{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:09:00Z","timestamp":1758816540761,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T00:00:00Z","timestamp":1447977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10664-015-9415-3","type":"journal-article","created":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T02:34:29Z","timestamp":1447986869000},"page":"57-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Defect propagation at the project-level: results and a post-hoc analysis on inspection efficiency"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9006-7174","authenticated-orcid":false,"given":"Padmal","family":"Vitharana","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abdelmoez W, Nassar DM, Shereschevsky M, Gradetsky N, Gunnalan R, Ammar H, Yu B, Mili A (2004) Error propagation in software architectures. In: Proceedings of the tenth international symposium on software metrics","key":"9415_CR1","DOI":"10.1109\/METRIC.2004.1357923"},{"issue":"10","key":"9415_CR2","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/TSE.1989.559768","volume":"15","author":"RD Banker","year":"1989","unstructured":"Banker RD, Kemerer CF (1989) Scale economies in new software development. IEEE Trans Softw Eng 15(10):416\u2013429","journal-title":"IEEE Trans Softw Eng"},{"doi-asserted-by":"crossref","unstructured":"Berling T, Thelin T (2003) An industrial case study of the verification and validation activities. In: Proceedings of the ninth international symposium on software metrics","key":"9415_CR3","DOI":"10.1109\/METRIC.2003.1232470"},{"issue":"5","key":"9415_CR4","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/TSE.2003.1199069","volume":"29","author":"S Biffl","year":"2000","unstructured":"Biffl S (2000) Using inspection data for defect estimation. IEEE Softw 29(5):385\u2013397","journal-title":"IEEE Softw"},{"issue":"5","key":"9415_CR5","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/TSE.2003.1199069","volume":"29","author":"S Biffl","year":"2003","unstructured":"Biffl S, Halling M (2003) Investigating the defect detection effectiveness and cost benefit of nominal inspection teams. IEEE Trans Softw Eng 29(5):385\u2013397","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR6","volume-title":"Software cost estimation with COCOMO II","author":"BW Boehm","year":"2000","unstructured":"Boehm BW, Abts C, Brown A, Chulani S, Clark B, Horowitz E, Madachy R, Reifer D, Steece B (2000) Software cost estimation with COCOMO II. Prentice-Hall, New Jersey"},{"unstructured":"Briand LC, Laitenberger O, Wieczorek I (1997) Building resource and quality management models for software inspections. In: Proceedings of the international software consulting network","key":"9415_CR7"},{"doi-asserted-by":"crossref","unstructured":"Briand L, El Emam K, Laitenberger O, Fussbroich T (1998) Using simulation to build inspection efficiency benchmarks for development projects. In: Proceedings of the twentieth international conference on software engineering, 340\u2013349","key":"9415_CR8","DOI":"10.1109\/ICSE.1998.671387"},{"issue":"6","key":"9415_CR9","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/32.852741","volume":"26","author":"L Briand","year":"2000","unstructured":"Briand L, El Emam K, Freimut B, Laitenberger O (2000) A comprehensive evaluation of capture-recapture models for estimating software defect content. IEEE Trans Softw Eng 26(6):518\u2013540","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.jss.2004.01.015","volume":"73","author":"L Briand","year":"2004","unstructured":"Briand L, Freimut B, Vollei F (2004) Using multiple adaptive regression splines to support decision. J Syst Softw 73:205\u2013217","journal-title":"J Syst Softw"},{"key":"9415_CR11","first-page":"468","volume":"1","author":"DA Christenson","year":"1988","unstructured":"Christenson DA, Huang ST (1988) A code inspection model for software quality management and prediction. Proc IEEE Glob Telecommun Conf 1:468\u2013472","journal-title":"Proc IEEE Glob Telecommun Conf"},{"key":"9415_CR12","volume-title":"Estimation and inference in econometrics","author":"R Davidson","year":"1993","unstructured":"Davidson R, MacKinnon JG (1993) Estimation and inference in econometrics. Oxford University Press, UK"},{"issue":"6","key":"9415_CR13","first-page":"9","volume":"7","author":"RG Ebenau","year":"1994","unstructured":"Ebenau RG (1994) Predictive quality control with software inspection. CrossTalk 7(6):9\u201316","journal-title":"CrossTalk"},{"key":"9415_CR14","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2009.118","volume":"42","author":"C Ebert","year":"2009","unstructured":"Ebert