{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:56:23Z","timestamp":1775822183373,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141410037"],"award-info":[{"award-number":["N000141410037"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1452959"],"award-info":[{"award-number":["1452959"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10664-016-9441-9","type":"journal-article","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T07:46:17Z","timestamp":1467359177000},"page":"631-669","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Do Programmers do Change Impact Analysis in Debugging?"],"prefix":"10.1007","volume":"22","author":[{"given":"Siyuan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Collin","family":"McMillan","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Santelices","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"9441_CR1","doi-asserted-by":"crossref","unstructured":"Acharya M, Robinson B (2011) Practical change impact analysis based on static program slicing for industrial software systems. In: Proceedings of the 33rd international conference on software engineering, ICSE \u201911. ACM, New York, pp 746\u2013755","DOI":"10.1145\/1985793.1985898"},{"key":"9441_CR2","doi-asserted-by":"crossref","unstructured":"Altmann J (1974) Observational study of behavior: sampling methods. Behaviour:227\u2013267","DOI":"10.1163\/156853974X00534"},{"key":"9441_CR3","unstructured":"Apiwattanapong T, Orso A, Harrold MJ (2005) Efficient and precise dynamic impact analysis using execute-after sequences. In: Proceedings of the 27th international conference on software engineering, 10. ACM, New York, pp 432\u2013441"},{"key":"9441_CR4","unstructured":"Bassil S, Keller R (2001) Software visualization tools: survey and analysis. In: Proceedings of 9th international workshop on program comprehension, 2001. IWPC 2001, pp 7\u201317"},{"key":"9441_CR5","doi-asserted-by":"crossref","unstructured":"Besz\u00e9des A, Gergely T, Farago S, Gyimothy T, Fischer F (2007) The dynamic function coupling metric and its use in software evolution. In: 11th European conference on software maintenance and reengineering, 2007, pp 103\u2013112","DOI":"10.1109\/CSMR.2007.47"},{"key":"9441_CR6","volume-title":"Software change impact analysis","author":"SA Bohner","year":"1996","unstructured":"Bohner SA (1996) Software change impact analysis. IEEE Computer Society Press, Los Alamitos"},{"key":"9441_CR7","doi-asserted-by":"crossref","unstructured":"Brandt J, Guo PJ, Lewenstein J, Dontcheva M, Klemmer SR (2009) Two studies of opportunistic programming: interleaving web foraging, learning, and writing code. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1589\u20131598","DOI":"10.1145\/1518701.1518944"},{"key":"9441_CR8","doi-asserted-by":"crossref","unstructured":"Brandt J, Guo PJ, Lewenstein J, Klemmer SR (2008) Opportunistic programming: how rapid ideation and prototyping occur in practice. In: Proceedings of the 4th international workshop on end-user software engineering. ACM, New York, pp 1\u20135","DOI":"10.1145\/1370847.1370848"},{"key":"9441_CR9","doi-asserted-by":"crossref","unstructured":"Breech B, Tegtmeyer M, Pollock L (2006) Integrating influence mechanisms into impact analysis for increased precision. In: 22nd IEEE international conference on software maintenance, 2006, pp 55\u201365","DOI":"10.1109\/ICSM.2006.33"},{"key":"9441_CR10","doi-asserted-by":"crossref","unstructured":"Briand LC, Wust J, Lounis H (1999) Using coupling measurement for impact analysis in object-oriented systems. In: Proceedings of the 1999 IEEE international conference on software maintenance. IEEE, pp 475\u2013482","DOI":"10.1109\/ICSM.1999.792645"},{"issue":"6","key":"9441_CR11","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks R (1983) Towards a theory of the comprehension of computer programs. Int J Man Mach Stud 18(6):543\u2013554","journal-title":"Int J Man Mach Stud"},{"key":"9441_CR12","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L (2006) Fine grained indexing of software repositories to support impact analysis. In: Proceedings of the 7th international workshop on mining software repositories. ACM, New York, pp 105\u2013111","DOI":"10.1145\/1137983.1138009"},{"key":"9441_CR13","unstructured":"Dam HK, Ghose A (2011) Automated change impact analysis for agent systems. In: 27th IEEE international conference on software maintenance (ICSM), 2011, pp 33\u201342"},{"key":"9441_CR14","unstructured":"de Souza CRB, Redmiles DF (2008) An empirical study of software developers\u2019 management of dependencies and changes. In: Proceedings of the 30th international conference on software engineering, pp 241\u2013250"},{"key":"9441_CR15","doi-asserted-by":"crossref","unstructured":"Dorn B, Guzdial M (2010) Learning on the job: characterizing the programming knowledge and learning strategies of web designers. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 703\u2013712","DOI":"10.1145\/1753326.1753430"},{"issue":"4","key":"9441_CR16","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TSE.2008.36","volume":"34","author":"M Eaddy","year":"2008","unstructured":"Eaddy M, Zimmermann T, Sherwood KD, Garg V, Murphy GC, Nagappan N, Aho AV (2008) Do crosscutting concerns cause defects. IEEE Trans Softw Eng 34(4):497\u2013515","journal-title":"IEEE Trans Softw Eng"},{"key":"9441_CR17","unstructured":"Fjeldstad RK, Hamlen WT (1983) Application program maintenance study: report to our respondents. In: Proceedings of GUIDE 48"},{"key":"9441_CR18","doi-asserted-by":"crossref","unstructured":"Gethers M, Dit B, Kagdi H, Poshyvanyk D (2012) Integrated impact analysis for managing software changes. In: 34th international conference on software engineering, 2012, pp 430\u2013440","DOI":"10.1109\/ICSE.2012.6227172"},{"issue":"3","key":"9441_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2008.54","volume":"7","author":"B Hartmann","year":"2008","unstructured":"Hartmann B, Doorley S, Klemmer SR (2008) Hacking, mashing, gluing: understanding opportunistic design. IEEE Pervasive Comput 7(3):46\u201354","journal-title":"IEEE Pervasive Comput"},{"key":"9441_CR20","doi-asserted-by":"crossref","unstructured":"Hattori L, Guerrero D, Figueiredo J, Brunet J, Damasio J (2008) On the precision and accuracy of impact analysis techniques. In: 7th IEEE\/ACIS international conference on computer and information science, pp 513\u2013518","DOI":"10.1109\/ICIS.2008.104"},{"key":"9441_CR21","doi-asserted-by":"crossref","unstructured":"Huo D, Ding T, McMillan C, Gethers M (2014) An empirical study of the effects of expert knowledge on bug reports. In: IEEE international conference on software maintenance and evolution, pp 157\u2013166","DOI":"10.1109\/ICSME.2014.22"},{"issue":"5","key":"9441_CR22","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1007\/s10664-012-9233-9","volume":"18","author":"H Kagdi","year":"2013","unstructured":"Kagdi H, Gethers M, Poshyvanyk D (2013) Integrating conceptual and logical couplings for change impact analysis in software. Empir Softw Eng 18(5):933\u2013969","journal-title":"Empir Softw Eng"},{"key":"9441_CR23","unstructured":"Kienle H, M\u00fcller H (2007) Requirements of software visualization tools: a literature survey. In: 4th IEEE international workshop on visualizing software for understanding and analysis, 2007. VISSOFT 2007, pp 2\u20139"},{"issue":"12","key":"9441_CR24","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TSE.2006.116","volume":"32","author":"A Ko","year":"2006","unstructured":"Ko A, Myers B, Coblenz M, Aung H (2006) An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Trans Softw Eng 32(12):971\u2013987","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9441_CR25","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0164-1212(93)90101-3","volume":"23","author":"A Lakhotia","year":"1993","unstructured":"Lakhotia A (1993) Understanding someone else\u2019s code: analysis of experiences. J Syst Softw 23(3):269\u2013275","journal-title":"J Syst Softw"},{"key":"9441_CR26","unstructured":"LaToza TD, Myers BA (2010) Developers ask reachability questions. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering, vol 1. ACM, New York, pp 185\u2013194"},{"key":"9441_CR27","doi-asserted-by":"crossref","unstructured":"LaToza TD, Venolia G, DeLine R (2006) Maintaining mental models: a study of developer work habits. In: Proceedings of the 28th international conference on software engineering. ACM, New York, pp 492\u2013501","DOI":"10.1145\/1134285.1134355"},{"key":"9441_CR28","doi-asserted-by":"crossref","unstructured":"LaToza TD, Garlan D, Herbsleb JD, Myers BA (2007) Program comprehension as fact finding. In: Proceedings of the the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ESEC-FSE \u201907. ACM, New York, pp 361\u2013370","DOI":"10.1145\/1287624.1287675"},{"key":"9441_CR29","doi-asserted-by":"crossref","unstructured":"Law J, Rothermel G (2003) Whole program path-based dynamic impact analysis. In: Proceedings of the 2003 international conference on software engineering. IEEE, pp 