{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:46:18Z","timestamp":1769741178326,"version":"3.49.0"},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10664-018-9650-5","type":"journal-article","created":{"date-parts":[[2018,9,30]],"date-time":"2018-09-30T22:58:02Z","timestamp":1538348282000},"page":"1259-1295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Usage and attribution of Stack Overflow code snippets in GitHub projects"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2442-7522","authenticated-orcid":false,"given":"Sebastian","family":"Baltes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4287-7447","authenticated-orcid":false,"given":"Stephan","family":"Diehl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,1]]},"reference":[{"key":"9650_CR1","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.infsof.2017.04.005","volume":"88","author":"R Abdalkareem","year":"2017","unstructured":"Abdalkareem R, Shihab E, Rilling J (2017) On code reuse from StackOverflow: An exploratory study on Android apps. Inf Softw Technol 88:148\u2013158","journal-title":"Inf Softw Technol"},{"key":"9650_CR2","doi-asserted-by":"crossref","unstructured":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C (2016) You get where you\u2019re looking for: The impact of information sources on code security. In: Locasto M, Shmatikov V, Erlingsson \u00da (eds) 2016 IEEE Symposium on Security and Privacy (S&P 2016), IEEE Computer Society, San Jose, CA, USA, pp 289\u2013305","DOI":"10.1109\/SP.2016.25"},{"key":"9650_CR3","unstructured":"Achte Z (2016) AZ I-8 O 294\/15. Landgericht Bochum \n                    http:\/\/www.justiz.nrw.de\/nrwe\/lgs\/bochum\/lg_bochum\/j2016\/I_8_O_294_15_Urteil_20160303.html"},{"key":"9650_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/0470114754","volume-title":"An introduction to categorical data analysis","author":"A Agresti","year":"2007","unstructured":"Agresti A (2007) An introduction to categorical data analysis, 2nd edn. Wiley, Hoboken","edition":"2nd edn."},{"key":"9650_CR5","unstructured":"Aioobe (2010) How to convert byte size into human readable format in java? \n                    http:\/\/stackoverflow.com\/a\/3758880"},{"key":"9650_CR6","doi-asserted-by":"crossref","unstructured":"Allamanis M, Sutton C (2013) Why, when, and what: Analyzing Stack Overflow questions by topic, type, and code. In: Zimmermann T, Di Penta M, Kim S (eds) 10th international working conference on mining software repositories (MSR 2013) IEEE, San Francisco, CA, USA, pp 53\u201356","DOI":"10.1109\/MSR.2013.6624004"},{"issue":"11","key":"9650_CR7","first-page":"730","volume":"11","author":"DA Almeida","year":"2018","unstructured":"Almeida DA, Murphy GC, Wilson G, Hoye M (2018) Investigating whether and how software developers understand open source software licensing. Empir Softw Eng 11(11):730","journal-title":"Empir Softw Eng"},{"key":"9650_CR8","unstructured":"Alsup W (2012) Oracle America, Inc v. Google, Inc. United States District Court for the Northern District of California"},{"key":"9650_CR9","doi-asserted-by":"crossref","unstructured":"An L, Mlouki O, Khomh F, Antoniol G (2017) Stack Overflow: A Code Laundering Platform? In: Pinzger M, Bavota G, Marcus A (eds) 24th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2017) IEEE Computer Society, Klagenfurt, Austria, pp 283\u2013293","DOI":"10.1109\/SANER.2017.7884629"},{"key":"9650_CR10","unstructured":"Badashian AS, Esteki A, Gholipour A, Hindle A, Stroulia E (2014) Involvement, Contribution and Influence in GitHub and Stack Overflow. In: Ng J, Li J, Wong K (eds) 24th international conference on computer science and software engineering (CASCON 2014), IBM \/ ACM, Markham, ON, Canada, pp 19\u201333"},{"key":"9650_CR11","doi-asserted-by":"publisher","unstructured":"Baltes S (2017). sbaltes\/api-retriever on GitHub. \n                    