Skip to main content
Erschienen in: Empirical Software Engineering 3/2018

03.11.2017

Reducing user input requests to improve IT support ticket resolution process

verfasst von: Monika Gupta, Allahbaksh Asadullah, Srinivas Padmanabhuni, Alexander Serebrenik

Erschienen in: Empirical Software Engineering | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Management and maintenance of IT infrastructure resources such as hardware, software and network is an integral part of software development and maintenance projects. Service management ensures that the tickets submitted by users, i.e. software developers, are serviced within the agreed resolution times. Failure to meet those times induces penalty on the service provider. To prevent a spurious penalty on the service provider, non-working hours such as waiting for user inputs are not included in the measured resolution time, that is, a service level clock pauses its timing. Nevertheless, the user interactions slow down the resolution process, that is, add to user experienced resolution time and degrade user experience. Therefore, this work is motivated by the need to analyze and reduce user input requests in tickets’ life cycle.
To address this problem, we analyze user input requests and investigate their impact on user experienced resolution time. We distinguish between input requests of two types: real, seeking information from the user to process the ticket and tactical, when no information is asked but the user input request is raised merely to pause the service level clock. Next, we propose a system that preempts a user at the time of ticket submission to provide additional information that the analyst, a person responsible for servicing the ticket, is likely to ask, thus reducing real user input requests. Further, we propose a detection system to identify tactical user input requests. To evaluate the approach, we conducted a case study in a large global IT company. We observed that around 57% of the tickets have user input requests in the life cycle, causing user experienced resolution time to be almost twice as long as the measured service resolution time. The proposed preemptive system preempts the information needs with an average accuracy of 94– 99% across five cross validations while traditional approaches such as logistic regression and naive Bayes have accuracy in the range of 50– 60%. The detection system identifies around 15% of the total user input requests as tactical. Therefore, the proposed solution can efficiently bring down the number of user input requests and, hence, improve the user-experienced resolution time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
We cannot reveal exact numbers because of confidentiality.
 
Literatur
Zurück zum Zitat Addy R (2007) Effective IT service management: to ITIL and beyond! Springer-Verlag New York, Inc. Addy R (2007) Effective IT service management: to ITIL and beyond! Springer-Verlag New York, Inc.
Zurück zum Zitat Akman B, Demirors O (2009) Applicability of process discovery algorithms for software organizations. In: 35th Euromicro conference on software engineering and advanced applications. IEEE, pp 195–202 Akman B, Demirors O (2009) Applicability of process discovery algorithms for software organizations. In: 35th Euromicro conference on software engineering and advanced applications. IEEE, pp 195–202
Zurück zum Zitat Anderson J, Salem S, Do H (2015) Striving for failure: an industrial case study about test failure prediction. In: 37th International conference on software engineering, vol 2. IEEE, pp 49–58 Anderson J, Salem S, Do H (2015) Striving for failure: an industrial case study about test failure prediction. In: 37th International conference on software engineering, vol 2. IEEE, pp 49–58
Zurück zum Zitat Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug? In: 28th International conference on software engineering. ACM, pp 361–370 Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug? In: 28th International conference on software engineering. ACM, pp 361–370
Zurück zum Zitat April A, Hayes J H, Abran A, Dumke R (2005) Software maintenance maturity model (SMmm): the software maintenance process model. J Softw Maint Evol Res Pract 17(3):197–223CrossRef April A, Hayes J H, Abran A, Dumke R (2005) Software maintenance maturity model (SMmm): the software maintenance process model. J Softw Maint Evol Res Pract 17(3):197–223CrossRef
