{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:45:58Z","timestamp":1776077158631,"version":"3.50.1"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T00:00:00Z","timestamp":1556323200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10664-019-09708-7","type":"journal-article","created":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T15:03:51Z","timestamp":1556377431000},"page":"2636-2673","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["Understanding the motivations, challenges and needs of Blockchain software developers: a survey"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3178-6232","authenticated-orcid":false,"given":"Amiangshu","family":"Bosu","sequence":"first","affiliation":[]},{"given":"Anindya","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Rifat","family":"Shahriyar","sequence":"additional","affiliation":[]},{"given":"Partha","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,27]]},"reference":[{"key":"9708_CR1","unstructured":"Abran A, Moore JW, Bourque P, Dupuis R, Tripp L (2004) Software engineering body of knowledge. IEEE Computer Society, Angela Burgess"},{"key":"9708_CR2","doi-asserted-by":"crossref","unstructured":"Adhami S, Giudici G, Martinazzi S (2018) Why do businesses go crypto? An empirical analysis of initial coin offerings. Journal of Economics and Business","DOI":"10.2139\/ssrn.3046209"},{"issue":"1","key":"9708_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2005.23","volume":"3","author":"B Arkin","year":"2005","unstructured":"Arkin B, Stender S, McGraw G (2005) Software penetration testing. IEEE Secur Priv 3(1):84\u201387","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"9708_CR4","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1177\/002224377701400320","volume":"14","author":"JS Armstrong","year":"1977","unstructured":"Armstrong JS, Overton TS (1977) Estimating Nonresponse Bias in Mail Surveys. J Market Res 14(3):396\u2013402","journal-title":"J Market Res"},{"key":"9708_CR5","doi-asserted-by":"crossref","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD). IEEE, pp 25\u201330","DOI":"10.1109\/OBD.2016.11"},{"issue":"2","key":"9708_CR6","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1037\/0882-7974.20.2.341","volume":"20","author":"ME Beier","year":"2005","unstructured":"Beier ME, Ackerman PL (2005) Age, ability, and the role of prior knowledge on the acquisition of new domain knowledge: promising results in a real-world learning environment. Psychol Aging 20(2):341","journal-title":"Psychol Aging"},{"issue":"1","key":"9708_CR7","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","volume":"57","author":"Y Benjamini","year":"1995","unstructured":"Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the royal statistical society. Series B (Methodological) 57(1):289\u2013300","journal-title":"Journal of the royal statistical society. Series B (Methodological)"},{"issue":"0","key":"9708_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jss.2014.03.061","volume":"94","author":"A Bosu","year":"2014","unstructured":"Bosu A, Carver J, Guadagno R, Bassett B, McCallum D, Hochstein L (2014a) Peer impressions in open source organizations: a survey. J Syst Softw 94 (0):4\u201315","journal-title":"J Syst Softw"},{"key":"9708_CR9","doi-asserted-by":"crossref","unstructured":"Bosu A, Carver JC (2014b) Impact of developer reputation on code review outcomes in oss projects: an empirical investigation. In: Proceedings of the 8th ACM\/IEEE international symposium on empirical software engineering and measurement. ACM, pp 33","DOI":"10.1145\/2652524.2652544"},{"issue":"1","key":"9708_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TSE.2016.2576451","volume":"43","author":"A Bosu","year":"2017","unstructured":"Bosu A, Carver JC, Bird C, Orbeck J, Chockley C (2017) Process aspects