Title
Identifying, categorizing and mitigating threats to validity in software engineering secondary studies.
Abstract
Abstract Context Secondary studies are vulnerable to threats to validity. Although, mitigating these threats is crucial for the credibility of these studies, we currently lack a systematic approach to identify, categorize and mitigate threats to validity for secondary studies. Objective In this paper, we review the corpus of secondary studies, with the aim to identify: (a) the trend of reporting threats to validity, (b) the most common threats to validity and corresponding mitigation actions, and (c) possible categories in which threats to validity can be classified. Method To achieve this goal we employ the tertiary study research method that is used for synthesizing knowledge from existing secondary studies. In particular, we collected data from more than 100 studies, published until December 2016 in top quality software engineering venues (both journals and conference). Results Our results suggest that in recent years, secondary studies are more likely to report their threats to validity. However, the presentation of such threats is rather ad hoc, e.g., the same threat may be presented with a different name, or under a different category. To alleviate this problem, we propose a classification schema for reporting threats to validity and possible mitigation actions. Both the classification of threats and the associated mitigation actions have been validated by an empirical study, i.e., Delphi rounds with experts. Conclusion Based on the proposed schema, we provide a checklist, which authors of secondary studies can use for identifying and categorizing threats to validity and corresponding mitigation actions, while readers of secondary studies can use the checklist for assessing the validity of the reported results.
Year
DOI
Venue
2019
10.1016/j.infsof.2018.10.006
Information and Software Technology
Keywords
Field
DocType
Empirical software engineering,Secondary studies,Threats to Validity,Literature Review
Research method,Checklist,Categorization,Tertiary study,Software engineering,Credibility,Computer science,Delphi,Schema (psychology),Empirical research
Journal
Volume
ISSN
Citations 
106
0950-5849
2
PageRank 
References 
Authors
0.36
26
5
Name
Order
Citations
PageRank
Apostolos Ampatzoglou133441.24
Stamatia Bibi25310.10
Paris Avgeriou31956139.94
Marijn Verbeek420.36
A. Chatzigeorgiou54610.34