{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T07:14:10Z","timestamp":1775632450763,"version":"3.50.1"},"reference-count":110,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T00:00:00Z","timestamp":1564099200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T00:00:00Z","timestamp":1564099200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"crossref","award":["03\/CE2\/I303_1"],"award-info":[{"award-number":["03\/CE2\/I303_1"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"crossref","award":["04\/CE2\/I303_1"],"award-info":[{"award-number":["04\/CE2\/I303_1"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["10\/CE\/I1855"],"award-info":[{"award-number":["10\/CE\/I1855"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s10664-019-09741-6","type":"journal-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T17:02:32Z","timestamp":1564160552000},"page":"940-995","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Characterizing the transfer of program comprehension in onboarding: an information-push perspective"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4467-7895","authenticated-orcid":false,"given":"Rebecca","family":"Yates","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Norah","family":"Power","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jim","family":"Buckley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,7,26]]},"reference":[{"issue":"2","key":"9741_CR1","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1037\/0021-9010.69.2.334","volume":"69","author":"JG Adair","year":"1984","unstructured":"Adair JG (1984) The Hawthorne effect: a reconsideration of the methodological artefact. J Appl Psychol 69(2):334\u2013345","journal-title":"J Appl Psychol"},{"issue":"4","key":"9741_CR2","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s10664-010-9152-6","volume":"16","author":"S Adolph","year":"2011","unstructured":"Adolph S, Hall W, Kruchten P (2011) Using grounded theory to study the experience of software development. Empir Softw Eng 16(4):487\u2013513","journal-title":"Empir Softw Eng"},{"key":"9741_CR3","unstructured":"Afonso LM., Cerqueira RF de G and de Souza CS (2012), Evaluating application programming interfaces as communication artefacts. in Proceedings of the Psychology of Programming Interest Group 2012, pp 151\u2013162"},{"key":"9741_CR4","unstructured":"Bass L (2007), Software architecture in practice. Pearson Education. ISBN: 0321815734"},{"key":"9741_CR5","doi-asserted-by":"crossref","unstructured":"Begel A and Simon B (2008a) Novice software developers, all over again. In Proceedings of the Fourth international Workshop on Computing Education Research (ICER '08). ACM, New York, 3\u201314","DOI":"10.1145\/1404520.1404522"},{"key":"9741_CR6","doi-asserted-by":"crossref","unstructured":"Begel A and Simon B (2008b), Struggles of new college graduates in their first software development job. In Proceedings of the 39th SIGCSE technical symposium on Computer science education (SIGCSE '08). ACM, New York, 226\u2013230","DOI":"10.1145\/1352135.1352218"},{"key":"9741_CR7","unstructured":"Berlin L (1993), Beyond program understanding: A look at programming expertise in industry. In: Empirical Studies of Programmers: Fifth Workshop, pp 6\u201325"},{"key":"9741_CR8","doi-asserted-by":"crossref","unstructured":"Berlin LM and Jeffries R (1992), Consultants and apprentices: observations about learning and collaborative problem solving. In: Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work, pp 130\u2013137","DOI":"10.1145\/143457.143471"},{"key":"9741_CR9","unstructured":"Boehm-Davis DA, Fox JE, Philips BH (1996) Techniques for exploring program comprehension. In: Empirical studies of programmers: Sixth Workshop, pp 3\u201337"},{"issue":"6","key":"9741_CR10","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks R (1983) Towards a theory of the comprehension of computer programs. International Journal of Man-Machine Studies 18(6):543\u2013554","journal-title":"International Journal of Man-Machine Studies"},{"key":"9741_CR11","doi-asserted-by":"crossref","unstructured":"Buckley J, Mooney S, Rosik J and