{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:15:59Z","timestamp":1740107759934,"version":"3.37.3"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T00:00:00Z","timestamp":1663459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T00:00:00Z","timestamp":1663459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00766-022-00389-1","type":"journal-article","created":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T01:02:12Z","timestamp":1663462932000},"page":"521-544","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing user stories: the influence of template differences and gender-related problem-solving styles"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3622-7851","authenticated-orcid":false,"given":"Catarina","family":"Gralha","sequence":"first","affiliation":[]},{"given":"Rita","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Goul\u00e3o","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Araujo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,18]]},"reference":[{"issue":"01","key":"389_CR1","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MS.2017.4541045","volume":"35","author":"D M\u00e9ndez Fern\u00e1ndes","year":"2018","unstructured":"M\u00e9ndez Fern\u00e1ndes D (2018) Supporting requirements-engineering research that industry needs: the napire initiative. IEEE Softw 35(01):112\u2013116. https:\/\/doi.org\/10.1109\/MS.2017.4541045","journal-title":"IEEE Softw"},{"key":"389_CR2","unstructured":"M\u00e9ndez Fern\u00e1ndes D, Wagner S. Naming the pain in requirements engineering. http:\/\/napire.org\/#\/home. Access Jan 2022"},{"key":"389_CR3","volume-title":"User stories applied: for agile software development","author":"M Cohn","year":"2004","unstructured":"Cohn M (2004) User stories applied: for agile software development. Addison Wesley Longman Publishing Co., Inc, Redwood City"},{"key":"389_CR4","doi-asserted-by":"publisher","unstructured":"Lucassen G, Dalpiaz F, van der Werf J, Brinkkemper S (2016) The use and effectiveness of user stories in practice. In: REFSQ 2016, pp 205\u2013222. https:\/\/doi.org\/10.1007\/978-3-319-30282-9_14","DOI":"10.1007\/978-3-319-30282-9_14"},{"issue":"6","key":"389_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2517668","volume":"20","author":"W Hudson","year":"2013","unstructured":"Hudson W (2013) User stories don\u2019t help users: introducing persona stories. Interactions 20(6):50\u201353. https:\/\/doi.org\/10.1145\/2517668","journal-title":"Interactions"},{"key":"389_CR6","unstructured":"Pichler R. From personas to user stories. https:\/\/www.romanpichler.com\/blog\/personas-epics-user-stories\/. Access Jan 2022"},{"key":"389_CR7","unstructured":"Pichler R. 10 tips for writing good user stories. https:\/\/www.romanpichler.com\/blog\/10-tips-writing-good-user-stories\/. Access Jan 2022"},{"key":"389_CR8","unstructured":"Ilgen DR, Hollenbeck JR (1991) The structure of work: job design and roles. In: Dunnettem MD, Hough LM (ed.) Handbook of industrial and organizational psychology, 2nd edn. Consulting Psychologists Press, Palo Alto, pp 165\u2013207. Chap. 3. https:\/\/psycnet.apa.org\/record\/1993-97200-003"},{"key":"389_CR9","doi-asserted-by":"publisher","DOI":"10.4324\/9780203785270","volume-title":"Introducing functional grammar","author":"G Thompson","year":"2014","unstructured":"Thompson G (2014) Introducing functional grammar, 3rd edn. Routledge, New York","edition":"3"},{"issue":"6","key":"389_CR10","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1093\/iwc\/iwv046","volume":"28","author":"M Burnett","year":"2016","unstructured":"Burnett M, Stumpf S, Macbeth J, Makri S, Beckwith L, Kwan I, Peters A, Jernigan W (2016) GenderMag: a method for evaluating software\u2019s gender inclusiveness. Interact Comput 28(6):760\u2013787. https:\/\/doi.org\/10.1093\/iwc\/iwv046","journal-title":"Interact Comput"},{"issue":"1","key":"389_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/506740.506744","volume":"32","author":"SJ Simon","year":"2001","unstructured":"Simon SJ (2001) The impact of culture and gender on web sites: an empirical study. DATA BASE 32(1):18\u201337. https:\/\/doi.org\/10.1145\/506740.506744","journal-title":"DATA BASE"},{"key":"389_CR12","volume-title":"Unlocking the clubhouse: women in computing","author":"J Margolis","year":"2002","unstructured":"Margolis J, Fisher A (2002) Unlocking the clubhouse: women in computing. MIT Press, Cambridge"},{"key":"389_CR13","doi-asserted-by":"publisher","unstructured":"Hou