{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T22:20:25Z","timestamp":1746397225068,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T00:00:00Z","timestamp":1482969600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"The Netherlands Organisation for Scientific Research (NWO)","award":["639.022.314"],"award-info":[{"award-number":["639.022.314"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10664-016-9489-6","type":"journal-article","created":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T03:01:53Z","timestamp":1482980513000},"page":"1508-1536","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The last line effect explained"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4852-0526","authenticated-orcid":false,"given":"Moritz","family":"Beller","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andy","family":"Zaidman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrey","family":"Karpov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rolf A.","family":"Zwaan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"issue":"2","key":"9489_CR1","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1037\/0021-9010.69.2.334","volume":"69","author":"JG Adair","year":"1984","unstructured":"Adair JG (1984) The Hawthorne effect: a reconsideration of the methodological artifact. J Appl Psychol 69(2):334\u2013345","journal-title":"J Appl Psychol"},{"key":"9489_CR2","unstructured":"Anderson JR (1990) Cognitive psychology and its implications. WH Freeman\/Times Books\/Henry Holt & Co"},{"key":"9489_CR3","doi-asserted-by":"crossref","unstructured":"Balazinska M, Merlo E, Dagenais M, Lag\u00fce B, Kontogiannis K (1999) Measuring clone based reengineering opportunities. In: Proceedings of the international software metrics symposium (METRICS). IEEE, pp 292\u2013303","DOI":"10.1109\/METRIC.1999.809750"},{"key":"9489_CR4","unstructured":"Basit HA, Jarzabek S (2007) Efficient token based clone detection with flexible tokenization. In: Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT international symposium on foundations of software engineering (ESEC\/FSE). ACM, pp 513\u2013516"},{"key":"9489_CR5","doi-asserted-by":"crossref","unstructured":"Baxter ID, Yahin A, de Moura LM, Sant\u2019Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the international conference on software maintenance (ICSM). IEEE, pp 368\u2013377","DOI":"10.1109\/ICSM.1998.738528"},{"key":"9489_CR6","doi-asserted-by":"crossref","unstructured":"Beller M, Bacchelli A, Zaidman A, Juergens E (2014) Modern code reviews in open-source projects: Which problems do they fix? In: Proceedings of the 11th working conference on mining software repositories. ACM, pp 202\u2013211","DOI":"10.1145\/2597073.2597082"},{"key":"9489_CR7","doi-asserted-by":"crossref","unstructured":"Beller M, Bholanath R, McIntosh S, Zaidman A (2016) Analyzing the state of static analysis: a large-scale evaluation in open source software. In: Proceedings of the 23rd IEEE international conference on software analysis, evolution, and reengineering. IEEE, pp 470\u2013481","DOI":"10.1109\/SANER.2016.105"},{"key":"9489_CR8","doi-asserted-by":"crossref","unstructured":"Beller M, Gousios G, Panichella A, Zaidman A (2015) When, how, and why developers (do not) test in their IDEs. In: Proceedings of the 10th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering (ESEC\/FSE). ACM","DOI":"10.1145\/2786805.2786843"},{"key":"9489_CR9","doi-asserted-by":"crossref","unstructured":"Beller M, Gousios G, Zaidman A (2015) How (much) do developers test? In: 37th International conference on software engineering (ICSE). ACM, pp 559\u2013562","DOI":"10.1109\/ICSE.2015.193"},{"key":"9489_CR10","doi-asserted-by":"crossref","unstructured":"Beller M, Levaja I, Panichella A, Gousios G, Zaidman A (2016) How to catch \u2019em all: watchdog, a family of ide plug-ins to assess testing. In: 3rd International workshop on software engineering research and industrial practice (SER&IP 2016). IEEE, pp 53\u201356","DOI":"10.1145\/2897022.2897027"},{"key":"9489_CR11","doi-asserted-by":"crossref","unstructured":"Beller M, Zaidman A, Karpov A (2015) The last line effect. In: 23rd International conference on program comprehension (ICPC). ACM, pp 240\u2013243","DOI":"10.1109\/ICPC.2015.34"},{"issue":"9","key":"9489_CR12","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans Softw Eng 33(9):577\u2013591","journal-title":"IEEE Trans Softw Eng"},{"issue":"7247","key":"9489_CR13","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1136\/bmj.320.7247.1468","volume":"320","author":"JM Bland","year":"2000","unstructured":"Bland