308\u2013318","DOI":"10.1109\/ICSE.2003.1201210"},{"issue":"2","key":"9441_CR30","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/TSE.2010.111","volume":"39","author":"J Lawrance","year":"2013","unstructured":"Lawrance J, Bogart C, Burnett M, Bellamy R, Rector K, Fleming S (2013) How programmers debug, revisited: an information foraging theory perspective. IEEE Trans Softw Eng 39(2):197\u2013215","journal-title":"IEEE Trans Softw Eng"},{"key":"9441_CR31","doi-asserted-by":"crossref","unstructured":"Lehnert S (2011) A taxonomy for software change impact analysis. In: Proceedings of the 12th international workshop on principles of software evolution and the 7th annual ERCIM workshop on software evolution, IWPSE-EVOL \u201911. ACM, New York, pp 41\u201350","DOI":"10.1145\/2024445.2024454"},{"issue":"8","key":"9441_CR32","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1002\/stvr.1475","volume":"23","author":"B Li","year":"2013","unstructured":"Li B, Sun X, Leung H, Zhang S (2013) A survey of code-based change impact analysis techniques. Verification Reliab Softw Test 23(8):613\u2013646","journal-title":"Verification Reliab Softw Test"},{"key":"9441_CR33","volume-title":"Handbook of biological statistics, vol 2","author":"JH McDonald","year":"2009","unstructured":"McDonald JH (2009) Handbook of biological statistics, vol 2. Sparky House Publishing, Baltimore"},{"key":"9441_CR34","doi-asserted-by":"crossref","unstructured":"McIntosh S, Adams B, Nagappan M, Hassan A (2014) Mining co-change information to understand when build changes are necessary. In: IEEE international conference on software maintenance and evolution (ICSME), 2014, pp 241\u2013250","DOI":"10.1109\/ICSME.2014.46"},{"key":"9441_CR35","doi-asserted-by":"crossref","unstructured":"McMillan C, Grechanik M, Poshyvanyk D, Xie Q, Fu C (2011) Portfolio: finding relevant functions and their usage. In: 2011 33rd international conference on software engineering. IEEE, pp 111\u2013120","DOI":"10.1145\/1985793.1985809"},{"key":"9441_CR36","doi-asserted-by":"crossref","unstructured":"Orso A, Apiwattanapong T, Harrold MJ (2003) Leveraging field data for impact analysis and regression testing. In: Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on foundations of software engineering. ACM, New York, pp 128\u2013137","DOI":"10.1145\/940071.940089"},{"key":"9441_CR37","doi-asserted-by":"crossref","unstructured":"Parande M, Koru G (2010) A longitudinal analysis of the dependency concentration in smaller modules for open-source software products. In: IEEE international conference on software maintenance (ICSM), 2010, pp 1\u20135","DOI":"10.1109\/ICSM.2010.5609568"},{"key":"9441_CR38","doi-asserted-by":"crossref","unstructured":"Petrenko M, Rajlich V (2009) Variable granularity for improving precision of impact analysis. In: IEEE 17th international conference on program comprehension, 2009, pp 10\u201319","DOI":"10.1109\/ICPC.2009.5090023"},{"issue":"1","key":"9441_CR39","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10664-008-9088-2","volume":"14","author":"D Poshyvanyk","year":"2009","unstructured":"Poshyvanyk D, Marcus A, Ferenc R, Gyim\u00f3thy T (2009) Using information retrieval based coupling measures for impact analysis. Empir Softw Eng 14(1):5\u201332","journal-title":"Empir Softw Eng"},{"key":"9441_CR40","doi-asserted-by":"crossref","unstructured":"Ren X, Shah F, Tip F, Ryder BG, Chesley O (2004) Chianti: a tool for change impact analysis of java programs. In: ACM sigplan notices, vol 39. ACM, pp 432\u2013448","DOI":"10.1145\/1035292.1029012"},{"issue":"12","key":"9441_CR41","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TSE.2004.101","volume":"30","author":"M Robillard","year":"2004","unstructured":"Robillard M, Coelho W, Murphy G (2004) How effective developers investigate source code: an exploratory study. IEEE Trans Softw Eng 30(12):889\u2013903","journal-title":"IEEE Trans Softw Eng"},{"key":"9441_CR42","doi-asserted-by":"crossref","unstructured":"Roehm T, Tiarks R, Koschke R, Maalej W (2012) How do professional developers comprehend software?. In: Proceedings of the 34th international conference on software engineering. IEEE Press, Piscataway, pp 255\u2013265","DOI":"10.1109\/ICSE.2012.6227188"},{"issue":"4","key":"9441_CR43","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TSE.2008.32","volume":"34","author":"P Roveg\u00e5rd","year":"2008","unstructured":"Roveg\u00e5rd P, Angelis L, Wohlin C (2008) An empirical study on views of importance of change impact analysis issues. IEEE Trans Softw Eng 