{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T17:29:55Z","timestamp":1768843795642,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162051"],"award-info":[{"award-number":["62162051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Guidance for Local Scientific and Technological Development Fund","award":["2024ZY0124"],"award-info":[{"award-number":["2024ZY0124"]}]},{"name":"the open project of IoT Standards and Application Key Laboratory of the Ministry of Industry and Information Technology","award":["202407"],"award-info":[{"award-number":["202407"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s10515-026-00593-1","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T01:57:38Z","timestamp":1768787858000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From interaction to evolution: A behavior-driven framework for automated software requirements elicitation"],"prefix":"10.1007","volume":"33","author":[{"given":"Tong","family":"Li","sequence":"first","affiliation":[]},{"given":"Chaoqun","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Xinran","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,19]]},"reference":[{"issue":"1","key":"593_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1186\/s40537-021-00461-7","volume":"8","author":"M Ala\u2019raj","year":"2021","unstructured":"Ala\u2019raj, M., Abbod, M.F., Majdalawieh, M.: Modelling customers credit card behaviour using bidirectional LSTM neural networks. J. Big Data 8(1), 69 (2021)","journal-title":"J. Big Data"},{"key":"593_CR2","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1613\/jair.1491","volume":"22","author":"R Begleiter","year":"2004","unstructured":"Begleiter, R., El-Yaniv, R., Yona, G.: On prediction using variable order Markov models. J. Artif. Intell. Res. 22, 385\u2013421 (2004)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"593_CR3","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/JSYST.2021.3067334","volume":"16","author":"M Cai","year":"2021","unstructured":"Cai, M., Tan, Y., Ge, B., Dou, Y., Huang, G., Du, Y.: PURA: A product-and-user oriented approach for requirement analysis from online reviews. IEEE Syst. J. 16(1), 566\u2013577 (2021)","journal-title":"IEEE Syst. J."},{"key":"593_CR4","doi-asserted-by":"crossref","unstructured":"Carre\u00f1o, L.V.G., Winbladh, K.: Analysis of user comments: An approach for software requirements evolution. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 582\u2013591. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606604"},{"issue":"5","key":"593_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIS.2016.29","volume":"31","author":"S Cresci","year":"2016","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: DNA-inspired online behavioral modeling and its application to spambot detection. IEEE Intell. Syst. 31(5), 58\u201364 (2016)","journal-title":"IEEE Intell. Syst."},{"key":"593_CR6","doi-asserted-by":"crossref","unstructured":"Ghezzi, C., Pezz\u00e8, M., Sama, M., Tamburrelli, G.: Mining behavior models from user-intensive web applications. In: Proceedings of the 36th International Conference on Software Engineering, pp. 277\u2013287 (2014)","DOI":"10.1145\/2568225.2568234"},{"key":"593_CR7","doi-asserted-by":"crossref","unstructured":"Guzman, E., Ibrahim, M., Glinz, M.: A little bird told me: Mining tweets for requirements and software evolution. In: 2017 IEEE 25th International Requirements Engineering Conference (RE), pp. 11\u201320. IEEE (2017)","DOI":"10.1109\/RE.2017.88"},{"key":"593_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12193-018-0258-2","volume":"12","author":"J Hussain","year":"2018","unstructured":"Hussain, J., Ul Hassan, A., Muhammad Bilal, H.S., Ali, R., Afzal, M., Hussain, S., Bang, J., Banos, O., Lee, S.: Model-based adaptive user interface based on context and user experience evaluation. J. Multimodal User Interfaces 12, 1\u201316 (2018)","journal-title":"J. Multimodal User Interfaces"},{"key":"593_CR9","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.chb.2018.02.012","volume":"83","author":"T Katerina","year":"2018","unstructured":"Katerina, T., Nicolaos, P.: Mouse behavioral patterns and keystroke dynamics in end-user development: What can they tell us about users\u2019 behavioral attributes? Comput. Hum. Behav. 83, 288\u2013305 (2018)","journal-title":"Comput. Hum. Behav."