{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:42:12Z","timestamp":1771699332645,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["RI 2147\/7-1"],"award-info":[{"award-number":["RI 2147\/7-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001652","name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001652","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Using qualitative data analysis (QDA) to perform domain analysis and modeling has shown great promise. Yet, the evaluation of such approaches has been limited to single-case case studies. While these exploratory cases are valuable for an initial assessment, the evaluation of the efficacy of QDA to solve the suggested problems is restricted by the common single-case case study research design. Using our own method, called QDAcity-RE, as the example, we present an in-depth empirical evaluation of employing qualitative data analysis for domain modeling using a controlled experiment design. Our controlled experiment shows that the QDA-based method leads to a deeper and richer set of domain concepts discovered from the data, while also being more time efficient than the control group using a comparable non-QDA-based method with the same level of traceability.<\/jats:p>","DOI":"10.1007\/s00766-021-00360-6","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T09:04:16Z","timestamp":1629104656000},"page":"31-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A validation of QDAcity-RE for domain modeling using qualitative data analysis"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1463-3389","authenticated-orcid":false,"given":"Andreas","family":"Kaufmann","sequence":"first","affiliation":[]},{"given":"Julia","family":"Krause","sequence":"additional","affiliation":[]},{"given":"Nikolay","family":"Harutyunyan","sequence":"additional","affiliation":[]},{"given":"Ann","family":"Barcomb","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Riehle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"key":"360_CR1","doi-asserted-by":"crossref","unstructured":"Adler A, Gujar A, Harrison BL, O\u2019hara K, Sellen A (1998) A diary study of work-related reading: design implications for digital reading devices, pp 241\u2013248","DOI":"10.1145\/274644.274679"},{"key":"360_CR2","doi-asserted-by":"crossref","unstructured":"Begel A, Simon B (2008) Novice software developers, all over again. In: Proceedings of the fourth international workshop on computing education research, pp 3\u201314","DOI":"10.1145\/1404520.1404522"},{"key":"360_CR3","unstructured":"Berry DM, Godfrey MW, Holt R, Kapser CJ, Ramos I (2013) Requirements specifications and recovered architectures as grounded theories"},{"issue":"1","key":"360_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MS.1984.233702","volume":"1","author":"BW Boehm","year":"1984","unstructured":"Boehm BW (1984) Verifying and validating software requirements and design specifications. IEEE Softw 1(1):75","journal-title":"IEEE Softw"},{"key":"360_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.2307\/249704","volume":"1992","author":"TA Byrd","year":"1992","unstructured":"Byrd TA, Cossick KL, Zmud RW (1992) A synthesis of research on requirements analysis and knowledge acquisition techniques. MIS Q 1992:117\u2013138","journal-title":"MIS Q"},{"issue":"2","key":"360_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.infsof.2004.06.005","volume":"47","author":"L Carvalho","year":"2005","unstructured":"Carvalho L, Scott L, Jeffery R (2005) An exploratory study into the use of qualitative research methods in descriptive process modelling. Inf Softw Technol 47(2):113\u2013127","journal-title":"Inf Softw Technol"},{"key":"360_CR7","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Dehlinger J (2009) Applying the grounded theory method to derive enterprise system requirements. In: 10th ACIS international conference on Software engineering, artificial intelligences, networking, and parallel\/distributed computing, SNPD\u201909, 2009. IEEE Computer Society, pp 333\u2013338","DOI":"10.1109\/SNPD.2009.102"},{"issue":"3","key":"360_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2629351","volume":"5","author":"S Chakraborty","year":"2015","unstructured":"Chakraborty S, Rosenkranz C, Dehlinger J (2015) Getting to the shalls: facilitating sensemaking in requirements engineering. ACM Trans Manag Inf Syst 5(3):14","journal-title":"ACM Trans Manag Inf Syst"},{"key":"360_CR9","doi-asserted-by":"crossref","unstructured":"Chen F, Power N, Collins J, Ishikawa F (2019) Contemporary requirements challenges and issues: an