Zurück zum Zitat Barash G, Bartolini C, Wu L (2007) Measuring and improving the performance of an IT support organization in managing service incidents. In: International workshop on business-driven IT management. IEEE, pp 11–18 Barash G, Bartolini C, Wu L (2007) Measuring and improving the performance of an IT support organization in managing service incidents. In: International workshop on business-driven IT management. IEEE, pp 11–18
Zurück zum Zitat Bartolini C, Stefanelli C, Tortonesi M (2009) Business-impact analysis and simulation of critical incidents in IT service management. In: International symposium on integrated network management. IEEE, pp 9–16 Bartolini C, Stefanelli C, Tortonesi M (2009) Business-impact analysis and simulation of critical incidents in IT service management. In: International symposium on integrated network management. IEEE, pp 9–16
Zurück zum Zitat Bartsch C, Mevius M, Oberweis A (2008) Simulation of IT service processes with Petri-nets. In: International conference on service-oriented computing. Springer, pp 53–65 Bartsch C, Mevius M, Oberweis A (2008) Simulation of IT service processes with Petri-nets. In: International conference on service-oriented computing. Springer, pp 53–65
Zurück zum Zitat Bavota G, De Lucia A, Marcus A, Oliveto R (2014) Automating extract class refactoring: an improved method and its evaluation. Empir Softw Eng 19(6):1617–1664CrossRef Bavota G, De Lucia A, Marcus A, Oliveto R (2014) Automating extract class refactoring: an improved method and its evaluation. Empir Softw Eng 19(6):1617–1664CrossRef
Zurück zum Zitat Begel A, Zimmermann T, Khoo Y P, Venolia GD (2015) Discovering and exploiting relationships in software repositories, September 8 US Patent 9,129,038 Begel A, Zimmermann T, Khoo Y P, Venolia GD (2015) Discovering and exploiting relationships in software repositories, September 8 US Patent 9,129,038
Zurück zum Zitat Bettenburg N, Just S, Schröter A, Weiss C, Premraj R, Zimmermann T (2008) What makes a good bug report? In: International symposium on foundations of software engineering. ACM, pp 308–318 Bettenburg N, Just S, Schröter A, Weiss C, Premraj R, Zimmermann T (2008) What makes a good bug report? In: International symposium on foundations of software engineering. ACM, pp 308–318
Zurück zum Zitat Bishop CM (2006) Pattern recognition. Mach Learn 128 Bishop CM (2006) Pattern recognition. Mach Learn 128
Zurück zum Zitat Breu S, Premraj R, Sillito J, Zimmermann T (2010) Information needs in bug reports: improving cooperation between developers and users. In: Proceedings of the 2010 ACM conference on computer supported cooperative work. ACM, pp 301–310 Breu S, Premraj R, Sillito J, Zimmermann T (2010) Information needs in bug reports: improving cooperation between developers and users. In: Proceedings of the 2010 ACM conference on computer supported cooperative work. ACM, pp 301–310
Zurück zum Zitat Caldeira J, Brito e Abreu F (2008) Influential factors on incident management: lessons learned from a large sample of products in operation. In: International conference on product focused software process improvement. Springer, pp 330–344 Caldeira J, Brito e Abreu F (2008) Influential factors on incident management: lessons learned from a large sample of products in operation. In: International conference on product focused software process improvement. Springer, pp 330–344
Zurück zum Zitat Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):1–27CrossRef Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):1–27CrossRef
Zurück zum Zitat Crowther PS, Cox RJ (2005) A method for optimal division of data sets for use in neural networks. In: International conference on knowledge-based and intelligent information and engineering systems. Springer, pp 1–7 Crowther PS, Cox RJ (2005) A method for optimal division of data sets for use in neural networks. In: International conference on knowledge-based and intelligent information and engineering systems. Springer, pp 1–7
Zurück zum Zitat Daniel F, Barkaoui K, Dustdar S (eds) (2012) Business process management workshops - BPM 2011 international workshops, Clermont-Ferrand, France, August 29, 2011, revised selected papers, Part I, volume 99 of lecture notes in business information processing. Springer, Berlin Daniel F, Barkaoui K, Dustdar S (eds) (2012) Business process management workshops - BPM 2011 international workshops, Clermont-Ferrand, France, August 29, 2011, revised selected papers, Part I, volume 99 of lecture notes in business information processing. Springer, Berlin
