By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Assessing Validity Threats in Controlled Software Engineering Experiments | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Assessing Validity Threats in Controlled Software Engineering Experiments | HackerNoon
Computing

Assessing Validity Threats in Controlled Software Engineering Experiments | HackerNoon

News Room
Last updated: 2025/12/15 at 7:42 PM
News Room Published 15 December 2025
Share
Assessing Validity Threats in Controlled Software Engineering Experiments | HackerNoon
SHARE

Table Of Links

Abstract

1 Introduction

2 Original Study: Research Questions and Methodology

3 Original Study: Validity Threats

4 Original Study: Results

5 Replicated Study: Research Questions and Methodology

6 Replicated Study: Validity Threats

7 Replicated Study: Results

8 Discussion

9 Related Work

10 Conclusions And References

3 Original Study: Validity Threats

Based on the checklist provided by Wohlin et al. [52], the relevant threats to our study are next described.

3.1 Conclusion Validity

1. Random heterogeneity of participants. The use of a within-subjects experimental design ruled out the risk of the variation due to individual differences among participants being larger than the variation due to the treatment.

3.2 Internal Validity

  1. History and maturation:

    – Since participants apply different techniques on different artefacts, learning effects should not be much of a concern. – Experimental sessions take place on different days. Given the association of grades to performance in the experiment, we expect students will try to do better on the following day, causing that the technique applied the last day gets a better effectiveness. To avoid this, different participants apply techniques in different orders. This way we cancel out the threat due to order of application (avoiding that a given technique gets benefited from the maturation effect). In any case, an analysis of the chosen techniques per day is done to study maturation effect.

  2. Interactions with selection. Different behaviours in different technique application groups are ruled out by randomly assigning participants to groups. However, we will check it analysing the behaviour of groups.

  3. Hypothesis guessing. Before filling in the questionnaire, participants in the study were informed about the goal of the study only partially. We told them that we wanted to know their preferences and opinions, but they were not aware of our research questions. In any case, if this threat is occurring, it would mean that our results for perceptions are the best possible ones, and therefore would set an upper bound.

  4. Mortality. The fact that several participants did not give consent to participate in the study has affected the balance of the experiment.

  5. Order of Training. Techniques are presented in the following order: CR, BT and EP. If this threat had taken place, then CR would be the most effective (or their favourite).

3.3 Construct Validity

  1. Inadequate preoperational explanation of cause constructs. Cause constructs are clearly defined thanks to the extensive training received by participants on the study techniques.
  2. Inadequate preoperational explanation of effect constructs. The question being asked is totally clear and should not be subject to possible misinterpretations. However, since the perception is subjective, there exists the possibility that the question asked is interpreted differently by different participants, and hence, perceptions are related to how the question is interpreted. This issue should be further investigated in future studies.

3.4 External Validity

  1. Interaction of setting and treatment. We tried to make the faults seeded in the programs as representative as possible of reality.
  2. Generalisation to other subject types. As we have already mentioned, the type of subjects our sample represents are developers with little or none previous experience in testing techniques and junior programmers. The extent to which the results obtained in this study can be generalised to other subject types needs to be investigated. Of all threats listed, the only one that could affect the validity of the results of this study in an industrial context is the one related to generalisation to other subject types.

:::info
Authors:

  1. Sira Vegas
  2. Patricia Riofr´ıo
  3. Esperanza Marcos
  4. Natalia Juristo

:::

:::info
This paper is available on arxiv under CC BY-NC-ND 4.0 license.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Best Gaming Chairs We’ve Tested for 2026 The Best Gaming Chairs We’ve Tested for 2026
Next Article Today's NYT Connections Hints, Answers for Dec. 16 #919 Today's NYT Connections Hints, Answers for Dec. 16 #919
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

I Tested Nearly 60 Office Chairs to Pick the Best One
I Tested Nearly 60 Office Chairs to Pick the Best One
Gadget
Canadian peer-to-peer clothing rental company Rax is expanding to the U.S. |  News
Canadian peer-to-peer clothing rental company Rax is expanding to the U.S. | News
News
Transformers v5 Introduces a More Modular and Interoperable Core
Transformers v5 Introduces a More Modular and Interoperable Core
News
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
Computing

You Might also Like

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
Computing

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

3 Min Read
Allen Institute for AI rivals Google, Meta and OpenAI with open-source AI vision model
Computing

Allen Institute for AI rivals Google, Meta and OpenAI with open-source AI vision model

10 Min Read
The Significant Performance Gains For Radeon RADV Ray-Tracing Performance In 2025
Computing

The Significant Performance Gains For Radeon RADV Ray-Tracing Performance In 2025

3 Min Read
TikTok’s clock continues to tick · TechNode
Computing

TikTok’s clock continues to tick · TechNode

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?