{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:58:44Z","timestamp":1743112724078,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031783852"},{"type":"electronic","value":"9783031783869"}],"license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78386-9_6","type":"book-chapter","created":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T16:44:54Z","timestamp":1733071494000},"page":"75-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Software Quality Through User Reviews: The ISOftSentiment Tool"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8042-3278","authenticated-orcid":false,"given":"Fang","family":"Hou","sequence":"first","affiliation":[]},{"given":"Liang","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3270-4398","authenticated-orcid":false,"given":"Siamak","family":"Farshidi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3752-2868","authenticated-orcid":false,"given":"Slinger","family":"Jansen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1007\/s10664-019-09792-9","volume":"25","author":"R Abdalkareem","year":"2020","unstructured":"Abdalkareem, R., Oda, V., Mujahid, S., Shihab, E.: On the impact of using trivial packages: an empirical case study on npm and PyPi. Empir. Softw. Eng. 25, 1168\u20131204 (2020)","journal-title":"Empir. Softw. Eng."},{"issue":"2","key":"6_CR2","first-page":"190","volume":"52","author":"A Ahmad","year":"2018","unstructured":"Ahmad, A., Feng, C., Ge, S., Yousif, A.: A survey on mining stack overflow: question and answering (q &a) community. Data Technol. Appl. 52(2), 190\u2013247 (2018)","journal-title":"Data Technol. Appl."},{"issue":"1","key":"6_CR3","first-page":"32","volume":"1","author":"S Asghar","year":"2010","unstructured":"Asghar, S., Umar, M.: Requirement engineering challenges in development of software applications and selection of customer-off-the-shelf (cots) components. Int. J. Softw. Eng. 1(1), 32\u201350 (2010)","journal-title":"Int. J. Softw. Eng."},{"issue":"1","key":"6_CR4","first-page":"113","volume":"32","author":"I Atoum","year":"2020","unstructured":"Atoum, I.: A novel framework for measuring software quality-in-use based on semantic similarity and sentiment analysis of software reviews. J. King Saud Univ.-Comput. Inf. Sci. 32(1), 113\u2013125 (2020)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1016\/j.jss.2010.10.019","volume":"84","author":"C Ayala","year":"2011","unstructured":"Ayala, C., Hauge, \u00d8., Conradi, R., Franch, X., Li, J.: Selection of third party software in off-the-shelf-based software development-an interview study with industrial practitioners. J. Syst. Softw. 84(4), 620\u2013637 (2011)","journal-title":"J. Syst. Softw."},{"key":"6_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111005","volume":"180","author":"T Bi","year":"2021","unstructured":"Bi, T., Liang, P., Tang, A., Xia, X.: Mining architecture tactics and quality attributes knowledge in stack overflow. J. Syst. Softw. 180, 111005 (2021)","journal-title":"J. Syst. Softw."},{"issue":"18","key":"6_CR7","doi-asserted-by":"publisher","first-page":"3798","DOI":"10.3390\/electronics12183798","volume":"12","author":"W Bu","year":"2023","unstructured":"Bu, W., Shu, H., Kang, F., Hu, Q., Zhao, Y.: Software subclassification based on bertopic-bert-bilstm model. Electronics 12(18), 3798 (2023)","journal-title":"Electronics"},{"key":"6_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110714","volume":"169","author":"S Farshidi","year":"2020","unstructured":"Farshidi, S., Jansen, S., van der Werf, J.M.: Capturing software architecture knowledge for pattern-driven design. J. Syst. Softw. 169, 110714 (2020)","journal-title":"J. Syst. Softw."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Hou, F., Jansen, F., De\u00a0Vries, A., Jansen, S.: The role of software trust in selection of open-source and closed software. In: 2023 IEEE\/ACM 11th International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS), pp. 30\u201337. IEEE (2023)","DOI":"10.1109\/SESoS59159.2023.00010"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/0165-0114(95)00185-9","volume":"79","author":"HM Hsu","year":"1996","unstructured":"Hsu, H.M., Chen, C.T.: Aggregation of fuzzy opinions under group decision making. Fuzzy Sets Syst. 79(3), 279\u2013285 (1996)","journal-title":"Fuzzy Sets Syst."