Zurück zum Zitat De Weerdt J, Vanden Broucke S, Vanthienen J, Baesens B (2012) Leveraging process discovery with trace clustering and text mining for intelligent analysis of incident management processes. In: Congress on evolutionary computation. IEEE, pp 1–8 De Weerdt J, Vanden Broucke S, Vanthienen J, Baesens B (2012) Leveraging process discovery with trace clustering and text mining for intelligent analysis of incident management processes. In: Congress on evolutionary computation. IEEE, pp 1–8
Zurück zum Zitat Elish K O, Elish M O (2008) Predicting defect-prone software modules using support vector machines. J Syst Softw 81(5):649–660CrossRef Elish K O, Elish M O (2008) Predicting defect-prone software modules using support vector machines. J Syst Softw 81(5):649–660CrossRef
Zurück zum Zitat Ferreira DR, Da Silva MM (2008) Using process mining for ITIL assessment: a case study with incident management. In: 13th Annual UKAIS conference, pp 1–16 Ferreira DR, Da Silva MM (2008) Using process mining for ITIL assessment: a case study with incident management. In: 13th Annual UKAIS conference, pp 1–16
Zurück zum Zitat Gachechiladze D, Lanubile F, Novielli N, Serebrenik A Anger and its direction in collaborative software development. ICSE NIER, pp 11–14 Gachechiladze D, Lanubile F, Novielli N, Serebrenik A Anger and its direction in collaborative software development. ICSE NIER, pp 11–14
Zurück zum Zitat Garousi V, Ergezer E G, Herkiloġlu K (2016) Usage, usefulness and quality of defect reports: an industrial case study. In: Proceedings of the 20th international conference on evaluation and assessment in software engineering, number 39. ACM, pp 1–6 Garousi V, Ergezer E G, Herkiloġlu K (2016) Usage, usefulness and quality of defect reports: an industrial case study. In: Proceedings of the 20th international conference on evaluation and assessment in software engineering, number 39. ACM, pp 1–6
Zurück zum Zitat Günther C W, Disco A R (2012) Discover your processes. BPM (Demos) 940:40–44 Günther C W, Disco A R (2012) Discover your processes. BPM (Demos) 940:40–44
Zurück zum Zitat Günther CW, van der Aalst W (2007) Fuzzy mining–adaptive process simplification based on multi-perspective metrics. In: Business process management. Springer, pp 328–343 Günther CW, van der Aalst W (2007) Fuzzy mining–adaptive process simplification based on multi-perspective metrics. In: Business process management. Springer, pp 328–343
Zurück zum Zitat Guo PJ, Zimmermann T, Nagappan N, Murphy B (2010) Characterizing and predicting which bugs get fixed: an empirical study of microsoft windows. In: 32nd international conference on software engineering, vol 1. IEEE, pp 495–504 Guo PJ, Zimmermann T, Nagappan N, Murphy B (2010) Characterizing and predicting which bugs get fixed: an empirical study of microsoft windows. In: 32nd international conference on software engineering, vol 1. IEEE, pp 495–504
Zurück zum Zitat Gupta M, Sureka A (2014) Nirikshan: mining bug report history for discovering process maps, inefficiencies and inconsistencies. In: 7th India software engineering conference. ACM, pp 1–10 Gupta M, Sureka A (2014) Nirikshan: mining bug report history for discovering process maps, inefficiencies and inconsistencies. In: 7th India software engineering conference. ACM, pp 1–10
Zurück zum Zitat Gupta M, Sureka A, Padmanabhuni S (2014) Process mining multiple repositories for software defect resolution from control and organizational perspective. In: 11th Working conference on mining software repositories. ACM, pp 122–131 Gupta M, Sureka A, Padmanabhuni S (2014) Process mining multiple repositories for software defect resolution from control and organizational perspective. In: 11th Working conference on mining software repositories. ACM, pp 122–131
Zurück zum Zitat Harrell F E (2013) Regression modeling strategies: with applications to linear models, logistic regression, and survival analysis. Springer Science & Business Media Harrell F E (2013) Regression modeling strategies: with applications to linear models, logistic regression, and survival analysis. Springer Science & Business Media
