{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:48:41Z","timestamp":1772909321340,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10664-021-09973-5","type":"journal-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T12:03:44Z","timestamp":1620734624000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Understanding and improving artifact sharing in software engineering research"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9785-324X","authenticated-orcid":false,"given":"Christopher S.","family":"Timperley","sequence":"first","affiliation":[]},{"given":"Lauren","family":"Herckis","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Le Goues","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hilton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,11]]},"reference":[{"key":"9973_CR1","unstructured":"Apache (2004) Apache License, Version 2.0. (January 2004). https:\/\/www.apache.org\/licenses\/LICENSE-2.0 [Date Accessed: July 21st 2020]."},{"key":"9973_CR2","unstructured":"Association for Computing Machinery (2018) Artifact Review and Badging. (April 2018). https:\/\/www.acm.org\/publications\/policies\/artifact-review-badging [Date Accessed: March 30th 2020]"},{"key":"9973_CR3","unstructured":"Association for Computing Machinery (2020) Software and Data Artifacts in the ACM Digital Library. (2020). https:\/\/www.acm.org\/publications\/artifacts [Date Accessed: July 29th 2020]"},{"issue":"2011","key":"9973_CR4","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/j.procs.2011.04.081","volume":"4","author":"J Austin","year":"2011","unstructured":"Austin J, Jackson T, Fletcher M, Jessop M, Liang B, Weeks M, Smith L, Ingram C, Watson P (2011) CARMEN: Code analysis, repository and modeling for e-neuroscience. Procedia Comput Sci 4(2011):768\u2013777","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"9973_CR5","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/32.799939","volume":"25","author":"VR Basili","year":"1999","unstructured":"Basili VR, Shull F, Lanubile F (1999) Building knowledge through families of experiments. Trans Softw Eng 25(4):456\u2013473","journal-title":"Trans Softw Eng"},{"issue":"1","key":"9973_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10664-006-9030-4","volume":"12","author":"VR Basili","year":"2007","unstructured":"Basili VR, Zelkowitz MV, Sj\u00f8berg DIK, Johnson P, Cowling AJ (2007) Protocols in the use of empirical software engineering artifacts. Empir Softw Eng 12(1):107\u2013119","journal-title":"Empir Softw Eng"},{"issue":"1","key":"9973_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1186\/s40359-015-0089-9","volume":"3","author":"MS Bauer","year":"2015","unstructured":"Bauer MS, Damschroder L, Hagedorn H, Smith J, Kilbourne AM (2015) An introduction to implementation science for the non-specialist. BMC Psychol 3(1):32","journal-title":"BMC Psychol"},{"key":"9973_CR8","unstructured":"Beller M (2020) Why I will never join an Artifacts Evaluation Committee Again. (June 2020). https:\/\/inventitech.com\/blog\/why-i-will-never-review-artifacts-again [Date Accessed: July 16th 2020]"},{"key":"9973_CR9","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.procs.2011.04.069","volume":"4","author":"GR Brammer","year":"2011","unstructured":"Brammer GR, Crosby RW, Matthews SJ, Williams TL (2011) Paper m\u00e2ch\u00e9: Creating dynamic reproducible science. Procedia Comput Sci 4:658\u2013667","journal-title":"Procedia Comput Sci"},{"key":"9973_CR10","first-page":"365","volume-title":"Replication\u2019s role in software engineering","author":"A Brooks","year":"2008","unstructured":"Brooks A, Roper M, Wood M, Daly J, Miller J (2008) Replication\u2019s role in software engineering. Springer, London, pp 365\u2013379"},{"key":"9973_CR11","unstructured":"Carver JC (2010) Towards reporting guidelines for experimental replications: A proposal. In: International workshop on replication in empirical software engineering research (RESER \u201910)"},{"issue":"2","key":"9973_CR12","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10664-013-9290-8","volume":"19","author":"JC Carver","year":"2014","unstructured":"Carver JC, Juristo N, Baldassarre MT, Vegas S (2014) Replications of software engineering experiments. Empir Softw Eng 19(2):267\u2013276","journal-title":"Empir Softw Eng"},{"key":"9973_CR13","unstructured":"Charmaz K (2014) Constructing grounded theory. Sage"},{"key":"9973_CR14","doi-asserted-by":"crossref","unstructured":"Childers BR, Chrysanthis PK (2017) Artifact evaluation: is it a real incentive?. In: International conference on e-science (e-Science \u201917), pp 488\u2013489","DOI":"10.1109\/eScience.2017.79"},{"key":"9973_CR15","doi-asserted-by":"crossref","unstructured":"Childers BR, Chrysanthis PK (2018) Artifact evaluation: FAD or real news?. In: International conference on data engineering (ICDE \u201918), pp 1664\u20131665","DOI":"10.1109\/ICDE.2018.00204"},{"issue":"3","key":"9973_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/2812803","volume":"59","author":"C Collberg","year":"2016","unstructured":"Collberg C, Proebsting TA (2016) Repeatability in computer systems research. Commun ACM 59(3):62\u201369","journal-title":"Commun ACM"},{"key":"9973_CR17","unstructured":"Collberg C, Proebsting TA, Warren AM (2015) Repeatability and Benefaction in Computer Systems Research: A Study and Modest Proposal. Technical Report TR 14-04. University of Arizona. http:\/\/reproducibility.cs.arizona.edu\/v2\/RepeatabilityTR.pdf"},{"key":"9973_CR18","unstructured":"Di Cosmo R, Zacchiroli S (2017) Software heritage: Why and how to preserve software source code. In: International conference on digital preservation (iPRES \u201917)"},{"key":"9973_CR19","unstructured":"Creative Commons (2013) Attribution 4.0 International (CC BY 4.0). (November 2013). https:\/\/creativecommons.org\/licenses\/by\/4.0 [Date Accessed: July 21st 2020]"},{"key":"9973_CR20","unstructured":"Creswell JW, Clark VLP (2017) Designing and conducting mixed methods research. Sage Publications"},{"key":"9973_CR21","unstructured":"Docker Inc (2020) Docker. (2020). https:\/\/www.docker.com [Date Accessed: December 11th 2020]"},{"issue":"12","key":"9973_CR22","doi-asserted-by":"publisher","first-page":"e28071","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"K El Emam","year":"2011","unstructured":"El Emam K, Jonker E, Arbuckle L, Malin B (2011) A systematic review of re-identification attacks on health data. PLOS One 6(12):e28071","journal-title":"PLOS One"},{"key":"9973_CR23","unstructured":"Engineering and Physical Sciences Research Council (2011) EPSRC policy framework on research data. (March 2011). https:\/\/epsrc.ukri.org\/about\/standards\/researchdata [Date Accessed: July 31st 2020]"},{"key":"9973_CR24","unstructured":"European Commission (2016) H2020 Programme: Guidelines on FAIR Data Management in Horizon 2020 (Version 3.0). (July 2016). https:\/\/ec.europa.eu\/research\/participants\/data\/ref\/h2020\/grantsmanual\/hi\/oapilot\/h2020-hi-oa-data-mgten.pdf [Date Accessed: July 31st 2020]"},{"key":"9973_CR25","unstructured":"European Commission (2020) Horizon 2020: Open Access. (2020). https:\/\/ec.europa.eu\/research\/participants\/docs\/h2020-funding-guide\/cross-cutting-issues\/open-access-data-management\/open-accessen.htm [Date Accessed: July 31st 2020]"},{"key":"9973_CR26","doi-asserted-by":"publisher","unstructured":"European Organization For Nuclear Research and OpenAIRE (2013) Zenodo. (2013). https:\/\/doi.org\/10.25495\/7GXK-RD71","DOI":"10.25495\/7GXK-RD71"},{"key":"9973_CR27","doi-asserted-by":"crossref","unstructured":"Flittner M, Bauer R, Rizk A, Gei\u00dfler S, Zinner T, Zitterbart M (2017) Taming the complexity of artifact reproducibility. In: Reproducibility workshop (Reproducibility \u201917), pp 14\u201316","DOI":"10.1145\/3097766.3097770"},{"issue":"2","key":"9973_CR28","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0148-2963(00)00152-1","volume":"55","author":"RT