empirical study in 11 organizations. In: Proceedings of the 34th ACM\/SIGAPP symposium on applied computing, pp 1592\u20131599","DOI":"10.1145\/3297280.3297435"},{"key":"360_CR10","doi-asserted-by":"crossref","unstructured":"Chitchyan R, Bird C (2020) Theory as a source of software requirements. In: 28th IEEE International Requirements Engineering Conference. IEEE Computer Society","DOI":"10.1109\/RE48521.2020.00033"},{"key":"360_CR11","doi-asserted-by":"crossref","unstructured":"Chitchyan R, Shah P, Bird C (2019) Eliciting requirements for demand response service design to households: a pilot study. In: Proceedings of the evaluation and assessment on software engineering, pp 299\u2013304","DOI":"10.1145\/3319008.3319355"},{"key":"360_CR12","volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"J Corbin","year":"2014","unstructured":"Corbin J, Strauss A (2014) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage, Thousands Oaks"},{"key":"360_CR13","doi-asserted-by":"crossref","unstructured":"Davidson JL, Mannan UA, Naik R, Dua I, Jensen C (2014) Older adults and free\/open source software: a diary study of first-time contributors. In: Proceedings of the international symposium on open collaboration, pp 1\u201310","DOI":"10.1145\/2641580.2641589"},{"key":"360_CR14","doi-asserted-by":"crossref","unstructured":"D\u00edaz O (2017) Strategic reading & conceptual modeling. In: Conceptual modeling perspectives. Springer, pp 41\u201353","DOI":"10.1007\/978-3-319-67271-7_4"},{"key":"360_CR15","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-59144-5_14","volume-title":"Designing the digital transformation","author":"O D\u00edaz","year":"2017","unstructured":"D\u00edaz O, Contell JP, Venable JR (2017) Strategic reading in design science: let root-cause analysis guide your readings. In: Maedche A, vom Brocke J, Hevner A (eds) Designing the digital transformation. Springer, Cham, pp 231\u2013246"},{"key":"360_CR16","doi-asserted-by":"crossref","unstructured":"Easterbrook S, Singer J, Storey MA, Damian D (2008) Selecting empirical methods for software engineering research. In: Guide to advanced empirical software engineering. Springer, pp 285\u2013311","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"360_CR17","doi-asserted-by":"crossref","unstructured":"Faily S, Flechais I (2011) Persona cases: a technique for grounding personas. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 2267\u20132270","DOI":"10.1145\/1978942.1979274"},{"key":"360_CR18","doi-asserted-by":"crossref","unstructured":"Faily S, Iacob C, Ali R, Ki-Aries D (2020) Identifying implicit vulnerabilities through personas as goal models. arXiv preprint arXiv:2008.04773","DOI":"10.1007\/978-3-030-64330-0_12"},{"key":"360_CR19","unstructured":"Fl\u00e9chais I (2005) Designing secure and usable systems. PhD thesis. University College London"},{"issue":"10","key":"360_CR20","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1080\/08870440903194015","volume":"25","author":"JJ Francis","year":"2010","unstructured":"Francis JJ, Johnston M, Robertson C, Glidewell L, Entwistle V, Eccles MP, Grimshaw JM (2010) What is an adequate sample size? Operationalising data saturation for theory-based interview studies. Psychol Health 25(10):1229\u20131245","journal-title":"Psychol Health"},{"key":"360_CR21","doi-asserted-by":"crossref","unstructured":"Gidey HK, Marmsoler D, Eckhardt J (2017) Grounded architectures: using grounded theory for the design of software architectures. In: 2017 IEEE international conference on software architecture workshops (ICSAW). IEEE, pp 141\u2013148","DOI":"10.1109\/ICSAW.2017.41"},{"key":"360_CR22","volume-title":"The discovery of grounded theory: strategies for qualitative research","author":"BG Glaser","year":"2009","unstructured":"Glaser BG, Strauss AL (2009) The discovery of grounded theory: strategies for qualitative research. Transaction Publishers, Piscataway"},{"key":"360_CR23","doi-asserted-by":"crossref","unstructured":"Gotel O, Finkelstein A (1994) An analysis of the requirements traceability problem. In: International conference on requirements engineering. IEEE Computer Society, pp 94\u2013101","DOI":"10.1109\/ICRE.1994.292398"},{"issue":"2","key":"360_CR24","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/BF02766777","volume":"29","author":"EG Guba","year":"1981","unstructured":"Guba EG (1981) Criteria for assessing the trustworthiness of naturalistic inquiries. Ectj 29(2):75","journal-title":"Ectj"},{"key":"360_CR25","unstructured":"Guion LA, Diehl D, McDonald D (2002) Triangulation: establishing the validity of