Zurück zum Zitat He H, Garcia E A (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21(9):1263–1284CrossRef He H, Garcia E A (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21(9):1263–1284CrossRef
Zurück zum Zitat Herbsleb J D, Kuwana E (1993) Preserving knowledge in design projects What designers need to know. In: Proceedings of the INTERACT’93 and CHI’93 conference on human factors in computing systems. ACM, pp 7–14 Herbsleb J D, Kuwana E (1993) Preserving knowledge in design projects What designers need to know. In: Proceedings of the INTERACT’93 and CHI’93 conference on human factors in computing systems. ACM, pp 7–14
Zurück zum Zitat Ho T K (1998) The random subspace method for constructing decision forests. Trans Pattern Anal Mach Intell 20(8):832–844CrossRef Ho T K (1998) The random subspace method for constructing decision forests. Trans Pattern Anal Mach Intell 20(8):832–844CrossRef
Zurück zum Zitat Hsu C-W, Chang C-C, Lin C-J (2003) A practical guide to support vector classification Hsu C-W, Chang C-C, Lin C-J (2003) A practical guide to support vector classification
Zurück zum Zitat Hüttermann M (2012) DevOps for developers. Apress Hüttermann M (2012) DevOps for developers. Apress
Zurück zum Zitat Japkowicz N (2000) The class imbalance problem: significance and strategies. In: International conference on artificial intelligence Japkowicz N (2000) The class imbalance problem: significance and strategies. In: International conference on artificial intelligence
Zurück zum Zitat Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. In: European conference on machine learning. Springer, pp 137–142 Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. In: European conference on machine learning. Springer, pp 137–142
Zurück zum Zitat Jolliffe I (2002) Principal component analysis. Wiley Online Library Jolliffe I (2002) Principal component analysis. Wiley Online Library
Zurück zum Zitat Kang C J, Kang Y S, Lee Y S, Noh S, Kim HC, Lim WC, Kim J, Hong R (2013) Process mining-based understanding and analysis of Volvo IT’s incident and problem management processes. In: BPIC@ BPM Kang C J, Kang Y S, Lee Y S, Noh S, Kim HC, Lim WC, Kim J, Hong R (2013) Process mining-based understanding and analysis of Volvo IT’s incident and problem management processes. In: BPIC@ BPM
Zurück zum Zitat Kindler E, Rubin V, Schäfer W (2006) Activity mining for discovering software process models software engineering. Fachtagung des GI-Fachbereichs Softwaretechnik 79:175–180 Kindler E, Rubin V, Schäfer W (2006) Activity mining for discovering software process models software engineering. Fachtagung des GI-Fachbereichs Softwaretechnik 79:175–180
Zurück zum Zitat Knab P, Pinzger M, Gall HC (2010) Visual patterns in issue tracking data. In: New modeling concepts for today’s software processes. Springer, pp 222–233 Knab P, Pinzger M, Gall HC (2010) Visual patterns in issue tracking data. In: New modeling concepts for today’s software processes. Springer, pp 222–233
Zurück zum Zitat Ko A J, Myers B A, Chau D H (2006) A linguistic analysis of how people describe software problems. In: VL/HCC IEEE symposium on visual languages and human-centric computing, 2006. IEEE, pp 127–134 Ko A J, Myers B A, Chau D H (2006) A linguistic analysis of how people describe software problems. In: VL/HCC IEEE symposium on visual languages and human-centric computing, 2006. IEEE, pp 127–134
Zurück zum Zitat Kotsiantis S, Kanellopoulos D, Pintelas P et al (2006) Handling imbalanced datasets: a review. GESTS Int Trans Comput Sci Eng 30(1):25–36 Kotsiantis S, Kanellopoulos D, Pintelas P et al (2006) Handling imbalanced datasets: a review. GESTS Int Trans Comput Sci Eng 30(1):25–36
Zurück zum Zitat Li TH, Liu R, Sukaviriya N, Li Y, Yang J, Sandin M, Lee J (2014) Incident ticket analytics for IT application management services. In: International conference on services computing. IEEE, pp 568–574 Li TH, Liu R, Sukaviriya N, Li Y, Yang J, Sandin M, Lee J (2014) Incident ticket analytics for IT application management services. In: International conference on services computing. IEEE, pp 568–574