C, Jones C (2009) Embedded software: facts, figures, and future. Computer 42:42\u201352","journal-title":"Computer"},{"issue":"7","key":"9415_CR15","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSE.1986.6312976","volume":"12","author":"ME Fagan","year":"1986","unstructured":"Fagan ME (1986) Advances in software inspections. IEEE Trans Softw Eng 12(7):744\u2013751","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR16","volume-title":"Software design and management conference, software pioneers: contributions to software engineering","author":"ME Fagan","year":"2002","unstructured":"Fagan ME (2002) A History of Software Inspections. In: Broy M, Denert E (eds) Software design and management conference, software pioneers: contributions to software engineering. Springer, New York"},{"issue":"5","key":"9415_CR17","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/32.815326","volume":"25","author":"NE Fenton","year":"1999","unstructured":"Fenton NE, Neil M (1999) A critique of software defect prediction models. IEEE Trans Softw Eng 25(5):675\u2013689","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"9415_CR18","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1109\/TSE.2005.136","volume":"31","author":"B Freimut","year":"2005","unstructured":"Freimut B, Briand L, Vollei F (2005) Determining inspection cost-effectiveness by combining project data and expert opinion. IEEE Trans Softw Eng 31(12):1074\u20131092","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR19","volume-title":"Econometric analysis","author":"WH Greene","year":"1993","unstructured":"Greene WH (1993) Econometric analysis, 2nd edn. Prentice-Hall, New Jersey","edition":"2"},{"key":"9415_CR20","volume-title":"Econometric analysis","author":"WH Greene","year":"2002","unstructured":"Greene WH (2002) Econometric analysis, 5th edn. Prentice-Hall, New Jersey","edition":"5"},{"unstructured":"Harter D, Slaughter SA (2000) Process maturity and software quality: a field study. In: Proceedings of the international conference on information systems, 407\u2013411","key":"9415_CR21"},{"key":"9415_CR22","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1016\/j.infsof.2006.09.002","volume":"49","author":"J Jacobs","year":"2007","unstructured":"Jacobs J, van Moll J, Kusters R, Trienekens J, Brombacher A (2007) Identification of factors that influence defect injection and detection in development of software intensive products. Inf Softw Technol 49:774\u2013789","journal-title":"Inf Softw Technol"},{"issue":"5","key":"9415_CR23","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.1037\/0033-2909.85.5.1104","volume":"85","author":"LR James","year":"1978","unstructured":"James LR, Singh BK (1978) An introduction to the logic, assumptions, and basic analytic procedures of two-stage least squares. Psychol Bull 85(5):1104\u20131122","journal-title":"Psychol Bull"},{"issue":"2","key":"9415_CR24","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/269012.269020","volume":"41","author":"PM Johnson","year":"1998","unstructured":"Johnson PM (1998) Reengineering inspection. Commun ACM 41(2):49\u201352","journal-title":"Commun ACM"},{"key":"9415_CR25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0164-1212(92)90089-3","volume":"17","author":"JC Kelly","year":"1992","unstructured":"Kelly JC, Sherif JS, Hops J (1992) An analysis of defect densities found during software inspections. J Syst Softw 17:111\u2013117","journal-title":"J Syst Softw"},{"issue":"4","key":"9415_CR26","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/TSE.2009.27","volume":"35","author":"CF Kemerer","year":"2009","unstructured":"Kemerer CF, Paulk MC (2009) The impact of design and code reviews on software quality: an empirical study based on PSP data. IEEE Trans Softw Eng 35(4):534\u2013550","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9415_CR27","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/52.476281","volume":"13","author":"B Kitchenham","year":"1996","unstructured":"Kitchenham B, Pfleeger S (1996) Software quality: the elusive target. IEEE Softw 13(1):12\u201321","journal-title":"IEEE Softw"},{"key":"9415_CR28","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/A:1009805707387","volume":"6","author":"O Laitenberger","year":"2001","unstructured":"Laitenberger O (2001) Cost-effective detection of software defects through perspective-based inspections. Empir Softw Eng 6:81\u201384","journal-title":"Empir Softw Eng"},{"doi-asserted-by":"crossref","unstructured":"Laitenberger O, Leszak M, Stoll D, El Emam K (1999) Quantitative modeling of software reviews in an industrial setting. In: Proceedings of the sixth