W, Kaur M, Komlodi A, Lutters WG, Boot L, Cotten SR, Morrell C, Ozok AA, Tufekci Z (2006) \u201cGirls don\u2019t waste time\u201d: pre-adolescent attitudes toward ICT. In: Olson GM, Jeffries R (eds) Extended abstracts proceedings of the 2006 conference on human factors in computing systems, CHI 2006. ACM, Montr\u00e9al, pp 875\u2013880. https:\/\/doi.org\/10.1145\/1125451.1125622","DOI":"10.1145\/1125451.1125622"},{"issue":"5","key":"389_CR14","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.intcom.2011.06.004","volume":"23","author":"MM Burnett","year":"2011","unstructured":"Burnett MM, Beckwith L, Wiedenbeck S, Fleming SD, Cao J, Park TH, Grigoreanu V, Rector K (2011) Gender pluralism in problem-solving software. Interact Comput 23(5):450\u2013460. https:\/\/doi.org\/10.1016\/j.intcom.2011.06.004","journal-title":"Interact Comput"},{"key":"389_CR15","unstructured":"Cafferata P, Tybout AM (1989) Gender differences in information processing: a selectivity interpretation. Lexington Books, Cognitive and Affective Responses to Advertising"},{"issue":"1","key":"389_CR16","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1086\/209241","volume":"18","author":"J Meyers-Levy","year":"1991","unstructured":"Meyers-Levy J, Maheswaran D (1991) Exploring differences in males\u2019 and females\u2019 processing strategies. J Consum Res 18(1):63\u201370. https:\/\/doi.org\/10.1086\/209241","journal-title":"J Consum Res"},{"key":"389_CR17","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1111\/j.1099-1123.2001.00328.x","volume":"5","author":"E O\u2019Donnell","year":"2001","unstructured":"O\u2019Donnell E, Johnson E (2001) Gender effects on processing effort during analytical procedures. Int J Auditing 5:91\u2013105","journal-title":"Int J Auditing"},{"issue":"1","key":"389_CR18","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.jcps.2014.06.003","volume":"25","author":"J Meyers-Levy","year":"2015","unstructured":"Meyers-Levy J, Loken B (2015) Revisiting gender differences: what we know and what lies ahead. J Consum Psychol 25(1):129\u2013149. https:\/\/doi.org\/10.1016\/j.jcps.2014.06.003","journal-title":"J Consum Psychol"},{"issue":"5","key":"389_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/S0747-5632(02)00006-7","volume":"18","author":"A Durndell","year":"2002","unstructured":"Durndell A, Haag Z (2002) Computer self efficacy, computer anxiety, attitudes towards the internet and reported experience with the internet, by gender, in an east european sample. Comput Hum Behav 18(5):521\u2013535. https:\/\/doi.org\/10.1016\/S0747-5632(02)00006-7","journal-title":"Comput Hum Behav"},{"key":"389_CR20","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1145\/903893.903933","volume":"46","author":"K Hartzel","year":"2003","unstructured":"Hartzel K (2003) How self-efficacy and gender issues affect software adoption and use. Commun ACM 46:167\u2013171. https:\/\/doi.org\/10.1145\/903893.903933","journal-title":"Commun ACM"},{"issue":"7","key":"389_CR21","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1002\/ejsp.835","volume":"41","author":"M Appel","year":"2011","unstructured":"Appel M, Kronberger N, Aronson J (2011) Stereotype threat impairs ability building: effects on test preparation among women in science and technology. Eur J Soc Psychol 41(7):904\u2013913. https:\/\/doi.org\/10.1002\/ejsp.835","journal-title":"Eur J Soc Psychol"},{"issue":"4","key":"389_CR22","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1016\/j.chb.2013.02.012","volume":"29","author":"AH Huffman","year":"2013","unstructured":"Huffman AH, Whetten J, Huffman WH (2013) Using technology in higher education: the influence of gender roles on technology self-efficacy. Comput Hum Behav 29(4):1779\u20131786. https:\/\/doi.org\/10.1016\/j.chb.2013.02.012","journal-title":"Comput Hum Behav"},{"issue":"4","key":"389_CR23","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1002\/bdm.414","volume":"15","author":"EU Weber","year":"2002","unstructured":"Weber EU, Blais A-R, Betz NE (2002) A domain-specific risk-attitude scale: measuring risk perceptions and risk behaviors. J Behav Decis Mak 15(4):263\u2013290. https:\/\/doi.org\/10.1002\/bdm.414","journal-title":"J Behav Decis Mak"},{"issue":"3","key":"389_CR24","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1111\/j.1542-4774.2011.01015.x","volume":"9","author":"T Dohmen","year":"2011","unstructured":"Dohmen T, Falk