JM, Altman DG (2000) The odds ratio. Bmj 320(7247):1468","journal-title":"Bmj"},{"key":"9489_CR14","doi-asserted-by":"crossref","unstructured":"Botvinick M, Plaut DC (2004) Doing without schema hierarchies: a recurrent connectionist approach to routine sequential action and its pathologies 111:395\u2013429","DOI":"10.1037\/0033-295X.111.2.395"},{"key":"9489_CR15","doi-asserted-by":"crossref","unstructured":"Busjahn T, Bednarik R, Begel A, Crosby M, Paterson JH, Schulte C, Sharif B, Tamm S (2015) Eye movements in code reading: relaxing the linear order. In: Proceedings of the international conference on program comprehension (ICPC). ACM, pp 255\u2013265","DOI":"10.1109\/ICPC.2015.36"},{"key":"9489_CR16","doi-asserted-by":"crossref","unstructured":"Chatterji D, Carver JC, Massengil B, Oslin J, Kraft N et al (2011) Measuring the efficacy of code clone information in a bug localization task: an empirical study. In: Proceedings of the international symposium on empirical software engineering and measurement (ESEM). IEEE, pp 20\u201329","DOI":"10.1109\/ESEM.2011.10"},{"key":"9489_CR17","doi-asserted-by":"crossref","unstructured":"Cooper R, Shallice T (2006) Hierarchical schemas and goals in the control of sequential behaviour, vol 113","DOI":"10.1037\/0033-295X.113.4.887"},{"key":"9489_CR18","doi-asserted-by":"crossref","unstructured":"de Wit M, Zaidman A, van Deursen A (2009) Managing code clones using dynamic change tracking and resolution. In: Proceedings of the international conference on software maintenance (ICSM). IEEE, pp 169\u2013178","DOI":"10.1109\/ICSM.2009.5306336"},{"issue":"27","key":"9489_CR19","doi-asserted-by":"crossref","first-page":"8726","DOI":"10.1523\/JNEUROSCI.2145-09.2009","volume":"29","author":"K Fukuda","year":"2009","unstructured":"Fukuda K, Vogel EK (2009) Human variation in overriding attentional capture. J Neurosci 29(27):8726\u2013 8733","journal-title":"J Neurosci"},{"key":"9489_CR20","doi-asserted-by":"crossref","unstructured":"G\u00f6de N, Koschke R (2011) Frequency and risks of changes to clones. In: Proceedings of the international conference on software engineering (ICSE). ACM, pp 311\u2013320","DOI":"10.1145\/1985793.1985836"},{"issue":"1","key":"9489_CR21","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1037\/0096-1523.6.1.45","volume":"6","author":"AF Healy","year":"1980","unstructured":"Healy AF (1980) Proofreading errors on the word the: new evidence on reading units. J Exper Psychol Human Percep Perform 6(1):45","journal-title":"J Exper Psychol Human Percep Perform"},{"key":"9489_CR22","doi-asserted-by":"crossref","unstructured":"Inoue K, Higo Y, Yoshida N, Choi E, Kusumoto S, Kim K, Park W, Lee E (2012) Experience of finding inconsistently-changed bugs in code clones of mobile software. In: Proceedings of the international workshop on software clones (IWSC). IEEE, pp 94\u201395","DOI":"10.1109\/IWSC.2012.6227882"},{"key":"9489_CR23","doi-asserted-by":"crossref","unstructured":"Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter? In: Proceedings of the international conference on software engineering (ICSE). IEEE, pp 485\u2013495","DOI":"10.1109\/ICSE.2009.5070547"},{"issue":"7","key":"9489_CR24","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1111\/j.1467-9280.2007.01948.x","volume":"18","author":"MJ Kane","year":"2007","unstructured":"Kane MJ, Brown LH, McVay JC, Silvia PJ, Myin-Germeys I, Kwapil TR (2007) For whom the mind wanders, and when an experience-sampling study of working memory and executive control in daily life. Psychol Sci 18(7):614\u2013621","journal-title":"Psychol Sci"},{"key":"9489_CR25","unstructured":"Kapser C, Godfrey M (2003) A taxonomy of clones in source code: the re-engineers most wanted list. In: 2nd International workshop on detection of software clones (IWDSC-03), vol 13"},{"issue":"6","key":"9489_CR26","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"CJ Kapser","year":"2008","unstructured":"Kapser CJ, Godfrey MW (2008) Cloning considered harmful\u2013considered harmful: patterns of cloning in software. Emp Softw Eng 13(6):645\u2013692","journal-title":"Emp Softw Eng"},{"key":"9489_CR27","unstructured":"Kim M, Bergman L, Lau T, Notkin D (2004) An ethnographic study of copy and paste programming practices in oopl. In: Proc. International symposium on empirical software engineering (ISESE). IEEE, pp 83\u201392"},{"key":"9489_CR28","unstructured":"Koschke R (2007) Survey of research on software clones. In: Koschke R, Merlo E, Walenstein A (eds) Duplication, redundancy, and similarity in software, no. 06301 in Dagstuhl seminar proceedings. Internationales