{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T07:48:53Z","timestamp":1772351333445,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,26]],"date-time":"2018-04-26T00:00:00Z","timestamp":1524700800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SI 2045\/2-1"],"award-info":[{"award-number":["SI 2045\/2-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Centre Digitisation.Bavaria"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s10664-018-9621-x","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T21:32:04Z","timestamp":1524691924000},"page":"417-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Shorter identifier names take longer to comprehend"],"prefix":"10.1007","volume":"24","author":[{"given":"Johannes C.","family":"Hofmeister","sequence":"first","affiliation":[]},{"given":"Janet","family":"Siegmund","sequence":"additional","affiliation":[]},{"given":"Daniel V.","family":"Holt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,26]]},"reference":[{"key":"9621_CR1","unstructured":"Anquetil N, Lethbridge T (1998) Assessing the relevance of identifier names in a legacy software system. In: Conf. centre for advanced studies on collaborative research, CASCON \u201998. IBM Press, Toronto, pp 1\u201310"},{"issue":"6","key":"9621_CR2","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1016\/S0022-5371(75)80045-4","volume":"14","author":"AD Baddeley","year":"1975","unstructured":"Baddeley AD, Thomson N, Buchanan M (1975) Word length and the structure of short-term memory. J Verbal Learn Verbal Behav 14(6):575\u2013589. \n                    https:\/\/doi.org\/10.1016\/S0022-5371(75)80045-4","journal-title":"J Verbal Learn Verbal Behav"},{"issue":"3","key":"9621_CR3","doi-asserted-by":"publisher","first-page":"379","DOI":"10.3758\/BF03192707","volume":"37","author":"R Bakeman","year":"2005","unstructured":"Bakeman R (2005) Recommended effect size statistics for repeated measures designs. Behav Res Methods 37(3):379\u2013384. \n                    https:\/\/doi.org\/10.3758\/BF03192707","journal-title":"Behav Res Methods"},{"issue":"1","key":"9621_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/0749-596X(85)90017-8","volume":"24","author":"DA Balota","year":"1985","unstructured":"Balota DA, Chumbley JI (1985) The locus of word-frequency effects in the pronunciation task: lexical access and\/or production? J Mem Lang 24(1):89\u2013106. \n                    https:\/\/doi.org\/10.1016\/0749-596X(85)90017-8","journal-title":"J Mem Lang"},{"key":"9621_CR5","doi-asserted-by":"publisher","unstructured":"Binkley D, Davis M, Lawrie D, Morrell C (2009) To CamelCase or under_score. In: Proc. Int\u2019l conf. program comprehension (ICPC), pp 158\u2013167. \n                    https:\/\/doi.org\/10.1109\/ICPC.2009.5090039","DOI":"10.1109\/ICPC.2009.5090039"},{"issue":"6","key":"9621_CR6","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks R (1983) Towards a theory of the comprehension of computer programs. Int\u013a J Man-Mach Stud 18(6):543\u2013554. \n                    https:\/\/doi.org\/10.1016\/S0020-7373(83)80031-5","journal-title":"Int\u013a J Man-Mach Stud"},{"issue":"4","key":"9621_CR7","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TSE.2009.70","volume":"36","author":"RPL Buse","year":"2010","unstructured":"Buse RPL, Weimer WR (2010) Learning a metric for code readability. IEEE Trans Softw Eng (TSE) 36(4):546\u2013558. \n                    https:\/\/doi.org\/10.1109\/TSE.2009.70","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9621_CR8","first-page":"1040","volume":"19","author":"M Ceccato","year":"2014","unstructured":"Ceccato M, Di Penta M, Falcarin P, Ricca F, Torchiano M, Tonella P (2014) A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir Softw Eng 19:1040\u20131074","journal-title":"Empir Softw Eng"},{"key":"9621_CR9","volume-title":"Statistical power analysis for the behavioral sciences","author":"J Cohen","year":"1988","unstructured":"Cohen J (1988) Statistical power analysis for the behavioral sciences. Erlbaum, Hillsdale"},{"issue":"6","key":"9621_CR10","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1037\/0033-295X.82.6.407","volume":"82","author":"AM Collins","year":"1975","unstructured":"Collins AM, Loftus EF (1975) A spreading-activation theory of semantic processing. Psychol Rev 82(6):407\u2013428. \n                    https:\/\/doi.org\/10.1037\/0033-295X.82.6.407","journal-title":"Psychol Rev"},{"issue":"1","key":"9621_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1037\/0033-295X.108.1.204","volume":"108","author":"M Coltheart","year":"2001","unstructured":"Coltheart M, Rastle K, Perry C, Langdon R, Ziegler J (2001) DRC: a dual route cascaded model of visual word recognition and reading aloud. Psychol Rev 108(1):204\u2013256","journal-title":"Psychol Rev"},{"issue":"1","key":"9621_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1017\/S0140525X01003922","volume":"24","author":"N Cowan","year":"2001","unstructured":"Cowan N (2001) The magical number 4 in short-term memory: a reconsideration of mental storage capacity. Behav Brain Sci 24(1):87\u2013185","journal-title":"Behav Brain Sci"},{"issue":"3","key":"9621_CR13","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11219-006-9219-1","volume":"14","author":"F Deissenboeck","year":"2006","unstructured":"Deissenboeck F, Pizka M (2006) Concise and consistent naming. Softw Qual Control 14(3):261\u2013282. \n                    https:\/\/doi.org\/10.1007\/s11219-006-9219-1","journal-title":"Softw Qual Control"},{"key":"9621_CR14","doi-asserted-by":"publisher","unstructured":"Hofmeister J, Siegmund J, Holt DV (2017) Shorter identifier names take longer to comprehend. In: 2017 IEEE 24th International conference on software analysis, evolution and reengineering (SANER), pp 217\u2013227. \n                    https:\/\/doi.org\/10.1109\/SANER.2017.7884623","DOI":"10.1109\/SANER.2017.7884623"},{"issue":"1","key":"9621_CR15","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3758\/BF03195497","volume":"35","author":"AR Jansen","year":"2003","unstructured":"Jansen AR, Blackwell AF, Marriott K (2003) A tool for tracking visual attention: the restricted focus viewer. Behav Res Methods Instrum Comput 35(1):57\u201369","journal-title":"Behav Res Methods Instrum Comput"},{"key":"9621_CR16","doi-asserted-by":"publisher","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2006) What\u2019s in a name? A study of identifiers. In: Proc. Int\u2019l conf. program comprehension (ICPC), pp 3\u201312. \n                    https:\/\/doi.org\/10.1109\/ICPC.2006.51","DOI":"10.1109\/ICPC.2006.51"},{"issue":"4","key":"9621_CR17","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11334-007-0031-2","volume":"3","author":"D Lawrie","year":"2007","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2007) Effective identifier names for comprehension and memory. Innov Syst Softw Eng 3(4):303\u2013318. \n                    https:\/\/doi.org\/10.1007\/s11334-007-0031-2","journal-title":"Innov Syst Softw Eng"},{"key":"9621_CR18","volume-title":"Lehrbuch Statistik Einstieg und Vertiefung","author":"R Leonhart","year":"2009","unstructured":"Leonhart R (2009) Lehrbuch Statistik Einstieg und Vertiefung, 2nd edn. Hans Huber, Hogrefe AG, Bern","edition":"2nd edn."},{"issue":"2","key":"9621_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1037\/0033-295X.101.2.343","volume":"101","author":"GA Miller","year":"1994","unstructured":"Miller GA (1994) The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol Rev 101(2):343\u2013352","journal-title":"Psychol Rev"},{"key":"9621_CR20","unstructured":"MSDN (2016) Class naming guidelines [online]. available: \n                    https:\/\/msdn.microsoft.com\/en-us\/library\/4xhs4564(v=vs.71).aspx"},{"key":"9621_CR21","doi-asserted-by":"crossref","unstructured":"Posnett D, Hindle A, Devanbu P (2011) A simpler model of software readability, ACM, New York","DOI":"10.1145\/1985441.1985454"},{"issue":"3","key":"9621_CR22","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1037\/0033-2909.114.3.510","volume":"114","author":"R Ratcliff","year":"1993","unstructured":"Ratcliff R (1993) Methods for dealing with reaction time outliers. Psychol Bull 114(3):510\u2013532","journal-title":"Psychol Bull"},{"key":"9621_CR23","doi-asserted-by":"publisher","unstructured":"Scalabrino S, Linares-V\u00e1squez M, Poshyvanyk D, Oliveto R (2016) Improving code readability models with textual features. In: Proc. Int\u2019l conf. program comprehension (ICPC), pp 1\u201310. \n                    https:\/\/doi.org\/10.1109\/ICPC.2016.7503707","DOI":"10.1109\/ICPC.2016.7503707"},{"key":"9621_CR24","first-page":"196","volume-title":"An eye tracking study on camelcase and under_score identifier styles. In: Proc. Int\u2019l Conf. program comprehension (ICPC). Proc. Int\u2019l Conf. Program Comprehension (ICPC)","author":"B Sharif","year":"2010","unstructured":"Sharif B, Maletic JI (2010) An eye tracking study on camelcase and under_score identifier styles. In: Proc. Int\u2019l Conf. program comprehension (ICPC). Proc. Int\u2019l Conf. Program Comprehension (ICPC). IEEE Computer Society, Washington, DC, pp 196\u2013205"},{"key":"9621_CR25","doi-asserted-by":"publisher","unstructured":"Sneed H (1996) Object-oriented COBOL Recycling. In: Proceedings of the Third working conference on reverse engineering, 1996, pp 169\u2013178. \n                    https:\/\/doi.org\/10.1109\/WCRE.1996.558901","DOI":"10.1109\/WCRE.1996.558901"},{"issue":"5","key":"9621_CR26","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1109\/TSE.1984.5010283","volume":"10","author":"E Soloway","year":"1984","unstructured":"Soloway E, Ehrlich K (1984) Empirical studies of programming knowledge. IEEE Trans Softw Eng SE 10(5):595\u2013609. \n                    https:\/\/doi.org\/10.1109\/TSE.1984.5010283","journal-title":"IEEE Trans Softw Eng SE"},{"key":"9621_CR27","doi-asserted-by":"crossref","unstructured":"Tichy WF (1998) Should computer scientists experiment more? In: IEEE Computer","DOI":"10.1109\/2.675631"},{"issue":"2","key":"9621_CR28","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1080\/713755710","volume":"50","author":"BS Weekes","year":"1997","unstructured":"Weekes BS (1997) Differential effects of number of letters on word and nonword naming latency. Q J Exper Psychol Sec A 50(2):439\u2013456. \n                    https:\/\/doi.org\/10.1080\/713755710","journal-title":"Q J Exper Psychol Sec A"},{"issue":"3","key":"9621_CR29","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/BF03395630","volume":"58","author":"R Whelan","year":"2008","unstructured":"Whelan R (2008) Effective analysis of reaction time data. Psychol Record 58 (3):475","journal-title":"Psychol Record"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9621-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9621-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9621-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T19:22:26Z","timestamp":1556220146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9621-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,26]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["9621"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9621-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,26]]},"assertion":[{"value":"26 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This study was performed in accordance with the ethical standards of the Department of Psychology, Heidelberg University, Germany.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}