{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:01:43Z","timestamp":1771329703827,"version":"3.50.1"},"reference-count":95,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T00:00:00Z","timestamp":1479081600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T00:00:00Z","timestamp":1479081600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CISE 1302169"],"award-info":[{"award-number":["CISE 1302169"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-CISE 1506586."],"award-info":[{"award-number":["NSF-CISE 1506586."]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s10664-016-9469-x","type":"journal-article","created":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T02:00:11Z","timestamp":1479088811000},"page":"1903-1935","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Are delayed issues harder to resolve? Revisiting cost-to-fix of defects throughout the lifecycle"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5040-3196","authenticated-orcid":false,"given":"Tim","family":"Menzies","sequence":"first","affiliation":[]},{"given":"William","family":"Nichols","sequence":"additional","affiliation":[]},{"given":"Forrest","family":"Shull","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Layman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,14]]},"reference":[{"key":"9469_CR1","doi-asserted-by":"crossref","unstructured":"Arcuri A, Briand L (2011) A practical guide for using statistical tests to assess randomized algorithms in software engineering. In: ICSE\u201911, pp 1\u201310","DOI":"10.1145\/1985793.1985795"},{"key":"9469_CR2","unstructured":"Aschwanden C (2010) Convincing the public to accept new medical guidelines. \n                    http:\/\/goo.gl\/RT6SK7\n                    \n                  . FiveThiryEight.com. Accessed: 2015-02-10"},{"key":"9469_CR3","unstructured":"Aschwanden C (2015) Your brain is primed to reach false conclusions. \n                    http:\/\/goo.gl\/OO3B7s\n                    \n                  . FiveThirtyEight.com. Accessed: 2015-02-10"},{"key":"9469_CR4","unstructured":"Avram A (2014) Idc study: how many software developers are out there? \n                    infoq.com\/news\/2014\/01\/IDC-software-developers"},{"issue":"4","key":"9469_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MS.2013.77","volume":"30","author":"FH Bachmann","year":"2013","unstructured":"Bachmann FH, Carballo L, McHale J, Nord RL (2013) Integrate end to end early and often. Softw IEEE 30(4):9\u201314","journal-title":"Softw IEEE"},{"key":"9469_CR6","doi-asserted-by":"crossref","unstructured":"Baziuk W (1995) Bnr\/nortel: path to improve product quality, reliability and customer satisfaction. In: Sixth international symposium on software reliability engineering, 1995. Proceedings. IEEE, pp 256\u2013262","DOI":"10.1109\/ISSRE.1995.497665"},{"key":"9469_CR7","unstructured":"Beck K, Beedle M, van Bennekum A, Cockburn A, Cunningham W, Fowler M, Grenning J, Highsmith J, Hunt A, Jeffries R, Kern J, Marick B, Martin RC, Mallor S, Schwaber K, Sutherland J, Thomas D (2001) The agile manifesto. \n                    http:\/\/www.agilemanifesto.org"},{"key":"9469_CR8","unstructured":"Beck K (2000) Extreme programming explained: embrace change. Addison Wesley"},{"key":"9469_CR9","doi-asserted-by":"crossref","unstructured":"Bettenburg N, Nagappan M, Hassan AE (2012) Think locally, act globally: improving defect and effort prediction models. In: MSR\u201912","DOI":"10.1109\/MSR.2012.6224300"},{"key":"9469_CR10","unstructured":"Bettenburg N, Nagappan M, Hassan AE (2014) Towards improving statistical modeling of software engineering data: think locally, act globally!. Emp Softw Eng:1\u201342"},{"issue":"10","key":"9469_CR11","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1109\/32.6191","volume":"14","author":"BW Boehm","year":"1988","unstructured":"Boehm B.W., Papaccio P.N. (1988) Understanding and controlling software costs. IEEE Trans Softw Eng 14(10):1462\u20131477","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"9469_CR12","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TC.1976.1674590","volume":"C-25","author":"B Boehm","year":"1976","unstructured":"Boehm B (1976) Software engineering. IEEE Trans