A, Huffman D, Sunde U, Schupp J, Wagner GG (2011) Individual risk attitudes: measurement, determinants, and behavioral consequences. J Eur Econ Assoc 9(3):522\u2013550. https:\/\/doi.org\/10.1111\/j.1542-4774.2011.01015.x","journal-title":"J Eur Econ Assoc"},{"issue":"1","key":"389_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jebo.2011.06.007","volume":"83","author":"G Charness","year":"2012","unstructured":"Charness G, Gneezy U (2012) Strong evidence for gender differences in risk taking. J Econ Behav Organ 83(1):50\u201358. https:\/\/doi.org\/10.1016\/j.jebo.2011.06.007","journal-title":"J Econ Behav Organ"},{"key":"389_CR26","doi-asserted-by":"publisher","unstructured":"Beckwith L, Kissinger C, Burnett M, Wiedenbeck S, Lawrance J, Blackwell A, Cook C (2006) Tinkering and gender in end-user programmers\u2019 debugging. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, Montr\u00e9al, pp 231\u2013240. https:\/\/doi.org\/10.1145\/1124772.1124808","DOI":"10.1145\/1124772.1124808"},{"key":"389_CR27","doi-asserted-by":"publisher","unstructured":"Rosner D, Bean J (2009) Learning from IKEA hacking: I\u2019m not one to decoupage a tabletop and call it a day. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, Boston, pp 419\u2013422. https:\/\/doi.org\/10.1145\/1518701.1518768","DOI":"10.1145\/1518701.1518768"},{"key":"389_CR28","doi-asserted-by":"publisher","unstructured":"Burnett M, Fleming SD, Iqbal S, Venolia G, Rajaram V, Farooq U, Grigoreanu V, Czerwinski M (2010) Gender differences and programming environments: across programming populations. In: Proceedings of the 2010 ACM-IEEE international symposium on empirical software engineering and measurement. ACM, Bolzano-Bozen, pp 1\u201310. https:\/\/doi.org\/10.1145\/1852786.1852824","DOI":"10.1145\/1852786.1852824"},{"key":"389_CR29","doi-asserted-by":"publisher","unstructured":"Gralha C, Goul\u00e3o M, Ara\u00fajo J (2019) Analysing gender differences in building social goal models: a quasi-experiment. In: 2019 IEEE 27th International Requirements Engineering Conference (RE). . IEEE, pp 165\u2013176. https:\/\/doi.org\/10.1109\/RE.2019.00027","DOI":"10.1109\/RE.2019.00027"},{"issue":"6","key":"389_CR30","doi-asserted-by":"publisher","first-page":"5416","DOI":"10.1007\/s10664-020-09883-y","volume":"25","author":"C Gralha","year":"2020","unstructured":"Gralha C, Goul\u00e3o M, Araujo J (2020) Are there gender differences when interacting with social goal models? Empir Softw Eng 25(6):5416\u20135453. https:\/\/doi.org\/10.1007\/s10664-020-09883-y","journal-title":"Empir Softw Eng"},{"key":"389_CR31","unstructured":"Marcano A. Old favourite: feature injection user stories on a business value theme. http:\/\/antonymarcano.com\/blog\/2011\/03\/fi_stories\/. Access Jan 2022"},{"issue":"1","key":"389_CR32","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3758\/BRM.41.1.113","volume":"41","author":"A Cao","year":"2009","unstructured":"Cao A, Chintamani K, Pandya A, Ellis D (2009) NASA TLX: software for assessing subjective mental workload. Behav Res Methods 41(1):113\u2013117. https:\/\/doi.org\/10.3758\/BRM.41.1.113","journal-title":"Behav Res Methods"},{"key":"389_CR33","doi-asserted-by":"publisher","unstructured":"Vorvoreanu M, Zhang L, Huang Y, Hilderbrand C, Steine-Hanson Z, Burnett M (2019) From gender biases to gender-inclusive design: an empirical investigation. In: ACM SIGCHI. https:\/\/doi.org\/10.1145\/3290605.3300283","DOI":"10.1145\/3290605.3300283"},{"key":"389_CR34","doi-asserted-by":"publisher","unstructured":"Gralha C, Pereira R, Goul\u00e3o M, Ara\u00fajo J (2021) On the impact of using different templates on creating and understanding user stories. In: 2021 IEEE 29th International Requirements Engineering Conference (RE), pp 209\u2013220. https:\/\/doi.org\/10.1109\/RE51729.2021.00026","DOI":"10.1109\/RE51729.2021.00026"},{"key":"389_CR35","unstructured":"Beck K, Beedle M, Van\u00a0Bennekum A, Cockburn A, Cunningham W, Fowler M, Grenning J, Highsmith J, Hunt A, Jeffries R, et al. Manifesto for agile software development. https:\/\/www.agilealliance.org\/agile101\/the-agile-manifesto\/. Access Jan 2022"},{"key":"389_CR36","volume-title":"An introduction to functional grammar","author":"M Halliday","year":"1994","unstructured":"Halliday M (1994) An introduction to functional grammar, 2nd edn. Routledge, London","edition":"2"},{"key":"389_CR37","unstructured":"Burnett M, Horvath A, Oleson A. GenderMag Personas