Frambach","year":"2002","unstructured":"Frambach RT, Schillewaert N (2002) Organizational innovation adoption: A multi-level framework of determinants and opportunities for future research. J Bus Res 55(2):163\u2013176","journal-title":"J Bus Res"},{"key":"9973_CR29","unstructured":"Free Software Foundation (2021) GNU Make. (2021). https:\/\/www.gnu.org\/software\/make [Date Accessed: March 13th 2021]"},{"key":"9973_CR30","doi-asserted-by":"crossref","unstructured":"Fursin G, Lokhmotov A, Plowman E (2016) Collective knowledge: Towards R&D sustainability. In: Design, automation & test in Europe conference & exhibition (DATE \u201916), pp 864\u2013869","DOI":"10.3850\/9783981537079_1018"},{"issue":"9","key":"9973_CR31","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.2105\/AJPH.89.9.1322","volume":"89","author":"RE Glasgow","year":"1999","unstructured":"Glasgow RE, Vogt TM, Boles SM (1999) Evaluating the public health impact of health promotion interventions: the RE-AIM framework. Am J Public Health 89(9):1322\u20131327","journal-title":"Am J Public Health"},{"key":"9973_CR32","doi-asserted-by":"crossref","unstructured":"G\u00f3mez C, Cleary B, Singer L (2013) A study of innovation diffusion through link sharing on stack overflow. In: Working conference on mining software repositories (MSR \u201913), pp 81\u201384","DOI":"10.1109\/MSR.2013.6624011"},{"key":"9973_CR33","unstructured":"Gradle (2021) Gradle Build Tool. (2021). https:\/\/gradle.org [Date Accessed: March 13th 2021]"},{"issue":"6","key":"9973_CR34","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/52.895175","volume":"17","author":"GC Green","year":"2000","unstructured":"Green GC, Hevner AR (2000) The successful diffusion of innovations: guidance for software development organizations. IEEE Softw 17(6):96\u2013103","journal-title":"IEEE Softw"},{"key":"9973_CR35","unstructured":"Hager C (2016) PDFx. (March 2016). https:\/\/github.com\/metachris\/pdfx\/releases\/tag\/v1.3.0 [Date Accessed: March 28th 2021]"},{"issue":"1","key":"9973_CR36","first-page":"4","volume":"5","author":"L Herckis","year":"2018","unstructured":"Herckis L (2018) Passing the baton: Digital literacy and sustained implementation of elearning technologies. Current Issues in Emerging eLearning 5(1):4","journal-title":"Current Issues in Emerging eLearning"},{"key":"9973_CR37","doi-asserted-by":"crossref","unstructured":"Hermann B, Winter S, Siegmund J (2020) Community expectations for research artifacts and evaluation processes. In: Joint meeting on european software engineering conference and symposium on the foundations of software engineering (ESEC\/FSE \u201920), pp 469\u2013480","DOI":"10.1145\/3368089.3409767"},{"issue":"6","key":"9973_CR38","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s10664-020-09851-6","volume":"25","author":"R Heum\u00fcller","year":"2020","unstructured":"Heum\u00fcller R, Nielebock S, Kr\u00fcger J, Ortmeier F (2020) Publish or perish, but do not forget your software artifacts. Empir Softw Eng 25 (6):4585\u20134616","journal-title":"Empir Softw Eng"},{"key":"9973_CR39","doi-asserted-by":"crossref","unstructured":"Ji S, Li W, Srivatsa M, Beyah R (2014) Structural data de-anonymization: quantification, practice, and implications. In: Conference on computer and communications security (SIGSAC \u201914), pp 1040\u20131053","DOI":"10.1145\/2660267.2660278"},{"key":"9973_CR40","doi-asserted-by":"crossref","unstructured":"Jimenez I, Sevilla M, Watkins N, Maltzahn C, Lofstead J, Mohror K, Arpaci-Dusseau A, Arpaci-Dusseau R (2017) The Popper convention: Making reproducible systems evaluation practical. In: International parallel and distributed processing symposium workshops (IPDPSW \u201917), pp 1561\u20131570","DOI":"10.1109\/IPDPSW.2017.157"},{"issue":"3","key":"9973_CR41","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1111\/j.1744-6570.1993.tb00885.x","volume":"46","author":"G Johns","year":"1993","unstructured":"Johns G (1993) Constraints On the adoption of psychology-based personnel practices: Lessons from organizational innovation. Personnel Psychol 46(3):569\u2013592","journal-title":"Personnel Psychol"},{"key":"9973_CR42","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10664-008-9061-0","volume":"13","author":"B Kitchenham","year":"2008","unstructured":"Kitchenham B (2008) The role of replications in empirical software engineering\u2014a word of warning. Empir Softw Eng 13:219\u2013221","journal-title":"Empir Softw Eng"},{"issue":"4","key":"9973_CR43","doi-asserted-by":"publisher","first-page":"243","DOI":"10.5694\/j.1326-5377.2008.tb01595.x","volume":"188","author":"SC Kitto","year":"2008","unstructured":"Kitto SC, Chesters J, Grbich C (2008) Quality in qualitative research. Med J Aust 188(4):243\u2013246","journal-title":"Med J Aust"},{"key":"9973_CR44","unstructured":"Kitware (2021) CMake. (2021). https:\/\/cmake.org [Date Accessed: March 13th 2021]"},{"key":"9973_CR45","unstructured":"Kluyver T, Ragan-Kelley B, P\u00e9rez F, Granger B, Bussonnier M, Frederic J, Kelley K, Hamrick J, Grout J, Corlay S, Ivanov P, Avila D, Abdalla S, Willing C, Jupyter Development Team Jupyter Notebooks - a publishing format for reproducible computational workflows. In: Positioning and power in academic publishing: Players, agents and agendas. IOS Press, pp 87\u201390"},{"issue":"5","key":"9973_CR46","doi-asserted-by":"publisher","first-page":"3288","DOI":"10.1007\/s10664-020-09834-7","volume":"25","author":"Z Kotti","year":"2020","unstructured":"Kotti Z, Kravvaritis K, Dritsa K, Spinellis D (2020) Standing on shoulders or feet? an extended study on the usage of the MSR data papers. Empir Softw Eng 25(5):3288\u20133322","journal-title":"Empir Softw Eng"},{"key":"9973_CR47","doi-asserted-by":"crossref","unstructured":"Krishnamurthi S (2013a) Artifact Evaluation for Software Conferences. SIGSOFT Software Engineering Notes 38, 3 (May 2013), 7\u201310","DOI":"10.1145\/2464526.2464530"},{"key":"9973_CR48","unstructured":"Krishnamurthi S (2013b) Examining \u201cReproducibility in Computer Science\u201d. (2013). http:\/\/cs.brown.edu\/~sk\/Memos\/Examining-Reproducibility\/ [Date Accessed: January 6th 2020]"},{"key":"9973_CR49","unstructured":"Krishnamurthi S (2014) Guidelines for Packaging AEC Submissions. (2014). https:\/\/www.artifact-eval.org\/guidelines.html [Date Accessed: July 17th 2020]"},{"issue":"3","key":"9973_CR50","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2658987","volume":"58","author":"S Krishnamurthi","year":"2015","unstructured":"Krishnamurthi S, Vitek J (2015) The real software crisis: Repeatability as a core value. Commun ACM 58(3):34\u201336","journal-title":"Commun ACM"},{"key":"9973_CR51","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.procs.2012.04.047","volume":"9","author":"S Li-Thiao-T\u00e9","year":"2012","unstructured":"Li-Thiao-T\u00e9 S (2012) Literate program execution for reproducible research and executable papers. Procedia Comput Sci 9:439\u2013448","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"9973_CR52","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11334-005-0007-z","volume":"1","author":"M Lindvall","year":"2005","unstructured":"Lindvall M, Rus I, Shull F, Zelkowitz M, Donzelli P, Memon A, Basili V, Costa P, Tvedt R, Hochstein L, Asgari S, Ackermann C, Pech D (2005) An evolutionary testbed for software technology evaluation. Innov Sys Softw Eng 1(1):3\u201311","journal-title":"Innov Sys Softw Eng"},{"key":"9973_CR53","doi-asserted-by":"crossref","unstructured":"Meng H, Thain D, Vyushkov A, Wolf M, Woodard A (2016) Conducting reproducible research with umbrella: Tracking, creating, and preserving execution environments. In: International conference on e-science, pp 91\u2013100","DOI":"10.1109\/eScience.2016.7870889"},{"key":"9973_CR54","doi-asserted-by":"crossref","unstructured":"Miranda M, Ferreira R, de Souza CRB, Filho FMF, Singer L (2014) An exploratory study of the adoption of