{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:37Z","timestamp":1740141817841,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:00:00Z","timestamp":1570838400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:00:00Z","timestamp":1570838400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s10270-019-00759-4","type":"journal-article","created":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T09:10:20Z","timestamp":1570871420000},"page":"345-369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Mining reading patterns from eye-tracking data: method and demonstration"],"prefix":"10.1007","volume":"19","author":[{"given":"Constantina","family":"Ioannou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9355-6179","authenticated-orcid":false,"given":"Indira","family":"Nurdiani","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Burattin","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Weber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,12]]},"reference":[{"key":"759_CR1","unstructured":"Abrahamsson, P., Salo, O., Ronkainen, J., Warsta, J.: Agile software development methods\u2014review and analysis, Technical Report 478. VTT Publications (2002)"},{"key":"759_CR2","doi-asserted-by":"crossref","unstructured":"Binamungu, L.P., Embury, S.M., Konstantinou, N.: Maintaining behaviour driven development specifications: challenges and opportunities. In: IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 175\u2013184 (2018)","DOI":"10.1109\/SANER.2018.8330207"},{"key":"759_CR3","unstructured":"Blinman, S., Cockburn, A.: Program comprehension: investigating the effects of naming style and documentation. In: Proceedings of the 6th Australasian Conference on User Interface, vol. 40, AUIC \u201905, pp. 73\u201378. Australian Computer Society, Inc, Darlinghurst (2005)"},{"key":"759_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TSE.1984.5010193","volume":"10","author":"B Boehm","year":"1984","unstructured":"Boehm, B.: Software engineering economics. IEEE Trans. Softw. Eng. 10, 4\u201321 (1984)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"759_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks, R.: Towards a theory of the comprehension of computer programs. Int. J. Man-Mach. Stud. 18(6), 543\u2013554 (1983)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"759_CR6","doi-asserted-by":"crossref","unstructured":"Busjahn, T., Schulte, C., Busjahn, A.: Analysis of code reading to gain more insight in program comprehension. In: Proceedings of the 11th Koli Calling International Conference on Computing Education Research, Koli Calling \u201911, pp. 1\u20139. ACM, New York (2011)","DOI":"10.1145\/2094131.2094133"},{"key":"759_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5589-6","volume-title":"Data Mining Methods for Knowledge Discovery","author":"KJ Cios","year":"1998","unstructured":"Cios, K.J., Pedrycz, W., Swiniarski, R.W.: Data Mining Methods for Knowledge Discovery. Springer, Boston (1998)"},{"issue":"1","key":"759_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/2.48797","volume":"23","author":"ME Crosby","year":"1990","unstructured":"Crosby, M.E., Stelovsky, J.: How do we read algorithms? A case study. Computer 23(1), 25\u201335 (1990)","journal-title":"Computer"},{"key":"759_CR9","unstructured":"de\u00a0Souza, P.L., do\u00a0Prado, A.F., de\u00a0Souza, W.L., dos Santos Forghieri\u00a0Pereira, S.M., Pires, L.F.: Combining behaviour-driven development with scrum for software development in the education domain. In: ICEIS (2), pp. 449\u2013458. SciTePress (2017)"},{"key":"759_CR10","doi-asserted-by":"crossref","unstructured":"Fritz, T., Begel, A., M\u00fcller, S.C., Yigit-Elliott, S., Z\u00fcger, M.: Using psycho-physiological measures to assess task difficulty in software development. In: Proceedings of the 36th International Conference on Software Engineering, pp. 402\u2013413. ACM, New York (2014)","DOI":"10.1145\/2568225.2568266"},{"issue":"4","key":"759_CR11","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/s00766-004-0204-6","volume":"9","author":"A Gemino","year":"2004","unstructured":"Gemino, A., Wand, Y.: A framework for empirical evaluation of conceptual modeling techniques. Requir. Eng. 9(4), 248\u2013260 (2004)","journal-title":"Requir. Eng."},{"issue":"6","key":"759_CR12","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/S0169-8141(98)00068-7","volume":"24","author":"JH Goldberg","year":"1999","unstructured":"Goldberg, J.H., Kotval, X.P.: Computer interface evaluation using eye movements: methods and constructs. Int. J. Ind. Ergon. 