Comput C-25(12):1226\u20131241","journal-title":"IEEE Trans Comput"},{"key":"9469_CR13","unstructured":"Boehm B (1980) Developing small-scale application software products: some experimental results. In: Proceedings of the IFIP congress, pp 321\u2013326"},{"key":"9469_CR14","volume-title":"Software engineering economics","author":"B Boehm","year":"1981","unstructured":"Boehm B (1981) Software engineering economics. Prentice Hall, Englewood Cliffs"},{"key":"9469_CR15","unstructured":"Boehm B (2010) Architecting: how much and when? In: Oram A, Wilson G (eds) Making software: what really works, and why we believe it. O\u2019Reilly Media, pp 141\u2013186"},{"key":"9469_CR16","unstructured":"Boehm B, Basili VR (2001) Software defect reduction top 10 list. IEEE Softw:135\u2013137"},{"key":"9469_CR17","unstructured":"Boehm B, Horowitz E, Madachy R, Reifer D, Clark BK, Steece B, Winsor Brown A, Chulani S, Abts C (2000) Software cost estimation with cocomo II. Prentice Hall"},{"issue":"5","key":"9469_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/2.59","volume":"21","author":"BW Boehm","year":"1988","unstructured":"Boehm BW (1988) A spiral model of software development and enhancement. Computer 21(5):61\u201372","journal-title":"Computer"},{"key":"9469_CR19","unstructured":"Boehm BW (2012) Architecting: how much and when. In: Oram A, Wilson G (eds) Making software: what really works, and why we believe it. O\u2019Reilly, pp 161\u2013186"},{"key":"9469_CR20","unstructured":"Bright P (2015) What windows as a service and a \u2019free upgrade\u2019 mean at home and at work. \n                    http:\/\/goo.gl\/LOM1NJ\/"},{"key":"9469_CR21","unstructured":"Budgen D, Brereton P, Kitchenham B (2009) Is evidence based software engineering mature enough for practice & policy? In: 33rd Annual IEEE software engineering workshop 2009 (SEW-33). Skovde"},{"issue":"1","key":"9469_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1089\/jpm.2008.9690","volume":"12","author":"MDA Carlson","year":"2009","unstructured":"Carlson MDA, Sean Morrison R (2009) Study design, precision, and validity in observational studies. J Palliative Med 12(1):77\u201382","journal-title":"J Palliative Med"},{"key":"9469_CR23","unstructured":"Cook TD, Campbell DT (1979) Quasi-experimentation: design & analysis issues for field settings. Houghton Mifflin Boston"},{"issue":"3","key":"9469_CR24","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TSE.1977.231132","volume":"SE-3","author":"EB Daly","year":"1977","unstructured":"Daly EB (1977) Management of software development. IEEE Trans Softw Eng SE-3(3):229\u2013242","journal-title":"IEEE Trans Softw Eng"},{"key":"9469_CR25","unstructured":"Deming WE (1986) Out of the crisis. MIT Press"},{"key":"9469_CR26","doi-asserted-by":"crossref","unstructured":"Devanbu P, Zimmermann T, Bird C (2016) Belief & evidence in empirical software engineering. In: Proceedings of the 38th international conference on software engineering, pp 108\u2013119. ACM","DOI":"10.1145\/2884781.2884812"},{"key":"9469_CR27","unstructured":"Dunsmore HE (1988) Evidence supports some truisms, belies others. (some empirical results concerning software development). IEEE Softw:96\u201399"},{"key":"9469_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9","volume-title":"An introduction to the bootstrap. Mono. Stat. Appl. Probab","author":"B Efron","year":"1993","unstructured":"Efron B, Tibshirani RJ (1993) An introduction to the bootstrap. Mono. Stat. Appl. Probab. Chapman and Hall, London"},{"key":"9469_CR29","doi-asserted-by":"crossref","unstructured":"Elssamadisy A, Schalliol G (2002) Recognizing and responding to \u201dbad smells\u201d in extreme programming. In: Proceedings of the 24th international conference on software engineering, ICSE \u201902. ACM, New York, pp 617\u2013622","DOI":"10.1145\/581417.581418"},{"key":"9469_CR30","unstructured":"Endres A, Rombach D (2003) A handbook of software and systems engineering: empirical observations, laws and theories. Addison Wesley"},{"issue":"3","key":"9469_CR31","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1147\/sj.153.0182","volume":"15","author":"ME Fagan","year":"1976","unstructured":"Fagan ME (1976) Design and code inspections