Luigi Quaranta , Kelly Azevedo , Fabio Calefato , Marcos Kalinowski
{"title":"A multivocal literature review on the benefits and limitations of industry-leading AutoML tools","authors":"Luigi Quaranta , Kelly Azevedo , Fabio Calefato , Marcos Kalinowski","doi":"10.1016/j.infsof.2024.107608","DOIUrl":"10.1016/j.infsof.2024.107608","url":null,"abstract":"<div><h3>Context:</h3><div>Rapid advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing software engineering in every application domain, driving unprecedented transformations and fostering innovation. However, despite these advances, several organizations are experiencing friction in the adoption of ML-based technologies, mainly due to the current shortage of ML professionals. In this context, Automated Machine Learning (AutoML) techniques have been presented as a promising solution to democratize ML adoption, even in the absence of specialized people.</div></div><div><h3>Objective:</h3><div>Our research aims to provide an overview of the evidence on the benefits and limitations of AutoML tools being adopted in industry.</div></div><div><h3>Methods:</h3><div>We conducted a Multivocal Literature Review, which allowed us to identify 54 sources from the academic literature and 108 sources from the grey literature reporting on AutoML benefits and limitations. We extracted explicitly reported benefits and limitations from the papers and applied the thematic analysis method for synthesis.</div></div><div><h3>Results:</h3><div>In general, we identified 18 reported benefits and 25 limitations. Concerning the benefits, we highlight that AutoML tools can help streamline the core steps of ML workflows, namely data preparation, feature engineering, model construction, and hyperparameter tuning—with concrete benefits on model performance, efficiency, and scalability. In addition, AutoML empowers both novice and experienced data scientists, promoting ML accessibility. However, we highlight several limitations that may represent obstacles to the widespread adoption of AutoML. For instance, AutoML tools may introduce barriers to transparency and interoperability, exhibit limited flexibility for complex scenarios, and offer inconsistent coverage of the ML workflow.</div></div><div><h3>Conclusion:</h3><div>The effectiveness of AutoML in facilitating the adoption of machine learning by users may vary depending on the specific tool and the context in which it is used. Today, AutoML tools are used to increase human expertise rather than replace it and, as such, require skilled users.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107608"},"PeriodicalIF":3.8,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using AI-based coding assistants in practice: State of affairs, perceptions, and ways forward","authors":"Agnia Sergeyuk , Yaroslav Golubev , Timofey Bryksin , Iftekhar Ahmed","doi":"10.1016/j.infsof.2024.107610","DOIUrl":"10.1016/j.infsof.2024.107610","url":null,"abstract":"<div><h3>Context:</h3><div>The last several years saw the emergence of <em>AI assistants</em> for code — multi-purpose AI-based helpers in software engineering. As they become omnipresent in all aspects of software development, it becomes critical to understand their usage patterns.</div></div><div><h3>Objective:</h3><div>We aim to better understand <em>how specifically</em> developers are using AI assistants, why they are <em>not</em> using them in certain parts of their development workflow, and what needs to be improved in the future.</div></div><div><h3>Methods:</h3><div>In this work, we carried out a large-scale survey aimed at how AI assistants are used, focusing on specific software development activities and stages. We collected opinions of 481 programmers on five broad activities: (a) implementing new features, (b) writing tests, (c) bug triaging, (d) refactoring, and (e) writing natural-language artifacts, as well as their individual stages.</div></div><div><h3>Results:</h3><div>Our results provide a novel comparison of different stages where AI assistants are used that is both comprehensive and detailed. It highlights specific activities that developers find less enjoyable and want to delegate to an AI assistant, <em>e.g.</em>, writing tests and natural-language artifacts. We also determine more granular stages where AI assistants are used, such as generating tests and generating docstrings, as well as less studied parts of the workflow, such as generating test data. Among the reasons for not using assistants, there are general aspects like trust and company policies, as well as more concrete issues like the lack of project-size context, which can be the focus of the future research.</div></div><div><h3>Conclusion:</h3><div>The provided analysis highlights stages of software development that developers want to delegate and that are already popular for using AI assistants, which can be a good focus for features aimed to help developers right now. The main reasons for not using AI assistants can serve as a guideline for future work.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107610"},"PeriodicalIF":3.8,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongwei Tao , Han Liu , Xiaoxu Niu , Licheng Ding , Yixiang Chen , Qiaoling Cao