and social dynamics of contemporary code review: insights from open source development and industrial practice at microsoft. IEEE Trans Softw Eng 43(1):56\u201375","journal-title":"IEEE Trans Softw Eng"},{"key":"9708_CR11","unstructured":"Brooke S (2018) The ins and outs of testing blockchain apps. https:\/\/jaxenter.com\/ins-outs-testing-blockchain-apps-146447.html"},{"key":"9708_CR12","unstructured":"Campion S, Messinger D (2013) System and method for distributed software testing. US Patent 8,621,434"},{"key":"9708_CR13","doi-asserted-by":"crossref","unstructured":"Chakraborty P, Shahriyar R, Iqbal A, Bosu A (2018) Understanding the software development practices of blockchain projects: a survey. In: Proceedings of the 12th ACM\/IEEE international symposium on empirical software engineering and measurement, ESEM \u201918, pp 28:1\u201328:10","DOI":"10.1145\/3239235.3240298"},{"key":"9708_CR14","unstructured":"Chen C, Qi Z, Liu Y, Lei K (2017) Using virtualization for blockchain testing. In: International conference on smart computing and communication. Springer, pp 289\u2013299"},{"issue":"6","key":"9708_CR15","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MSP.2004.111","volume":"2","author":"B Chess","year":"2004","unstructured":"Chess B, McGraw G (2004) Static analysis for security. IEEE Secur Priv 2 (6):76\u201379","journal-title":"IEEE Secur Priv"},{"key":"9708_CR16","volume-title":"Handbook of digital currency: bitcoin, innovation, financial instruments, and big data","author":"DLK Chuen","year":"2015","unstructured":"Chuen DLK (2015) Handbook of digital currency: bitcoin, innovation, financial instruments, and big data. Academic Press, New York"},{"key":"9708_CR17","unstructured":"Clack CD, Bakshi VA, Braine L (2016) Smart contract templates: foundations, design landscape and research directions. arXiv: 1608.00771"},{"issue":"4","key":"9708_CR18","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/242223.242257","volume":"28","author":"EM Clarke","year":"1996","unstructured":"Clarke EM, Wing JM (1996) Formal methods: State of the art and future directions. ACM Comput Surv (CSUR) 28(4):626\u2013643","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"9708_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Meas 20(1):37\u201346","journal-title":"Educ Psychol Meas"},{"key":"9708_CR20","unstructured":"Cryptocurrency market capitalization (2019) https:\/\/www.coinmarketcap.com\/ . Accessed: 2019-01-15"},{"issue":"7","key":"9708_CR21","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1080\/1043859052000344705","volume":"14","author":"L Dahlander","year":"2005","unstructured":"Dahlander L, Mckelvey M (2005) Who is not developing open source software? non-users, users, and developers. Econ Innov Technol 14(7):617\u2013635","journal-title":"Econ Innov Technol"},{"issue":"4","key":"9708_CR22","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.infoecopol.2008.10.001","volume":"20","author":"PA David","year":"2008","unstructured":"David PA, Shapiro JS (2008) Community-based production of open-source software: What do we know about the developers who participate?. Inf Econ Policy 20 (4):364\u2013398. Empirical Issues in Open Source Software","journal-title":"Inf Econ Policy"},{"issue":"4","key":"9708_CR23","first-page":"529","volume":"5","author":"P Filippi De","year":"2016","unstructured":"De Filippi P, Loveluck B (2016) The invisible politics of bitcoin: Governance crisis of a decentralized infrastructure. Internet Policy Rev 5(4):529\u2013546","journal-title":"Internet Policy Rev"},{"key":"9708_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2271-7","volume-title":"Intrinsic motivation and self-determination in human behavior","author":"E Deci","year":"1985","unstructured":"Deci E, Ryan RM (1985) Intrinsic motivation and self-determination in human