qualitative studies. Tech. rep., University of Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, EDIS"},{"issue":"1","key":"360_CR26","first-page":"27","volume":"16","author":"M Halaweh","year":"2012","unstructured":"Halaweh M (2012) Application of grounded theory method in information systems research: methodological and practical issues. Rev Bus Inf Syst 16(1):27","journal-title":"Rev Bus Inf Syst"},{"issue":"1","key":"360_CR27","first-page":"23","volume":"9","author":"M Halaweh","year":"2012","unstructured":"Halaweh M (2012) Using grounded theory as a method for system requirements analysis. J Inf Syst Technol Manag 9(1):23\u201338","journal-title":"J Inf Syst Technol Manag"},{"issue":"1","key":"360_CR28","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1177\/026839629901400107","volume":"14","author":"J Hughes","year":"1999","unstructured":"Hughes J, Wood-Harper T (1999) Systems development as a research act. J Inf Technol 14(1):83\u201394","journal-title":"J Inf Technol"},{"key":"360_CR29","doi-asserted-by":"crossref","unstructured":"Huzar Z, Kuzniarz L, Reggio G, Sourrouille JL (2004) Consistency problems in UML-based software development. In: International conference on the unified modeling language. Springer, pp 1\u201312","DOI":"10.1007\/978-3-540-31797-5_1"},{"issue":"1","key":"360_CR30","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00766-017-0284-8","volume":"24","author":"A Kaufmann","year":"2019","unstructured":"Kaufmann A, Riehle D (2019) The qdacity-re method for structural domain modeling using qualitative data analysis. Requir Eng 24(1):85\u2013102. https:\/\/doi.org\/10.1007\/s00766-017-0284-8","journal-title":"Requir Eng"},{"issue":"260","key":"360_CR31","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1080\/01621459.1952.10483441","volume":"47","author":"WH Kruskal","year":"1952","unstructured":"Kruskal WH, Wallis WA (1952) Use of ranks in one-criterion variance analysis. J Am Stat Assoc 47(260):583\u2013621","journal-title":"J Am Stat Assoc"},{"issue":"2","key":"360_CR32","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.268955","volume":"11","author":"OI Lindland","year":"1994","unstructured":"Lindland OI, Sindre G, Solvberg A (1994) Understanding quality in conceptual modeling. IEEE Softw 11(2):42\u201349","journal-title":"IEEE Softw"},{"key":"360_CR33","volume-title":"Seven strategies of highly effective readers: using cognitive research to boost K-8 achievement","author":"EK McEwan","year":"2004","unstructured":"McEwan EK (2004) Seven strategies of highly effective readers: using cognitive research to boost K-8 achievement. Corwin Press, Thousand Oaks"},{"key":"360_CR34","doi-asserted-by":"crossref","unstructured":"M\u2019manga A, Faily S, McAlaney J, Kadobayashi Y, Miyamoto D (2018) Qualitative adaptation: informing design for risk-based decision making","DOI":"10.14236\/ewic\/HCI2018.216"},{"issue":"6","key":"360_CR35","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J Mylopoulos","year":"1992","unstructured":"Mylopoulos J, Chung L, Nixon B (1992) Representing and using nonfunctional requirements: a process-oriented approach. IEEE Trans Softw Eng 18(6):483\u2013497","journal-title":"IEEE Trans Softw Eng"},{"key":"360_CR36","unstructured":"Nor NFM, Azman H, Hamat A (2013) Investigating students\u2019 use of online annotation tool in an online reading environment. 3L: Language, Linguistics, Literature 19(3)"},{"key":"360_CR37","doi-asserted-by":"crossref","unstructured":"O\u2019hara K, Sellen A, (1997) A comparison of reading paper and on-line documents. CHI 97:335\u2013342","DOI":"10.1145\/258549.258787"},{"issue":"2","key":"360_CR38","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0020-7373(05)80146-4","volume":"35","author":"NF Pidgeon","year":"1991","unstructured":"Pidgeon NF, Turner BA, Blockley DI (1991) The use of grounded theory for conceptual analysis in knowledge elicitation. Int J Man-Mach Stud 35(2):151\u2013173","journal-title":"Int J Man-Mach Stud"},{"key":"360_CR39","doi-asserted-by":"crossref","unstructured":"Porter-O\u2019Donnell C (2004) Beyond the yellow highlighter: teaching annotation skills to improve reading comprehension. Engl J 82\u201389","DOI":"10.2307\/4128941"},{"key":"360_CR40","doi-asserted-by":"crossref","unstructured":"Rashid A, Naqvi SAA, Ramdhany R, Edwards M, Chitchyan R, Babar MA (2016) Discovering \u201cunknown known\u201d security requirements. In: Proceedings of the 38th international conference on software engineering, pp 866\u2013876","DOI":"10.1145\/2884781.2884785"},{"key":"360_CR41","doi-asserted-by":"crossref","unstructured":"Sharma