{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:05Z","timestamp":1750221365574,"version":"3.41.0"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T00:00:00Z","timestamp":1522195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2018,3,28]]},"abstract":"<jats:p>All experimental studies are prone to risk with regard to the validity of their results. After applying a determined action to control a threat, during planning or executing an experiment, new risks to the study validity can arise. Aim. To improve the quality of controlled experiments in Software Engineering (SE), setting out strategies that permit researchers giving priority to specific threats in causes virtue and consequences (trade-offs), which exist between threats to validity and possible measures for control. Method. We will employ a knowledge base acquired through a survey and a Systematic Literature Review to model an approach for prioritizing and controlling threats to validity. The proposed approach will also be evaluated through experiments. Contribution. To improve the control processes for threats to validity considered to be critical, reducing efforts required by researchers, thereby improving the quality of future controlled experiments in the Software Engineering area by increasing its results? validity.<\/jats:p>","DOI":"10.1145\/3178315.3178321","type":"journal-article","created":{"date-parts":[[2018,3,30]],"date-time":"2018-03-30T12:19:12Z","timestamp":1522412352000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving the Quality of Controlled Experiments in Software Engineering"],"prefix":"10.1145","volume":"43","author":[{"given":"Eudis","family":"Teixeira","sequence":"first","affiliation":[{"name":"University of Pernambuco Recife, PE, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Travassos G.H. Gurov D. and Amaral E.A.G.G. 2002. Introdu\u00e7\u00e3o \u00e0 engenharia de software experimental (p. 53). UFRJ.  Travassos G.H. Gurov D. and Amaral E.A.G.G. 2002. Introdu\u00e7\u00e3o \u00e0 engenharia de software experimental (p. 53). UFRJ."},{"key":"e_1_2_1_2_1","unstructured":"Feldt R. and Magazinius A. 2010 July. Validity Threats in Empirical Software Engineering Research-An Initial Survey. In SEKE (pp. 374--379).  Feldt R. and Magazinius A. 2010 July. Validity Threats in Empirical Software Engineering Research-An Initial Survey. In SEKE (pp. 374--379)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.97"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Wohlin C. Runeson P. H\u00f6st M. Ohlsson M.C. Regnell B. and Wessl\u00e9n A. 2012. Experimentation in software engineering. Springer Science & Business Media.   Wohlin C. Runeson P. H\u00f6st M. Ohlsson M.C. Regnell B. and Wessl\u00e9n A. 2012. Experimentation in software engineering. Springer Science & Business Media.","DOI":"10.1007\/978-3-642-29044-2"},{"key":"e_1_2_1_5_1","unstructured":"Juristo N. and Moreno A.M. 2013. Basics of software engineering experimentation. Springer Science & Business Media.   Juristo N. and Moreno A.M. 2013. Basics of software engineering experimentation. Springer Science & Business Media."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9279-3"},{"first-page":"9","volume-title":"Software Engineering (ICSE), 2015 IEEE\/ACM 37th IEEE International Conference on (Vol. 1","author":"Siegmund J.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461011"},{"volume-title":"Empirical Software Engineering, 2003. ISESE 2003. Proceedings. 2003 International Symposium on (pp. 174--184)","author":"Andersson C.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018434.1021583"},{"key":"e_1_2_1_11_1","unstructured":"Wazlawick R. 2014. Metodologia de pesquisa para ci\u00eancia da computa\u00e7\u00e3o 2a edi\u00e7\u00e3o (Vol. 2). Elsevier Brasil.  Wazlawick R. 2014. Metodologia de pesquisa para ci\u00eancia da computa\u00e7\u00e3o 2a edi\u00e7\u00e3o (Vol. 2). Elsevier Brasil."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-5967-6"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414034"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178315.3178321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3178315.3178321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:23Z","timestamp":1750213583000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178315.3178321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,28]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3,28]]}},"alternative-id":["10.1145\/3178315.3178321"],"URL":"https:\/\/doi.org\/10.1145\/3178315.3178321","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2018,3,28]]},"assertion":[{"value":"2018-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}