24(6), 631\u2013645 (1999)","journal-title":"Int. J. Ind. Ergon."},{"issue":"7","key":"759_CR13","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1002\/smr.1673","volume":"27","author":"D Graziotin","year":"2015","unstructured":"Graziotin, D., Wang, X., Abrahamsson, P.: Do feelings matter? On the correlation of affects and the self-assessed productivity in software engineering. J. Softw. Evol. Process 27(7), 467\u2013487 (2015)","journal-title":"J. Softw. Evol. Process"},{"key":"759_CR14","doi-asserted-by":"crossref","unstructured":"Gulden, J., Burattin, A., Andaloussi, A.A., Weber, B.: From analytical purposes to data visualizations: a decision process guided by a conceptual framework and eye tracking. Softw. Syst. Model. (2019)","DOI":"10.1007\/s10270-019-00742-z"},{"key":"759_CR15","volume-title":"Eye Tracking: A Comprehensive Guide to Methods and Measures","author":"K Holmqvist","year":"2011","unstructured":"Holmqvist, K., Nystr\u00f6m, M., Andersson, R., Dewhurst, R., Jarodzka, H., Van de Weijer, J.: Eye Tracking: A Comprehensive Guide to Methods and Measures. OUP, Oxford (2011)"},{"key":"759_CR16","unstructured":"IEEE Task Force on Process Mining.: Process Mining Manifesto. Business Process Management Workshops, pp. 169\u2013194 (2011)"},{"key":"759_CR17","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-92898-2_14","volume-title":"Advanced Information Systems Engineering Workshops","author":"C Ioannou","year":"2018","unstructured":"Ioannou, C., Burattin, A., Weber, B.: Mining developers\u2019 workflows from IDE usage. In: Matulevi\u010dius, R., Dijkman, R. (eds.) Advanced Information Systems Engineering Workshops, pp. 167\u2013179. Springer, Cham (2018)"},{"key":"759_CR18","volume-title":"The Coding Manual for Qualitative Researchers","author":"S Johnny","year":"2012","unstructured":"Johnny, S.: The Coding Manual for Qualitative Researchers. SAGE Publications Limited, Thousand Oaks (2012)"},{"key":"759_CR19","doi-asserted-by":"crossref","unstructured":"Kevic, K., Walters, B.M., Shaffer, T.R., Sharif, B., Shepherd, D.C., Fritz, T.: Tracing software developers\u2019 eyes and interactions for change tasks. In Proceedings of the 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015, pp. 202\u2013213. ACM, New York (2015)","DOI":"10.1145\/2786805.2786864"},{"issue":"3","key":"759_CR20","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1287\/isre.11.3.284.12206","volume":"11","author":"J Kim","year":"2000","unstructured":"Kim, J., Hahn, J., Hahn, H.: How do we understand a system with (so) many diagrams? Cognitive integration processes in diagrammatic reasoning. Inf. Syst. Res. 11(3), 284\u2013303 (2000)","journal-title":"Inf. Syst. Res."},{"key":"759_CR21","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/11608035_25","volume-title":"Unifying the Software Process Spectrum","author":"Ekkart Kindler","year":"2006","unstructured":"Kindler, E., Rubin, V., Sch\u00e4fer, W.: Incremental workflow mining based on document versioning information. In: Software Process Workshop, volume 3840 of LNCS, pp. 287\u2013301. Springer, Berlin (2005)"},{"key":"759_CR22","doi-asserted-by":"crossref","unstructured":"King, T.M., Nunez, G., Santiago, D., Cando, A., Mack, C.: Legend: An Agile DSL Toolset for Web Acceptance Testing. pp. 409\u2013412 (2014)","DOI":"10.1145\/2610384.2628048"},{"issue":"4","key":"759_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11334-007-0031-2","volume":"3","author":"D Lawrie","year":"2007","unstructured":"Lawrie, D., Morrell, C., Feild, H., Binkley, D.: Effective identifier names for comprehension and memory. Innov. Syst. Softw. Eng. 3(4), 303\u2013318 (2007)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"759_CR24","doi-asserted-by":"crossref","unstructured":"Leemans, M., van\u00a0der Aalst, W.M.P.: Process mining in software systems: discovering real-life business transactions and process models from distributed systems. In: Proceedings of MODELS, pp. 44\u201353 (2015)","DOI":"10.1109\/MODELS.2015.7338234"},{"key":"759_CR25","doi-asserted-by":"crossref","unstructured":"Leemans, M., van\u00a0der Aalst, W.M.P., van\u00a0den Brand, M.G..J.: Recursion aware modeling and discovery for hierarchical software event log analysis (extended). CoRR, abs\/1710.09323 (2017)","DOI":"10.1109\/SANER.2018.8330208"},{"key":"759_CR26","doi-asserted-by":"crossref","unstructured":"Leemans, Sander J.