Foundations Document. http:\/\/eusesconsortium.org\/gender\/GenderMagPersona-FoundationDocuments\/Foundations.html. Access Jan 2022"},{"key":"389_CR38","volume-title":"The mind\u2019s eye: cognitive and applied aspects of eye movement research","author":"R Radach","year":"2003","unstructured":"Radach R, Hyona J, Deubel H (2003) The mind\u2019s eye: cognitive and applied aspects of eye movement research, 1st edn. Elsevier, Amsterdam","edition":"1"},{"key":"389_CR39","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.infsof.2015.06.008","volume":"67","author":"Z Sharafi","year":"2015","unstructured":"Sharafi Z, Soh Z, Gu\u00e9h\u00e9neuc Y-G (2015) A systematic literature review on the usage of eye-tracking in software engineering. Inf Softw Technol 67:79\u2013107. https:\/\/doi.org\/10.1016\/j.infsof.2015.06.008","journal-title":"Inf Softw Technol"},{"issue":"3","key":"389_CR40","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1037\/0033-2909.124.3.372","volume":"124","author":"K Rayner","year":"1998","unstructured":"Rayner K (1998) Eye movements in reading and information processing: 20 years of research. Psychol Bull 124(3):372\u2013422. https:\/\/doi.org\/10.1037\/0033-2909.124.3.372","journal-title":"Psychol Bull"},{"key":"389_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57883-5","volume-title":"Eye tracking methodology: theory and practice","author":"A Duchowski","year":"2017","unstructured":"Duchowski A (2017) Eye tracking methodology: theory and practice, 3rd edn. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-57883-5","edition":"3"},{"key":"389_CR42","doi-asserted-by":"publisher","unstructured":"Fritz T, Begel A, M\u00fcller SC, Yigit-Elliott S, Z\u00fcger M (2014) Using psycho-physiological measures to assess task difficulty in software development. In: 36th International Conference on Software Engineering ICSE 2014. ACM, pp 402\u2013413. https:\/\/doi.org\/10.1145\/2568225.2568266","DOI":"10.1145\/2568225.2568266"},{"issue":"4","key":"389_CR43","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1177\/001872089303500412","volume":"35","author":"FGWC Paas","year":"1993","unstructured":"Paas FGWC, van Merri\u00ebnboer JJG (1993) The efficiency of instructional conditions: an approach to combine mental effort and performance measures. Hum Factors J Hum Factors Ergon Soc 35(4):737\u2013743. https:\/\/doi.org\/10.1177\/001872089303500412","journal-title":"Hum Factors J Hum Factors Ergon Soc"},{"issue":"4","key":"389_CR44","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/BF02213420","volume":"6","author":"FGWC Paas","year":"1994","unstructured":"Paas FGWC, van Merri\u00ebnboer JJG (1994) Instructional control of cognitive load in the training of complex cognitive tasks. Educ Psychol Rev 6(4):351\u2013371. https:\/\/doi.org\/10.1007\/BF02213420","journal-title":"Educ Psychol Rev"},{"issue":"1","key":"389_CR45","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1177\/001872088803000110","volume":"30","author":"YY Yeh","year":"1988","unstructured":"Yeh YY, Wickens CD (1988) Dissociation of performance and subjective measures of workload. Hum Factors J Hum Factors Ergon Soc 30(1):111\u2013120. https:\/\/doi.org\/10.1177\/001872088803000110","journal-title":"Hum Factors J Hum Factors Ergon Soc"},{"issue":"3","key":"389_CR46","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1080\/00140137808931710","volume":"21","author":"AT Welford","year":"1978","unstructured":"Welford AT (1978) Mental workload as a function of demand, capacity, strategy and skill. Ergonomics 21(3):151\u2013167. https:\/\/doi.org\/10.1080\/00140137808931710","journal-title":"Ergonomics"},{"key":"389_CR47","unstructured":"Hancock PA, Chignell MH (1986) Toward a theory of mental workload: Stress and adaptability in human-machine systems. IEEE Trans Syst Man Cybern 378\u2013383"},{"key":"389_CR48","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0166-4115(08)62386-9","volume":"52","author":"SG Hart","year":"1988","unstructured":"Hart SG, Staveland LE (1988) Development of NASA-TLX (Task Load Index): results of empirical and theoretical research. Adv Psychol 52:139\u2013183. https:\/\/doi.org\/10.1016\/S0166-4115(08)62386-9","journal-title":"Adv Psychol"},{"key":"389_CR49","doi-asserted-by":"publisher","unstructured":"Hart SG (2006) NASA-Task Load Index (NASA-TLX); 20 years later. In: Proceedings of the human factors and ergonomics society annual meeting, vol 50. SAGE Publications, pp 