{"title":"Software aging oriented trustworthiness measurement based on weighted Boltzmann entropy","authors":"Hongwei Tao , Han Liu , Xiaoxu Niu , Licheng Ding , Yixiang Chen , Qiaoling Cao","doi":"10.1016/j.infsof.2024.107606","DOIUrl":"10.1016/j.infsof.2024.107606","url":null,"abstract":"<div><h3>Context:</h3><div>With the rapid development of software, various software accidents emerge one after another. The catastrophic consequences caused by these accidents make people realize the importance of software trustworthiness. As an indispensable means to ensure software quality, traditional trustworthiness measurement evaluates the software trustworthiness by studying the trustworthy attributes in a static way. However, most of the factors considered in trustworthy attributes tend to be dynamic with time. The current research often ignores the changes in software after running for some time, and cannot reflect the changes in software trustworthiness at different running times.</div></div><div><h3>Objective:</h3><div>Our objective in this paper is to study the relationship between running time and software trustworthiness, and design a running time-related software trustworthiness measurement model from the untrustworthy evidence related to software aging.</div></div><div><h3>Method:</h3><div>We first extract the untrustworthy evidence from the bugs related to software aging in 5 subsystems of 4 public defect databases and 18 well-known software accidents, establish a risk level model, and design metric elements of untrustworthy evidence based on software aging. Then we construct a software aging cause category trustworthiness measurement model based on Boltzmann entropy. Finally, we build a software trustworthiness measurement model based on weighted Boltzmann entropy. For the weight values used in the model, the Brassard Priority Synthesis Analysis method was used to determine them.</div></div><div><h3>Result:</h3><div>Different from the common resource consumption parameter and performance parameter, a model based on weighted Boltzmann entropy can describe the influence of various parameters on the software’s trustworthiness through risk state. It can reflect the change of system state and describe the system state completely.</div></div><div><h3>Conclusion:</h3><div>The empirical study shows the effectiveness and practicality of our method for evaluating software dynamic trustworthiness. Meanwhile, it also indicates a promising avenue for future research and application in the field of software trustworthiness measurement.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107606"},"PeriodicalIF":3.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of minimum viable product on software ecosystem failure","authors":"Kati Saarni , Marjo Kauppinen , Tomi Männistö","doi":"10.1016/j.infsof.2024.107612","DOIUrl":"10.1016/j.infsof.2024.107612","url":null,"abstract":"<div><h3>Context</h3><div>Companies are interested in building successful value-producing ecosystems together to offer end users a broader digital service offering and better meet customer needs. However, most ecosystems fail in the early years.</div></div><div><h3>Objective</h3><div>We investigated one small software ecosystem from the planning phase to the operative phase, where the participating companies left one by one because the software ecosystem was unsuccessful, and the software ecosystem ended after four operative years. The software ecosystem provided a digital service offering based on the defined MVP (Minimum Viable Product). That is why we were interested in understanding the MVP's impact on the ecosystem's failure.</div></div><div><h3>Method</h3><div>We conducted a case study, the results of which are based on the semi-structured interviews of eight representatives of the software ecosystem.</div></div><div><h3>Results</h3><div>This study showed that the actors prioritized out functionalities from the MVP, and the MVP was no longer based on the defined value proposition, target customer groups, and customer paths. It was then difficult for the actors to achieve their objectives. The companies’ commitment depended on the set objectives, and when the objectives were not achieved, the actors left the ecosystem, and the software ecosystem failed.</div></div><div><h3>Conclusion</h3><div>The results show that the MVP can significantly affect the failure of the small software ecosystem, where all actors have a keystone role. The MVP largely defines what kind of digital service offering the software ecosystem provides and whether the actors can achieve the objectives, especially their sales goals. Thus, prioritizing the functionalities of the MVP is a critical activity.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107612"},"PeriodicalIF":3.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142572785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anjana M.S. , Patricia Lago , Aryadevi Remanidevi Devidas , Maneesha Vinodini Ramesh