Zurück zum Zitat Maita AR, Martins L C, Paz C R, Peres S M, Fantinato M (2015) Process mining through artificial neural networks and support vector machines: a systematic literature review. Bus Process Manag J 21(6):1391–1415CrossRef Maita AR, Martins L C, Paz C R, Peres S M, Fantinato M (2015) Process mining through artificial neural networks and support vector machines: a systematic literature review. Bus Process Manag J 21(6):1391–1415CrossRef
Zurück zum Zitat Moraes A, Silva E, da Trindade C, Barbosa Y, Meira S (2010) Recommending experts using communication history. In: International workshop on recommendation systems for software engineering. ACM, pp 41–45 Moraes A, Silva E, da Trindade C, Barbosa Y, Meira S (2010) Recommending experts using communication history. In: International workshop on recommendation systems for software engineering. ACM, pp 41–45
Zurück zum Zitat Oliveira D C, Filho R H (2009) A time and financial loss estimation using a highly parallel scheduling model for IT change management. In: International symposium on integrated network management-workshops. IEEE, pp 1–9 Oliveira D C, Filho R H (2009) A time and financial loss estimation using a highly parallel scheduling model for IT change management. In: International symposium on integrated network management-workshops. IEEE, pp 1–9
Zurück zum Zitat Palshikar G K, Vin H M, Mudassar M, Natu M (2010) Domain-driven data mining for IT infrastructure support. In: International conference on data mining workshops, pp 959–966 Palshikar G K, Vin H M, Mudassar M, Natu M (2010) Domain-driven data mining for IT infrastructure support. In: International conference on data mining workshops, pp 959–966
Zurück zum Zitat Palshikar G K, Mudassar M, Vin H M, Natu M (2012) Streamlining service levels for IT infrastructure support. In: International conference on data mining workshops, pp 309–316 Palshikar G K, Mudassar M, Vin H M, Natu M (2012) Streamlining service levels for IT infrastructure support. In: International conference on data mining workshops, pp 309–316
Zurück zum Zitat Paszkiewicz Z, Picard W (2013) Analysis of the volvo IT incident and problem handling processes using process mining and social network analysis. In: BPIC@ BPM Paszkiewicz Z, Picard W (2013) Analysis of the volvo IT incident and problem handling processes using process mining and social network analysis. In: BPIC@ BPM
Zurück zum Zitat Phillips S, Ruhe G, Sillito J (2012) Information needs for integration decisions in the release process of large-scale parallel development. In: Proceedings of the ACM 2012 conference on computer supported cooperative work. ACM, pp 1371–1380 Phillips S, Ruhe G, Sillito J (2012) Information needs for integration decisions in the release process of large-scale parallel development. In: Proceedings of the ACM 2012 conference on computer supported cooperative work. ACM, pp 1371–1380
Zurück zum Zitat Pletea D, Vasilescu B, Serebrenik A (2014) Security and emotion: sentiment analysis of security discussions on github. In: Proceedings of the 11th working conference on mining software repositories. ACM, pp 348–351 Pletea D, Vasilescu B, Serebrenik A (2014) Security and emotion: sentiment analysis of security discussions on github. In: Proceedings of the 11th working conference on mining software repositories. ACM, pp 348–351
Zurück zum Zitat Poncin W, Serebrenik A, van den Brand M GJ (2011a) Mining student capstone projects with FRASR and ProM. In: International conference companion on object oriented programming systems languages and applications companion. ACM, pp 87–96 Poncin W, Serebrenik A, van den Brand M GJ (2011a) Mining student capstone projects with FRASR and ProM. In: International conference companion on object oriented programming systems languages and applications companion. ACM, pp 87–96
Zurück zum Zitat Poncin W, Serebrenik A, van den Brand M GJ (2011b) Process mining software repositories. In: European conference on software maintenance and reengineering, pp 5–14 Poncin W, Serebrenik A, van den Brand M GJ (2011b) Process mining software repositories. In: European conference on software maintenance and reengineering, pp 5–14
Zurück zum Zitat Porter M F (1980) An algorithm for suffix stripping. Program 14(3):130–137CrossRef Porter M F (1980) An algorithm for suffix stripping. Program 14(3):130–137CrossRef
Zurück zum Zitat Robillard MP, Maalej W, Walker RJ, Zimmermann T (2014) Recommendation systems in software engineering. Springer Robillard MP, Maalej W, Walker RJ, Zimmermann T (2014) Recommendation systems in software engineering. Springer