behavior. Springer Science & Business Media, Berlin"},{"key":"9708_CR25","doi-asserted-by":"crossref","unstructured":"Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In: International conference on financial cryptography and data security. Springer, pp 79\u201394","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"9708_CR26","doi-asserted-by":"crossref","unstructured":"Destefanis G, Marchesi M, Ortu M, Tonelli R, Bracciali A, Hierons RM (2018) Smart contracts vulnerabilities: a call for blockchain software engineering?. In: Proceedings of the 2018 international workshop on blockchain oriented software engineering. IEEE, Campobasso, pp 19\u201325","DOI":"10.1109\/IWBOSE.2018.8327567"},{"key":"9708_CR27","unstructured":"Documentation BD (2018) Mainnet, bicoin main network. https:\/\/bitcoin.org\/en\/glossary\/mainnet . Accessed: 2018-01-04"},{"issue":"3","key":"9708_CR28","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1111\/j.1467-9876.2005.05459.x","volume":"54","author":"MR Elliott","year":"2005","unstructured":"Elliott MR, Davis WW (2005) Obtaining cancer risk factor prevalence estimates in small areas: combining data from two surveys. J Royal Stat Soc: Ser C (Appl Stat) 54(3):595\u2013609","journal-title":"J Royal Stat Soc: Ser C (Appl Stat)"},{"issue":"5","key":"9708_CR29","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1002\/jcaf.22179","volume":"27","author":"K Fanning","year":"2016","unstructured":"Fanning K, Centers DP (2016) Blockchain and its coming impact on financial services. J Corp Account Financ 27(5):53\u201357","journal-title":"J Corp Account Financ"},{"key":"9708_CR30","unstructured":"Galati F (2019) Blockchain as a process: Ideologies and motivations behind the technology. https:\/\/medium.com\/coinmonks\/blockchain-as-a-process-ideologies-and-motivations-behind-the-technology-c25219d87881\/"},{"issue":"6","key":"9708_CR31","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/2.507642","volume":"29","author":"SL Garfinkel","year":"1996","unstructured":"Garfinkel SL (1996) Public key cryptography. Computer 29(6):101\u2013104","journal-title":"Computer"},{"key":"9708_CR32","unstructured":"Gilbertson T, Vroegindewey L (2017) Larry\u2019s cryptocoin risk. https:\/\/www.coindevelopmentindex.com\/"},{"key":"9708_CR33","unstructured":"Hars A, Ou S (2001) Working for free? motivations of participating in open source projects. In: 2001. Proceedings of the 34th annual Hawaii international conference on system sciences. IEEE, pp 9\u2013pp"},{"key":"9708_CR34","first-page":"1153","volume":"51","author":"BA Hennessey","year":"1998","unstructured":"Hennessey BA, Amabile TM (1998) Reality, intrinsic motivation, and creativity. Am Psychol 51:1153\u20131166","journal-title":"Am Psychol"},{"key":"9708_CR35","unstructured":"Herndon JB (2018) Comparing and linking survey data: Considerations for working with multiple data sources. https:\/\/www.nidcr.nih.gov\/grants-funding\/grant-programs\/behavioral-social-sciences-research-program\/comparing-and-linking-survey-data"},{"issue":"7","key":"9708_CR36","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1016\/S0048-7333(03)00047-7","volume":"32","author":"G Hertel","year":"2003","unstructured":"Hertel G, Niedner S, Herrmann S (2003) Motivation of software developers in open source projects: an internet-based survey of contributors to the linux kernel. Res Policy 32(7):1159\u20131177","journal-title":"Res Policy"},{"key":"9708_CR37","doi-asserted-by":"crossref","unstructured":"Hildenbrandt E, Saxena M, Rodrigues N, Zhu X, Daian P, Guth D, Moore B, Park D, Zhang Y, Stefanescu A et al (2018) Kevm: a complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st computer security foundations symposium (CSF). IEEE, pp 204\u2013217","DOI":"10.1109\/CSF.2018.00022"},{"key":"9708_CR38","first-page":"113","volume":"16","author":"M