Ali N (2013), \u2018JITTAC: a just-in-time tool for architectural consistency\u2019. In: Proceedings of the 35th International Conference on Software Engineering, pp 1291\u20131294","DOI":"10.1109\/ICSE.2013.6606700"},{"key":"9741_CR12","unstructured":"Buckley J, O'Brien MP, Power N (2006) Empirically refining a model of programmers\u2019 information-seeking behavior during software maintenance. In Proceedings of the 18th Workshop of the Psychology of Programming Interest Group, pp 168-182"},{"key":"9741_CR13","doi-asserted-by":"crossref","unstructured":"Buckley J, Rosik J, Herold S, Wasala A, Botterweck G and Exton C (2016), FLINTS: a tool for architectural-level modeling of features in software systems. In the proceedings of the 10th European Conference on Software Architecture Workshop. pp 14\u201322","DOI":"10.1145\/2993412.3003390"},{"key":"9741_CR14","first-page":"127","volume-title":"Developing grounded theory: The second generation","author":"K Charmaz","year":"2009","unstructured":"Charmaz K (2009) Shifting the grounds: Constructivist grounded theory methods. In: Morse JM, Stern PN, Corbin J, Bowers B, Charmaz K, Clarke AE (eds) Developing grounded theory: The second generation. Left Coast Press, Walnut Creek, pp 127\u2013154"},{"key":"9741_CR15","unstructured":"Chen K and Rajlich V (2011), Case study of feature location using dependency graph, after 10 years. In: Proceedings of the 18th International Conference on Program Comprehension, pp 1\u20133"},{"key":"9741_CR16","doi-asserted-by":"crossref","unstructured":"Chen C, Zhang K and Itoh T (2012), Empirical evidence of tags supporting high-level awareness. Cooperative Design, Visualization, and Engineering, pp. 94\u2013101","DOI":"10.1007\/978-3-642-32609-7_13"},{"key":"9741_CR17","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.infsof.2017.04.003","volume":"88","author":"M Chochlov","year":"2017","unstructured":"Chochlov M, English M, Buckley J (2017) A historical, textual analysis approach to feature location. Inf Softw Technol 88:110\u2013126","journal-title":"Inf Softw Technol"},{"key":"9741_CR18","unstructured":"Clements P, Garlan D, Bass L, Stafford J, Nord R, Ivers J, and Little R (2002), Documenting software architectures: views and beyond. Pearson Education. ISBN: 0201703726"},{"key":"9741_CR19","doi-asserted-by":"crossref","unstructured":"Corbin J and Strauss A (2008), Basics of qualitative research: Techniques and procedures for developing Grounded Theory. Sage Publications. ISBN: 141290644X","DOI":"10.4135\/9781452230153"},{"key":"9741_CR20","doi-asserted-by":"crossref","unstructured":"Dagenais B, Ossher H, Bellamy RKE, Robillard MP and de Vries JP (2010), Moving into a new software project landscape. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, pp 275\u2013284","DOI":"10.1145\/1806799.1806842"},{"key":"9741_CR21","unstructured":"de Gialdino IV (2009), Ontological and Epistemological Foundations of Qualitative Research. at the Forum: Qualitative Social Research. 10(2), Article 30. Available at http:\/\/www.qualitative-research.net\/index.php\/fqs\/article\/view\/1299\/3163 Accessed 30 Sept 2018"},{"key":"9741_CR22","doi-asserted-by":"crossref","unstructured":"Dekel U and Herbsleb J (2009a), Reading the documentation of invoked API functions in program comprehension, in IEEE 17th International Conference on Program Comprehension, pp 168\u2013177","DOI":"10.1109\/ICPC.2009.5090040"},{"key":"9741_CR23","doi-asserted-by":"crossref","unstructured":"Dekel U and Herbsleb JD (2009b), Improving API documentation usability with knowledge pushing, in Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society, pp 320\u2013330","DOI":"10.1109\/ICSE.2009.5070532"},{"key":"9741_CR24","volume-title":"Beyond Method","author":"N Denzin","year":"1983","unstructured":"Denzin N (1983) Interpretive interactionism. In: Morgan G (ed) Beyond Method. Sage, California"},{"key":"9741_CR25","doi-asserted-by":"crossref","unstructured":"Detienne F (2002), Software design - cognitive aspects. Springer-Verlag. ISBN: 1852332530","DOI":"10.1007\/978-1-4471-0111-6"},{"issue":"3","key":"9741_CR26","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0020-7373(05)80122-1","volume":"33","author":"F