to reduce errors in program development. IBM Syst J 15(3):182\u2013211","journal-title":"IBM Syst J"},{"key":"9469_CR32","doi-asserted-by":"crossref","unstructured":"Fenton NE, Neil M (2000) Software metrics: a roadmap. In: Finkelstein A (ed) Software metrics: a roadmap. Available from \n                    http:\/\/citeseer.nj.nec.com\/fenton00software.html\n                    \n                  . ACM Press, New York","DOI":"10.1145\/336512.336588"},{"key":"9469_CR33","unstructured":"Fenton NE, Ohlsson N (2000) Quantitative analysis of faults and failures in a complex software system. IEEE Trans Softw Eng:797\u2013814"},{"key":"9469_CR34","unstructured":"Fenton NE, Pfleeger SL (1997) Software metrics: a rigorous & practical approach. International Thompson Press"},{"key":"9469_CR35","doi-asserted-by":"crossref","unstructured":"Ghotra B, McIntosh S, Hassan AE (2015) Revisiting the impact of classification techniques on the performance of defect prediction models. In: Proc. of the international conference on software engineering (ICSE), pp 789\u2013800","DOI":"10.1109\/ICSE.2015.91"},{"key":"9469_CR36","unstructured":"Glass RL (2002) Facts and fallacies of software engineering. Addison-Wesley Professional, Boston"},{"key":"9469_CR37","unstructured":"Gordon P (2016) The cost of requirements errors. \n                    https:\/\/goo.gl\/HSMQtP"},{"issue":"4","key":"9469_CR38","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TSE.2011.63","volume":"38","author":"DE Harter","year":"2012","unstructured":"Harter DE, Kemerer CF, Slaughter SA (2012) Does software process improvement reduce the severity of defects? A longitudinal field study. IEEE Trans Softw Eng 38(4):810\u2013827","journal-title":"IEEE Trans Softw Eng"},{"key":"9469_CR39","unstructured":"Humphrey WS (1995) A discipline for software engineering. Addison-Wesley Longman Publishing Co. Inc."},{"key":"9469_CR40","volume-title":"Introduction to the team software process","author":"WS Humphrey","year":"2000","unstructured":"Humphrey WS (2000) Introduction to the team software process. Addison-Wesley Longman Ltd., Essex"},{"key":"9469_CR41","unstructured":"Humphrey WS (2005) TSP(SM)-leading a development team (SEI series in software engineering). Addison-Wesley Professional"},{"key":"9469_CR42","unstructured":"IEEE-1012 (1998) IEEE standard 1012-2004 for software verification and validation"},{"key":"9469_CR43","unstructured":"IfSQ (2013) Catching defects during testing is 10 times more expensive. \n                    https:\/\/goo.gl\/dXIwu4"},{"key":"9469_CR44","unstructured":"Gartner Inc (2014) Gartner says worldwide software market grew 4.8 percent in 2013. \n                    gartner.com\/newsroom\/id\/2696317"},{"key":"9469_CR45","unstructured":"Jacobson I, Booch G, Rumbaugh J (1999) The unified software development process. Addison-Wesley Reading"},{"key":"9469_CR46","unstructured":"Jones C (2007) Estimating software costs, 2nd edn. McGraw-Hill"},{"key":"9469_CR47","unstructured":"Jones C, Bonsignour O (2012) The economics of software quality. Addison Wesley"},{"issue":"3","key":"9469_CR48","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1109\/TSE.2009.2","volume":"35","author":"M J\u00f8rgensen","year":"2009","unstructured":"J\u00f8rgensen M, Gruschke TM (2009) The impact of lessons-learned sessions on effort estimation and uncertainty assessments. IEEE Trans Softw Eng 35(3):368\u2013383","journal-title":"IEEE Trans Softw Eng"},{"issue":"11-12","key":"9469_CR49","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.infsof.2007.02.015","volume":"49","author":"VBy Kampenes","year":"2007","unstructured":"Kampenes VBy, Dyb\u00e5 T, Hannay JE, Sj\u00f8berg DIK (2007) A systematic review of effect size in software engineering experiments. Inf Softw Technol 49(11-12):1073\u20131086","journal-title":"Inf Softw Technol"},{"issue":"3","key":"9469_CR50","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.jss.2010.11.904","volume":"84","author":"LM Karg","year":"2011","unstructured":"Karg LM, Grottke M, Beckhaus A (2011) A systematic literature review of software quality cost research. J Syst Softw 84(3):415\u2013427","journal-title":"J Syst Softw"},{"key":"9469_CR51","unstructured":"Kim D (2013) Making