IEEE symposium on software metrics","key":"9415_CR29","DOI":"10.1109\/METRIC.1999.809752"},{"issue":"5","key":"9415_CR30","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/32.922713","volume":"27","author":"O Laitenberger","year":"2001","unstructured":"Laitenberger O, Emam K, Harbich T (2001) An internally replicated quasi-experimental comparison of checklist and perspective-based reading of code documents. IEEE Trans Softw Eng 27(5):387\u2013421","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR31","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1023\/A:1020519222014","volume":"7","author":"O Laitenberger","year":"2002","unstructured":"Laitenberger O, Beil T, Schwinn T (2002) An industrial case study to examine a non-traditional inspection implementation for requirements specifications. Empir Softw Eng 7:345\u2013374","journal-title":"Empir Softw Eng"},{"key":"9415_CR32","volume-title":"Introduction to econometrics","author":"GS Maddala","year":"2008","unstructured":"Maddala GS (2008) Introduction to econometrics, 3rd edn. Wiley, New York","edition":"3"},{"doi-asserted-by":"crossref","unstructured":"Mandala N, Carver JC, Nagappan N (2012) Application of Kusumoto cost-metric to evaluate the cost effectiveness of software inspections. In: Proceeding of the ACM-IEEE international symposium on empirical software engineering and measurement, 221\u2013230","key":"9415_CR33","DOI":"10.1145\/2372251.2372291"},{"issue":"3","key":"9415_CR34","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/TSE.2008.71","volume":"35","author":"MV Mantyla","year":"2009","unstructured":"Mantyla MV, Lassenius C (2009) What types of defects are really discovered in code reviews. IEEE Trans Softw Eng 35(3):430\u2013448","journal-title":"IEEE Trans Softw Eng"},{"issue":"11","key":"9415_CR35","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TSE.2004.69","volume":"30","author":"J Miller","year":"2004","unstructured":"Miller J, Yin Z (2004) A cognitive-based mechanism for constructing software inspection teams. IEEE Trans Softw Eng 30(11):811\u2013825","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR36","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1009735805377","volume":"3","author":"J Miller","year":"1998","unstructured":"Miller J, Wood M, Roper M (1998) Further experiences with scenarios and checklists. Empir Softw Eng 3:37\u201364","journal-title":"Empir Softw Eng"},{"key":"9415_CR37","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s11219-011-9146-7","volume":"20","author":"S Montagud","year":"2012","unstructured":"Montagud S, Abrahao S, Insfran E (2012) A systematic review of quality attributes and measures for software product lines. Softw Qual J 20:425\u2013486","journal-title":"Softw Qual J"},{"key":"9415_CR38","volume-title":"The Art of Software Testing","author":"GJ Myers","year":"1979","unstructured":"Myers GJ (1979) The Art of Software Testing. Wiley, New York"},{"issue":"1","key":"9415_CR39","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/52.566420","volume":"14","author":"D O\u2019Neill","year":"1997","unstructured":"O\u2019Neill D (1997) Issues in software inspection. IEEE Softw 14(1):18\u201319","journal-title":"IEEE Softw"},{"issue":"6","key":"9415_CR40","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/32.601071","volume":"23","author":"AA Porter","year":"1997","unstructured":"Porter AA, Siy HP, Toman CA, Votta LG (1997) An experiment to assess the cost-benefits of code inspections in large scale software development. IEEE Trans Softw Eng 23(6):329\u2013346","journal-title":"IEEE Trans Softw Eng"},{"key":"9415_CR41","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1002\/qre.540","volume":"20","author":"T Raz","year":"2004","unstructured":"Raz T, Barad M (2004) In-process control of design inspection effectiveness. Int J Qual Reliab Eng 20:17\u201330","journal-title":"Int J Qual Reliab Eng"},{"unstructured":"Raz T, Yaung AT (1994) Inspection effectiveness in software development: a neural network approach. In: Proceedings of the conference of the centre for advances studies on collaborative research, 61\u201372","key":"9415_CR42"},{"key":"9415_CR43","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/S0950-5849(96)01147-0","volume":"39","author":"T Raz","year":"1997","unstructured":"Raz T, Yaung AT (1997) Factors affecting design inspection effectiveness in software development. Inf Softw Technol 39:297\u2013305","journal-title":"Inf Softw Technol"},{"issue":"4","key":"9415_CR44","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/2594458","volume":"23","author":"PC Rigby","year":"2014","unstructured":"Rigby PC, German DM, Cowen