34(4):516\u2013530","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9441_CR44","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson P, H\u00f6st M (2009) Guidelines for conducting and reporting case study research in software engineering. Empirical Softw. Empir Softw Eng 14(2):131\u2013164","journal-title":"Empir Softw Eng"},{"key":"9441_CR45","doi-asserted-by":"crossref","unstructured":"Rungta N, Person S, Branchaud J (2012) A change impact analysis to characterize evolving program behaviors. In: 28th IEEE international conference on software maintenance (ICSM), 2012, pp 109\u2013118","DOI":"10.1109\/ICSM.2012.6405261"},{"key":"9441_CR46","unstructured":"Shneiderman B (1980) Software psychology: human factors in computer and information systems (Winthrop Computer Systems Series). Winthrop Publishers"},{"issue":"4","key":"9441_CR47","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TSE.2008.26","volume":"34","author":"J Sillito","year":"2008","unstructured":"Sillito J, Murphy G, De Volder K (2008) Asking and answering questions during a programming change task. IEEE Trans Softw Eng 34(4):434\u2013451","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9441_CR48","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11219-006-9216-4","volume":"14","author":"MA Storey","year":"2006","unstructured":"Storey MA (2006) Theories, tools and research methods in program comprehension: past, present and future. Softw Qual J 14(3):187\u2013208","journal-title":"Softw Qual J"},{"key":"9441_CR49","doi-asserted-by":"crossref","unstructured":"Storey MA, Wong K, Muller H (1997) How do program understanding tools affect how programmers understand programs?. In: Proceedings of the 4th working conference on reverse engineering, 1997, pp 12\u201321","DOI":"10.1109\/WCRE.1997.624572"},{"key":"9441_CR50","doi-asserted-by":"crossref","unstructured":"Tao Y, Dang Y, Xie T, Zhang D, Kim S (2012) How do software engineers understand code changes?: an exploratory study in industry. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, FSE \u201912. ACM, New York, pp 51:1\u201351:11","DOI":"10.1145\/2393596.2393656"},{"key":"9441_CR51","doi-asserted-by":"crossref","unstructured":"Wetzlmaier T, Ramler R (2015) Improving manual change impact analysis with tool support: a study in an industrial project. In: Software quality. Software and systems quality in distributed and mobile environments, lecture notes in business information processing, vol 200. Springer International Publishing, pp 47\u201366","DOI":"10.1007\/978-3-319-13251-8_4"},{"key":"9441_CR52","doi-asserted-by":"crossref","unstructured":"Wilkerson J (2012) A software change impact analysis taxonomy. In: 28th IEEE international conference on software maintenance (ICSM), 2012, pp 625\u2013628","DOI":"10.1109\/ICSM.2012.6405338"},{"key":"9441_CR53","doi-asserted-by":"crossref","unstructured":"Wu Y, Yap R, Ramnath R (2010) Comprehending module dependencies and sharing. In: ACM\/IEEE 32nd international conference on software engineering, 2010, vol 2, pp 89\u201398","DOI":"10.1145\/1810295.1810309"},{"key":"9441_CR54","doi-asserted-by":"crossref","unstructured":"Ye X, Bunescu R, Liu C (2014) Learning to rank relevant files for bug reports using domain knowledge. In: Proceedings of the 22Nd ACM SIGSOFT international symposium on foundations of software engineering, FSE 2014. ACM, New York, pp 689\u2013699","DOI":"10.1145\/2635868.2635874"},{"key":"9441_CR55","doi-asserted-by":"crossref","unstructured":"Zeller A (2009) Why programs fail: a guide to systematic debugging. Elsevier","DOI":"10.1016\/B978-0-12-374515-6.00006-X"},{"issue":"6","key":"9441_CR56","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSE.2005.72","volume":"31","author":"T Zimmermann","year":"2005","unstructured":"Zimmermann T, Zeller A, Weissgerber P, Diehl S (2005) Mining version histories to guide software changes. IEEE Trans Softw Eng 31(6):429\u2013445","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9441-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9441-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9441-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9441-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:07:22Z","timestamp":1589728042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9441-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,1]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["9441"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9441-9","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,1]]},"assertion":[{"value":"1 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}