mobile development platforms by software engineers. In: International conference on mobile software engineering and systems (MOBILESoft \u201914), pp 50\u201353","DOI":"10.1145\/2593902.2593915"},{"key":"9973_CR55","doi-asserted-by":"crossref","unstructured":"Morse JM (1991) Qualitative nursing research: A free-for-all. Qualitative nursing research: A contemporary dialogue, pp 14\u201322","DOI":"10.4135\/9781483349015.n2"},{"key":"9973_CR56","doi-asserted-by":"crossref","unstructured":"Murphy-Hill ER, Smith EK, Sadowski C, Jaspan C, Winter C, Jorde M, Knight A, Trenk A, Gross S (2019) Do developers discover new tools on the toilet?. In: International conference on software engineering (ICSE \u201919), pp 465\u2013475","DOI":"10.1109\/ICSE.2019.00059"},{"key":"9973_CR57","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Symposium on security and privacy (SP \u201908), pp 111\u2013125","DOI":"10.1109\/SP.2008.33"},{"key":"9973_CR58","unstructured":"NIH (2003) NIH Data Sharing Policy and Implementation Guidance. (2003). https:\/\/grants.nih.gov\/grants\/policy\/datasharing\/datasharingguidance.htm [Date Accessed: July 21st 2020]"},{"key":"9973_CR59","unstructured":"NSF (2011) Dissemination and Sharing of Research Results. (2011). https:\/\/www.nsf.gov\/bfa\/dias\/policy\/dmp.jsp [Date Accessed: July 21st 2020]"},{"issue":"1","key":"9973_CR60","doi-asserted-by":"publisher","first-page":"98","DOI":"10.5465\/amr.1998.192963","volume":"23","author":"HM O\u2019Neill","year":"1998","unstructured":"O\u2019Neill HM, Pouder RW, Buchholtz AK (1998) Patterns in the diffusion of strategies across organizations: Insights from the innovation diffusion literature. Acad Manag Rev 23(1):98\u2013114","journal-title":"Acad Manag Rev"},{"key":"9973_CR61","unstructured":"Oracle (2021) VirtualBox. (2021). https:\/\/www.virtualbox.org [Date Accessed: March 13th 2021]"},{"key":"9973_CR62","unstructured":"Patterson D, Snyder L, Ullman J (1999) Evaluating computer scientists and engineers for promotion and tenure. Comput Res News"},{"issue":"2","key":"9973_CR63","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/07421222.1994.11518044","volume":"11","author":"G Premkumar","year":"1994","unstructured":"Premkumar G, Ramamurthy K, Nilakanta S (1994) Implementation of electronic data interchange: An innovation diffusion perspective. J Manag Inf Syst 11(2):157\u2013186","journal-title":"J Manag Inf Syst"},{"key":"9973_CR64","unstructured":"PyPA (2021) pip \u2013The Python Package Installer. (2021). https:\/\/pip.pypa.io\/en\/stable [Date Accessed: March 13th 2021]"},{"key":"9973_CR65","unstructured":"QEMU (2021) QEMU. (2021). https:\/\/www.qemu.org [Date Accessed: March 13th 2021]"},{"key":"9973_CR66","unstructured":"RedHat (2021) Podman. (2021). https:\/\/github.com\/containers\/podman [Date Accessed: March 13th 2021]"},{"key":"9973_CR67","unstructured":"Rogers EM (2010) Diffusion of innovations. Simon and Schuster"},{"issue":"12","key":"9973_CR68","first-page":"1","volume":"3","author":"NP Rougier","year":"2017","unstructured":"Rougier NP, Hinsen K, Alexandre F, Arildsen T, Barba LA, Benureau FCY, Titus Brown C, de Buyl P, Caglayan O, Davison AP, Delsuc M, Detorakis G, Diem AK, Drix D, Enel P, Girard B, Guest O, Hall MG, Henriques RN, Hinaut X, Jaron KS, Khamassi M, Klein A, Manninen T, Marchesi P, McGlinn D, Metzner C, Petchey OL, Plesser HE, Poisot T, Ram K, Ram Y, Roesch EB, Rossant C, Rostami V, Shifman A, Stachelek J, Stimberg M, Stollmeier F, Vaggi F, Viejo G, Vitay J, Vostinar AE, Yurchak R, Zito T (2017) Sustainable computational science: the ReScience initiative. PeerJ Comput Sci 3(12):1\u20138","journal-title":"PeerJ Comput Sci"},{"key":"9973_CR69","unstructured":"Salda\u00f1a J (2015) The coding manual for qualitative researchers. Sage"},{"key":"9973_CR70","doi-asserted-by":"crossref","unstructured":"Shull F, Basili V, Carver J, Maldonado JC, Travassos GH, Mendonca M, Fabbri S (2002) Replicating software engineering experiments: addressing the tacit knowledge problem. In: International symposium on empirical software engineering (ESEM \u20192), pp 7\u201316","DOI":"10.1109\/ISESE.2002.1166920"},{"issue":"2","key":"9973_CR71","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s10664-008-9060-1","volume":"13","author":"FJ Shull","year":"2008","unstructured":"Shull FJ, Carver JC, Vegas S, Juristo N (2008) The role of replications in empirical software engineering. Empir Softw Eng 13(2):211\u2013218","journal-title":"Empir Softw Eng"},{"key":"9973_CR72","unstructured":"Silverman D, Marvasti A (2008) Doing qualitative research: A comprehensive guide. Sage"},{"key":"9973_CR73","doi-asserted-by":"publisher","first-page":"e86","DOI":"10.7717\/peerj-cs.86","volume":"2","author":"AM Smith","year":"2016","unstructured":"Smith AM, Katz DS, Niemeyer KE (2016) Software citation principles. PeerJ Comput Sci 2:e86","journal-title":"PeerJ Comput Sci"},{"key":"9973_CR74","first-page":"1","volume":"13","author":"V Stodden","year":"2009","unstructured":"Stodden V (2009a) Enabling reproducible research: Open licensing for scientific innovation. Int J Commun Law Pol 13:1\u201355","journal-title":"Int J Commun Law Pol"},{"issue":"1","key":"9973_CR75","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MCSE.2009.19","volume":"11","author":"V Stodden","year":"2009","unstructured":"Stodden V (2009b) The legal framework for reproducible scientific research: licensing and copyright. Comput Sci Eng 11(1):35\u201340","journal-title":"Comput Sci Eng"},{"key":"9973_CR76","doi-asserted-by":"crossref","unstructured":"Stodden V, Leisch F, Peng RD (2014) Implementing reproducible research. CRC Press","DOI":"10.1201\/b16868"},{"key":"9973_CR77","unstructured":"Teshima CG, Cleary B, Singer L (2013) A study of innovation diffusion through link sharing on stack overflow. In: Working conference on mining software repositories (MSR \u201913), pp 81\u201384"},{"key":"9973_CR78","doi-asserted-by":"crossref","unstructured":"Timperley CS, Stepney S, Le Goues C (2018) Bugzoo: A platform for studying software bugs. In: International conference on software engineering: Companion proceeedings, pp 446\u2013447","DOI":"10.1145\/3183440.3195050"},{"issue":"3","key":"9973_CR79","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1111\/j.1467-6486.1994.tb00624.x","volume":"31","author":"RA Wolfe","year":"1994","unstructured":"Wolfe RA (1994) Organizational innovation: review, critique and suggested research directions. J Manag Stud 31(3):405\u2013431","journal-title":"J Manag Stud"},{"issue":"4","key":"9973_CR80","first-page":"628","volume":"115","author":"RE Wright","year":"1995","unstructured":"Wright RE, Palmar JC, Kavanaugh DC (1995) The importance of promoting stakeholder acceptance of educational innovations. Education 115(4):628\u2013633","journal-title":"Education"},{"key":"9973_CR81","doi-asserted-by":"crossref","unstructured":"Zerhouni E (2003) The NIH roadmap","DOI":"10.1126\/science.1091867"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09973-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-09973-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09973-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:26:09Z","timestamp":1672100769000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-09973-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,11]]},"references-count":81,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["9973"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-09973-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,11]]},"assertion":[{"value":"14 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Our study included an online survey of software engineering researchers. We received approval for our survey from Carnegie Mellon University\u2019s Institutional Review Board. We have include our informed consent form as part of the additional materials for this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}}],"article-number":"67"}}