},{"key":"593_CR10","doi-asserted-by":"publisher","first-page":"120030","DOI":"10.1016\/j.eswa.2023.120030","volume":"225","author":"M Kloska","year":"2023","unstructured":"Kloska, M., Grmanova, G., Rozinajova, V.: Expert enhanced dynamic time warping based anomaly detection. Expert Syst. Appl. 225, 120030 (2023)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"593_CR11","doi-asserted-by":"publisher","first-page":"526","DOI":"10.12965\/jer.1938384.192","volume":"15","author":"H-S Lee","year":"2019","unstructured":"Lee, H.-S.: Application of dynamic time warping algorithm for pattern similarity of gait. J. Exerc. Rehabil. 15(4), 526 (2019)","journal-title":"J. Exerc. Rehabil."},{"issue":"9","key":"593_CR12","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/PROC.1980.11805","volume":"68","author":"MM Lehman","year":"1980","unstructured":"Lehman, M.M.: Programs, life cycles, and laws of software evolution. Proc. IEEE 68(9), 1060\u20131076 (1980)","journal-title":"Proc. IEEE"},{"key":"593_CR13","doi-asserted-by":"crossref","unstructured":"Li, T., Zhang, T.: Continuous usability requirements evaluation based on runtime user behavior mining. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 1036\u20131045. IEEE (2022)","DOI":"10.1109\/QRS57517.2022.00107"},{"key":"593_CR14","first-page":"22","volume":"37","author":"J Li","year":"2023","unstructured":"Li, J., Guo, X., Zhang, K., Zhao, W.: A knowledge-enabled approach for user experience-driven product improvement at the conceptual design stage. AI EDAM. 37, 22 (2023)","journal-title":"AI EDAM."},{"issue":"11","key":"593_CR15","doi-asserted-by":"publisher","first-page":"4485","DOI":"10.1109\/TSE.2021.3120203","volume":"48","author":"M Liu","year":"2021","unstructured":"Liu, M., Peng, X., Marcus, A., Xing, S., Treude, C., Zhao, C.: API-related developer information needs in stack overflow. IEEE Trans. Software Eng. 48(11), 4485\u20134500 (2021)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"593_CR16","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1007\/s10489-021-02497-x","volume":"52","author":"M Ma","year":"2022","unstructured":"Ma, M., Na, S., Wang, H., Chen, C., Xu, J.: The graph-based behavior-aware recommendation for interactive news. Appl. Intell. 52(2), 1913\u20131929 (2022)","journal-title":"Appl. Intell."},{"key":"593_CR17","doi-asserted-by":"crossref","unstructured":"Mens, T., Wermelinger, M., Ducasse, S., Demeyer, S., Hirschfeld, R., Jazayeri, M.: Challenges in software evolution. In: Eighth International Workshop on Principles of Software Evolution (IWPSE\u201905), pp. 13\u201322. IEEE (2005)","DOI":"10.1109\/IWPSE.2005.7"},{"key":"593_CR18","doi-asserted-by":"crossref","unstructured":"Navalpakkam, V., Jentzsch, L., Sayres, R., Ravi, S., Ahmed, A., Smola, A.: Measurement and modeling of eye-mouse behavior in the presence of nonlinear page layouts. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 953\u2013964 (2013)","DOI":"10.1145\/2488388.2488471"},{"key":"593_CR19","doi-asserted-by":"crossref","unstructured":"Park, J.S., O\u2019Brien, J., Cai, C.J., Morris, M.R., Liang, P., Bernstein, M.S.: Generative agents: Interactive simulacra of human behavior. In: Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, pp. 1\u201322 (2023)","DOI":"10.1145\/3586183.3606763"},{"key":"593_CR20","doi-asserted-by":"publisher","first-page":"90978","DOI":"10.1109\/ACCESS.2020.2994056","volume":"8","author":"SGK Patro","year":"2020","unstructured":"Patro, S.G.K., Mishra, B.K., Panda, S.K., Kumar, R., Long, H.V., Taniar, D., Priyadarshini, I.: A hybrid action-related K-nearest neighbour (HAR-KNN) approach for recommendation systems. IEEE Access 8, 90978\u201390991 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"593_CR21","doi-asserted-by":"publisher","first-page":"25961","DOI":"10.1525\/collabra.25961","volume":"7","author":"JE Peelle","year":"2021","unstructured":"Peelle, J.E., Van\u00a0Engen, K.J.: Time stand still: Effects of temporal window selection on eye tracking analysis. Collabra: Psychol. 7(1), 25961 (2021)","journal-title":"Collabra: Psychol."},{"key":"593_CR22","doi-asserted-by":"crossref","unstructured":"Pereira, L.: A mouse (H) over a hotspot survey: An exploration of patterns of hesitation through cursor movement metrics. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u20136 (2019)","DOI":"10.1145\/3290607.3312956"},{"key":"593_CR23","doi-asserted-by":"crossref","unstructured":"Rehse, J.