904\u2013908. https:\/\/doi.org\/10.1177\/154193120605000909","DOI":"10.1177\/154193120605000909"},{"key":"389_CR50","doi-asserted-by":"publisher","unstructured":"Choma J, Zaina L, Beraldo D (2016) Userx story: incorporating ux aspects into user stories elaboration. In: International conference on Human\u2013Computer Interaction (HCI 2016). Springer, pp 131\u2013140. https:\/\/doi.org\/10.1007\/978-3-319-39510-4_13","DOI":"10.1007\/978-3-319-39510-4_13"},{"key":"389_CR51","unstructured":"Nielsen J (1994) 10 usability heuristics for user interface design. http:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/. Access Jan 2022"},{"key":"389_CR52","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.infsof.2018.12.007","volume":"110","author":"F Dalpiaz","year":"2019","unstructured":"Dalpiaz F, van der Schalk I, Brinkkemper S, Aydemir F, Lucassen G (2019) Detecting terminological ambiguity in user stories: tool and experimentation. Inf Softw Technol 110:3\u201316. https:\/\/doi.org\/10.1016\/j.infsof.2018.12.007","journal-title":"Inf Softw Technol"},{"key":"389_CR53","doi-asserted-by":"publisher","unstructured":"Dalpiaz F, Sturm A (2020) Conceptualizing requirements using user stories and use cases: a controlled experiment. In: REFSQ 2020, vol 12045, pp 221\u2013238. https:\/\/doi.org\/10.1007\/978-3-030-44429-7_16","DOI":"10.1007\/978-3-030-44429-7_16"},{"key":"389_CR54","doi-asserted-by":"publisher","unstructured":"Liskin O, Pham R, Kiesling S, Schneider K (2014) Why we need a granularity concept for user stories. In: Cantone G, Marchesi M (eds.) XP 2014, vol 179. Springer, Cham, pp 110\u2013125. https:\/\/doi.org\/10.1007\/978-3-319-06862-6_8","DOI":"10.1007\/978-3-319-06862-6_8"},{"key":"389_CR55","doi-asserted-by":"publisher","unstructured":"Lin J, Yu H, Shen Z, Miao C (2014) Using goal net to model user stories in agile software development. In: SNPD 2014. IEEE Computer Society, Las Vegas, pp 1\u20136. https:\/\/doi.org\/10.1109\/SNPD.2014.6888731","DOI":"10.1109\/SNPD.2014.6888731"},{"key":"389_CR56","doi-asserted-by":"publisher","unstructured":"Sharafi Z, Marchetto A, Susi A, Antoniol G, Gu\u00e9h\u00e9neuc Y-G (2013) An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension. In: 2013 21st International Conference on Program Comprehension (ICPC). IEEE, pp 33\u201342. https:\/\/doi.org\/10.1109\/ICPC.2013.6613831","DOI":"10.1109\/ICPC.2013.6613831"},{"key":"389_CR57","doi-asserted-by":"publisher","unstructured":"Gu\u00e9h\u00e9neuc Y-G (2006) Taupe: towards understanding program comprehension. In: Proceedings of the 2006 Conference of the Center for Advanced Studies on Collaborative Research. CASCON \u201906. IBM Corp., Riverton. https:\/\/doi.org\/10.1145\/1188966.1188968","DOI":"10.1145\/1188966.1188968"},{"key":"389_CR58","doi-asserted-by":"publisher","unstructured":"Yusuf S, Kagdi H, Maletic JI (2007) Assessing the comprehension of uml class diagrams via eye tracking. In: 5th IEEE International Conference on Program Comprehension, 2007. ICPC\u201907. IEEE, pp 113\u2013122. https:\/\/doi.org\/10.1109\/ICPC.2007.10","DOI":"10.1109\/ICPC.2007.10"},{"key":"389_CR59","doi-asserted-by":"publisher","unstructured":"Jeanmart S, Gu\u00e9h\u00e9neuc Y-G, Sahraoui H, Habra N (2009) Impact of the visitor pattern on program comprehension and maintenance. In: Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement. ESEM \u201909. IEEE Computer Society, Lake Buena Vista, pp 69\u201378. https:\/\/doi.org\/10.1109\/ESEM.2009.5316015","DOI":"10.1109\/ESEM.2009.5316015"},{"key":"389_CR60","doi-asserted-by":"publisher","unstructured":"Sharif B, Maletic JI (2010) An eye tracking study on the effects of layout in understanding the role of design patterns. In: IEEE International Conference on Software Maintenance (ICSM), 2010. https:\/\/doi.org\/10.1109\/ICSM.2010.5609582. IEEE, pp 1\u201310","DOI":"10.1109\/ICSM.2010.5609582"},{"key":"389_CR61","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.scico.2012.01.004","volume":"79","author":"B De Smet","year":"2014","unstructured":"De Smet B, Lempereur L, Sharafi Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G, Habra N (2014) Taupe: visualizing and analyzing eye-tracking data. Sci Comput Program 79:260\u2013278. https:\/\/doi.org\/10.1016\/j.scico.2012.01.004","journal-title":"Sci Comput Program"},{"issue":"8","key":"389_CR62","doi-asserted-by":"publisher","first-page":"2184","DOI":"10.1016\/j.jss.2013.03.106","volume":"86","author":"NE