Hitka","year":"2015","unstructured":"Hitka M, Bal\u00e1\u017eov\u00e1 \u017e (2015) The impact of age, education and seniority on motivation of employees. Bus: Theory Pract 16:113","journal-title":"Bus: Theory Pract"},{"key":"9708_CR39","doi-asserted-by":"crossref","unstructured":"Howell ST, Niessner M, Yermack D (2018) Initial coin offerings: Financing growth with cryptocurrency token sales. Technical report, National Bureau of Economic Research","DOI":"10.3386\/w24774"},{"key":"9708_CR40","doi-asserted-by":"crossref","unstructured":"Huh S, Cho S, Kim S (2017) Managing iot devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology (ICACT). IEEE, pp 464\u2013467","DOI":"10.23919\/ICACT.2017.7890132"},{"issue":"5","key":"9708_CR41","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1037\/0021-9010.92.5.1332","volume":"92","author":"SE Humphrey","year":"2007","unstructured":"Humphrey SE, Nahrgang JD, Morgeson FP (2007) Integrating motivational, social, and contextual work design features: a meta-analytic summary and theoretical extension of the work design literature. J Appl Psychol 92(5):1332","journal-title":"J Appl Psychol"},{"issue":"1","key":"9708_CR42","first-page":"118","volume":"95","author":"M Iansiti","year":"2017","unstructured":"Iansiti M, Lakhani KR (2017) The truth about blockchain. Harv Bus Rev 95 (1):118\u2013127","journal-title":"Harv Bus Rev"},{"key":"9708_CR43","unstructured":"IBM Corp. Released (2017) IBM SPSS Statistics for Windows, Version 25.0. Armonk, NY: IBM Corp."},{"key":"9708_CR44","unstructured":"Jacobovitz O (2016) Blockchain for identity management"},{"key":"9708_CR45","unstructured":"Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. In: Secure information networks. Springer, pp 258\u2013272"},{"key":"9708_CR46","doi-asserted-by":"crossref","unstructured":"Jiang B, Liu Y, Chan W (2018) Contractfuzzer: Fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering. ACM, pp 259\u2013269","DOI":"10.1145\/3238147.3238177"},{"key":"9708_CR47","doi-asserted-by":"crossref","unstructured":"Kononenko O, Baysal O, Godfrey MW (2016) Code review quality: how developers see it. In: 2016 IEEE\/ACM 38th international conference on software engineering (ICSE). IEEE, pp 1028\u20131038","DOI":"10.1145\/2884781.2884840"},{"key":"9708_CR48","doi-asserted-by":"crossref","unstructured":"Korpela K, Hallikas J, Dahlberg T (2017) Digital supply chain transformation toward blockchain integration. In: Proceedings of the 50th Hawaii international conference on system sciences","DOI":"10.24251\/HICSS.2017.506"},{"key":"9708_CR49","doi-asserted-by":"crossref","unstructured":"Krafft PM, Della Penna N, Pentland AS (2018) An experimental study of cryptocurrency market dynamics. In: Proceedings of the 2018 CHI conference on human factors in computing systems, CHI \u201918, pp 605:1\u2013605:13","DOI":"10.1145\/3173574.3174179"},{"key":"9708_CR50","unstructured":"Lakhani KR, Wolf RG (2003) Why hackers do what they do: Understanding motivation and effort in free\/open source software projects. MIT Sloan Working Paper 4425\u201303"},{"issue":"1","key":"9708_CR51","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33(1):159\u2013174. http:\/\/www.jstor.org\/stable\/2529310","journal-title":"Biometrics"},{"key":"9708_CR52","doi-asserted-by":"publisher","unstructured":"Lee A, Carver JC, Bosu A (2017) Understanding the impressions, motivations, and barriers of one time code contributors to floss projects: a survey. In: Proceedings of the 39th international conference on software engineering, ICSE \u201917. IEEE Press, Piscataway, pp 187\u2013197. https:\/\/doi.org\/10.1109\/ICSE.2017.25","DOI":"10.1109\/ICSE.2017.25"},{"issue":"449","key":"9708_CR53","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1080\/01621459.2000.10473920","volume":"95","author":"SL