{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:26:47Z","timestamp":1776482807915,"version":"3.51.2"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T00:00:00Z","timestamp":1565222400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T00:00:00Z","timestamp":1565222400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1755995"],"award-info":[{"award-number":["CCF-1755995"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s10664-019-09751-4","type":"journal-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T08:16:21Z","timestamp":1565252181000},"page":"2140-2178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Measuring the impact of lexical and structural inconsistencies on developers\u2019 cognitive load during bug localization"],"prefix":"10.1007","volume":"25","author":[{"given":"Sarah","family":"Fakhoury","sequence":"first","affiliation":[]},{"given":"Devjeet","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Yuzhan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Venera","family":"Arnaoudova","sequence":"additional","affiliation":[]},{"given":"Olusola","family":"Adesope","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,8]]},"reference":[{"key":"9751_CR1","doi-asserted-by":"crossref","unstructured":"Abebe SL, Arnaoudova V, Tonella P, Antoniol G, Gu\u00e9h\u00e9neuc YG (2012) Can lexicon bad smells improve fault prediction?. In: Proceedings of the Working Conference on Reverse Engineering (WCRE), pp 235\u2013244","DOI":"10.1109\/WCRE.2012.33"},{"key":"9751_CR2","doi-asserted-by":"crossref","unstructured":"Afergan D, Peck EM, Solovey ET, Jenkins A, Hincks SW, Brown ET, Chang R, Jacob RJ (2014) Dynamic difficulty using brain metrics of workload. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, pp 3797\u20133806","DOI":"10.1145\/2556288.2557230"},{"key":"9751_CR3","doi-asserted-by":"crossref","unstructured":"Aghajani E, Nagy C, Bavota G, Lanza M (2018) A large-scale empirical study on linguistic antipatterns affecting apis. In: 2018 IEEE International conference on software maintenance and evolution (ICSME). IEEE, pp 25\u201335","DOI":"10.1109\/ICSME.2018.00012"},{"key":"9751_CR4","doi-asserted-by":"crossref","unstructured":"Arnaoudova V, Di Penta, M, Antoniol, G, Gu\u00e9h\u00e9neuc Y-G (2013) A new family of software anti-patterns: Linguistic anti-patterns. In: Proceedings of the European Conference on Software Maintenance and Reengineering (CSMR), pp 187\u2013196","DOI":"10.1109\/CSMR.2013.28"},{"issue":"1","key":"9751_CR5","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s10664-014-9350-8","volume":"21","author":"V Arnaoudova","year":"2016","unstructured":"Arnaoudova V, Di Penta, M, Antoniol G (2016) Linguistic antipatterns: What they are and how developers perceive them. Empir Softw Eng (EMSE) 21(1):104\u2013158","journal-title":"Empir Softw Eng (EMSE)"},{"issue":"11","key":"9751_CR6","doi-asserted-by":"publisher","first-page":"4053","DOI":"10.1364\/BOE.5.004053","volume":"5","author":"WB Baker","year":"2014","unstructured":"Baker WB, Parthasarathy AB, Busch DR, Mesquita RC, Greenberg JH, Yodh A (2014) Modified beer-lambert law for blood flow. Biomed Opt Express 5 (11):4053\u20134075","journal-title":"Biomed Opt Express"},{"issue":"2","key":"9751_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10664-012-9201-4","volume":"18","author":"D Binkley","year":"2013","unstructured":"Binkley D, Davis M, Lawrie D, Maletic JI, Morrell C, Sharif B (2013) The impact of identifier style on effort and comprehension. Empir Softw Eng (EMSE) 18(2):219\u2013276","journal-title":"Empir Softw Eng (EMSE)"},{"key":"9751_CR8","doi-asserted-by":"crossref","unstructured":"Binkley D, Davis M, Lawrie D, Morrell C (2009a) To CamelCase or Under_score. In: Proceedings of the International Conference on Program Comprehension (ICPC), pp 158\u2013167","DOI":"10.1109\/ICPC.2009.5090039"},{"issue":"7","key":"9751_CR9","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.scico.2009.02.006","volume":"74","author":"D Binkley","year":"2009","unstructured":"Binkley