https:\/\/doi.org\/10.5281\/zenodo.1049419","DOI":"10.5281\/zenodo.1049419"},{"key":"9650_CR12","doi-asserted-by":"publisher","unstructured":"Baltes S (2018) Usage and Attribution of Stack Overflow Code Snippets in GitHub Projects \u2014 Supplementary Material. \n                    https:\/\/doi.org\/10.5281\/zenodo.1148069","DOI":"10.5281\/zenodo.1148069"},{"key":"9650_CR13","doi-asserted-by":"publisher","unstructured":"Baltes S, Dumani L (2018) SOTorrent Dataset. \n                    https:\/\/doi.org\/10.5281\/zenodo.1135262","DOI":"10.5281\/zenodo.1135262"},{"key":"9650_CR14","doi-asserted-by":"crossref","unstructured":"Baltes S, Dumani L, Treude C, Diehl S (2018) SOTOrrent: Reconstructing and analyzing the evolution stack overflow posts. In: Zaidman A, Hill E, Kamei Y (eds) 15th international conference on mining software repositories (MSR 2018) ACM, Gothenburg, Sweden, pp 1\u201312","DOI":"10.1145\/3196398.3196430"},{"issue":"1","key":"9650_CR15","first-page":"43","volume":"19","author":"JEII Bartlett","year":"2001","unstructured":"Bartlett JEII, Kotrlik JW, Higgins CC (2001) Organizational research: Determining appropriate sample size in survey research. Information technology Learning, and Performance Journal 19(1):43\u201350","journal-title":"Information technology Learning, and Performance Journal"},{"key":"9650_CR16","doi-asserted-by":"crossref","unstructured":"Bosu A, Corley CS, Heaton D, Chatterji D, Carver JC, Kraft NA (2013) Building reputation in StackOverflow: An empirical investigation. In: Zimmermann T, Di Penta M, Kim S (eds) 10th international working conference on mining software repositories (MSR 2013) IEEE, San Francisco, CA, USA, pp 89\u201392","DOI":"10.1109\/MSR.2013.6624013"},{"key":"9650_CR17","doi-asserted-by":"crossref","unstructured":"Brandt J, Dontcheva M, Weskamp M, Klemmer SR (2010) Example-centric programming: Integrating web search into the development environment. In: Mynatt E, Edwards K, Rodden T (eds) 2010 Conference on human factors in computing systems (CHI 2010), ACM, Atlanta, GA, USA, pp 513\u2013522","DOI":"10.1145\/1753326.1753402"},{"issue":"2","key":"9650_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1002\/spe.750","volume":"37","author":"S Burrows","year":"2007","unstructured":"Burrows S, Tahaghoghi SMM, Zobel J (2007) Efficient plagiarism detection for large code repositories. Software\u2014Practice and Experience 37(2):151\u2013176","journal-title":"Software\u2014Practice and Experience"},{"key":"9650_CR19","unstructured":"Campbell BA, Treude C (2017) NLP2Code: Code snippet content assist via natural language tasks. In: Mei H, Zhang L, Zimmermann T (eds) 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME 2017) IEEE Computer Society, Shanghai, China, pp 628\u2013632"},{"key":"9650_CR20","unstructured":"Cavaretta MJ (2015) Open source issues in mergers & acquisitions. \n                    http:\/\/www.mbbp.com\/news\/open-source-issues"},{"key":"9650_CR21","volume-title":"Sampling techniques","author":"WG Cochran","year":"1977","unstructured":"Cochran WG (1977) Sampling techniques, 3rd edn. Wiley, Hoboken","edition":"3rd edn."},{"key":"9650_CR22","unstructured":"Corley JS (2017) Artifex Software Inc v. Hancom, Inc. United States District Court for the Northern District of California"},{"key":"9650_CR23","unstructured":"Creative Commons Corporation (2007) Attribution-ShareAlike 3.0 Unported. \n                    https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/legalcode"},{"key":"9650_CR24","unstructured":"Creative Commons Corporation (2017a) Compatible Licenses. \n                    https:\/\/creativecommons.org\/share-your-work\/licensing-considerations\/compatible-licenses\/"},{"key":"9650_CR25","unstructured":"Creative Commons Corporation (2017b) Frequently Asked Questions. \n                    https:\/\/creativecommons.org\/faq\/#can-i-apply-a-creative-commons-license-to-software"},{"key":"9650_CR26","doi-asserted-by":"crossref","unstructured":"Duijn