Detienne","year":"1990","unstructured":"Detienne F, Soloway E (1990) An empirically-derived control structure for the process of program understanding. International Journal of Man-Machine Studies 33(3):323\u2013342","journal-title":"International Journal of Man-Machine Studies"},{"issue":"1","key":"9741_CR27","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2011","unstructured":"Dit B, Revelle M, Gethers M, Poshyvanyk D (2011) `Feature location in source code: a taxonomy and survey. J Softw Maint Evol Res Pract 25(1):53\u201395","journal-title":"J Softw Maint Evol Res Pract"},{"key":"9741_CR28","volume-title":"Guide to Advanced Empirical Software Engineering","author":"S Easterbrook","year":"2008","unstructured":"Easterbrook S, Singer J, Storey MA, Damian D (2008) Selecting Empirical Methods for Software Engineering Research. In: Shull F, Singer J, Sj\u00f8berg DIK (eds) Guide to Advanced Empirical Software Engineering. Springer, London"},{"issue":"4","key":"9741_CR29","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1108\/EUM0000000007204","volume":"53","author":"D Ellis","year":"1997","unstructured":"Ellis D, Haugan M (1997) `Modelling the information seeking patterns of engineers and research scientists in an industrial environment. J Doc 53(4):384\u2013403","journal-title":"J Doc"},{"key":"9741_CR30","unstructured":"Ericsson KA, Simon HA (1980) Verbal reports as data. Psychol Rev 87(3):215"},{"key":"9741_CR31","doi-asserted-by":"crossref","unstructured":"Fagerholm F, Johnson P, Guinea AS, Borenstein J, and Munch J (2013), Onboarding in Open Source Projects: A Preliminary Analysis. IEEE 8th International Conference on Global Software Engineering Workshops. pp 5\u201310","DOI":"10.1109\/ICGSEW.2013.8"},{"key":"9741_CR32","doi-asserted-by":"crossref","unstructured":"Feigenspan J, K\u00e4stner C, Liebig J, Apel S, Hanenberg S (2012), Measuring programming experience. In 20th IEEE International Conference on Program Comprehension, pp. 73\u201382","DOI":"10.1109\/ICPC.2012.6240511"},{"key":"9741_CR33","doi-asserted-by":"crossref","unstructured":"Fritz T, Ou J, Murphy GC, and Murphy-Hill E (2010), A degree-of-knowledge model to capture source code familiarity. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, Vol. 1, pp 385\u2013394","DOI":"10.1145\/1806799.1806856"},{"key":"9741_CR34","unstructured":"Gamma E, Helm R, Johnson R and Vlissides J (1995), Design patterns: elements of reusable object-oriented software. Vol. 206, Addison-Wesley. ISBN: 0321700694"},{"key":"9741_CR35","volume-title":"The discovery of Grounded Theory: Strategies for qualitative research","author":"BG Glaser","year":"1967","unstructured":"Glaser BG, Strauss AL (1967) The discovery of Grounded Theory: Strategies for qualitative research. Aldine de Gruyter, Hawthorne ISBN: 0202302601"},{"issue":"14","key":"9741_CR36","first-page":"1913","volume":"17","author":"MK Goncalves","year":"2011","unstructured":"Goncalves MK, de Souza CRB, Gonzalez VM (2011) Collaboration, information seeking and communication: An observational study of software developers' work practices. J Univ Comput Sci 17(14):1913\u20131930","journal-title":"J Univ Comput Sci"},{"key":"9741_CR37","unstructured":"Gorton I (2006) Essential software architecture. Springer ISBN: 3\u2013540\u201328713-2"},{"issue":"5","key":"9741_CR38","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/S0306-4573(00)00011-X","volume":"36","author":"M Hertzum","year":"2000","unstructured":"Hertzum M, Pejtersen AM (2000) `The information-seeking practices of engineers: searching for documents as well as for people. Inf Process Manag 36(5):761\u2013778","journal-title":"Inf Process Manag"},{"issue":"6","key":"9741_CR39","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/s10664-011-9161-0","volume":"17","author":"R Hoda","year":"2012","unstructured":"Hoda R, Nobel J, Marshall S (2012) Developing a grounded theory to explain the practices of self-organizing agile teams. Empir Softw Eng 17(6):609\u2013639","journal-title":"Empir Softw