D, Lawrie D, Maex S, Morrell C (2009b) Identifier length and limited programmer memory. Sci Comput Program 74(7):430\u2013445","journal-title":"Sci Comput Program"},{"key":"9751_CR10","unstructured":"BIOPAC (2018a) Biopac homepage, \nhttps:\/\/www.biopac.com"},{"key":"9751_CR11","unstructured":"BIOPAC (2018b) fnirsoft user manual, \nhttps:\/\/www.biopac.com\/wp-content\/uploads\/fnirsoft-user-manual.pdf"},{"key":"9751_CR12","unstructured":"Blackwell AF (2006) Metaphors we program by: space, action and society in java. In: PPIG, pp 8"},{"issue":"4","key":"9751_CR13","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TSE.2009.70","volume":"36","author":"RP Buse","year":"2010","unstructured":"Buse RP, Weimer W (2010) Learning a metric for code readability. IEEE Trans Softw Eng (TSE) 36(4):546\u2013558","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9751_CR14","doi-asserted-by":"crossref","unstructured":"Butler S, Wermelinger M, Yu Y, Sharp H (2009) Relating identifier naming flaws and code quality: an empirical study. In: 2009 16Th working conference on reverse engineering. IEEE, pp 31\u201335","DOI":"10.1109\/WCRE.2009.50"},{"key":"9751_CR15","unstructured":"Castelhano J, Duarte IC, Ferreira C, Duraes J, Madeira H, Castelo-Branco M (2018) The role of the insula in intuitive expert bug detection in computer code: an fmri study. Brain Imaging and Behavior, pp 1\u201315"},{"issue":"1","key":"9751_CR16","doi-asserted-by":"publisher","first-page":"5222","DOI":"10.1038\/s41598-017-05378-x","volume":"7","author":"M Causse","year":"2017","unstructured":"Causse M, Chua Z, Peysakhovich V, Del Campo N, Matton N (2017) Mental workload and neural efficiency quantified in the prefrontal cortex using fnirs. Sci Rep 7(1):5222","journal-title":"Sci Rep"},{"issue":"3","key":"9751_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11219-006-9219-1","volume":"14","author":"F Deissenboeck","year":"2006","unstructured":"Deissenboeck F, Pizka M (2006) Concise and consistent naming. Softw Qual J 14(3):261\u2013282","journal-title":"Softw Qual J"},{"issue":"12","key":"9751_CR18","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1088\/0031-9155\/33\/12\/008","volume":"33","author":"DT Delpy","year":"1988","unstructured":"Delpy DT, Cope M, van der Zee P, Arridge S, Wray S, Wyatt J (1988) Estimation of optical pathlength through tissue from direct time of flight measurement. Phys Med Biol 33(12):1433","journal-title":"Phys Med Biol"},{"key":"9751_CR19","doi-asserted-by":"crossref","unstructured":"Duraes J, Madeira H, Castelhano J, Duarte C, Branco MC (2016) Wap: Understanding the brain at software debugging. In: 2016 IEEE 27Th international symposium on software reliability engineering (ISSRE). IEEE, pp 87\u201392","DOI":"10.1109\/ISSRE.2016.53"},{"key":"9751_CR20","unstructured":"Eclipse (2018) Eclipse ide, \nhttps:\/\/www.eclipse.org\/ide"},{"key":"9751_CR21","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1016\/j.neuroimage.2013.03.067","volume":"85","author":"A-C Ehlis","year":"2014","unstructured":"Ehlis A-C, Schneider S, Dresler T, Fallgatter AJ (2014) Application of functional near-infrared spectroscopy in psychiatry. Neuroimage 85:478\u2013488","journal-title":"Neuroimage"},{"key":"9751_CR22","unstructured":"EyeTribe (2018) The eye tribe homepage, \nhttps:\/\/theeyetribe.com"},{"key":"9751_CR23","unstructured":"Fakhoury S (2018a) Online replication package, \nhttps:\/\/github.com\/smfakhoury\/fNIRS-and-cognitive-load"},{"key":"9751_CR24","doi-asserted-by":"crossref","unstructured":"Fakhoury S, Ma Y, Arnaoudova V, Adesope O (2018b) The effect of poor source code lexicon and readability on developers\u2019 cognitive load","DOI":"10.1145\/3196321.3196347"},{"key":"9751_CR25","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3389\/fnhum.2014.00076","volume":"8","author":"FA Fishburn","year":"2014","unstructured":"Fishburn FA, Norr ME, Medvedev AV, Vaidya CJ (2014) Sensitivity of fnirs to cognitive state and load. Front Hum Neurosci 8:76","journal-title":"Front Hum