M, Kucera A, Bacchelli A (2015) Quality questions need quality code: Classifying code fragments on stack overflow. In: Di Penta M, Pinzger M, Robbes R (eds) 12th working conference on mining software repositories (MSR 2015) IEEE Computer Society, Florence, Italy, pp 410\u2013413","DOI":"10.1109\/MSR.2015.51"},{"key":"9650_CR27","unstructured":"Electronic Frontier Foundation (2018) Oracle v. Google. \n                    https:\/\/www.eff.org\/cases\/oracle-v-google"},{"key":"9650_CR28","unstructured":"Engelfriet A (2016) What is the license status of StackOverflow code snippets? \n                    https:\/\/legalict.com\/software\/what-is-the-license-status-of-stackoverflow-code-snippets\/"},{"key":"9650_CR29","unstructured":"Fazunenko D (2016) Get rid of the humanReadableByteCount() method in openjdk\/hotspot. \n                    https:\/\/bugs.openjdk.java.net\/browse\/JDK-8170860"},{"key":"9650_CR30","doi-asserted-by":"crossref","unstructured":"Fischer F, B\u00f6ttinger K, Xiao H, Stransky C, Acar Y, Backes M, Fahl S (2017) Stack overflow considered harmful? the impact of Copy&Paste on android application security. In: Butler KRB, Erlingsson \u00da, Parno B (eds) 2017 IEEE Symposium on security and privacy (S&P 2017) IEEE Computer Society, San Jose, CA, USA, pp 121\u2013136","DOI":"10.1109\/SP.2017.31"},{"key":"9650_CR31","unstructured":"German DM, Hassan AE (2009) License integration patterns: Addressing license mismatches in component-based development. In: Fickas S, Atlee J M, Inverardi P (eds) 31St international conference on software engineering (ICSE 2009) IEEE Computer Society, Vancouver, BC, Canada, pp 188\u2013198"},{"key":"9650_CR32","doi-asserted-by":"crossref","unstructured":"German DM, Di Penta M, Gueheneuc YG, Antoniol G (2009) Code siblings: Technical and legal implications of copying code between applications. In: Godfrey M W, Whitehead J (eds) 6th international working conference on mining software repositories (MSR 2009), IEEE Computer Society, Vancouver, BC, Canada, pp 81\u201390","DOI":"10.1109\/MSR.2009.5069483"},{"key":"9650_CR33","doi-asserted-by":"crossref","unstructured":"Gharehyazie M, Ray B, Filkov V (2017) Some From Here, Some From There: Cross-project Code Reuse in GitHub. In: Gonzalez-Barahona JM, Hindle A, Tan L (eds) 14th international conference on mining software repositories (MSR 2017), IEEE Computer Society, Buenos Aires, Argentina, pp 291\u2013301","DOI":"10.1109\/MSR.2017.15"},{"key":"9650_CR34","unstructured":"GitHub Inc (2017a) Choosealicense.com: No License. \n                    https:\/\/choosealicense.com\/no-license\/"},{"key":"9650_CR35","unstructured":"GitHub Inc (2017b) GitHub Developer \u2013 API. \n                    https:\/\/developer.github.com\/v3\/"},{"key":"9650_CR36","unstructured":"GitHub Inc (2018) The State of the Octoverse 2017. \n                    https:\/\/octoverse.github.com\/"},{"key":"9650_CR37","unstructured":"Google Cloud Platform (2017a) GitHub Data. \n                    https:\/\/cloud.google.com\/bigquery\/public-data\/github"},{"key":"9650_CR38","unstructured":"Google Cloud Platform (2017b) Stack Overflow Data. \n                    https:\/\/cloud.google.com\/bigquery\/public-data\/stackoverflow"},{"key":"9650_CR39","doi-asserted-by":"crossref","unstructured":"Gousios G (2013) The GHTorrent dataset and tool suite. In: Zimmermann T, Di Penta M, Kim S (eds) 10th international working conference on mining software repositories (MSR 2013), IEEE, San Francisco, CA, USA, pp 233\u2013236","DOI":"10.1109\/MSR.2013.6624034"},{"key":"9650_CR40","unstructured":"Gousios G (2017) GHTorrent on the Google cloud. \n                    http:\/\/ghtorrent.org\/gcloud.html"},{"key":"9650_CR41","unstructured":"Kaess J, M\u00fcller J, Rieger J (2004) Welte v. Sitecom Deutschland GmbH. District Court of