Zurück zum Zitat Roehm T, Tiarks R, Koschke R, Maalej W (2012) How do professional developers comprehend software? In: Proceedings of the 34th international conference on software engineering. IEEE Press, pp 255–265 Roehm T, Tiarks R, Koschke R, Maalej W (2012) How do professional developers comprehend software? In: Proceedings of the 34th international conference on software engineering. IEEE Press, pp 255–265
Zurück zum Zitat Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164CrossRef Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164CrossRef
Zurück zum Zitat Samalikova J, Kusters RJ, Trienekens JJM, Weijters A J M M (2014) Process mining support for capability maturity model integration-based software process assessment, in principle and in practice. J Softw Evol Process 26(7):714–728CrossRef Samalikova J, Kusters RJ, Trienekens JJM, Weijters A J M M (2014) Process mining support for capability maturity model integration-based software process assessment, in principle and in practice. J Softw Evol Process 26(7):714–728CrossRef
Zurück zum Zitat Schröter A, Kwan I, Panjer LD, Damian D (2008) Chat to succeed. In: International workshop on recommendation systems for software engineering. ACM, pp 43–44 Schröter A, Kwan I, Panjer LD, Damian D (2008) Chat to succeed. In: International workshop on recommendation systems for software engineering. ACM, pp 43–44
Zurück zum Zitat Scott S, Matwin S (1999) Feature engineering for text classification. Int Conf Mach Learn 99:379–388 Scott S, Matwin S (1999) Feature engineering for text classification. Int Conf Mach Learn 99:379–388
Zurück zum Zitat Shull F, Singer J, Sjøberg DI K (2008) Guide to advanced empirical software engineering, vol 93. Springer Shull F, Singer J, Sjøberg DI K (2008) Guide to advanced empirical software engineering, vol 93. Springer
Zurück zum Zitat Sillito J, Murphy G C, De Volder K (2006) Questions programmers ask during software evolution tasks. In: Proceedings of the 14th ACM SIGSOFT international symposium on foundations of software engineering. ACM, pp 23–34 Sillito J, Murphy G C, De Volder K (2006) Questions programmers ask during software evolution tasks. In: Proceedings of the 14th ACM SIGSOFT international symposium on foundations of software engineering. ACM, pp 23–34
Zurück zum Zitat Sillito J, Murphy G C, De Volder K (2008) Asking and answering questions during a programming change task. IEEE Trans Softw Eng 34(4):434–451CrossRef Sillito J, Murphy G C, De Volder K (2008) Asking and answering questions during a programming change task. IEEE Trans Softw Eng 34(4):434–451CrossRef
Zurück zum Zitat Sun C, Lo D, Wang X, Jiang J, Khoo S-C (2010) A discriminative model approach for accurate duplicate bug report retrieval. In: 32nd international conference on software engineering vol 1. ACM, pp 45–54 Sun C, Lo D, Wang X, Jiang J, Khoo S-C (2010) A discriminative model approach for accurate duplicate bug report retrieval. In: 32nd international conference on software engineering vol 1. ACM, pp 45–54
Zurück zum Zitat Sunindyo W, Moser T, Winkler D, Dhungana D (2012) Improving open source software process quality based on defect data mining. In: Software quality. Process automation in software development. Springer, pp 84–102 Sunindyo W, Moser T, Winkler D, Dhungana D (2012) Improving open source software process quality based on defect data mining. In: Software quality. Process automation in software development. Springer, pp 84–102
Zurück zum Zitat Sureka A, Jalote P (2010) Detecting duplicate bug report using character n-gram-based features. In: 2010 Asia Pacific software engineering conference. IEEE, pp 366–374 Sureka A, Jalote P (2010) Detecting duplicate bug report using character n-gram-based features. In: 2010 Asia Pacific software engineering conference. IEEE, pp 366–374
Zurück zum Zitat Tantithamthavorn C, McIntosh S, Hassan A E, Matsumoto K (2016) Automated parameter optimization of classification techniques for defect prediction models. In: Proceedings of the 38th international conference on software engineering. ACM, pp 321–332 Tantithamthavorn C, McIntosh S, Hassan A E, Matsumoto K (2016) Automated parameter optimization of classification techniques for defect prediction models. In: Proceedings of the 38th international conference on software engineering. ACM, pp 321–332