Lohr","year":"2000","unstructured":"Lohr SL, Rao J (2000) Inference from dual frame surveys. J Am Stat Assoc 95(449):271\u2013280","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"9708_CR54","doi-asserted-by":"publisher","first-page":"105","DOI":"10.5172\/mra.455.2.1.105","volume":"2","author":"CJ Lu","year":"2008","unstructured":"Lu CJ, Shulman SW (2008) Rigor and flexibility in computer-based qualitative research: Introducing the coding analysis toolkit. Int J Multiple Res Approaches 2 (1):105\u2013117","journal-title":"Int J Multiple Res Approaches"},{"key":"9708_CR55","doi-asserted-by":"crossref","unstructured":"Luu L, Chu DH, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 254\u2013269","DOI":"10.1145\/2976749.2978309"},{"issue":"4","key":"9708_CR56","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1093\/poq\/nfm046","volume":"71","author":"MP Mcdonald","year":"2007","unstructured":"Mcdonald MP (2007) The true electorate: a Cross-Validation of voter registration files and election survey demographics. Publ Opin Q 71(4):588\u2013602","journal-title":"Publ Opin Q"},{"issue":"5","key":"9708_CR57","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.jsp.2006.04.004","volume":"44","author":"JL Meece","year":"2006","unstructured":"Meece JL, Glienke BB, Burg S (2006) Gender and motivation. J Sch Psychol 44(5):351\u2013373","journal-title":"J Sch Psychol"},{"issue":"3","key":"9708_CR58","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/567793.567795","volume":"11","author":"A Mockus","year":"2002","unstructured":"Mockus A, Fielding RT, Herbsleb JD (2002) Two case studies of open source software development: Apache and mozilla. ACM Trans Softw Eng Methodol 11 (3):309\u2013346","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9708_CR59","doi-asserted-by":"crossref","unstructured":"Murphy-Hill E, Zimmermann T, Nagappan N (2014) Cowboys, ankle sprains, and keepers of quality: How is video game development different from software development?. In: Proceedings of the 36th international conference on software engineering. ACM, pp 1\u201311","DOI":"10.1145\/2568225.2568226"},{"key":"9708_CR60","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system"},{"key":"9708_CR61","volume-title":"Bitcoin and cryptocurrency technologies: a comprehensive introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2016) Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, Princeton"},{"key":"9708_CR62","doi-asserted-by":"crossref","unstructured":"Nikolic I, Kolluri A, Sergey I, Saxena P, Hobor A (2018) Finding the greedy, prodigal, and suicidal contracts at scale. arXiv: 1802.06038","DOI":"10.1145\/3274694.3274743"},{"key":"9708_CR63","unstructured":"Overflow S (2017) Stack overflow annual developer survey. https:\/\/insights.stackoverflow.com\/survey\/"},{"key":"9708_CR64","unstructured":"Palladino S (2017) The parity wallet hack explained. https:\/\/blog.zeppelin.solutions\/on-the-parity-wallet-multisig-hack-405a8c12e8f7"},{"key":"9708_CR65","doi-asserted-by":"crossref","unstructured":"Park D, Zhang Y, Saxena M, Daian P, Ros\u0307u G. (2018) A formal verification tool for ethereum vm bytecode. In: Proceedings of the 2018 26th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering. ACM, pp 912\u2013915","DOI":"10.1145\/3236024.3264591"},{"key":"9708_CR66","unstructured":"Peters GW, Panayi E (2016) Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In: Banking beyond banks and money. Springer, pp 239\u2013278"},{"key":"9708_CR67","doi-asserted-by":"crossref","unstructured":"Porru S, Pinna A, Marchesi M, Tonelli R (2017) Blockchain-oriented software engineering: challenges and new directions. In: Proceedings of the 39th international conference on software engineering companion. IEEE Press, Buenos Aires, pp 169\u2013171","DOI":"10.1109\/ICSE-C.2017.142"},{"key":"9708_CR68","unstructured":"Posel