Cagiltay","year":"2013","unstructured":"Cagiltay NE, Tokdemir G, Kilic O, Topalli D (2013) Performing and analyzing non-formal inspections of entity relationship diagram (erd). J Syst Softw 86(8):2184\u20132195. https:\/\/doi.org\/10.1016\/j.jss.2013.03.106","journal-title":"J Syst Softw"},{"key":"389_CR63","doi-asserted-by":"publisher","unstructured":"Santos M, Gralha C, Goul\u00e3o M, Araujo J, Moreira A, Cambeiro J (2016) What is the impact of bad layout in the understandability of social goal models? In: 2016 IEEE 24th International on Requirements Engineering Conference (RE). IEEE, pp 206\u2013215. https:\/\/doi.org\/10.1109\/RE.2016.51","DOI":"10.1109\/RE.2016.51"},{"key":"389_CR64","doi-asserted-by":"publisher","unstructured":"Santos M, Gralha C, Goul\u00e3o M, Araujo J, Moreira A (2018) On the impact of semantic transparency on understanding and reviewing social goal models. In: 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, pp 228\u2013239. https:\/\/doi.org\/10.1109\/RE.2018.00031","DOI":"10.1109\/RE.2018.00031"},{"key":"389_CR65","unstructured":"Crosby ME, Scholtz J, Wiedenbeck S (2002) The roles beacons play in comprehension for novice and expert programmers. In: 14th Workshop of the Psychology of Programming Interest Group, pp 58\u201373. https:\/\/www.ppig.org\/files\/2002-PPIG-14th-crosby.pdf"},{"key":"389_CR66","doi-asserted-by":"publisher","unstructured":"Busjahn T, Bednarik R, Schulte C (2014) What influences dwell time during source code reading? Analysis of element type and frequency as factors. In: Proceedings of the Symposium on Eye Tracking Research and Applications. ETRA \u201914, pp 335\u2013338. https:\/\/doi.org\/10.1145\/2578153.2578211","DOI":"10.1145\/2578153.2578211"},{"key":"389_CR67","doi-asserted-by":"publisher","unstructured":"Rodeghero P, McMillan C, McBurney PW, Bosch N, D\u2019Mello S (2014) Improving automated source code summarization via an eye-tracking study of programmers. In: Proceedings of the 36th International Conference on Software Engineering. ICSE 2014, pp 390\u2013401. https:\/\/doi.org\/10.1145\/2568225.2568247","DOI":"10.1145\/2568225.2568247"},{"issue":"1","key":"389_CR68","doi-asserted-by":"publisher","first-page":"79","DOI":"10.12700\/APH.18.1.2021.1.6","volume":"18","author":"J Katona","year":"2021","unstructured":"Katona J (2021) Clean and dirty code comprehension by eyetracking based evaluation using GP3 eye tracker. Acta Polytech Hungarica 18(1):79\u201399","journal-title":"Acta Polytech Hungarica"},{"key":"389_CR69","doi-asserted-by":"publisher","unstructured":"Busjahn T, Schulte C, Busjahn A (2011) Analysis of code reading to gain more insight in program comprehension. In: Proceedings of the 11th Koli Calling International Conference on Computing Education Research, pp 1\u20139. https:\/\/doi.org\/10.1145\/2094131.2094133","DOI":"10.1145\/2094131.2094133"},{"issue":"2","key":"389_CR70","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10664-012-9201-4","volume":"18","author":"D Binkley","year":"2013","unstructured":"Binkley D, Davis M, Lawrie D, Maletic JI, Morrell C, Sharif B (2013) The impact of identifier style on effort and comprehension. Empir Softw Eng 18(2):219\u2013276. https:\/\/doi.org\/10.1007\/s10664-012-9201-4","journal-title":"Empir Softw Eng"},{"issue":"3","key":"389_CR71","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1037\/0033-2909.125.3.367","volume":"125","author":"JP Byrnes","year":"1999","unstructured":"Byrnes JP, Miller DC, Schafer WD (1999) Gender differences in risk taking: a meta-analysis. Psychol Bull 125(3):367","journal-title":"Psychol Bull"},{"issue":"2","key":"389_CR72","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1037\/0022-0663.86.2.193","volume":"86","author":"F Pajares","year":"1994","unstructured":"Pajares F, Miller MD (1994) Role of self-efficacy and self-concept beliefs in mathematical problem solving: a path analysis. J Educ Psychol 86(2):193. https:\/\/doi.org\/10.1037\/0022-0663.86.2.193","journal-title":"J Educ Psychol"},{"key":"389_CR73","doi-asserted-by":"publisher","unstructured":"Beckwith L, Burnett M, Wiedenbeck S, Cook C, Sorte S, Hastings M (2005) Effectiveness of end-user debugging software features: are there gender issues? In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, Portland, pp 869\u2013878. https:\/\/doi.org\/10.1145\/1054972.1055094","DOI":"10.1145\/1054972.1055094"},{"issue":"3","key":"389_CR74","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1177\/0013164494054003028","volume":"54","author":"G