Munich I"},{"key":"9650_CR42","doi-asserted-by":"crossref","unstructured":"Kalliamvakou E, Gousios G, Blincoe K, Singer L, Germ\u00e1n DM, Damian D (2014) The promises and perils of mining GitHub. In: Devanbu PT, Kim S, Pinzger M (eds) 11th working conference on mining software repositories (MSR 2014), ACM, Hyderabad, India, pp 92\u2013101","DOI":"10.1145\/2597073.2597074"},{"issue":"2","key":"9650_CR43","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/08993400412331363843","volume":"14","author":"T Lancaster","year":"2004","unstructured":"Lancaster T, Culwin F (2004) A comparison of source code plagiarism detection engines. Comput Sci Educ 14(2):101\u2013112","journal-title":"Comput Sci Educ"},{"issue":"OOPSLA","key":"9650_CR44","doi-asserted-by":"publisher","first-page":"84:1","DOI":"10.1145\/3133908","volume":"1","author":"CV Lopes","year":"2017","unstructured":"Lopes CV, Maj P, Martins P, Saini V, Di Yang, Zitny J, Sajnani H, Vitek J (2017) D\u00e9J\u00e0vu: A map of code duplicates on GitHub. Proc ACM Program Lang 1(OOPSLA):84:1\u201384:28","journal-title":"Proc ACM Program Lang"},{"key":"9650_CR45","unstructured":"Martins VT, Fonte D, Henriques PR, Dd Cruz (2014) Plagiarism detection: a tool survey and comparison. In: Pereira MJV, Leal JP, Simoes A (eds) 3rd symposium on languages, applications and technologies (SLATE 2014), Schloss Dagstuhl\u2013Leibniz-Zentrum Fuer Informatik, Bragan\u00e7a, Portugal, Openaccess Series In Informatics (OASIcs), vol 38, pp 143\u2013158"},{"key":"9650_CR46","doi-asserted-by":"crossref","unstructured":"Meloca R, Pinto G, Baiser L, Mattos M, Polato I, Wiese IS, German D (2018) Understanding the usage, impact, and adoption of non-OSI approved licenses. In: Zaidman A, Hill E, Kamei Y (eds) 15th international conference on mining software repositories (MSR 2018) ACM, Gothenburg, Sweden, pp 1\u201311","DOI":"10.1145\/3196398.3196427"},{"key":"9650_CR47","doi-asserted-by":"crossref","unstructured":"Morrison P, Murphy-Hill E (2013) Is programming knowledge related to age? An exploration of Stack Overflow. In: Zimmermann T, Di Penta M, Kim S (eds) 10th international working conference on mining software repositories (MSR 2013) IEEE, San Francisco, CA, USA, pp 69\u201372","DOI":"10.1109\/MSR.2013.6624008"},{"issue":"6","key":"9650_CR48","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.1007\/s10664-017-9512-6","volume":"22","author":"N Munaiah","year":"2017","unstructured":"Munaiah N, Kroh S, Cabrey C, Nagappan M (2017) Curating GitHub for engineered software projects. Empir Softw Eng 22(6):3219\u20133253","journal-title":"Empir Softw Eng"},{"key":"9650_CR49","doi-asserted-by":"crossref","unstructured":"Nasehi SM, Sillito J, Maurer F, Burns C (2012) What makes a good code example? A study of programming Q&A in StackOverflow. In: Tonella P, Di Penta M, Maletic JI (eds) 28th IEEE International Conference on Software Maintenance (ICSM 2012) IEEE Computer Society, Trento, Italy, pp 25\u201334","DOI":"10.1109\/ICSM.2012.6405249"},{"issue":"3","key":"9650_CR50","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1002\/ejsp.2420150303","volume":"15","author":"AJ Nederhof","year":"1985","unstructured":"Nederhof AJ (1985) Methods of coping with social desirability bias: a review. Eur J Soc Psychol 15(3):263\u2013280","journal-title":"Eur J Soc Psychol"},{"key":"9650_CR51","unstructured":"PMD (2016) Finding duplicated code. \n                    http:\/\/pmd.github.io\/pmd-5.5.1\/usage\/cpd-usage.html"},{"key":"9650_CR52","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Bacchelli A, Lanza M (2013) Seahawk: Stack overflow in the IDEa. In: Notkin D, Cheng BHC, Pohl K (eds) 35th international conference on software engineering (ICSE 2013) IEEE Computer Society, San Francisco, CA, USA, pp 1295\u20131298","DOI":"10.1109\/ICSE.2013.6606701"},{"key":"9650_CR53","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Mocci