Eng"},{"issue":"2","key":"9741_CR40","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/52.991327","volume":"19","author":"A Hunt","year":"2002","unstructured":"Hunt A, Thomas D (2002) Software archaeology. IEEE Softw 19(2):20\u201322","journal-title":"IEEE Softw"},{"key":"9741_CR41","doi-asserted-by":"crossref","unstructured":"Jordan H, Rosik J, Herold S, Botterweck G, Buckley J (2015) Manually Locating Features in Industrial Source Code: The Search Actions of Software Nomads, in Proccedings of the IEEE 23rd International Conference on Program Comprehension, pp 174\u2013177","DOI":"10.1109\/ICPC.2015.26"},{"issue":"3","key":"9741_CR42","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1108\/13665621011028620","volume":"22","author":"M Johnson","year":"2010","unstructured":"Johnson M, Senges M (2010) Learning to be a programmer in a complex organization: A case study on practice-based learning during the onboarding process at Google. J Work Learn 22(3):180\u2013194. https:\/\/doi.org\/10.1108\/13665621011028620 Accessed 17 Dec 2018","journal-title":"J Work Learn"},{"key":"9741_CR43","unstructured":"Kelly T and Buckley J (2006), A context-aware analysis scheme for bloom\u2019s taxonomy, In: Proceedings of the 14th International Workshop on Program Comprehension, pp 275\u2013284"},{"key":"9741_CR44","unstructured":"Kingrey KP (2002) Concepts of information seeking and their presence in the practical library literature. Libr Philos Pract (e-journal) Available at: http:\/\/digitalcommons.unl.edu\/cgi\/viewcontent.cgi?article=1035&context=libphilprac Accessed 18 Aug 2016"},{"key":"9741_CR45","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TSE.2006.116","volume":"32","author":"AJ Ko","year":"2006","unstructured":"Ko AJ, Myers BA, Coblenz MJ, Aung HH (2006) An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Trans Softw Eng 32:971\u2013987","journal-title":"IEEE Trans Softw Eng"},{"key":"9741_CR46","unstructured":"Ko AJ, DeLine R and Venolia G (2007), Information needs in collocated software development teams, In: Proceedings of the 29th International Conference on Software Engineering. IEEE Computer Society, pp 344\u2013353"},{"issue":"2","key":"9741_CR47","first-page":"232","volume":"28","author":"C Kuhlthau","year":"1988","unstructured":"Kuhlthau C (1988) Developing a Model of the Library Search Process: Investigation of Cognitive and Affective Aspects. Reference Quarterly 28(2):232\u2013242","journal-title":"Reference Quarterly"},{"issue":"3","key":"9741_CR48","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0164-1212(93)90101-3","volume":"23","author":"A Lakhotia","year":"1993","unstructured":"Lakhotia A (1993) Understanding someone else's code: analysis of experiences. J Syst Softw 23(3):269\u2013275","journal-title":"J Syst Softw"},{"key":"9741_CR49","doi-asserted-by":"crossref","unstructured":"LaToza TD, Venolia G and DeLine R (2006), Maintaining mental models: a study of developer work habits, In: Proceedings of the 28th International Conference on Software Engineering, pp 492\u2013501","DOI":"10.1145\/1134285.1134355"},{"key":"9741_CR50","unstructured":"Lawrance J, Burnett M, Bellamy R, Bogart C and Swart C (2010), Reactive information foraging for evolving goals, In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI '10, pp. 25\u201334"},{"key":"9741_CR51","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/TSE.2010.111","volume":"39","author":"J Lawrance","year":"2013","unstructured":"Lawrance J, Bogart C, Burnett M, Bellamy R, Rector K, Fleming S (2013) How programmers debug, revisited: An information foraging theory perspective. IEEE Trans Softw Eng 39:197\u2013215","journal-title":"IEEE Trans Softw Eng"},{"key":"9741_CR52","first-page":"61","volume-title":"Software Engineering Research, Management and Applications, Vol. 377 of Studies in Computational Intelligence","author":"S Lee","year":"2012","unstructured":"Lee S, Kang S (2012) A study on guiding programmers code navigation with a graphical code recommender. In: Lee R (ed) Software Engineering Research, Management and Applications, Vol. 377 of Studies in Computational Intelligence. Springer, Berlin, pp 