{"title":"Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems","authors":"Anjana M.S. , Patricia Lago , Aryadevi Remanidevi Devidas , Maneesha Vinodini Ramesh","doi":"10.1016/j.infsof.2024.107607","DOIUrl":"10.1016/j.infsof.2024.107607","url":null,"abstract":"<div><h3>Context:</h3><div>India’s coal use for electricity jumped 13% in 2021–22. Energy management systems (EnMS) are seen as a solution, but only sustainable EnMS can have a discernable impact on the carbon footprint and the Return On Investment (ROI).</div></div><div><h3>Objective:</h3><div>Designing a software-intensive sustainable energy management system requires considering technical, environmental, social, and economic factors. This helps evaluate an EnMS’s overall impact and improve its design. We proposed EnSAF for efficient utilization of the energy incurred for the design of sustainability-aware EnMSs.</div></div><div><h3>Method:</h3><div>In this work, EnMSs in diverse use cases were selected and analyzed in terms of technical, social, environmental, and economic dimensions of sustainability in collaboration with various stakeholders. The set of application-specific design concerns and Quality Attributes (QAs) were addressed by the Sustainability Assessment Framework (SAF) toolkit. The resultant SAF instances of each EnMS, derived through the analysis and discussion with the stakeholders, were then analyzed to advocate the DMs and SQ model for generic EnMSs.</div></div><div><h3>Results:</h3><div>This study demonstrated the following outcomes (i) technical concerns dominate the existing EnMSs (ii) integration of renewable energy resources reduces dependency to the main power grid and nurtures a sustainable environment by diminishing carbon footprint, and minimizing payback time, in the economic dimension; (iii) extant definitions of quality attributes need significant scrutiny and updates apropos of objectives of EnMSs</div></div><div><h3>Conclusion:</h3><div>The SAF toolkit was found to be deficient in the representation of relevant design concerns and quality attributes concomitant with sustainable EnMS. Prevailing DMs are inept to factor in stakeholder’s concerns, as the model is ill-equipped to account for spatio-temporal representation of QAs. Pursuant to the insights from the 4 SAF instances, a generic framework, EnSAF, is proposed to tackle the relevant concerns apropos of EnMS sustainability. This work proposed a representation of DMs in the SAF toolkit specifically for sustainability-aware EnMS.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107607"},"PeriodicalIF":3.8,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FOBICS: Assessing project security level through a metrics framework that evaluates DevSecOps performance","authors":"Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo","doi":"10.1016/j.infsof.2024.107605","DOIUrl":"10.1016/j.infsof.2024.107605","url":null,"abstract":"<div><h3>Context:</h3><div>In today’s software development landscape, the DevSecOps approach has gained traction due to its focus on the software development process and bolstering security measures in projects, a task in light of the ever-evolving cybersecurity threats.</div></div><div><h3>Objective:</h3><div>This study aims to address the lack of metrics for quantitatively assessing its efficacy from both security and business logic perspectives.</div></div><div><h3>Methods:</h3><div>To tackle this issue, the research introduces the Framework of Business Index Concerning Security (FOBICS), a set of metrics designed to enable transparent evaluations of project security. FOBICS considers various perspectives relevant to DevSecOps practices. It includes factors such as project duration and financial outcomes, making it appealing for implementation in business settings.</div></div><div><h3>Results:</h3><div>The effectiveness of FOBICS is validated theoretically and empirically via its application in two real-world projects: the results from these implementations show a correlation between FOBICS metrics and the security strategies employed as the development methodologies adopted by diverse teams throughout the projects.</div></div><div><h3>Conclusion:</h3><div>Hence, FOBICS emerges as a tool for assessing and continuously monitoring project security, offering insights into areas of strength and areas that may require enhancement. FOBICS is shown to be effective in assessing the level of DevSecOps implementation. The ease of calculating FOBICS metrics makes them easily interpretable and continuously verifiable. Moreover, FOBICS summarizes most of the other quantitative and qualitative metrics in the literature.