R, Biswas KK (2015) Functional requirements categorization grounded theory approach. In: 2015 international conference on evaluation of novel approaches to software engineering (ENASE). IEEE Computer Society, pp 301\u2013307","DOI":"10.5220\/0005472103010307"},{"key":"360_CR42","doi-asserted-by":"crossref","unstructured":"Siegmund J, Siegmund N, Apel S (2015) Views on internal and external validity in empirical software engineering. In: Proceedings of the 37th international conference on software engineering-volume 1. IEEE Computer Society, pp 9\u201319","DOI":"10.1109\/ICSE.2015.24"},{"issue":"2","key":"360_CR43","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1177\/107780049800400208","volume":"4","author":"S Spall","year":"1998","unstructured":"Spall S (1998) Peer debriefing in qualitative research: emerging operational models. Qual Inqu 4(2):280\u2013292. https:\/\/doi.org\/10.1177\/107780049800400208","journal-title":"Qual Inqu"},{"issue":"4","key":"360_CR44","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00766-017-0273-y","volume":"23","author":"S Thew","year":"2018","unstructured":"Thew S, Sutcliffe A (2018) Value-based requirements engineering: method and experience. Requir Eng 23(4):443\u2013464","journal-title":"Requir Eng"},{"key":"360_CR45","doi-asserted-by":"crossref","unstructured":"Thomas K, Bandara AK, Price BA, Nuseibeh B (2014) Distilling privacy requirements for mobile applications. In: Proceedings of the 36th international conference on software engineering. ACM, pp 871\u2013882","DOI":"10.1145\/2568225.2568240"},{"issue":"4","key":"360_CR46","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1023\/A:1009844119158","volume":"5","author":"WF Tichy","year":"2000","unstructured":"Tichy WF (2000) Hints for reviewing empirical work in software engineering. Empir Softw Eng 5(4):309\u2013312","journal-title":"Empir Softw Eng"},{"issue":"3","key":"360_CR47","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1142\/S021819401250009X","volume":"22","author":"R Torkar","year":"2012","unstructured":"Torkar R, Gorschek T, Feldt R, Svahnberg M, Uzair Akbar R, Kamran K (2012) Requirements traceability a systematic review and industry case study. Int J Softw Eng Knowl Eng 22(3):385\u2013433","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"360_CR48","volume-title":"Information retrieval","author":"CJ Van Rijsbergen","year":"1979","unstructured":"Van Rijsbergen CJ (1979) Information retrieval, 2nd edn. Butterworth-Heinemann, Newton","edition":"2"},{"issue":"6","key":"360_CR49","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F (1945) Individual comparisons by ranking methods. Biometrics Bull 1(6):80\u201383","journal-title":"Biometrics Bull"},{"key":"360_CR50","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/j.jss.2015.10.024","volume":"117","author":"D W\u00fcrfel","year":"2016","unstructured":"W\u00fcrfel D, Lutz R, Diehl S (2016) Grounded requirements engineering: an approach to use case driven requirements engineering. J Syst Softw 117:645\u2013657","journal-title":"J Syst Softw"},{"issue":"14","key":"360_CR51","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/S0950-5849(03)00100-9","volume":"45","author":"D Zowghi","year":"2003","unstructured":"Zowghi D, Gervasi V (2003) On the interplay between consistency, completeness, and correctness in requirements evolution. Inf Softw Technol 45(14):993\u20131009","journal-title":"Inf Softw Technol"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-021-00360-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00766-021-00360-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-021-00360-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T13:55:44Z","timestamp":1644846944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00766-021-00360-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,16]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s00766-021-00360-6","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,16]]},"assertion":[{"value":"23 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All participants signed a consent form prior to their participation. We\u2019re happy to provide a copy of the form without the names of any of our participants upon request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The consent form signed by all participants explicitly stated publication of aggregated statistics and quotes from the interviews, which would be anonymized by a participant ID.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no conflicts of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}