify early signs of community smells at the individual level, allowing managers to address issues before they escalate. Using a mixed-method design that leveraged an existing literature review and a user survey, we cataloged symptoms related to four community smell types. Additionally, we developed TOAST, a tool that operationalizes this catalog, and assessed its usability and practical usefulness through an experiment involving project managers. The study showed that even participants unfamiliar with the term “community smells” were able to interpret the tool's output, reflect on team dynamics, and recognize problematic behavioral patterns when supported by structured symptom-based information. The paper concludes by shedding light on the potential impact of our work and its contribution to advancing the detection and analysis of community smells.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 11","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145581428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongchao Xing, Weipan Yang, Yiming Lv, Dianhui Chu, Zhiying Tu
{"title":"How Far Is Machine Learning From the Detection of Complex Microservice Bad Smells?","authors":"Yongchao Xing, Weipan Yang, Yiming Lv, Dianhui Chu, Zhiying Tu","doi":"10.1002/smr.70064","DOIUrl":"https://doi.org/10.1002/smr.70064","url":null,"abstract":"<div>\u0000 \u0000 <p>Microservice bad smells, arising from poor design and development practices, can severely degrade system quality if unaddressed. While rule-based detection methods exist, their applicability is limited by subjective metric thresholds and the difficulty in defining certain bad smells, particularly complex microservice bad smells that are challenging to express through rules or involve high subjectivity. These smells often involve multiple services or manifest across multiple layers within a service, making them particularly challenging to detect using traditional methods. Without efficient and accurate detection mechanisms, the self-healing capabilities of microservices during operation and continuous evolution will also be compromised. Given the promise of machine learning in code smell detection, this study empirically evaluates its performance in detecting complex microservice bad smells. We employ two sampling techniques and eight classification models on 1180 samples from 55 systems, generating 45 detection models and identifying top classifiers for seven complex microservice bad smell types. We compare machine learning with rule-based methods for high-subjectivity smells, analyze performance gaps, and propose a MAPE-K-based conceptual framework for runtime detection and refactoring. Finally, we discuss the necessity for future research.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 11","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145581132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}