{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T04:26:43Z","timestamp":1743568003365,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031885303","type":"print"},{"value":"9783031885310","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-88531-0_2","type":"book-chapter","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T02:57:40Z","timestamp":1743562660000},"page":"13-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Veracity Debt: Practitioners Voices on\u00a0Managing Software Requirements Concerning Veracity"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1092-4229","authenticated-orcid":false,"given":"Judith","family":"Perera","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3786-1707","authenticated-orcid":false,"given":"Ewan","family":"Tempero","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7284-7081","authenticated-orcid":false,"given":"Yu-Cheng","family":"Tu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4092-9706","authenticated-orcid":false,"given":"Kelly","family":"Blincoe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"2_CR1","unstructured":"ISO\/IEC 25010:2011 - systems and software engineering - systems and software quality requirements and evaluation (square) - system and software quality models (2011). https:\/\/iso25000.com\/index.php\/en\/iso-25000-standards\/iso-25010. Accessed 25 Jan 2025"},{"key":"2_CR2","unstructured":"Ala-Pietil\u00e4, P., et\u00a0al.: The assessment list for trustworthy artificial intelligence (ALTAI). European Commission (2020)"},{"key":"2_CR3","unstructured":"Blincoe, K., Luczak-Roesch, M., Miller, T., Galster, M.: Human-centric literature on trust for SFTI veracity spearhead. arXiv preprint arXiv:2306.00226 (2023)"},{"issue":"2","key":"2_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Ernst, N.A.: On the role of requirements in understanding and managing technical debt. In: 2012 Third International Workshop on Managing Technical Debt, pp. 61\u201364. IEEE (2012). https:\/\/doi.org\/10.1109\/MTD.2012.6226002","DOI":"10.1109\/MTD.2012.6226002"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1037\/h0061470","volume":"51","author":"JC Flanagan","year":"1954","unstructured":"Flanagan, J.C.: The critical incident technique. Psychol. Bull. 51(4), 327 (1954)","journal-title":"Psychol. Bull."},{"key":"2_CR7","unstructured":"Galster, M., Dietrich, J.: Towards understanding provenance in industry (2023)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"113132","DOI":"10.1016\/j.dss.2019.113132","volume":"129","author":"MG Lozano","year":"2020","unstructured":"Lozano, M.G., et al.: Veracity assessment of online data. Decis. Support Syst. 129, 113132 (2020). https:\/\/doi.org\/10.1016\/j.dss.2019.113132","journal-title":"Decis. Support Syst."},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Kitchenham, B.A., Pfleeger, S.L.: Personal opinion surveys. In: Shull, F., Singer, J., Sj\u00f8berg, D.I.K. (eds.) Guide to Advanced Empirical Software Engineering, pp. 63\u201392. Springer, London (2008). https:\/\/doi.org\/10.1007\/978-1-84800-044-5_3","DOI":"10.1007\/978-1-84800-044-5_3"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Lenarduzzi, V., Fucci, D.: Towards a holistic definition of requirements debt. In: 2019 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp.\u00a01\u20135. IEEE (2019). https:\/\/doi.org\/10.1109\/ESEM.2019.8870159","DOI":"10.1109\/ESEM.2019.8870159"},{"key":"2_CR11","volume-title":"Guidelines for Conducting Surveys in Software Engineering","author":"J Lin\u00e5ker","year":"2015","unstructured":"Lin\u00e5ker, J., Sulaman, S.M., de Mello, R.M., H\u00f6st, M.: Guidelines for Conducting Surveys in Software Engineering. Lund University, Department of Computer Science (2015)"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Luczak-Roesch, M., Galster, M., Shedlock, K.: The veracity grand challenge in computing: a perspective from Aotearoa New Zealand. Commun. ACM 66(7), 67\u201369 (2023).https:\/\/doi.org\/10.1145\/3589154","DOI":"10.1145\/3589154"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Melo, A., Fagundes, R., Lenarduzzi, V., Santos, W.B.: Identification and measurement of requirements technical debt in software development: a systematic literature review. J. Syst. Softw. 111483 (2022)","DOI":"10.1016\/j.jss.2022.111483"},{"key":"2_CR14","unstructured":"Mendez, D., Avgeriou, P., Kalinowski, M., Ali, N.B.: Handbook on Teaching Empirical Software Engineering"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00766-021-00367-z","volume":"27","author":"L Montgomery","year":"2022","unstructured":"Montgomery, L., Fucci, D., Bouraffa, A., Scholz, L., Maalej, W.: Empirical research on requirements quality: a systematic mapping study. Requirements Eng. 27(2), 183\u2013209 (2022)","journal-title":"Requirements Eng."},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Perera, J., Tempero, E., Tu, Y.C., Blincoe, K.: Quantifying requirements technical debt: a systematic mapping study and a conceptual model. In: 2023 IEEE 31st International Requirements Engineering Conference (RE), pp. 123\u2013133 (2023). https:\/\/doi.org\/10.1109\/RE57278.2023.00021","DOI":"10.1109\/RE57278.2023.00021"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Perera, J., Tempero, E., Tu, Y.C., Blincoe, K.: Modelling the quantification of requirements technical debt. Requirements Eng. 1\u201338 (2024). https:\/\/doi.org\/10.1007\/s00766-024-00424-3","DOI":"10.1007\/s00766-024-00424-3"},{"key":"2_CR18","unstructured":"Ralph, P., et\u00a0al.: Empirical standards for software engineering research. arXiv preprint arXiv:2010.03525 (2020)"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s11390-018-1843-2","volume":"33","author":"X Yang","year":"2018","unstructured":"Yang, X., Jabeen, G., Luo, P., Zhu, X.L., Liu, M.H.: A unified measurement solution of software trustworthiness based on social-to-software framework. J. Comput. Sci. Technol. 33, 603\u2013620 (2018)","journal-title":"J. Comput. Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-88531-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T02:57:56Z","timestamp":1743562676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-88531-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031885303","9783031885310"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-88531-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}