Begegnungs- und Forschungszentrum f\u00fcr Informatik (IBFI). https:\/\/web.archive.org\/web\/20161024110147\/http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2007\/962\/ . Schloss Dagstuhl, Dagstuhl"},{"key":"9489_CR29","doi-asserted-by":"crossref","unstructured":"Meyerovich L, Rabkin A (2013) Empirical analysis of programming language adoption. In: ACM SIGPLAN notices, vol 48. ACM, pp 1\u201318","DOI":"10.1145\/2509136.2509515"},{"issue":"1","key":"9489_CR30","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1037\/0278-7393.21.1.82","volume":"21","author":"JE Moravcsik","year":"1995","unstructured":"Moravcsik JE, Healy AF (1995) Effect of meaning on letter detection. J Exper Psychol Learn Memory Cogn 21(1):82","journal-title":"J Exper Psychol Learn Memory Cogn"},{"issue":"3","key":"9489_CR31","doi-asserted-by":"crossref","first-page":"919","DOI":"10.2466\/pms.1977.44.3.919","volume":"44","author":"JJ O\u2019Malley","year":"1977","unstructured":"O\u2019Malley JJ, Gallas J (1977) Noise and attention span. Percep Motor Skills 44(3):919\u2013922","journal-title":"Percep Motor Skills"},{"key":"9489_CR32","doi-asserted-by":"crossref","unstructured":"Rieger M, Ducasse S, Lanza M (2004) Insights into system-wide code duplication. In: Proceedings of the working conference on reverse engineering (WCRE). IEEE, pp 100\u2013109","DOI":"10.1109\/WCRE.2004.25"},{"issue":"7","key":"9489_CR33","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"C Roy","year":"2009","unstructured":"Roy C, Cordy J, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci Comput Program 74 (7):470\u2013495","journal-title":"Sci Comput Program"},{"key":"9489_CR34","unstructured":"Roy CK, Cordy JR (2007) A survey on software clone detection research. Tech. Rep. TR 2007-541. Queens University"},{"key":"9489_CR35","doi-asserted-by":"crossref","unstructured":"Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present, and future (keynote paper). In: 2014 Software evolution week - IEEE conference on software maintenance, reengineering, and reverse engineering, (CSMR-WCRE). IEEE, pp 18\u201333","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"9489_CR36","doi-asserted-by":"crossref","unstructured":"Siegmund J, K\u00e4stner C, Apel S, Parnin C, Bethmann A, Leich T, Saake G, Brechmann A (2014) Understanding understanding source code with functional magnetic resonance imaging. In: Proceedings of the international conference on software engineering (ICSE). ACM, pp 378\u2013389","DOI":"10.1145\/2568225.2568252"},{"key":"9489_CR37","doi-asserted-by":"crossref","unstructured":"Svajlenko J, Roy CK (2014) Evaluating modern clone detection tools. In: 30th IEEE International conference on software maintenance and evolution (ICSME). IEEE, pp 321\u2013330","DOI":"10.1109\/ICSME.2014.54"},{"key":"9489_CR38","doi-asserted-by":"crossref","unstructured":"van Tonder R, Le Goues C (2016) Defending against the attack of the micro-clones. In: 2016 IEEE 24th International conference on program comprehension (ICPC). IEEE, pp 1\u20134","DOI":"10.1109\/ICPC.2016.7503736"},{"key":"9489_CR39","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.cogsys.2010.07.010","volume":"12","author":"JG Trafton","year":"2011","unstructured":"Trafton JG, Altmann EM, Ratwani RM (2011) A memory for goals model of sequence errors. Cogn Syst Res 12:134\u2013143","journal-title":"Cogn Syst Res"},{"key":"9489_CR40","doi-asserted-by":"crossref","unstructured":"Xie S, Khomh F, Zou Y (2013) An empirical study of the fault-proneness of clone mutation and clone migration. In: Proceedings of the 10th working conference on mining software repositories (MSR). IEEE","DOI":"10.1109\/MSR.2013.6624022"},{"key":"9489_CR41","doi-asserted-by":"crossref","unstructured":"Zibran MF, Saha RK, Asaduzzaman M, Roy CK (2011) Analyzing and forecasting near-miss clones in evolving software: an empirical study. In: Proceedings of the international conference on engineering of complex computer systems (ICECCS). IEEE, pp 295\u2013304","DOI":"10.1109\/ICECCS.2011.36"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9489-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9489-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9489-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T21:45:59Z","timestamp":1568670359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9489-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,29]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9489"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9489-6","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2016,12,29]]}}}