\u00a0J., Fahland, Dirk, van\u00a0der Aalst, Wil M.\u00a0P.: Discovering block-structured process models from event logs - a constructive approach. In Application and Theory of Petri Nets and Concurrency. Springer, (2013)","DOI":"10.1007\/978-3-642-38697-8_17"},{"key":"759_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jss.2015.04.084","volume":"107","author":"P Lenberg","year":"2015","unstructured":"Lenberg, P., Feldt, R., Wallgren, L.: Behavioral software engineering: a definition and systematic literature review. J. Syst. Softw. 107, 15\u201337 (2015)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"759_CR28","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/0164-1212(87)90032-X","volume":"7","author":"S Letovsky","year":"1987","unstructured":"Letovsky, S.: Cognitive processes in program comprehension. J. Syst. Softw. 7(4), 325\u2013339 (1987)","journal-title":"J. Syst. Softw."},{"key":"759_CR29","unstructured":"Liu, C., van Dongen, B.F., Assy, N., Aalst, W.M.P.: Software architectural model discovery from execution data. In: 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 03 (2018)"},{"key":"759_CR30","unstructured":"Liu, C., van Dongen, B., Assy, N., van\u00a0der Aalst, W.M.P.: Component behavior discovery from software execution data. In: IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1\u20138, (2016)"},{"key":"759_CR31","doi-asserted-by":"crossref","unstructured":"Mller, S.C., Fritz, T.: Stakeholders\u2019 information needs for artifacts and their dependencies in a real world context. In: IEEE International Conference on Software Maintenance, pp 290\u2013299 (2013)","DOI":"10.1109\/ICSM.2013.40"},{"key":"759_CR32","unstructured":"Nancy, P.: Empirical studies of programmers: Second workshop. In: Comprehension Strategies in Programming, pp. 100\u2013113. Ablex Publishing Corp., Norwood (1987)"},{"key":"759_CR33","unstructured":"North, D.: Introducing BDD (2006). \nhttp:\/\/dannorth.net\/introducing-bdd\/\n\n. Last Accessed October 2018"},{"key":"759_CR34","doi-asserted-by":"crossref","unstructured":"Rubin, V., G\u00fcnther, C.W., van\u00a0der Aalst, W.M.P., Kindler, E., van Dongen, B.F., Sch\u00e4fer, W.: Process mining framework for software processes. In Proceedings of ICSP 2007, pp. 169\u2013181. Springer (2007)","DOI":"10.1007\/978-3-540-72426-1_15"},{"key":"759_CR35","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.jss.2016.06.043","volume":"119","author":"I Nurdiani","year":"2016","unstructured":"Nurdiani, I., B\u00f6rstler, J., Fricker, S.: The impacts of agile and lean practices on project constraints: a tertiary study. J. Syst. Softw. 119, 162\u2013183 (2016)","journal-title":"J. Syst. Softw."},{"key":"759_CR36","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-319-77243-1_18","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G Oliveira","year":"2018","unstructured":"Oliveira, G., Marczak, S.: On the understanding of bdd scenarios\u2019 quality: Preliminary practitioners\u2019 opinions. In: Kamsties, E., Horkoff, J., Dalpiaz, F. (eds.) Requirements Engineering: Foundation for Software Quality, pp. 290\u2013296. Springer, Berlin (2018)"},{"key":"759_CR37","doi-asserted-by":"crossref","unstructured":"Salviulo, F., Scanniello, G.: Dealing with identifiers and comments in source code comprehension and maintenance: results from an ethnographically-informed study with students and professionals. In: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, EASE \u201914, pp. 48:1\u201348:10. ACM, New York (2014)","DOI":"10.1145\/2601248.2601251"},{"key":"759_CR38","doi-asserted-by":"crossref","unstructured":"Schr\u00f6ter, I., Kr\u00fcger, J., Siegmund, J., Leich, T.: Comprehending studies on program comprehension. In: IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), pp. 308\u2013311 (2017)","DOI":"10.1109\/ICPC.2017.9"},{"key":"759_CR39","doi-asserted-by":"crossref","unstructured":"Shaffer, T.R., Wise, J.L., Walters, B.M., M\u00fcller, S.C., Falcone, M., Sharif, B.: itrace: Enabling eye tracking on software artifacts within the ide to support software engineering tasks. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015, pp. 954\u2013957. ACM, New York (2015)","DOI":"10.1145\/2786805.2803188"},{"key":"759_CR40","doi-asserted-by":"crossref","unstructured":"Sharafi, Z., Soh, Z., Gu\u00e9h\u00e9neuc, Y., Antoniol, G.: Women and men\u2014different but equal: on the impact of identifier style on source code reading. In: 20th IEEE International Conference on Program Comprehension (ICPC), pp. 27\u201336 (2012)","DOI":"10.1109\/ICPC.2012.6240505"},{"key":"759_CR41","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.infsof.2015.06.008","volume":"67","author":"Z Sharafi","year":"2015","unstructured":"Sharafi, Z., Soh, Z., Gu\u00e9h\u00e9neuc, Y.-G.: A systematic literature review on the usage of eye-tracking in software engineering. Inf. Softw. Technol. 67, 79\u2013107 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"759_CR42","unstructured":"Siau, K.Leng: Empirical studies in information modeling: Interpretation of the object relationship. PhD thesis, University of British Columbia (1996)"},{"key":"759_CR43","volume-title":"BDD in Action","author":"JF Smart","year":"2014","unstructured":"Smart, J.F.: BDD in Action. Manning Publications, New York (2014)"},{"key":"759_CR44","unstructured":"IEEE\u00a0Computer Society, Bourque, P., Fairley, R.E.: Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): Version 3.0., 3rd edn. IEEE Computer Society Press, Los Alamitos (2014)"},{"key":"759_CR45","doi-asserted-by":"crossref","unstructured":"Solis, C., Wang, X.: A study of the characteristics of behaviour driven development. In: 37th EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 383\u2013387 (2011)","DOI":"10.1109\/SEAA.2011.76"},{"key":"759_CR46","first-page":"152","volume":"129","author":"E Soloway","year":"1988","unstructured":"Soloway, E., Adelson, B., Ehrlich, K.: Knowledge and processes in the comprehension of computer programs. Nat. Expert. 129, 152 (1988)","journal-title":"Nat. Expert."},{"key":"759_CR47","doi-asserted-by":"crossref","unstructured":"van\u00a0der Aalst, W.: Big software on the run: In vivo software analytics based on process mining (keynote). In: Proceedings of ICSSP 2015, pp. 1\u20135. ACM (2015)","DOI":"10.1145\/2785592.2785593"},{"key":"759_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining: Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining: Data Science in Action. Springer, Berlin (2016)"},{"issue":"8","key":"759_CR49","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/2.402076","volume":"28","author":"AM Vans","year":"1995","unstructured":"Vans, A.M., von Mayrhauser, A.: Program comprehension during software maintenance and evolution. Computer 28(8), 44\u201355 (1995)","journal-title":"Computer"},{"key":"759_CR50","unstructured":"Version One.: 12th Annual State of Agile\u2122\u00a0Report, 2017. Last Accessed December 2018"},{"key":"759_CR51","doi-asserted-by":"crossref","unstructured":"Vessey, I., Conger, S.A.: Requirements Specification: Learning Object, Process, and Data Methodologies. Communications of the ACM (1994)","DOI":"10.1145\/175290.175305"},{"key":"759_CR52","doi-asserted-by":"crossref","unstructured":"Walters, B., Shaffer, T., Sharif, B., Kagdi, H.: Capturing software traceability links from developers\u2019 eye gazes. In: Proceedings of the 22nd International Conference on Program Comprehension, ICPC 2014, pp. 201\u2013204. ACM, New York (2014)","DOI":"10.1145\/2597008.2597795"},{"key":"759_CR53","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-91602-6_3","volume-title":"Agile Processes in Software Engineering and Extreme Programming","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Wagner, S.: Combining stpa and bdd for safety analysis and verification in agile development: a controlled experiment. In: Garbajosa, J., Wang, X., Aguiar, A. (eds.) Agile Processes in Software Engineering and Extreme Programming, pp. 37\u201353. Springer, Cham (2018)"},{"key":"759_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Berlin (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-43839-8"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-019-00759-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-019-00759-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-019-00759-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T23:43:00Z","timestamp":1602373380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-019-00759-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,12]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["759"],"URL":"https:\/\/doi.org\/10.1007\/s10270-019-00759-4","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2019,10,12]]},"assertion":[{"value":"12 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}