L, Storey M (2014) Peer review on open source software projects: parameters, statistical models, and theory. ACM Trans Softw Eng Methodol 23(4):35\u201367","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"3","key":"9415_CR45","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MS.2006.89","volume":"23","author":"P Runeson","year":"2006","unstructured":"Runeson P, Andersson C, Thelin T, Andrews A, Berling T (2006) What do we know about defect detection methods? IEEE Softw 23(3):82\u201390","journal-title":"IEEE Softw"},{"issue":"1","key":"9415_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/32.825763","volume":"26","author":"C Sauer","year":"2000","unstructured":"Sauer C, Jeffery D, Land L, Yetton P (2000) The effectiveness of software development technical reviews: a behaviorally motivated program of research. IEEE Trans Softw Eng 26(1):1\u201314","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"9415_CR47","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1037\/0021-9010.67.6.806","volume":"67","author":"N Schmitt","year":"1982","unstructured":"Schmitt N, Bedeian AG (1982) A comparison of LISREL and Two-stage least squares analysis of a hypothesized life-job satisfaction reciprocal relationship. J Appl Psychol 67(6):806\u2013817","journal-title":"J Appl Psychol"},{"key":"9415_CR48","volume-title":"Software inspection process","author":"S Strauss","year":"1994","unstructured":"Strauss S, Ebenau R (1994) Software inspection process. McGraw-Hill, New York"},{"issue":"2","key":"9415_CR49","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TSE.2011.26","volume":"38","author":"M Unterkalmsteiner","year":"2012","unstructured":"Unterkalmsteiner M, Gorschek T, Moinul Islam AKM, Cheng CK, Permadi RB, Feldt R (2012) Evaluation and measurement of software process improvement\u2014a systematic literature review. IEEE Trans Softw Eng 38(2):398\u2013424","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9415_CR50","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/TSE.2003.1178054","volume":"29","author":"P Vitharana","year":"2003","unstructured":"Vitharana P, Ramamurthy K (2003) Computer-mediated group support, anonymity, and the software inspection process: an empirical investigation. IEEE Trans Softw Eng 29(2):167\u2013180","journal-title":"IEEE Trans Softw Eng"},{"doi-asserted-by":"crossref","unstructured":"Wagner S (2006) A model and sensitivity analysis of the quality economics of defect-detection techniques. In: Proceedings of the ACM\/SIGSOFT international symposium on software testing and analysis, 73\u201383","key":"9415_CR51","DOI":"10.1145\/1146238.1146247"},{"issue":"2","key":"9415_CR52","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0167-9236(03)00020-4","volume":"37","author":"J Westland","year":"2004","unstructured":"Westland J (2004) The cost behavior of software defects. Decis Support Syst 37(2):229\u2013238","journal-title":"Decis Support Syst"},{"doi-asserted-by":"crossref","unstructured":"Winkler D, Biffl S, Faderl K (2010) Investigating the temporal behavior of defect detection in software inspection and inspection-based testing. In: Baber, M A Vierimaa, M Oivo M (eds) Product-focused software process improvement. Proceedings of the eleventh international conference on product-focused software process improvement, 17\u201331","key":"9415_CR53","DOI":"10.1007\/978-3-642-13792-1_4"},{"issue":"9","key":"9415_CR54","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1109\/32.6170","volume":"14","author":"T Yu","year":"1988","unstructured":"Yu T, Shen VY, Dunsmore HE (1988) An analysis of several software defect models. IEEE Trans Softw Eng 14(9):1261\u20131270","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9415_CR55","doi-asserted-by":"crossref","first-page":"54","DOI":"10.2307\/1911287","volume":"30","author":"A Zellner","year":"1962","unstructured":"Zellner A, Theil H (1962) Three-stage least squares: simultaneous estimation of simultaneous equations. Econometrica 30(1):54\u201378","journal-title":"Econometrica"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9415-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-015-9415-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9415-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9415-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:15:18Z","timestamp":1559236518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-015-9415-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,20]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["9415"],"URL":"https:\/\/doi.org\/10.1007\/s10664-015-9415-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2015,11,20]]}}}