Torkzadeh","year":"1994","unstructured":"Torkzadeh G, Koufteros X (1994) Factorial validity of a computer self-efficacy scale and the impact of computer training. Educ Psychol Meas 54(3):813\u2013821. https:\/\/doi.org\/10.1177\/0013164494054003028","journal-title":"Educ Psychol Meas"},{"key":"389_CR75","doi-asserted-by":"publisher","unstructured":"Fisher M, Cox A, Zhao L (2006) Using sex differences to link spatial cognition and program comprehension. In: 2006 22nd IEEE International Conference on Software Maintenance. IEEE, pp 289\u2013298. https:\/\/doi.org\/10.1109\/ICSM.2006.72","DOI":"10.1109\/ICSM.2006.72"},{"key":"389_CR76","doi-asserted-by":"publisher","unstructured":"Sharafi Z, Soh Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) Women and men\u2014different but equal: on the impact of identifier style on source code reading. In: 20th IEEE International Conference on Program Comprehension (ICPC). IEEE, pp 27\u201336. https:\/\/doi.org\/10.1109\/ICPC.2012.6240505","DOI":"10.1109\/ICPC.2012.6240505"},{"issue":"6","key":"389_CR77","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/32.6156","volume":"14","author":"V Basili","year":"1988","unstructured":"Basili V, Rombach D (1988) The TAME project: towards improvement-oriented software environments. IEEE Trans Softw Eng 14(6):758\u2013773. https:\/\/doi.org\/10.1109\/32.6156","journal-title":"IEEE Trans Softw Eng"},{"key":"389_CR78","doi-asserted-by":"publisher","unstructured":"Gralha C, Pereira R, Goul\u00e3o M, Ara\u00fajo J. Assessing user stories: the influence of template differences and gender-related problem-solving styles: companion site. https:\/\/doi.org\/10.5281\/zenodo.6979649. Access Jan 2022","DOI":"10.5281\/zenodo.6979649"},{"key":"389_CR79","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034","volume-title":"Case study research in software engineering: guidelines and examples","author":"P Runeson","year":"2012","unstructured":"Runeson P, H\u00f6st M, Rainer A, Regnell B (2012) Case study research in software engineering: guidelines and examples. Wiley, Hoboken"},{"key":"389_CR80","unstructured":"TLX@NASA: NASA TLX Paper\/Pensil Version. https:\/\/humansystems.arc.nasa.gov\/groups\/TLX\/tlxpaperpencil.php. Access Jan 2022"},{"key":"389_CR81","doi-asserted-by":"publisher","unstructured":"Sharafi Z, Shaffer T, Sharif B, Gu\u00e9h\u00e9neuc Y-G (2015) Eye-tracking metrics in software engineering. In: 2015 Asia-Pacific Software Engineering Conference (APSEC). https:\/\/doi.org\/10.1109\/APSEC.2015.53. IEEE, pp 96\u2013103","DOI":"10.1109\/APSEC.2015.53"},{"key":"389_CR82","doi-asserted-by":"publisher","unstructured":"Jacob RJ, Karn KS (2003) Eye tracking in human\u2013computer interaction and usability research: ready to deliver the promises. In: The mind\u2019s eye: cognitive aspects of eye movement research. Elsevier, Amsterdam, pp 573\u2013605. https:\/\/doi.org\/10.1016\/B978-044451020-4\/50031-1","DOI":"10.1016\/B978-044451020-4\/50031-1"},{"issue":"5","key":"389_CR83","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10664-009-9125-9","volume":"15","author":"GC Porras","year":"2010","unstructured":"Porras GC, Gu\u00e9h\u00e9neuc Y-G (2010) An empirical study on the efficiency of different design pattern representations in UML class diagrams. Empir Softw Eng 15(5):493\u2013522. https:\/\/doi.org\/10.1007\/s10664-009-9125-9","journal-title":"Empir Softw Eng"},{"key":"389_CR84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson M, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer, Heidelberg"},{"issue":"2","key":"389_CR85","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TSE.2015.2467378","volume":"42","author":"S Vegas","year":"2016","unstructured":"Vegas S, Apa C, Juristo N (2016) Crossover designs in software engineering experiments: benefits and perils. IEEE Trans Softw Eng 42(2):120\u2013135. https:\/\/doi.org\/10.1109\/TSE.2015.2467378","journal-title":"IEEE Trans Softw Eng"},{"key":"389_CR86","unstructured":"The Eye Tribe eye-tracker: the EyeTribe. https:\/\/theeyetribe.com\/. Access Jan 2022"},{"issue":"1\/2","key":"389_CR87","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1093\/biomet\/34.1-2.28","volume":"34","author":"BL Welch","year":"1947","unstructured":"Welch BL (1947) The generalization of \u2018student\u2019s\u2019 problem when several different population variances are involved. Biometrika 