agile mandatory at the department of defense"},{"key":"9469_CR52","doi-asserted-by":"crossref","unstructured":"Kitchenham BA, Dyba T, J\u00f8rgensen M (2004) Evidence-based software engineering. In: ICSE \u201904: Proceedings of the 26th international conference on software engineering. IEEE Computer Society, Washington, pp 273\u2013281","DOI":"10.1109\/ICSE.2004.1317449"},{"key":"9469_CR53","doi-asserted-by":"crossref","unstructured":"Kocaguneli E, Zimmermann T, Bird C, Nagappan N, Menzies T (2013) Distributed development considered harmful? In: Proceedings - international conference on software engineering, pp 882\u2013 890","DOI":"10.1109\/ICSE.2013.6606637"},{"key":"9469_CR54","unstructured":"Lapham MA, Garcia-Miller S, Nemeth-Adams L, Brown N, Hackemack L, Hammons CB, Levine L, Schenker AR (2011) Agile methods: selected dod management and acquisition concerns. Technical report, Carnegie Mellon University - Software Engineering Institute"},{"issue":"6","key":"9469_CR55","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MC.2003.1204375","volume":"36","author":"C Larman","year":"2003","unstructured":"Larman C, Basili VR (2003) Iterative and incremental development: a brief history. Computer 36(6):47\u201356","journal-title":"Computer"},{"key":"9469_CR56","unstructured":"Leffingwell D (1996) Calculating your return on investment form more effective requirements management. \n                    http:\/\/goo.gl\/3WHsla\n                    \n                  . Rational Software Corporation"},{"key":"9469_CR57","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1146\/annurev-statistics-022513-115645","volume":"1","author":"D Madigan","year":"2014","unstructured":"Madigan D, Stang PE, Berlin JA, Schuemie M, Overhage MJ, Suchard MA, Dumouchel B, Hartzema AG, Ryan PB (2014) A systematic statistical approach to evaluating evidence from observational studies. Ann Rev Stat Appl 1:11\u201339","journal-title":"Ann Rev Stat Appl"},{"key":"9469_CR58","volume-title":"Applied statistics for software managers","author":"KD Maxwell","year":"2002","unstructured":"Maxwell KD (2002) Applied statistics for software managers. Prentice-Hall, Englewood Cliffs"},{"issue":"8","key":"9469_CR59","first-page":"38","volume":"4","author":"S McConnell","year":"1996","unstructured":"McConnell S (1996) Software quality at top speed. Softw Develop 4(8):38\u201342","journal-title":"Softw Develop"},{"issue":"3","key":"9469_CR60","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MS.2001.922718","volume":"18","author":"S McConnell","year":"2001","unstructured":"McConnell S (2001) An ounce of prevention. IEEE Softw 18(3):5\u20137","journal-title":"IEEE Softw"},{"key":"9469_CR61","unstructured":"McHale J (2002) Tsp: process costs and benefits. Crosstalk"},{"key":"9469_CR62","unstructured":"Mead NR, Allen JH, Barnum S, Ellison RJ, McGraw G (2004) Software security engineering: a guide for project managers. Addison-Wesley Professional"},{"key":"9469_CR63","doi-asserted-by":"crossref","unstructured":"Menzies T, Benson M, Costello K, Moats C, Northey M, Richarson J (2008) Learning better IV&V practices. Innovations in Systems and Software Engineering. Available from \n                    http:\/\/menzies.us\/pdf\/07ivv.pdf","DOI":"10.1007\/s11334-008-0046-3"},{"key":"9469_CR64","doi-asserted-by":"crossref","unstructured":"Menzies T, Butcher A, Cok DR, Marcus A, Layman L, Shull F, Turhan B, Zimmermann T (2013) Local versus global lessons for defect prediction and effort estimation, vol 39. Available from \n                    http:\/\/menzies.us\/pdf\/12localb.pdf","DOI":"10.1109\/TSE.2012.83"},{"key":"9469_CR65","doi-asserted-by":"crossref","unstructured":"Menzies T, Butcher A, Marcus A, Zimmermann T, Cok D (2011) Local vs global models for effort estimation and defect prediction. In: IEEE ASE\u201911. Available from \n                    http:\/\/menzies.us\/pdf\/11ase.pdf","DOI":"10.1109\/ASE.2011.6100072"},{"issue":"8","key":"9469_CR66","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1016\/j.infsof.2012.09.012","volume":"55","author":"LL Minku","year":"2013","unstructured":"Minku LL, Yao X (2013) Ensembles and locality: insight on improving software effort estimation. Inf Softw