A, Bacchelli A, Lanza M (2014) Understanding and classifying the quality of technical forum questions. In: Wong WE, McMillin B (eds) 14th international conference on quality software (QSIC 2014) IEEE, Allen, TX, USA, pp 343\u2013352","DOI":"10.1109\/QSIC.2014.27"},{"key":"9650_CR54","unstructured":"Poteat H (2016) GitHub\u2019s 2015 Transparency Report. \n                    https:\/\/github.com\/blog\/2202-github-s-2015-transparency-report"},{"issue":"11","key":"9650_CR55","first-page":"1016","volume":"8","author":"L Prechelt","year":"2002","unstructured":"Prechelt L, Malpohl G, Philippsen M (2002) Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science 8(11):1016\u20131038","journal-title":"Journal of Universal Computer Science"},{"key":"9650_CR56","doi-asserted-by":"crossref","unstructured":"Ragkhitwetsagul C (2016) Measuring code similarity in Large-Scaled code corpora. In: Kraft NA, Menzies T, Adams B, Poshyvanyk D (eds) 2016 IEEE International conference on software maintenance and evolution (ICSME 2016) IEEE Computer Society, Raleigh, NC, USA, pp 626\u2013630","DOI":"10.1109\/ICSME.2016.18"},{"issue":"7","key":"9650_CR57","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci Comput Program 74 (7):470\u2013495","journal-title":"Sci Comput Program"},{"key":"9650_CR58","doi-asserted-by":"crossref","unstructured":"Sajnani H, Saini V, Svajlenko J, Roy CK, Lopes CV (2016) SourcererCC: Scaling code clone detection to big-code. In: Dillon L, Visser W, Williams L (eds) 38th international conference on software engineering (ICSE 2016), ACM, Austin, TX, USA, pp 1157\u20131168","DOI":"10.1145\/2884781.2884877"},{"key":"9650_CR59","doi-asserted-by":"crossref","unstructured":"Scalabrino S, Bavota G, Vendome C, Linares-V\u00e1squez M, Poshyvany D, Oliveto R (2017) Automatically assessing code understandability: How far are we? In: Rosu G, Penta MD, Nguyen TN (eds) 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE 2017) IEEE Computer Society, Urbana, IL, USA, pp 417\u2013427","DOI":"10.1109\/ASE.2017.8115654"},{"key":"9650_CR60","doi-asserted-by":"crossref","unstructured":"Schenk D, Lungu M (2013) Geo-locating the knowledge transfer in StackOverflow. In: Ali R, Begel A, Maalej W (eds) 2013 International workshop on social software engineering (SSE 2013) ACM, Saint Petersburg, Russian Federation, pp 21\u201324","DOI":"10.1145\/2501535.2501540"},{"key":"9650_CR61","unstructured":"Silvestri G, Yang J, Bozzon A, Tagarelli A (2015) Linking Accounts across Social Networks: The Case of StackOverflow, GitHub and Twitter. In: Armano G, Bozzon A, Giuliani A (eds) 1st International Workshop on Knowledge Discovery on the WEB (KDWeb 2015) CEUR-WS.org, Cagliari, Italy, CEUR Workshop Proceedings, pp 41\u201352"},{"key":"9650_CR62","unstructured":"Software Freedom Law Center (2008) Free Software Foundation Inc v. Cisco Systems, Inc. United States District Court for the Southern District of New York"},{"issue":"12","key":"9650_CR63","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2043174.2043193","volume":"54","author":"M Sojer","year":"2011","unstructured":"Sojer M, Henkel J (2011) License risks from ad hoc reuse of code from the internet. Commun ACM 54(12):74\u201381","journal-title":"Commun ACM"},{"key":"9650_CR64","volume-title":"Understanding Open Source and Free Software Licensing","author":"AM St Laurent","year":"2004","unstructured":"St Laurent AM (2004) Understanding Open Source and Free Software Licensing. O\u2019Reilly Media, Sebastopol"},{"key":"9650_CR65","unstructured":"Stack Exchange Inc (2015) Stack Exchange Data Dump: August 18, 2015. \n                    https:\/\/archive.org\/details\/stackexchange\/"},{"key":"9650_CR66","unstructured":"Stack Exchange Inc (2016) Stack Exchange API v2.2. \n                    https:\/\/api.stackexchange.com\/docs"},{"key":"9650_CR67","unstructured":"Stack Exchange Inc (2017a) Stack