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Hussain, M.E., Hussain, R.: Real time Aho-corasick implementation of string matching technique suitable for smart IoT. In: 2021 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), pp.\u00a01\u20136 (2021)","DOI":"10.1109\/SMARTGENCON51891.2021.9645846"},{"key":"6_CR12","unstructured":"International Organization for Standardization: ISO\/IEC 25010:2011 - Systems and software engineering. Technical Report ISO\/IEC 25010, ISO (2011)"},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115019","volume":"178","author":"N Jing","year":"2021","unstructured":"Jing, N., Wu, Z., Wang, H.: A hybrid model integrating deep learning with investor sentiment analysis for stock price prediction. Expert Syst. Appl. 178, 115019 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"6_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.entcs.2009.09.041","volume":"238","author":"M de Jonge","year":"2009","unstructured":"de Jonge, M.: Developing product lines with third-party components. Electron. Notes Theor. Comput. Sci. 238(5), 63\u201380 (2009)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"6_CR15","unstructured":"Kenton, J.D.M.W.C., Toutanova, L.K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of naacL-HLT, vol.\u00a01, p.\u00a02 (2019)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Leopairote, W., Surarerks, A., Prompoon, N.: Evaluating software quality in use using user reviews mining. In: The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 257\u2013262. IEEE (2013)","DOI":"10.1109\/JCSSE.2013.6567355"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Li, P.L., Ko, A.J., Zhu, J.: What makes a great software engineer? In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol.\u00a01, pp. 700\u2013710. IEEE (2015)","DOI":"10.1109\/ICSE.2015.335"},{"issue":"20","key":"6_CR18","doi-asserted-by":"publisher","first-page":"28079","DOI":"10.1007\/s11042-021-11892-y","volume":"81","author":"Z Li","year":"2022","unstructured":"Li, Z., Shen, Z.: Deep semantic mining of big multimedia data advertisements based on needs ontology construction. Multimedia Tools Appl. 81(20), 28079\u201328102 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Lin, B., Zampetti, F., Bavota, G., Di\u00a0Penta, M., Lanza, M., Oliveto, R.: Sentiment analysis for software engineering: how far can we go? In: Proceedings of the 40th International Conference on Software Engineering, pp. 94\u2013104 (2018)","DOI":"10.1145\/3180155.3180195"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-19460-3_1","volume-title":"Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data","author":"B Liu","year":"2011","unstructured":"Liu, B.: Introduction. In: Liu, B. (ed.) Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, pp. 1\u201314. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19460-3_1"},{"key":"6_CR21","unstructured":"Liu, Y., et al.: RoBERTa: a robustly optimized BERT pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"M\u00e4ntyl\u00e4, M.V., Novielli, N., Lanubile, F., Claes, M., Kuutila, M.: Bootstrapping a lexicon for emotional arousal in software engineering. In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp. 198\u2013202. IEEE (2017)","DOI":"10.1109\/MSR.2017.47"},{"issue":"4","key":"6_CR23","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1016\/j.asej.2014.04.011","volume":"5","author":"W Medhat","year":"2014","unstructured":"Medhat, W., Hassan, A., Korashy, H.: Sentiment analysis algorithms and applications: a survey. Ain Shams Eng. J. 5(4), 1093\u20131113 (2014)","journal-title":"Ain Shams Eng. J."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., Tarau, P.: TextRank: bringing order into text. In: Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing, pp. 404\u2013411 (2004)","DOI":"10.3115\/1220575.1220627"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Mutanov, G., Karyukin, V., Mamykova, Z.: Multi-class sentiment analysis of social media data with machine learning algorithms. Comput. Mater. Continua 69(1) (2021)","DOI":"10.32604\/cmc.2021.017827"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Obaidi, M., Nagel, L., Specht, A., Kl\u00fcnder, J.: Sentiment analysis tools in software engineering: a systematic mapping study. Inf. Softw. Technol., 107018 (2022)","DOI":"10.1016\/j.infsof.2022.107018"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Ohm, M., Stuke, C.: SoK: practical detection of software supply chain attacks. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1\u201311 (2023)","DOI":"10.1145\/3600160.3600162"},{"issue":"10","key":"6_CR28","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1016\/j.infsof.2014.03.012","volume":"56","author":"M Oriol","year":"2014","unstructured":"Oriol, M., Marco, J., Franch, X.: Quality models for web services: a systematic mapping. Inf. Softw. Technol. 56(10), 1167\u20131182 (2014)","journal-title":"Inf. Softw. Technol."},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., et\u00a0al.: Opinion mining and sentiment analysis. Found. Trends\u00ae Inf. Retrieval 2(1\u20132), 1\u2013135 (2008)","DOI":"10.1561\/1500000011"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5534615","volume":"2021","author":"G Pang","year":"2021","unstructured":"Pang, G., et al.: Aspect-level sentiment analysis approach via BERT and aspect feature location model. Wirel. Commun. Mob. Comput. 2021, 1\u201313 (2021)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"2","key":"6_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1839667.1839672","volume":"7","author":"D Pao","year":"2010","unstructured":"Pao, D., Lin, W., Liu, B.: A memory-efficient pipelined implementation of the Aho-corasick string-matching algorithm. ACM Trans. Archit. Code Optim. (TACO) 7(2), 1\u201327 (2010)","journal-title":"ACM Trans. Archit. Code Optim. (TACO)"},{"issue":"8","key":"6_CR32","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.im.2016.06.002","volume":"53","author":"J Qi","year":"2016","unstructured":"Qi, J., Zhang, Z., Jeon, S., Zhou, Y.: Mining customer requirements from online reviews: a product improvement perspective. Inf. Manage. 53(8), 951\u2013963 (2016)","journal-title":"Inf. Manage."},{"issue":"3","key":"6_CR33","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0165-0114(92)90236-W","volume":"52","author":"X Ruoning","year":"1992","unstructured":"Ruoning, X., Xiaoyan, Z.: Extensions of the analytic hierarchy process in fuzzy environment. Fuzzy Sets Syst. 52(3), 251\u2013257 (1992)","journal-title":"Fuzzy Sets Syst."},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Shukri, S.E., Yaghi, R.I., Aljarah, I., Alsawalqah, H.: Twitter sentiment analysis: a case study in the automotive industry. In: 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp.\u00a01\u20135. IEEE (2015)","DOI":"10.1109\/AEECT.2015.7360594"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Van\u00a0Oordt, S., Guzman, E.: On the role of user feedback in software evolution: a practitioners\u2019 perspective. In: 2021 IEEE 29th International Requirements Engineering Conference (RE), pp. 221\u2013232. IEEE (2021)","DOI":"10.1109\/RE51729.2021.00027"},{"issue":"7","key":"6_CR36","doi-asserted-by":"publisher","first-page":"5731","DOI":"10.1007\/s10462-022-10144-1","volume":"55","author":"M Wankhade","year":"2022","unstructured":"Wankhade, M., Rao, A.C.S., Kulkarni, C.: A survey on sentiment analysis methods, applications, and challenges. Artif. Intell. Rev. 55(7), 5731\u20135780 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"6_CR37","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-38977-1_14","volume-title":"Safe and Secure Software Reuse","author":"Y Zou","year":"2013","unstructured":"Zou, Y., Liu, C., Jin, Y., Xie, B.: Assessing software quality through web comment search and analysis. In: Favaro, J., Morisio, M. (eds.) Safe and Secure Software Reuse, pp. 208\u2013223. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38977-1_14"}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78386-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T17:02:50Z","timestamp":1733072570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78386-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"ISBN":["9783031783852","9783031783869"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78386-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PROFES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Product-Focused Software Process Improvement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tartu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"profes2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/profes-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}