Neurosci"},{"key":"9751_CR26","doi-asserted-by":"crossref","unstructured":"Floyd B, Santander T, Weimer W (2017) Decoding the representation of code in the brain: an fmri study of code review and expertise. In: Proceedings of the International Conference on Software Engineering (ICSE), pp 175\u2013186","DOI":"10.1109\/ICSE.2017.24"},{"key":"9751_CR27","doi-asserted-by":"crossref","unstructured":"Fritz T, Begel A, Muller SC, Yigit-Elliott S, Zuger M (2014) Using psycho-physiological measures to assess task difficulty in software development. In: Proceedings of the International Conference on Software Engineering (ICSE), pp 402\u2013413","DOI":"10.1145\/2568225.2568266"},{"key":"9751_CR28","doi-asserted-by":"crossref","unstructured":"Girouard A, Solovey ET, Hirshfield LM, Chauncey K, Sassaroli A, Fantini S, Jacob RJ (2009) Distinguishing difficulty levels with non-invasive brain activity measurements. In: IFIP Conference on human-computer interaction. Springer, pp 440\u2013452","DOI":"10.1007\/978-3-642-03655-2_50"},{"key":"9751_CR29","unstructured":"Grissom RJ, Kim JJ (2005) Effect sizes for research: A broad practical approach, 2nd edn. Lawrence Earlbaum Associates"},{"key":"9751_CR30","unstructured":"Halstead MH (1977) Elements of software science"},{"key":"9751_CR31","doi-asserted-by":"publisher","first-page":"935","DOI":"10.3389\/fnhum.2013.00935","volume":"7","author":"C Herff","year":"2014","unstructured":"Herff C, Heger D, Fortmann O, Hennrich J, Putze F, Schultz T (2014) Mental workload during n-back task-quantified in the prefrontal cortex using fnirs. Front Hum Neurosci 7:935","journal-title":"Front Hum Neurosci"},{"issue":"5","key":"9751_CR32","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1145\/1095430.1081762","volume":"30","author":"L Hochstein","year":"2005","unstructured":"Hochstein L, Basili VR, Zelkowitz MV, Hollingsworth JK, Carver J (2005) Combining self-reported and automatic data to improve programming effort measurement. SIGSOFT Softw Eng Notes 30(5):356\u2013365","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"9751_CR33","doi-asserted-by":"crossref","unstructured":"Ikutani Y, Uwano H (2014) Brain activity measurement during program comprehension with nirs. In: Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), pp 1\u20136","DOI":"10.1109\/SNPD.2014.6888727"},{"key":"9751_CR34","doi-asserted-by":"crossref","unstructured":"Jaafar F, Gu\u00e9h\u00e9neuc Y-G, Hamel S, Khomh F (2013) Mining the relationship between anti-patterns dependencies and fault-proneness. In: 2013 20Th working conference on reverse engineering (WCRE). IEEE, pp 351\u2013360","DOI":"10.1109\/WCRE.2013.6671310"},{"issue":"3","key":"9751_CR35","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh F, Penta MD, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change- and fault-proneness. Empirical Softw Eng 17(3):243\u2013275","journal-title":"Empirical Softw Eng"},{"issue":"4","key":"9751_CR36","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1002\/(SICI)1097-0193(1999)8:4<259::AID-HBM9>3.0.CO;2-K","volume":"8","author":"F Kruggel","year":"1999","unstructured":"Kruggel F, von Cramon DY (1999) Temporal properties of the hemodynamic response in functional mri. Hum Brain Mapp 8(4):259\u2013271","journal-title":"Hum Brain Mapp"},{"key":"9751_CR37","doi-asserted-by":"crossref","unstructured":"Lawrie D, Morrell C, Feild H, Binkley D (2006) What\u2019s in a name? A study of identifiers. In: Proceedings of International Conference on Program Comprehension (ICPC), pp 3\u201312","DOI":"10.1109\/ICPC.2006.51"},{"key":"9751_CR38","unstructured":"Lee S, Hooshyar D, Ji H, Nam K, Lim H (2017) Mining biometric data to predict programmer expertise and task difficulty. Clust Comput 21:1\u201311"},{"key":"9751_CR39","unstructured":"Liblit B, Begel A, Sweetser E (2006) Cognitive perspectives on the role of naming in computer programs.. In: PPIG. Citeseer, pp 11"},{"issue":"2","key":"9751_CR40","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/TSE.2007.70768","volume":"34","author":"A