61\u201375"},{"issue":"6","key":"9741_CR53","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MS.2003.1241364","volume":"20","author":"T Lethbridge","year":"2003","unstructured":"Lethbridge T, Singer J, Forward A (2003) How software engineers use documentation: The state of the practice. IEEE Softw 20(6):35\u201339","journal-title":"IEEE Softw"},{"issue":"3","key":"9741_CR54","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s10664-005-1290-x","volume":"10","author":"T Lethbridge","year":"2005","unstructured":"Lethbridge T, Sim S, Singer J (2005) Studying software engineers: Data collection techniques for software field studies. Empir Softw Eng 10(3):311\u2013341","journal-title":"Empir Softw Eng"},{"issue":"4","key":"9741_CR55","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/0164-1212(87)90032-X","volume":"7","author":"S Letovsky","year":"1987","unstructured":"Letovsky S (1987) Cognitive processes in program comprehension. J Syst Softw 7(4):325\u2013339","journal-title":"J Syst Softw"},{"key":"9741_CR56","unstructured":"Lincoln YS, Guba EG (1985) Establishing trustworthiness. Naturalistic Inquiry 289:331"},{"key":"9741_CR57","unstructured":"Littman D, Pinto J, Letovsky S and Soloway E (1986), Mental models and software maintenance, In: Empirical Studies of Programmers: First Workshop, p. 80\u201393"},{"key":"9741_CR58","doi-asserted-by":"crossref","unstructured":"MacLeod L, Storey M-A, Bergen A (2015), Code, camera, action: how software developers document and share program knowledge using YouTube, In: Proceedings of International Conference on Program Comprehension 2015, pp 104\u2013114","DOI":"10.1109\/ICPC.2015.19"},{"key":"9741_CR59","unstructured":"Marchionini G (1997), Information seeking in electronic environments, Vol. 9, Cambridge University Press. ISBN: 0521586747"},{"key":"9741_CR60","unstructured":"Matroska (2013), Matroska media container. URL: http:\/\/matroska.org\/. Accessed 19 June 2016"},{"key":"9741_CR61","doi-asserted-by":"crossref","unstructured":"McDonald DW and Ackerman MS (1998), Just talk to me: a field study of expertise location, In: Proceedings of the 1998 ACM conference on Computer Supported Cooperative Work, CSCW '98, pp 315\u2013324","DOI":"10.1145\/289444.289506"},{"key":"9741_CR62","doi-asserted-by":"crossref","unstructured":"McKeogh J and Exton C (2004), Eclipse plug-in to monitor programmer behaviour In: Proceedings of the 2004 OOPSLA Workshop on Eclipse Technology Exchange, pp 93\u201397","DOI":"10.1145\/1066129.1066148"},{"key":"9741_CR63","doi-asserted-by":"crossref","unstructured":"Mockus A, Herbsleb JD (2002) Expertise browser: a quantitative approach to identifying expertise, in Proceedings of the 24th International Conference on Software Engineering, pp 503\u2013512","DOI":"10.1145\/581339.581401"},{"key":"9741_CR64","unstructured":"Muhr T (2013), Atlas.ti v6. URL: http:\/\/www.atlasti.com. Accessed 08 July 2016"},{"key":"9741_CR65","unstructured":"Murray AR (2006), Discourse structure of software explanation: snapshot theory, cognitive patterns and grounded theory methods, PhD thesis, University of Ottawa"},{"key":"9741_CR66","unstructured":"Murray A and Lethbridge T (2005a), Presenting micro-theories of program comprehension in pattern form, In: Proceedings of the 13th International Workshop on Program Comprehension, pp 45\u201354"},{"key":"9741_CR67","unstructured":"Murray A and Lethbridge TC (2005b), On generating cognitive patterns of software comprehension, In: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, CASCON '05, pp 200\u2013211"},{"issue":"6","key":"9741_CR68","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/945131.945136","volume":"1","author":"GV Neville-Neil","year":"2003","unstructured":"Neville-Neil GV (2003) Code spelunking: Exploring cavernous code bases. ACM Queue 1(6):42\u201348","journal-title":"ACM Queue"},{"key":"9741_CR69","unstructured":"Northrup DA (1997) The problem of the self-report in survey research. Institute for Social Research, York University"},{"key":"9741_CR70","unstructured":"O\u2019Brien M (2007), Evolving a model of the information-seeking behaviour of industrial programmers, PhD