Exchange Data Dump 2017-12-01. \n                    https:\/\/archive.org\/details\/stackexchange\/"},{"key":"9650_CR68","unstructured":"Stack Exchange Inc (2017b) Stack Exchange Data Dump: March 14, 2017. \n                    https:\/\/archive.org\/details\/stackexchange\/"},{"key":"9650_CR69","unstructured":"Stack Exchange Inc (2018a) Stack exchange network terms of service. \n                    https:\/\/web.archive.org\/web\/20180228075555\/http:\/\/stackexchange.com\/legal"},{"key":"9650_CR70","unstructured":"Stack Exchange Inc (2018b) Stack exchange network terms of service. \n                    http:\/\/stackexchange.com\/legal"},{"key":"9650_CR71","unstructured":"Stack Exchange Meta (2009) What is up with the source code license on Stack Overflow? \n                    http:\/\/meta.stackexchange.com\/q\/25956"},{"key":"9650_CR72","unstructured":"Stack Exchange Meta (2013) Do I have to worry about copyright issues for code posted on Stack Overflow? \n                    http:\/\/meta.stackexchange.com\/q\/12527"},{"key":"9650_CR73","unstructured":"Stack Exchange Meta (2015) Can we get some explicit clarification on the *intended* legal usage of code from SO answers? \n                    http:\/\/meta.stackoverflow.com\/q\/286582"},{"key":"9650_CR74","unstructured":"Stack Exchange Meta (2016) A new code license: The MIT, this time with attribution required. \n                    http:\/\/meta.stackexchange.com\/q\/272956"},{"key":"9650_CR75","doi-asserted-by":"crossref","unstructured":"Subramanian S, Holmes R (2013) Making sense of online code snippets. In: Zimmermann T, Di Penta M, Kim S (eds) 10th international working conference on mining software repositories (MSR 2013) IEEE, San Francisco, CA, USA, pp 85\u201388","DOI":"10.1109\/MSR.2013.6624012"},{"key":"9650_CR76","unstructured":"Tim Post (2018) A new (2018) update to our terms of service is here. \n                    https:\/\/meta.stackexchange.com\/questions\/309746\/a-new-2018-update-to-our-terms-of-service-is-here"},{"key":"9650_CR77","unstructured":"TIOBE software BV (2017) TIOBE Index for February 2017. \n                    http:\/\/www.tiobe.com\/tiobe-index\/"},{"key":"9650_CR78","doi-asserted-by":"crossref","unstructured":"Treude C, Robillard MP (2016) Augmenting API documentation with insights from stack overflow. In: Dillon L, Visser W, Williams L (eds) 38th international conference on software engineering (ICSE 2016), ACM, Austin, TX, USA, pp 392\u2013403","DOI":"10.1145\/2884781.2884800"},{"key":"9650_CR79","doi-asserted-by":"crossref","unstructured":"Treude C, Robillard MP (2017) Understanding stack overflow code fragments. In: Mei H, Zhang L, Zimmermann T (eds) 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME 2017) IEEE Computer Society, Shanghai, China, pp 509\u2013513","DOI":"10.1109\/ICSME.2017.24"},{"key":"9650_CR80","doi-asserted-by":"crossref","unstructured":"Treude C, Barzilay O, Storey MAD (2011) How do programmers ask and answer questions on the web? In: Taylor RN, Gall HC, Medvidovic N (eds) 33rd international conference on software engineering (ICSE 2011) ACM, Waikiki, Honolulu, pp 804\u2013807","DOI":"10.1145\/1985793.1985907"},{"key":"9650_CR81","doi-asserted-by":"crossref","unstructured":"Vasilescu B, Capiluppi A, Serebrenik A (2012) Gender, representation and online participation: A quantitative study of stackoverflow. In: Aberer K, Flache A, Jager W, Liu L, Tang J, Gueret C (eds) 4th International Conference on Social Informatics (SocInfo 2012) Springer, Lausanne, Switzerland, Lecture Notes in Computer Science, pp 332\u2013338","DOI":"10.1109\/SocialInformatics.2012.81"},{"key":"9650_CR82","doi-asserted-by":"crossref","unstructured":"Vasilescu B, Filkov V, Serebrenik A (2013) StackOverflow and GitHub: Associations between Software Development and Crowdsourced Knowledge. In: Chang LW, Srivastava J, Zhan J (eds) 2013 International