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107605"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic robustness evaluation for automated model selection in operation","authors":"Jin Zhang , Jingyue Li , Zhirong Yang","doi":"10.1016/j.infsof.2024.107603","DOIUrl":"10.1016/j.infsof.2024.107603","url":null,"abstract":"<div><h3>Context:</h3><div>The increasing use of artificial neural network (ANN) classifiers in systems, especially safety-critical systems (SCSs), requires ensuring their robustness against out-of-distribution (OOD) shifts in operation, which are changes in the underlying data distribution from the data training the classifier. However, measuring the robustness of classifiers in operation with only unlabeled data is challenging. Additionally, machine learning engineers may need to compare different models or versions of the same model and switch to an optimal version based on their robustness.</div></div><div><h3>Objective:</h3><div>This paper explores the problem of dynamic robustness evaluation for automated model selection. We aim to find efficient and effective metrics for evaluating and comparing the robustness of multiple ANN classifiers using unlabeled operational data.</div></div><div><h3>Methods:</h3><div>To quantitatively measure the differences between the model outputs and assess robustness under OOD shifts using unlabeled data, we choose distance-based metrics. An empirical comparison of five such metrics, suitable for higher-dimensional data like images, is performed. The selected metrics include Wasserstein distance (WD), maximum mean discrepancy (MMD), Hellinger distance (HL), Kolmogorov–Smirnov statistic (KS), and Kullback–Leibler divergence (KL), known for their efficacy in quantifying distribution differences. We evaluate these metrics on 20 state-of-the-art models (ten CIFAR10-based models, five CIFAR100-based models, and five ImageNet-based models) from a widely used robustness benchmark (<strong>RobustBench</strong>) using data perturbed with various types and magnitudes of corruptions to mimic real-world OOD shifts.</div></div><div><h3>Results:</h3><div>Our findings reveal that the WD metric outperforms others when ranking multiple ANN models for CIFAR10- and CIFAR100-based models, while the KS metric demonstrates superior performance for ImageNet-based models. MMD can be used as a reliable second option for both datasets.</div></div><div><h3>Conclusion:</h3><div>This study highlights the effectiveness of distance-based metrics in ranking models’ robustness for automated model selection. It also emphasizes the significance of advancing research in dynamic robustness evaluation.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107603"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142539048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on Cryptoagility and Agile Practices in the light of quantum resistance","authors":"Lodovica Marchesi , Michele Marchesi , Roberto Tonelli","doi":"10.1016/j.infsof.2024.107604","DOIUrl":"10.1016/j.infsof.2024.107604","url":null,"abstract":"<div><h3>Context:</h3><div>Crypto-agility, a name that stems from agile methodologies for software development, means the ability to modify quickly and securely cryptographic algorithms in the event of a compromise. The advent of quantum computing poses existential threats to current cryptography, having the power to breach current cryptography systems.</div></div><div><h3>Objective:</h3><div>We investigated whether and to what extent agile practices for software development are suited to support crypto-agility, or not. In particular, we discuss their usefulness in the context of substituting current algorithms with quantum-resistant ones.</div></div><div><h3>Method:</h3><div>First, we analyzed the literature to define a subset of 15 agile practices potentially relevant to cryptographic software development. Then, we developed a questionnaire to assess the suitability of agile practices for obtaining crypto-agility. We performed a Web search of relevant documents about crypto-agility and quantum resistance and sent their authors the questionnaire. We also sent the questionnaire to cybersecurity officers of four Italian firms. We analyzed and discussed the responses to 32 valid questionnaires.</div></div><div><h3>Results:</h3><div>The respondents’ affiliations are evenly distributed between researchers and developers. Most of them are active, or somehow active, in quantum-resistant cryptography and use agile methods. Most of the agile practices are deemed to be quite useful, or very useful to get crypto-agility, the most effective being Continuous Integration and Coding Standards; the least appreciated is Self-organizing Team.</div></div><div><h3>Conclusion:</h3><div>According to researchers and developers working in the field, the safe transition of cryptographic algorithms to quantum-resistant ones can benefit from the adoption of many agile practices. Further software engineering research is needed to integrate agile practices in more formal cryptographic software development processes.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107604"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yue Pan , Chen Lyu , Zhenyu Yang , Lantian Li , Qi Liu , Xiuting Shao