-R., Abb, L., Berg, G., Bormann, C., Kampik, T., Warmuth, C.: User behavior mining: A research agenda. Business & Information Systems Engineering, 1\u201318 (2024)","DOI":"10.1007\/s12599-023-00848-1"},{"key":"593_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14, 131\u2013164 (2009)","journal-title":"Empir. Softw. Eng."},{"key":"593_CR25","doi-asserted-by":"crossref","unstructured":"Seraj, M.S.A.: A survey on user modeling in HCI. 5, 21\u201328 (2018)","DOI":"10.5121\/caij.2018.5102"},{"issue":"7","key":"593_CR26","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1080\/10447318.2021.1960092","volume":"38","author":"KESD Souza","year":"2022","unstructured":"Souza, K.E.S.D., Aviz, I.L.D., Mello, H.D.D., Figueiredo, K., Vellasco, M.M.B.R., Costa, F.A.R., Seruffo, M.C.D.R.: An evaluation framework for user experience using eye tracking, mouse tracking, keyboard input, and artificial intelligence: A case study. Int. J. Human\u2013Comput. Interact. 38(7), 646\u2013660 (2022)","journal-title":"Int. J. Human\u2013Comput. Interact."},{"key":"593_CR27","doi-asserted-by":"crossref","unstructured":"Stone, S.A., Chapman, C.S.: Unconscious frustration: Dynamically assessing user experience using eye and mouse tracking. Proc. ACM on Human-Comput. Interact. 7(ETRA), 1\u201317 (2023)","DOI":"10.1145\/3591137"},{"key":"593_CR28","doi-asserted-by":"crossref","unstructured":"Tabbassum, S., Fischer, R.A.-L., Guzman, E.: Towards a cross-country analysis of software-related tweets. In: International Working Conference on Requirements Engineering: Foundation for Software Quality, pp. 272\u2013282. Springer (2023)","DOI":"10.1007\/978-3-031-29786-1_19"},{"key":"593_CR29","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.neucom.2022.01.023","volume":"479","author":"Q Tran","year":"2022","unstructured":"Tran, Q., Tran, L., Hai, L.C., Van Linh, N., Than, K.: From implicit to explicit feedback: A deep neural network for modeling sequential behaviours and long-short term preferences of online users. Neurocomputing 479, 89\u2013105 (2022)","journal-title":"Neurocomputing"},{"key":"593_CR30","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.chb.2017.02.035","volume":"72","author":"K Tzafilkou","year":"2017","unstructured":"Tzafilkou, K., Protogeros, N.: Diagnosing user perception and acceptance using eye tracking in web-based end-user development. Comput. Hum. Behav. 72, 23\u201337 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"593_CR31","doi-asserted-by":"crossref","unstructured":"Van\u00a0Lamsweerde, A.: Goal-oriented requirements engineering: A guided tour. In: Proceedings Fifth IEEE International Symposium on Requirements Engineering, pp. 249\u2013262. IEEE (2001)","DOI":"10.1109\/ISRE.2001.948567"},{"issue":"2","key":"593_CR32","first-page":"1","volume":"43","author":"L Wang","year":"2025","unstructured":"Wang, L., Zhang, J., Yang, H., Chen, Z.-Y., Tang, J., Zhang, Z., Chen, X., Lin, Y., Sun, H., Song, R., et al.: User behavior simulation with large language model-based agents. ACM Trans. Inf. Syst. 43(2), 1\u201337 (2025)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"3","key":"593_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3568954","volume":"41","author":"X Xin","year":"2023","unstructured":"Xin, X., Yang, J., Wang, H., Ma, J., Ren, P., Luo, H., Shi, X., Chen, Z., Ren, Z.: On the user behavior leakage from recommender system exposure. ACM Trans. Inf. Syst. 41(3), 1\u201325 (2023)","journal-title":"ACM Trans. Inf. Syst."},{"key":"593_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, E., Wang, X., Gong, P., Lin, Y., Mao, J.: Usimagent: Large language models for simulating search users. In: Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 2687\u20132692 (2024)","DOI":"10.1145\/3626772.3657963"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-026-00593-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-026-00593-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-026-00593-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T01:57:42Z","timestamp":1768787862000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-026-00593-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,19]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["593"],"URL":"https:\/\/doi.org\/10.1007\/s10515-026-00593-1","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,19]]},"assertion":[{"value":"20 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"46"}}