conference on social computing (SocialCom 2013) IEEE Computer Society, Washington, DC, USA, pp 188\u2013195","DOI":"10.1109\/SocialCom.2013.35"},{"key":"9650_CR83","doi-asserted-by":"crossref","unstructured":"Vendome C (2015) A large scale study of license usage on GitHub. In: Bertolino A, Canfora G, Elbaum S (eds) 37th international conference on software engineering (ICSE 2015) IEEE, Florence, Italy, pp 772\u2013774","DOI":"10.1109\/ICSE.2015.245"},{"key":"9650_CR84","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D, Jiang L (2013) An empirical study on developer interactions in StackOverflow. In: Shin SY, Maldonado JC (eds) 28th annual ACM symposium on applied computing (SAC 2013) ACM, Coimbra, Portugal, pp 1019\u20131024","DOI":"10.1145\/2480362.2480557"},{"key":"9650_CR85","unstructured":"White JS (2008) Jacobsen v. Katzer, 535 F.3d 1373, 1379. United States Court of Appeals for the Federal Circuit"},{"key":"9650_CR86","unstructured":"Wikipedia (2017) Free Software Foundation, Inc v. Cisco Systems, Inc. \n                    https:\/\/en.wikipedia.org\/wiki\/Free_Software_Foundation,_Inc._v._Cisco_Systems,_Inc."},{"issue":"6","key":"9650_CR87","doi-asserted-by":"publisher","first-page":"3149","DOI":"10.1007\/s10664-017-9514-4","volume":"22","author":"X Xia","year":"2017","unstructured":"Xia X, Bao L, Lo D, Kochhar PS, Hassan AE, Xing Z (2017) What do developers search for on the web? Empir Softw Eng 22(6):3149\u20133185","journal-title":"Empir Softw Eng"},{"key":"9650_CR88","doi-asserted-by":"crossref","unstructured":"Yang D, Hussain A, Lopes CV (2016) From query to usable code: an analysis of stack overflow code snippets. In: Kim M, Robbes R, Bird C (eds) 13th international conference on mining software repositories (MSR 2016), ACM, Austin, TX, USA, pp 391\u2013402","DOI":"10.1145\/2901739.2901767"},{"key":"9650_CR89","doi-asserted-by":"crossref","unstructured":"Yang D, Martins P, Saini V, Lopes CV (2017) Stack Overflow in GitHub: Any snippets there? In: Gonzalez-Barahona JM, Hindle A, Tan L (eds) 14th international conference on mining software repositories (MSR 2017) IEEE Computer Society, Buenos Aires, Argentina, pp 280\u2013290","DOI":"10.1109\/MSR.2017.13"},{"key":"9650_CR90","doi-asserted-by":"crossref","unstructured":"Yang J, Hauff C, Bozzon A, Houben GJ (2014) Asking the right question in collaborative Q&A systems. In: Ferres L, Rossi G, Almeida VAF, Herder E (eds) 25th ACM conference on hypertext and social media (HT 2014) ACM, Santiago, Chile, pp 179\u2013189","DOI":"10.1145\/2631775.2631809"},{"key":"9650_CR91","doi-asserted-by":"crossref","unstructured":"Zagalsky A, Barzilay O, Yehudai A (2012) Example Overflow: Using social media for code recommendation. In: Maalej W, Robillard MP, Walker RJ, Zimmermann T (eds) 3rd international workshop on recommendation systems for software engineering (RSSE 2012) IEEE, Zurich, Switzerland, pp 38\u201342","DOI":"10.1109\/RSSE.2012.6233407"},{"key":"9650_CR92","unstructured":"Zhang T, Upadhyaya G, Reinhardt A, Rajan H, Kim M (2018) Are Code Examples on an Online Q&A Forum Reliable? A Study of API Misuse on Stack Overflow. In: Crnkovic I, Chechik M, Harman M (eds) 40th international conference on software engineering (ICSE 2018) ACM, Gothenburg, Sweden, pp 1\u201311"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9650-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9650-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9650-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T22:36:17Z","timestamp":1569882977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9650-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":92,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9650"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9650-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,1]]},"assertion":[{"value":"1 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}