thesis, University of Limerick"},{"issue":"6","key":"9741_CR71","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1002\/smr.307","volume":"16","author":"MP O\u2019Brien","year":"2004","unstructured":"O\u2019Brien MP, Buckley J, Shaft TM (2004) Expectation-based, inference-based, and bottom-up software comprehension. J Softw Maint Evol Res Pract 16(6):427\u2013447","journal-title":"J Softw Maint Evol Res Pract"},{"key":"9741_CR72","doi-asserted-by":"crossref","unstructured":"O\u2019Brien M, Buckley J and Exton C (2005) Empirically studying software practitioners \u2013 bridging the gap between theory and practice\u2019. In: Proceedings of the 21 International Conference on Software Maintenance, pp 433\u2013442","DOI":"10.1109\/ICSM.2005.44"},{"issue":"3","key":"9741_CR73","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0010-0285(87)90007-7","volume":"19","author":"N Pennington","year":"1987","unstructured":"Pennington N (1987) Stimulus structures and mental representations in expert comprehension of computer programs. Cogn Psychol 19(3):295\u2013341","journal-title":"Cogn Psychol"},{"issue":"1","key":"9741_CR74","doi-asserted-by":"crossref","first-page":"57","DOI":"10.2307\/2667031","volume":"44","author":"L Perlow","year":"1999","unstructured":"Perlow L (1999) The time famine: Toward a sociology of work time. Adm Sci Q 44(1):57\u201381","journal-title":"Adm Sci Q"},{"issue":"4","key":"9741_CR75","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1037\/0033-295X.106.4.643","volume":"104","author":"P Pirolli","year":"1999","unstructured":"Pirolli P, Card S (1999) Information foraging. Psychol Rev 104(4):643\u2013675","journal-title":"Psychol Rev"},{"key":"9741_CR76","unstructured":"Poff MA (2003), Pair programming to Facilitate the Training of Newly Hired Programmers. Technical report, Florida Institute of Technology. URI: http:\/\/hdl.handle.net\/11141\/116 Accessed 17 Dec 2018"},{"key":"9741_CR77","doi-asserted-by":"publisher","unstructured":"Ragavan SS, Kuttal SK, Hill C, Sarma A, Piorkowski D, and Burnett M (2016), Foraging Among an Overabundance of Similar Variants. In: Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, pp 3509\u20133521. https:\/\/doi.org\/10.1145\/2858036.2858469","DOI":"10.1145\/2858036.2858469"},{"key":"9741_CR78","doi-asserted-by":"publisher","unstructured":"Ragavan SS, Pandya B, Piorkowski D, Hill C, Kuttal SK, Sarma A, and Burnett M (2017), PFIS-V: Modeling Foraging Behavior in the Presence of Variants. In: Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, pp 6232\u20136244. https:\/\/doi.org\/10.1145\/3025453.3025818","DOI":"10.1145\/3025453.3025818"},{"key":"9741_CR79","unstructured":"Ratanotayanon S and Sim S (2006), When programmers don't ask, in Proceedings of the 21st International Conference on Automated Software Engineering, pp 9\u201316"},{"key":"9741_CR80","doi-asserted-by":"crossref","unstructured":"Razzaq A, Wasala A, Exton C, Buckley J (2019) The State of Empirical Evaluation in Static Feature Location. ACM Trans Softw Eng Methodol (TOSEM) 28(1)","DOI":"10.1145\/3280988"},{"key":"9741_CR81","unstructured":"Riley J (1996), Getting the most from your data, 2nd edn, Technical and Education Services Ltd. ISBN: 0947885307"},{"key":"9741_CR82","unstructured":"Rist RS (1986), Plans in programming: definition, demonstration, and development, In First workshop on Empirical Studies of Programmers, pp 28\u201347"},{"issue":"12","key":"9741_CR83","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TSE.2004.101","volume":"30","author":"MP Robillard","year":"2004","unstructured":"Robillard MP, Coelho W, Murphy GC (2004) How Effective Developers Investigate Source Code: An Exploratory Study. IEEE Trans. Softw. Eng. 30(12):889\u2013903","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9741_CR84","doi-asserted-by":"crossref","unstructured":"Rubin J and Chechik M (2013) A survey of feature location techniques, In: I. Reinhartz-Berger, Sturm A, Clark T, Cohen S, and Bettin J, (eds). Domain engineering, Springer, pp 29\u201358","DOI":"10.1007\/978-3-642-36654-3_2"},{"issue":"4","key":"9741_CR85","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"C