Mining non-functional requirements from App store reviews

被引:0
|
作者
Nishant Jha
Anas Mahmoud
机构
[1] Louisiana State University,Division of Computer Science and Engineering
来源
关键词
Requirements elicitation; Non-functional requirements; Application store; Classification;
D O I
暂无
中图分类号
学科分类号
摘要
User reviews obtained from mobile application (app) stores contain technical feedback that can be useful for app developers. Recent research has been focused on mining and categorizing such feedback into actionable software maintenance requests, such as bug reports and functional feature requests. However, little attention has been paid to extracting and synthesizing the Non-Functional Requirements (NFRs) expressed in these reviews. NFRs describe a set of high-level quality constraints that a software system should exhibit (e.g., security, performance, usability, and dependability). Meeting these requirements is a key factor for achieving user satisfaction, and ultimately, surviving in the app market. To bridge this gap, in this paper, we present a two-phase study aimed at mining NFRs from user reviews available on mobile app stores. In the first phase, we conduct a qualitative analysis using a dataset of 6,000 user reviews, sampled from a broad range of iOS app categories. Our results show that 40% of the reviews in our dataset signify at least one type of NFRs. The results also show that users in different app categories tend to raise different types of NFRs. In the second phase, we devise an optimized dictionary-based multi-label classification approach to automatically capture NFRs in user reviews. Evaluating the proposed approach over a dataset of 1,100 reviews, sampled from a set of iOS and Android apps, shows that it achieves an average precision of 70% (range [66% - 80%]) and average recall of 86% (range [69% - 98%]).
引用
收藏
页码:3659 / 3695
页数:36
相关论文
共 50 条
  • [1] Mining non-functional requirements from App store reviews
    Jha, Nishant
    Mahmoud, Anas
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (06) : 3659 - 3695
  • [2] Identifying Functional and Non-functional Software Requirements From User App Reviews
    Dave, Dev
    Anu, Vaibhav
    [J]. 2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 845 - 850
  • [3] Non-Functional Requirements Analysis Based on Application Reviews in the Android App Market
    Yao, Yongming
    Jiang, Weiyi
    Wang, Yulin
    Song, Peng
    Wang, Bin
    [J]. INFORMATION RESOURCES MANAGEMENT JOURNAL, 2022, 35 (02)
  • [4] Automatic Classification of Non-Functional Requirements in App User Reviews Based on System Model
    Li, Xue-Ying
    Wang, Tian-Lu
    Liang, Peng
    Wang, Chong
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (09): : 2079 - 2089
  • [5] What Aspects do Non-functional Requirements in App User Reviews Describe?: An Exploratory and Comparative Study
    Wang, Tianlu
    Liang, Peng
    Lu, Mengmeng
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 494 - 503
  • [6] Are "Non-functional" Requirements really Non-functional?
    Eckhardt, Jonas
    Vogelsang, Andreas
    Fernandez, Daniel Mendez
    [J]. 2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 832 - 842
  • [7] On non-functional requirements
    Glinz, Martin
    [J]. 15TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 21 - +
  • [8] NFRFinder: A Knowledge Based Strategy for Mining Non-Functional Requirements
    Portugal, Roxana L. Q.
    Li, Tong
    Silva, Lyrene
    Almentero, Eduardo
    do Prado Leite, Julio Cesar S.
    [J]. SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2018, : 102 - 111
  • [9] Mining Non-Functional Requirements using Machine Learning Techniques
    Jindal, Rajni
    Malhotra, Ruchika
    Jain, Abha
    Bansal, Ankita
    [J]. E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2021, 15 (01) : 85 - 114
  • [10] Quantification of Non-functional Requirements
    Khatter, Kiran
    Kalia, Arvind
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 224 - 229