Zurück zum Zitat Treeratanaporn T (2015) Information technology service management (ITSM) in education. Walailak J Sci Technol 12(9):739–747 Treeratanaporn T (2015) Information technology service management (ITSM) in education. Walailak J Sci Technol 12(9):739–747
Zurück zum Zitat Van den Spiegel P, Dieltjens L, Blevi L (2013) Applied process mining techniques for incident and problem management. In: BPIC@ BPM Van den Spiegel P, Dieltjens L, Blevi L (2013) Applied process mining techniques for incident and problem management. In: BPIC@ BPM
Zurück zum Zitat van der Aalst W (2011) Process mining - discovery, conformance and enhancement of business processes. Springer van der Aalst W (2011) Process mining - discovery, conformance and enhancement of business processes. Springer
Zurück zum Zitat van der Aalst W, Reijers H A, Weijters T, Dongen B F, de Medeiros A K Al, Song M, Verbeek E (2007) Business process mining: an industrial application. Inf Syst 32(5):713–732CrossRef van der Aalst W, Reijers H A, Weijters T, Dongen B F, de Medeiros A K Al, Song M, Verbeek E (2007) Business process mining: an industrial application. Inf Syst 32(5):713–732CrossRef
Zurück zum Zitat van der Werf JMEM, van Dongen BF, Hurkens CAJ, Serebrenik A (2008) Process discovery using integer linear programming. In: International conference on applications and theory of petri nets. Springer, pp 368–387 van der Werf JMEM, van Dongen BF, Hurkens CAJ, Serebrenik A (2008) Process discovery using integer linear programming. In: International conference on applications and theory of petri nets. Springer, pp 368–387
Zurück zum Zitat van Dongen BF, Weber B, Ferreira D R, De Weerdt J (2013) Business process intelligence challenge van Dongen BF, Weber B, Ferreira D R, De Weerdt J (2013) Business process intelligence challenge
Zurück zum Zitat Wohlin C, Runeson P, Höst M, Ohlsson M C, Regnell B, Wesslén A (2012) Experimentation in software engineering. Springer Science & Business Media Wohlin C, Runeson P, Höst M, Ohlsson M C, Regnell B, Wesslén A (2012) Experimentation in software engineering. Springer Science & Business Media
Zurück zum Zitat Xu Q-S, Liang Y-Z (2001) Monte Carlo cross validation. Chemom Intell Lab Syst 56(1):1–11CrossRef Xu Q-S, Liang Y-Z (2001) Monte Carlo cross validation. Chemom Intell Lab Syst 56(1):1–11CrossRef
Zurück zum Zitat Xuan J, Jiang H, Ren Z, Zou W (2012) Developer prioritization in bug repositories. In: 34th International conference on software engineering. IEEE, pp 25–35 Xuan J, Jiang H, Ren Z, Zou W (2012) Developer prioritization in bug repositories. In: 34th International conference on software engineering. IEEE, pp 25–35
Zurück zum Zitat Yusop NSM, Grundy J, Vasa R (2016) Reporting usability defects: do reporters report what software developers need? In: Proceedings of the 20th international conference on evaluation and assessment in software engineering, number 38, pp 1–10 Yusop NSM, Grundy J, Vasa R (2016) Reporting usability defects: do reporters report what software developers need? In: Proceedings of the 20th international conference on evaluation and assessment in software engineering, number 38, pp 1–10
Zurück zum Zitat Zhang Y, Jin R, Zhou Z-H (2010) Understanding bag-of-words model: a statistical framework. J Mach Learn Cybern 1(1-4):43–52CrossRef Zhang Y, Jin R, Zhou Z-H (2010) Understanding bag-of-words model: a statistical framework. J Mach Learn Cybern 1(1-4):43–52CrossRef
Zurück zum Zitat Zhang C, Yang J, Zhang Y, Fan J, Zhang X, Zhao J, Ou P (2012) Automatic parameter recommendation for practical API usage. In: 34th International conference on software engineering. IEEE Press, pp 826–836 Zhang C, Yang J, Zhang Y, Fan J, Zhang X, Zhao J, Ou P (2012) Automatic parameter recommendation for practical API usage. In: 34th International conference on software engineering. IEEE Press, pp 826–836
Metadaten
Titel
Reducing user input requests to improve IT support ticket resolution process
verfasst von
Monika Gupta
Allahbaksh Asadullah
Srinivas Padmanabhuni
Alexander Serebrenik
Publikationsdatum
03.11.2017
Verlag
Springer US
Erschienen in
Empirical Software Engineering / Ausgabe 3/2018
Print ISSN: 1382-3256
Elektronische ISSN: 1573-7616
DOI
https://doi.org/10.1007/s10664-017-9532-2

Weitere Artikel der Ausgabe 3/2018

Empirical Software Engineering 3/2018 Zur Ausgabe