Seaman","year":"1999","unstructured":"Seaman C (1999) Qualitative methods in empirical studies of software engineering. IEEE Trans Softw Eng 25(4):557\u2013572","journal-title":"IEEE Trans Softw Eng"},{"key":"9741_CR86","doi-asserted-by":"crossref","unstructured":"Seaman C (2002), The information gathering strategies of software maintainers. In: Proceedings of the International Conference on Software Maintenance, pp 141\u2013149","DOI":"10.1109\/ICSM.2002.1167761"},{"key":"9741_CR87","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1287\/isre.6.3.286","volume":"6","author":"TM Shaft","year":"1995","unstructured":"Shaft TM, Vessey I (1995) `The relevance of application domain knowledge: the case of computer program comprehension. Inf Syst Res 6:286\u2013299","journal-title":"Inf Syst Res"},{"key":"9741_CR88","unstructured":"Sharif KY (2012), Open source programmers' information seeking, PhD thesis, University of Limerick"},{"key":"9741_CR89","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.infsof.2014.09.003","volume":"57","author":"KY Sharif","year":"2015","unstructured":"Sharif KY, English M, Ali N, Exton C, Collins JJ, Buckley J (2015) An empirically-based characterization and quantification of information seeking through mailing lists during Open Source developers\u2019 software evolution. Inf Softw Technol 57:77\u201394","journal-title":"Inf Softw Technol"},{"key":"9741_CR90","unstructured":"Shaw M and Garlan D (1996), Software architecture: perspectives on an emerging discipline. Prentice Hall. ISBN: 0131829572"},{"key":"9741_CR91","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.1979.1658575","volume":"12","author":"S Sheppard","year":"1979","unstructured":"Sheppard S, Curtis B, Milliman P, Love T (1979) Modern coding practices and programmer performance. Computer 12:41\u201349","journal-title":"Computer"},{"issue":"3","key":"9741_CR92","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF00977789","volume":"8","author":"B Shneiderman","year":"1979","unstructured":"Shneiderman B, Mayer R (1979) Syntactic\/semantic interactions in programmer behavior: A model and experimental results. Int J Comput Inform Sci 8(3):219\u2013238","journal-title":"Int J Comput Inform Sci"},{"key":"9741_CR93","doi-asserted-by":"crossref","unstructured":"Sillito J, Murphy G and De Volder K (2006), Questions Programmers ask during Software Evolution Tasks. Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, pp 23\u201334","DOI":"10.1145\/1181775.1181779"},{"key":"9741_CR94","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TSE.2008.26","volume":"34","author":"J Sillito","year":"2008","unstructured":"Sillito J, Murphy G, De Volder K (2008) Asking and answering questions during a programming change task. IEEE Trans Softw Eng 34:434\u2013451","journal-title":"IEEE Trans Softw Eng"},{"key":"9741_CR95","doi-asserted-by":"crossref","unstructured":"Sim S, Holt R (1998) The Ramp-Up Problem in Software Projects: A Case Study of How Software Immigrants Naturalize. In: Proceedings of the 1998 International Conference on Software Engineering, pp 361\u2013370","DOI":"10.1109\/ICSE.1998.671389"},{"key":"9741_CR96","doi-asserted-by":"crossref","unstructured":"Singer J (1998), Practices of software maintenance. In: Proceedings of the International Conference on Software Maintenance, ICSM '98, pp. 139\u2013145","DOI":"10.1109\/ICSM.1998.738502"},{"key":"9741_CR97","unstructured":"Smith-Atakan S (2006), Human Computer Interaction. Thompson publishing. ISBN: 1\u201384480\u2013454-2"},{"issue":"5","key":"9741_CR98","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/TSE.1984.5010283","volume":"10","author":"E Soloway","year":"1984","unstructured":"Soloway E, Ehrlich K (1984) Empirical studies of programming knowledge. IEEE Trans Softw Eng 10(5):595\u2013609","journal-title":"IEEE Trans Softw Eng"},{"key":"9741_CR99","doi-asserted-by":"crossref","unstructured":"Starke J, Luce C and Sillito J (2009), Searching and skimming: An exploratory study. In: Proceedings of the IEEE International Conference on Software Maintenance ICSM 2009, pp. 