How To Do A Structured Literature Review in Computer Science
How To Do A Structured Literature Review in Computer Science
How To Do A Structured Literature Review in Computer Science
Anders Kofod-Petersen
Version 0.2
Contents
1 Introduction 1
References 7
1 Introduction
How to write a reference list
Doing a systematic literature review is a formal way of synthesising the information avail-
able from available primary studies relevant to a set of research questions. The use of sys-
tematic literature reviews have traditionally been widespread primarily in medicine (e.g. the
well known Cochrane reviews [1]). Unfortunately it has been used to a much lesser extend
in computer science (for an example of how to do reviews in software engineering see: [2]).
Systematic literature reviews stand apart from, in computer science the more traditional un-
systematic surveys by using a strict methodological framework with a set of well defined steps
carried out in accordance with a predefined protocol.
Using a systematic literature review is in no way a guarantee of finding all relevant lit-
erature in a given area. However, there are several advantages in using it: A systematic
literature review can map out existing solutions before a researcher attempts to tackle an
area; it helps researchers in avoiding bias in their work; publishing these reviews also benefits
the community by allowing others to avoid duplicating the effort; it allows researchers to
identify gaps of knowledge; and it highlights the areas where additional research is required.
If a systematic literature review is conducted thoroughly it fulfils the advantages described
above and thereby gains scientific value.
This documents attempts to give a short introduction to how to conduct a structured
literature review within computer science. The examples used are taken from [3].
1
The first phase involves planning the review and can be broken down into these five steps:
2. Commissioning a review
This second phase is the actually review of the literature. It consists of five steps:
1. Identification of research
5. Data synthesis
The last phase deals with how to disseminate the newly acquired knowledge. It consists
of three steps:
2
RQ2 How does the different solutions found by addressing RQ1 compare to each other with
respect to C?
RQ3 What is the strength of the evidence in support of the different solutions?
RQ4 What implications will these findings have when creating S?
3
Table 1: Search terms
Group 1
Group 2
Group 3
Group 4
Target studies
4
The set of papers constructed by applying this search strategy is now ready to go though
the selection process.
2. The same study published in different sources (keep the highest ranking source),
Applying this selection now leaves us with a set of relevant studies that can now be filtered
with respect to quality.
The criteria can be divided into: primary, secondary and quality screening criteria. In the
example described in Table 2 IC 1 and 2 would be the primary; IC 3 and 4 the secondary;
and QC 1 and 2 the quality criteria. The criteria can now be applied in a three stage process:
Each step should be thoroughly documented as part of the final protocol. Once the set
of studies have gone through this process it is (most likely) further reduced and can now go
though the next step of detailed quality assessment.
5
The final quality assessment is done to answer the third research question (What is the
strength of the evidence in support of the different solutions? ). To do this further quality
criteria, supplementing QC 1 and 2 in Table 2 should be developed. Examples of this could
be (QC 1 and 2 is duplicated as questions for completeness):
QC 7 Is it clearly stated in the study which other algorithms the study’s algorithm(s) have
been compared with?
QC 8 Are the performance metrics used in the study explained and justified?
Each of the studies under considerations should be classified according to these 10 quality
criteria. The protocol should clearly specify the granularity of the score, e.g. yes (1 point),
partly ( 21 point) or no (0 point). The protocol should further specify the threshold for studies
to be accepted and if it is acceptable to have, e.g. zero points in certain criteria.
All the studies have been classified and a suitable set of worthy studies has been selected.
Now the data from each study can now be extracted.
6
References
[1] J. P. T. Higgins and S. Green, editors. Cochrane Handbook for Systematic Reviews of
Interventions Version 5.1.0 [updated March 2011]. The Cochrane Collaboration, 2011.
Available from www.cochrane-handbook.org.
[3] Terje Nesbakken Lillegraven and Arnt Christian Wolden. Design of a bayesian recom-
mender system for tourists presenting a solution to the cold-start user problem. Master’s
thesis, Department of Computer and Information Science, NTNU, 2010.