Marcus","year":"2008","unstructured":"Marcus A, Poshyvanyk D, Ferenc R (2008) Using the conceptual cohesion of classes for fault prediction in object-oriented systems. IEEE Trans Softw Eng (TSE) 34(2):287\u201330","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"4","key":"9751_CR41","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"SE-2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Transactions on software engineering (TSE) SE-2(4):308\u2013320","journal-title":"IEEE Transactions on software engineering (TSE)"},{"key":"9751_CR42","unstructured":"Muller SC, Fritz T (2016) Using (bio)metrics to predict code quality online. In: Proceedings of the International Conference on Software Engineering (ICSE), pp 452\u2013463"},{"key":"9751_CR43","doi-asserted-by":"crossref","unstructured":"Nakagawa T, Kamei Y, Uwano H, Monden A, Matsumoto K, German DM (2014) Quantifying programmers\u2019 mental workload during program comprehension based on cerebral blood flow measurement: a controlled experiment. In: Proceedings of the International Conference on Software Engineering (ICSE), pp 448\u2013451","DOI":"10.1145\/2591062.2591098"},{"key":"9751_CR44","unstructured":"Ooms K, Dupont L, Lapon L, Popelka S (2015) Accuracy and precision of fixation locations recorded with the low-cost eye tribe tracker in different experimental setups. J Eye Mov Res 8(1):1\u201324"},{"key":"9751_CR45","doi-asserted-by":"crossref","unstructured":"Peitek N, Siegmund J, Parnin C, Apel S, Hofmeister J (2018) A Brechmann Simultaneous measurement of program comprehension with fmri and eye tracking: a case study","DOI":"10.1145\/3239235.3240495"},{"key":"9751_CR46","doi-asserted-by":"crossref","unstructured":"Poshyvanyk D, Gu\u00e9h\u00e9neuc Y-G, Marcus A, Antoniol G, Rajlich V (2006) Combining probabilistic ranking and latent semantic indexing for feature identification. In: Proceedings of the International Conference on Program Comprehension (ICPC), pp 137\u2013148","DOI":"10.1109\/ICPC.2006.17"},{"key":"9751_CR47","doi-asserted-by":"crossref","unstructured":"Posnett D, Hindle A, Devanbu P (2011) A simpler model of software readability. In: Proceedings of the Working Conference on Mining Software Repositories (MSR), pp 73\u201382","DOI":"10.1145\/1985441.1985454"},{"issue":"3","key":"9751_CR48","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1037\/0033-2909.124.3.372","volume":"124","author":"K Rayner","year":"1998","unstructured":"Rayner K (1998) Eye movements in reading and information processing: 20 years of research. Psychol Bull 124(3):372\u2013422","journal-title":"Psychol Bull"},{"key":"9751_CR49","doi-asserted-by":"crossref","unstructured":"Salman I, Misirli AT, Juristo N (2015) Are students representatives of professionals in software engineering experiments?. In: Proceedings of the International Conference on Software Engineering (ICSE), pp 666\u2013676","DOI":"10.1109\/ICSE.2015.82"},{"key":"9751_CR50","unstructured":"Scanniello G, Risi M (2013) Dealing with faults in source code: Abbreviated vs. full-word identifier names. In: 2013 29th IEEE international conference on Software maintenance (ICSM). IEEE, pp 190\u2013199"},{"key":"9751_CR51","doi-asserted-by":"crossref","unstructured":"Scalabrino S, Linares-Vasquez M, Poshyvanyk D, Oliveto R (2016) Improving code readability models with textual features. In: Proceedings of the International Conference on Program Comprehension (ICPC), pp 1\u201310","DOI":"10.1109\/ICPC.2016.7503707"},{"key":"9751_CR52","doi-asserted-by":"crossref","unstructured":"Shaffer T, Wise JL, Walters BM, M\u00fcller SC, Falcone M, Sharif B (2015) Itrace Enabling eye tracking on software artifacts within the ide to support software engineering tasks. In: Proceedings of the Joint Meeting on Foundations of Software Engineering (ESEC\/FSE), pp 954\u2013957","DOI":"10.1145\/2786805.2803188"},{"key":"9751_CR53","doi-asserted-by":"crossref","unstructured":"Sharafi Z, Soh Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) Women and men \u2014 different but equal: on the impact of identifier style on source code reading. In: IEEE International conference on program comprehension, pp 27\u201336","DOI":"10.1109\/ICPC.2012.6240505"},{"key":"9751_CR54","doi-asserted-by":"crossref","unstructured":"Sharafi Z, Shaffer T, Sharif B, Gu\u00e9h\u00e9neuc Y-G (2015a) Eye-tracking metrics in software engineering. In: 2015 Asia-pacific software engineering conference (APSEC). IEEE, pp 96\u2013103","DOI":"10.1109\/APSEC.2015.53"},{"key":"9751_CR55","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.infsof.2015.06.008","volume":"67","author":"Z Sharafi","year":"2015","unstructured":"Sharafi Z, Soh Z, Gu\u00e9h\u00e9neuc Y-G (2015b) A systematic literature review on the usage of eye-tracking in software engineering. Inf Softw Technol 67:79\u2013107","journal-title":"Inf Softw Technol"},{"key":"9751_CR56","doi-asserted-by":"crossref","unstructured":"Sharif B, Falcone M, Maletic JI (2012) An eye-tracking study on the role of scan time in finding source code defects. In: Proceedings of the Symposium on Eye Tracking Research and Applications (ETRA), pp 381\u2013384","DOI":"10.1145\/2168556.2168642"},{"key":"9751_CR57","doi-asserted-by":"crossref","unstructured":"Siegmund J, Kastner C, Apel S, Parnin C, Bethmann A, Leich T, Saake G, Brechmann A (2014) Understanding understanding source code with functional magnetic resonance imaging. In: Proceedings of the International Conference on Software Engineering (ICSE), pp 378\u2013389","DOI":"10.1145\/2568225.2568252"},{"key":"9751_CR58","doi-asserted-by":"crossref","unstructured":"Siegmund J, Peitek N, Parnin C, Apel S, Hofmeister J, Kastner C, Begel A, Bethmann A, Brechmann A (2017) Measuring neural efficiency of program comprehension. In: Proceedings of the Joint Meeting on Foundations of Software Engineering (ESEC\/FSE), pp 140\u2013150","DOI":"10.1145\/3106237.3106268"},{"key":"9751_CR59","first-page":"1409","volume":"28","author":"RR Sokal","year":"1958","unstructured":"Sokal RR (1958) A statistical method for evaluating systematic relationship. Univ Kansas Sci Bullet 28:1409\u20131438","journal-title":"Univ Kansas Sci Bullet"},{"issue":"3","key":"9751_CR60","first-page":"143","volume":"4","author":"AA Takang","year":"1996","unstructured":"Takang AA, Grubb PA, Macredie RD (1996) The effects of comments and identifier names on program comprehensibility: an experimental investigation. J Prog Lang 4(3):143\u2013167","journal-title":"J Prog Lang"},{"issue":"6","key":"9751_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2687926","volume":"21","author":"E Treacy Solovey","year":"2015","unstructured":"Treacy Solovey E, Afergan D, Peck EM, Hincks SW, Jacob RJK (2015) Designing Implicit Interfaces for Physiological Computing. ACM Trans Comput-Hum Interact 21(6):1\u201327","journal-title":"ACM Trans Comput-Hum Interact"},{"key":"9751_CR62","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in software engineering - an introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin C, Runeson P, Martin H, Ohlsson MC, Regnell B, Wessl\u00e9n A (2000) Experimentation in software engineering - an introduction. Kluwer Academic Publishers, Norwell"},{"key":"9751_CR63","volume-title":"Case Study Research: Design and Methods","author":"RK Yin","year":"1994","unstructured":"Yin RK (1994) Case Study Research: Design and Methods, 2nd edn. Sage Publications, New York","edition":"2nd edn."}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09751-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-019-09751-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09751-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T23:47:07Z","timestamp":1596757627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-019-09751-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,8]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["9751"],"URL":"https:\/\/doi.org\/10.1007\/s10664-019-09751-4","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,8]]},"assertion":[{"value":"8 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}