157\u2013166","DOI":"10.1109\/ICSM.2009.5306335"},{"key":"9741_CR100","doi-asserted-by":"crossref","unstructured":"Stol, K-J, Ralph P, and Fitzgerald B (2016), Grounded Theory in Software Engineering Research. the 38th International Conference on Software Engineering, pp. 120\u201331","DOI":"10.1145\/2884781.2884833"},{"issue":"3","key":"9741_CR101","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s11219-006-9216-4","volume":"14","author":"MA Storey","year":"2006","unstructured":"Storey MA (2006) Theories, tools and research methods in program comprehension: past, present and future. Softw Qual J 14(3):187\u2013208","journal-title":"Softw Qual J"},{"key":"9741_CR102","doi-asserted-by":"crossref","unstructured":"van Deursen A (2001). Program Comprehension Risks and Opportunities in Extreme Programming. Proceedings Eighth Working Conference on Reverse Engineering. pp 176\u2013185","DOI":"10.1109\/WCRE.2001.957822"},{"key":"9741_CR103","unstructured":"Van Maanen J, Schein EH (1979) Toward a theory of organizational socialization. Res Organ Behav 1:209\u2013264"},{"key":"9741_CR104","unstructured":"VideoLAN (2013), VLC Media Player. URL: http:\/\/www.videolan.org\/vlc\/. Accessed 19th June 2016"},{"key":"9741_CR105","doi-asserted-by":"crossref","unstructured":"von Mayrhauser A and Vans AM (1993), From program comprehension to tool requirements for an industrial environment. In: Proceedings of the IEEE Workshop on Program Comprehension, pp 78\u201386","DOI":"10.1109\/WPC.1993.263903"},{"key":"9741_CR106","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0065-2458(08)60543-4","volume":"40","author":"A von Mayrhauser","year":"1995","unstructured":"von Mayrhauser A, Vans AM (1995a) Program understanding: Models and experiments. Adv Comput 40:1\u201338","journal-title":"Adv Comput"},{"issue":"5","key":"9741_CR107","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1049\/sej.1995.0023","volume":"10","author":"A von Mayrhauser","year":"1995","unstructured":"von Mayrhauser A, Vans AM (1995b) `Industrial experience with an integrated code comprehension model. Softw Eng J 10(5):171\u2013182","journal-title":"Softw Eng J"},{"key":"9741_CR108","doi-asserted-by":"crossref","unstructured":"von Mayrhauser A, Vans AM, Howe AE (1997), Program understanding behaviour during enhancement of large\u2010scale software. In: Journal of Software Maintenance: Research and Practice 9 (5), pp 299\u2013327","DOI":"10.1002\/(SICI)1096-908X(199709\/10)9:5<299::AID-SMR157>3.0.CO;2-S"},{"key":"9741_CR109","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/S0020-7373(86)80083-9","volume":"25","author":"S Wiedenbeck","year":"1986","unstructured":"Wiedenbeck S (1986) Beacons in computer program comprehension. International Journal of Man-Machine Studies 25:697\u2013709","journal-title":"International Journal of Man-Machine Studies"},{"issue":"1","key":"9741_CR110","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1108\/eb026702","volume":"37","author":"TD Wilson","year":"1981","unstructured":"Wilson TD (1981) On user studies and information needs. J Doc 37(1):3\u201315","journal-title":"J Doc"}],"updated-by":[{"DOI":"10.1007\/s10664-020-09923-7","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T00:00:00Z","timestamp":1614124800000}}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09741-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-019-09741-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09741-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T18:34:07Z","timestamp":1614191647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-019-09741-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,26]]},"references-count":110,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["9741"],"URL":"https:\/\/doi.org\/10.1007\/s10664-019-09741-6","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10664-020-09923-7","asserted-by":"object"}]},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,26]]},"assertion":[{"value":"26 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10664-020-09923-7","URL":"https:\/\/doi.org\/10.1007\/s10664-020-09923-7","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}