Technol 55(8):1512\u20131528","journal-title":"Inf Softw Technol"},{"issue":"4","key":"9469_CR67","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/TSE.2012.45","volume":"39","author":"N Mittas","year":"2013","unstructured":"Mittas N, Angelis L (2013) Ranking and clustering software cost estimation models through a multiple comparisons algorithm. IEEE Trans Softw Eng 39(4):537\u2013551","journal-title":"IEEE Trans Softw Eng"},{"key":"9469_CR68","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.scico.2014.11.012","volume":"101","author":"T Paivarinta","year":"2015","unstructured":"Paivarinta T, Smolander K (2015) Theorizing about software development practices. Sci Comput Program 101:124\u2013135","journal-title":"Sci Comput Program"},{"key":"9469_CR69","unstructured":"Parker J (2013) Good requirements deliver a high roi. \n                    http:\/\/goo.gl\/JvB9BW"},{"key":"9469_CR70","doi-asserted-by":"crossref","unstructured":"Passos C, Braun AP, Cruzes DS, Mendonca M (2011) Analyzing the impact of beliefs in software project practices. In: ESEM\u201911","DOI":"10.1109\/ESEM.2011.63"},{"key":"9469_CR71","unstructured":"Paul R Exclusive: a behind-the-scenes look at facebook release engineering. \n                    http:\/\/arstechnica.com\/business\/2012\/04\/exclusive-a-behind-the-scenes-look-at-facebook-release-engineering\/1\/\n                    \n                  . Accessed: 2016-06-14"},{"key":"9469_CR72","doi-asserted-by":"crossref","unstructured":"Popper K (1959) The logic of scientific discovery. Basic Books. New York","DOI":"10.1063\/1.3060577"},{"key":"9469_CR73","doi-asserted-by":"crossref","unstructured":"Posnett D, Filkov V, Devanbu P (2011) Ecological inference in empirical software engineering. In: Proceedings of ASE\u201911","DOI":"10.1109\/ASE.2011.6100074"},{"issue":"8","key":"9469_CR74","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.mayocp.2013.05.012","volume":"88","author":"V Prasad","year":"2013","unstructured":"Prasad V, Vandross A, Toomey C, Cheung M, Rho J, Quinn S, Jacob Chacko S, Borkar D, Gall V, Selvaraj S, Ho N, Cifu A (2013) A decade of reversal: an analysis of 146 contradicted medical practices. Mayo Clinic Proc 88(8):790\u2013798","journal-title":"Mayo Clinic Proc"},{"key":"9469_CR75","unstructured":"Pressman RS (2005) Software engineering: a practitioner\u2019s approach. Palgrave Macmillan"},{"key":"9469_CR76","doi-asserted-by":"crossref","unstructured":"Ray B, Posnett D, Filkov V, Devanbu P (2014) A large scale study of programming languages and code quality in github. In: Proceedings of the ACM SIGSOFT 22nd international symposium on the foundations of software engineering, FSE \u201914. ACM","DOI":"10.1145\/2635868.2635922"},{"key":"9469_CR77","unstructured":"Reifer DJ (2007) Profiles of level 5 cmmi organizations. Crosstalk: J Defense Softw Eng:24\u201328"},{"key":"9469_CR78","volume-title":"Software project management: a unified framework","author":"W Royce","year":"1998","unstructured":"Royce W (1998) Software project management: a unified framework. Addison-Wesley, Reading"},{"issue":"8","key":"9469_CR79","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1016\/j.infsof.2011.12.008","volume":"54","author":"MJ Shepperd","year":"2012","unstructured":"Shepperd MJ, MacDonell SG (2012) Evaluating prediction systems in software project estimation. Inf Softw Technol 54(8):820\u2013827","journal-title":"Inf Softw Technol"},{"issue":"9","key":"9469_CR80","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"MJ Shepperd","year":"2013","unstructured":"Shepperd MJ, Song Q, Sun Z, Mair C (2013) Data quality: some comments on the nasa software defect datasets. IEEE Trans Software Eng 39(9):1208\u20131215","journal-title":"IEEE Trans Software Eng"},{"key":"9469_CR81","doi-asserted-by":"crossref","unstructured":"Shirai Y, Nichols W, Kasunic M (2014) Initial evaluation of data quality in a tsp software engineering project data repository. In: Proceedings of the 2014 international conference on software and system process, ICSSP 2014. ACM, New York, pp 25\u201329","DOI":"10.1145\/2600821.2600841"},{"key":"9469_CR82","doi-asserted-by":"crossref","unstructured":"Shull F, Basili V, Boehm B, Winsor Brown A, Costa P, Lindvall