{"title":"E-code: Mastering efficient code generation through pretrained models and expert encoder group","authors":"Yue Pan , Chen Lyu , Zhenyu Yang , Lantian Li , Qi Liu , Xiuting Shao","doi":"10.1016/j.infsof.2024.107602","DOIUrl":"10.1016/j.infsof.2024.107602","url":null,"abstract":"<div><h3>Context:</h3><div>With the waning of Moore’s Law, the software industry is placing increasing importance on finding alternative solutions for continuous performance enhancement. The significance and research results of software performance optimization have been on the rise in recent years, especially with the advancement propelled by <strong>L</strong>arge <strong>L</strong>anguage <strong>M</strong>odel<strong>s</strong> (LLMs). However, traditional strategies for rectifying performance flaws have shown significant limitations at the competitive code efficiency optimization level, and research on this topic is surprisingly scarce.</div></div><div><h3>Objective:</h3><div>This study aims to address the research gap in this domain, offering practical solutions to the various challenges encountered. Specifically, we have overcome the constraints of traditional performance error rectification strategies and developed a <strong>L</strong>anguage <strong>M</strong>odel (LM) tailored for the competitive code efficiency optimization realm.</div></div><div><h3>Methods:</h3><div>We introduced E-code, an advanced program synthesis LM. Inspired by the recent success of expert LMs, we designed an innovative structure called the Expert Encoder Group. This structure employs multiple expert encoders to extract features tailored for different input types. We assessed the performance of E-code against other leading models on a competitive dataset and conducted in-depth ablation experiments.</div></div><div><h3>Results:</h3><div>Upon systematic evaluation, E-code achieved a 54.98% improvement in code efficiency, significantly outperforming other advanced models. In the ablation experiments, we further validated the significance of the expert encoder group and other components within E-code.</div></div><div><h3>Conclusion:</h3><div>The research findings indicate that the expert encoder group can effectively handle various inputs in efficiency optimization tasks, significantly enhancing the model’s performance. In summary, this study paves new avenues for developing systems and methods to assist programmers in writing efficient code.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107602"},"PeriodicalIF":3.8,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic review on the current state of computer-supported argumentation learning systems","authors":"Laura Sinikallio , Lili Aunimo , Tomi Männistö","doi":"10.1016/j.infsof.2024.107598","DOIUrl":"10.1016/j.infsof.2024.107598","url":null,"abstract":"<div><h3>Context:</h3><div>Argumentation is a fundamental part of learning, communication and problem-solving not only in software engineering but all education. Teaching argumentation is a long-standing practice, and with the advance of digital learning, it, too, has been transitioning to an online format.</div></div><div><h3>Objective:</h3><div>As computer-supported argumentation learning progresses, other learning domains have much to learn from it on how to enable argumentation and reasoning in automated and scalable online learning solutions.</div></div><div><h3>Methods:</h3><div>To review the current state of the field, we conducted a systematic literature review on the last decade of academic research and design on computer-supported argumentation learning systems. We reviewed and summarised the central aspects and approaches of reported systems.</div></div><div><h3>Results:</h3><div>We reviewed 34 different argumentation learning tools. The review showed that approaches to computer-supported argumentation vary significantly in many aspects, e.g., argumentation theory, learning task types and collaboration status. However, the use of argumentation graphs is quite common. Most modern tools seem to embrace the role of feedback in learning.</div></div><div><h3>Conclusions:</h3><div>The role of individual learning has risen in computer-supported argumentation learning. This is in opposition to previous predictions and statements on the role of collaborative learning of argumentation. Automated feedback has, on the other hand, become commonplace in collaborative and individual-use argumentation learning tools. The modern generation of argumentation teaching tools is Web-based but recently we have also seen the emergence of mobile-based solutions.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107598"},"PeriodicalIF":3.8,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}