D, Devey R (2006) The demographics of fathers in south africa: an analysis of survey data, 1993\u20132002 Baba: men and fatherhood in South Africa, pp 38\u201352"},{"issue":"478","key":"9708_CR69","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1198\/016214506000001293","volume":"102","author":"TE Raghunathan","year":"2007","unstructured":"Raghunathan TE, Xie D, Schenker N, Parsons VL, Davis WW, Dodd KW, Feuer EJ (2007) Combining information from two surveys to estimate county-level prevalence rates of cancer risk factors and screening. J Am Stat Assoc 102 (478):474\u2013486","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"9708_CR70","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s13347-016-0239-x","volume":"31","author":"W Reijers","year":"2018","unstructured":"Reijers W, Coeckelbergh M (2018) The blockchain as a narrative technology: Investigating the social ontology and normative configurations of cryptocurrencies. Phil Technol 31(1):103\u2013130","journal-title":"Phil Technol"},{"issue":"7","key":"9708_CR71","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1287\/mnsc.1060.0554","volume":"52","author":"JA Roberts","year":"2006","unstructured":"Roberts JA, Hann IH, Slaughter SA (2006) Understanding the motivations, participation, and performance of open source software developers: a longitudinal study of the apache projects. Manag Sci 52(7):984\u2013999","journal-title":"Manag Sci"},{"issue":"4","key":"9708_CR72","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1300\/J079v21n04_02","volume":"21","author":"JA Rosenthal","year":"1996","unstructured":"Rosenthal JA (1996) Qualitative descriptors of strength of association and effect size. J Soc Serv Res 21(4):37\u201359","journal-title":"J Soc Serv Res"},{"key":"9708_CR73","unstructured":"Rosenthal R (1994) Parametric measures of effect size. In: Cooper H, Hedges LV (eds) The Handbook of Research Synthesis. Russell Sage Foundation, New York, pp 231\u2013244"},{"key":"9708_CR74","doi-asserted-by":"crossref","unstructured":"Ross J, Irani L, Silberman MS, Zaldivar A, Tomlinson B (2010) Who are the crowdworkers?: Shifting demographics in mechanical turk. In: CHI \u201910 Extended abstracts on human factors in computing systems, CHI EA \u201910, pp 2863\u20132872","DOI":"10.1145\/1753846.1753873"},{"key":"9708_CR75","unstructured":"Sadana R, Mathers CD, Lopez AD, Murray CJ, Iburg K (2002) Comparative analyses of more than 50 household surveys on health status. In: Lopez AD (ed) Summary Measures of Population Health: Concepts, Ethics, Measurement and Applications. World Health Organization, Geneva, pp 369\u2013386"},{"key":"9708_CR76","unstructured":"Schenker N, Gentleman JF, Rose D, Hing E, Shimizu IM (2016) Combining estimates from complementary surveys: a case study using prevalence estimates from national health surveys of households and nursing homes. Public Health Reports"},{"issue":"3\/4","key":"9708_CR77","doi-asserted-by":"publisher","first-page":"591","DOI":"10.2307\/2333709","volume":"52","author":"SS Shapiro","year":"1965","unstructured":"Shapiro SS, Wilk MB (1965) An analysis of variance test for normality (complete samples). Biometrika 52(3\/4):591\u2013611","journal-title":"Biometrika"},{"issue":"4","key":"9708_CR78","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/356789.356793","volume":"11","author":"GJ Simmons","year":"1979","unstructured":"Simmons GJ (1979) Symmetric and asymmetric encryption. ACM Comput Surv (CSUR) 11(4):305\u2013330","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9708_CR79","unstructured":"Snow J, Mann M (2013) Qualtrics survey software: handbook for research professionals. Qualtrics Labs, Inc"},{"key":"9708_CR80","unstructured":"Stallman R (2003) Free software foundation (fsf)"},{"issue":"2","key":"9708_CR81","doi-asserted-by":"publisher","first-page":"291","DOI":"10.2307\/25148732","volume":"30","author":"KJ Stewart","year":"2006","unstructured":"Stewart KJ, Gosain S (2006) The impact of ideology on effectiveness in open source software development teams. Mis Quarterly 30(2):291\u2013314","journal-title":"Mis Quarterly"},{"key":"9708_CR82","doi-asserted-by":"crossref","unstructured":"Stoykov L, Zhang K, Jacobsen HA (2017) Vibes: fast blockchain simulations for large-scale peer-to-peer networks. In: Proceedings of the 18th ACM\/IFIP\/USENIX Middleware Conference: Posters and Demos. ACM, pp 19\u201320","DOI":"10.1145\/3155016.3155020"},{"key":"9708_CR83","unstructured":"Suiche M (2017) Porosity: a decompiler for blockchain-based smart contracts bytecode. DEF CON 25"},{"key":"9708_CR84","unstructured":"Swan M (2015) Blockchain: Blueprint for a new economy. \u201dO\u2019Reilly Media Inc.\u201d"},{"key":"9708_CR85","unstructured":"Technologies P (2017) A postmortem on the parity multi-sig library self-destruct. https:\/\/paritytech.io\/a-postmortem-on-the-parity-multi-sig-library-self-destruct\/"},{"issue":"11","key":"9708_CR86","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2994581","volume":"59","author":"S Underwood","year":"2016","unstructured":"Underwood S (2016) Blockchain beyond bitcoin. Commun ACM 59(11):15\u201317","journal-title":"Commun ACM"},{"issue":"2","key":"9708_CR87","doi-asserted-by":"publisher","first-page":"649","DOI":"10.2307\/41703471","volume":"36","author":"G Von Krogh","year":"2012","unstructured":"Von Krogh G, Haefliger S, Spaeth S, Wallin MW (2012) Carrots and rainbows: Motivation and social practice in open source software development. MIS quarterly 36 (2):649\u2013676","journal-title":"MIS quarterly"},{"key":"9708_CR88","doi-asserted-by":"crossref","unstructured":"Wan Z, Lo D, Xia X, Cai L (2017) Bug characteristics in blockchain systems: a large-scale empirical study. In: 2017 IEEE\/ACM 14th international conference on Mining software repositories (MSR). IEEE, pp 413\u2013424","DOI":"10.1109\/MSR.2017.59"},{"issue":"3","key":"9708_CR89","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1111\/j.1467-9310.2006.00436.x","volume":"36","author":"J West","year":"2006","unstructured":"West J, Gallagher S (2006) Challenges of open innovation: the paradox of firm investment in open-source software. R & D Manag 36(3):319\u2013331","journal-title":"R & D Manag"},{"key":"9708_CR90","unstructured":"Wiki B (2018a) Hardfork. https:\/\/bitcoin.org\/en\/glossary\/hard-fork . Accessed: 2018-01-04"},{"key":"9708_CR91","unstructured":"Wiki B (2018b) Testnet. https:\/\/en.bitcoin.it\/wiki\/Testnet . Accessed: 2018-01-04"},{"key":"9708_CR92","unstructured":"Yamane T (1973) Statistics: An introductory analysis"},{"key":"9708_CR93","unstructured":"Ye Y, Kishida K (2003) Toward an understanding of the motivation open source software developers. In: Proceedings of the 25th international conference on software engineering. IEEE Computer Society, pp 419\u2013429"},{"key":"9708_CR94","unstructured":"Zheng Z, Xie S, Dai HN, Wang H (2016) Blockchain challenges and opportunities: A survey. Work Pap.\u20132016"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09708-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-019-09708-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09708-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T00:38:32Z","timestamp":1663375112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-019-09708-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,27]]},"references-count":94,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["9708"],"URL":"https:\/\/doi.org\/10.1007\/s10664-019-09708-7","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,27]]},"assertion":[{"value":"27 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}