M, Port D, Rus I, Tesoriero R, Zelkowitz M (2002) What we have learned about fighting defects. In: Eighth IEEE symposium on software metrics, 2002. Proceedings, pp 249\u2013258","DOI":"10.1109\/METRIC.2002.1011343"},{"key":"9469_CR83","doi-asserted-by":"crossref","unstructured":"Shull F, Feldmann R (2008) Building theories from multiple evidence sources. In: Shull F, Singer J, Sjoberg DIK (eds) Guide to advanced empirical software engineering. Springer-Verlag, pp 337\u2013364","DOI":"10.1007\/978-1-84800-044-5_13"},{"key":"9469_CR84","doi-asserted-by":"crossref","unstructured":"Sj\u00f8berg DIK, Dyb\u00e5 T, Anda BCD, Hannay JE (2008) Building theories in software engineering. In: Shull F, Singer J, Sj\u00f8berg DIK (eds) Guide to advanced empirical software engineering. Springer-Verlag, pp 312\u2013336","DOI":"10.1007\/978-1-84800-044-5_12"},{"key":"9469_CR85","unstructured":"Soni M (2016) Defect prevention: reducing costs and enhancing quality. \n                    https:\/\/goo.gl\/k2cBnW"},{"key":"9469_CR86","doi-asserted-by":"crossref","unstructured":"Stecklein J, Dabney J, Dick B, Haskins B, Lovell R, Moroney G (2004) Error cost escalation through the project life cycle. In: 14th Annual INCOSE international symposium. Toulouse","DOI":"10.1002\/j.2334-5837.2004.tb00608.x"},{"key":"9469_CR87","unstructured":"Stephenson WE (1976) An analysis of the resources used in the safeguard system software development. In: Proceedings of the 2Nd International Conference On Software Engineering, ICSE \u201976. IEEE Computer Society Press, Los Alamitos, pp 312\u2013321"},{"key":"9469_CR88","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.scico.2014.11.010","volume":"101","author":"K-J Stol","year":"2015","unstructured":"Stol K-J, Fitzgerald B (2015) Theory-oriented software engineering. Sci Comput Program 101:79\u201398","journal-title":"Sci Comput Program"},{"key":"9469_CR89","unstructured":"Tassey G (2002) The economic impacts of inadequate infrastructure for software testing. Technical report, National Institute of Standards and Technology"},{"issue":"1","key":"9469_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0164-1212(01)00130-3","volume":"62","author":"CJ Westland","year":"2002","unstructured":"Westland CJ (2002) The cost of errors in software development: evidence from industry. J Syst Softw 62(1):1\u20139","journal-title":"J Syst Softw"},{"key":"9469_CR91","unstructured":"Willis RR, Rova RM, Scott MD, Johnson MJ, Ryskowski JF, Moon JA, Winfield TO, Shumate KC (1998) Hughes aircrafts widespread deployment of a continuously improving software process. Technical report, Carnegie Mellon University - Software Engineering Institute"},{"key":"9469_CR92","doi-asserted-by":"crossref","unstructured":"Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, page Article 38","DOI":"10.1145\/2601248.2601268"},{"key":"9469_CR93","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer Science & Business Media","DOI":"10.1007\/978-3-642-29044-2"},{"issue":"8","key":"9469_CR94","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1016\/j.infsof.2013.03.002","volume":"55","author":"Y Yang","year":"2013","unstructured":"Yang Y, He Z, Mao K, Li Q, Nguyen V, Boehm BW, Valerdi R (2013) Analyzing and handling local bias for calibrating parametric cost estimation models. Inf Softw Technol 55(8):1496\u20131511","journal-title":"Inf Softw Technol"},{"key":"9469_CR95","unstructured":"Ye Y, Xie L, He Z, Qi L, Nguyen V, Boehm BW, Valerdi R (2011) Local bias and its impacts on the performance of parametric estimation models. In: PROMISE"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9469-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9469-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9469-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:07:46Z","timestamp":1589728066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9469-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,14]]},"references-count":95,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["9469"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9469-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,14]]},"assertion":[{"value":"14 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}