34(1\/2):28\u201335. https:\/\/doi.org\/10.1093\/biomet\/34.1-2.28","journal-title":"Biometrika"},{"issue":"2","key":"389_CR88","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s10664-016-9437-5","volume":"22","author":"B Kitchenham","year":"2017","unstructured":"Kitchenham B, Madeyski L, Budgen D, Keung J, Brereton P, Charters S, Gibbs S, Pohthong A (2017) Robust statistical methods for empirical software engineering. Empir Softw Eng 22(2):579\u2013630. https:\/\/doi.org\/10.1007\/s10664-016-9437-5","journal-title":"Empir Softw Eng"},{"key":"389_CR89","doi-asserted-by":"publisher","DOI":"10.1201\/9780429186196","volume-title":"Handbook of parametric and nonparametric statistical procedures","author":"DJ Sheskin","year":"2020","unstructured":"Sheskin DJ (2020) Handbook of parametric and nonparametric statistical procedures, 5th edn. CRC Press, Boca Raton","edition":"5"},{"key":"389_CR90","first-page":"3","volume":"8","author":"C Bonferroni","year":"1936","unstructured":"Bonferroni C (1936) Teoria statistica delle classi e calcolo delle probabilita. Pubblicazioni del R Istituto Superiore di Scienze Economiche e Commericiali di Firenze 8:3\u201362","journal-title":"Pubblicazioni del R Istituto Superiore di Scienze Economiche e Commericiali di Firenze"},{"key":"389_CR91","first-page":"65","volume":"6","author":"S Holm","year":"1979","unstructured":"Holm S (1979) A simple sequentially rejective multiple test procedure. Scand J Stat 6:65\u201370","journal-title":"Scand J Stat"},{"issue":"2","key":"389_CR92","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3102\/10769986001002113","volume":"1","author":"PA Games","year":"1976","unstructured":"Games PA, Howell JF (1976) Pairwise multiple comparison procedures with unequal n\u2019s and\/or variances: a Monte Carlo study. J Educ Stat 1(2):113\u2013125. https:\/\/doi.org\/10.3102\/10769986001002113","journal-title":"J Educ Stat"},{"key":"389_CR93","doi-asserted-by":"publisher","unstructured":"Marcher MH, Christensen IM, Grabarczyk P, Graversen T, Brabrand C (2021) Computing educational activities involving people rather than things appeal more to women (cs1 appeal perspective). In: Proceedings of the 17th ACM Conference on International Computing Education Research, pp 145\u2013156. https:\/\/doi.org\/10.1145\/3446871.3469761","DOI":"10.1145\/3446871.3469761"},{"issue":"1","key":"389_CR94","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1037\/0033-2909.112.1.155","volume":"112","author":"J Cohen","year":"1992","unstructured":"Cohen J (1992) A power primer. Psychol Bull 112(1):155. https:\/\/doi.org\/10.1037\/0033-2909.112.1.155","journal-title":"Psychol Bull"},{"issue":"7139","key":"389_CR95","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1136\/bmj.316.7139.1236","volume":"316","author":"TV Perneger","year":"1998","unstructured":"Perneger TV (1998) What\u2019s wrong with Bonferroni adjustments. BMJ 316(7139):1236\u20131238. https:\/\/doi.org\/10.1136\/bmj.316.7139.1236","journal-title":"BMJ"},{"issue":"6","key":"389_CR96","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1093\/beheco\/arh107","volume":"15","author":"S Nakagawa","year":"2004","unstructured":"Nakagawa S (2004) A farewell to Bonferroni: the problems of low statistical power and publication bias. Behav Ecol 15(6):1044\u20131045. https:\/\/doi.org\/10.1093\/beheco\/arh107","journal-title":"Behav Ecol"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-022-00389-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00766-022-00389-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-022-00389-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T14:29:57Z","timestamp":1669300197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00766-022-00389-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,18]]},"references-count":96,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["389"],"URL":"https:\/\/doi.org\/10.1007\/s00766-022-00389-1","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"type":"print","value":"0947-3602"},{"type":"electronic","value":"1432-010X"}],"subject":[],"published":{"date-parts":[[2022,9,18]]},"assertion":[{"value":"31 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations:"}},{"value":"All the participants in this study read and agreed to a participant consent form, adapted from []. All the data was anonymised. This research work does not have conflicts of interest (financial or non-financial).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}