{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:53:33Z","timestamp":1765961613672,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000038","name":"natural sciences and engineering research council of canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10664-022-10246-y","type":"journal-article","created":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T07:02:36Z","timestamp":1671865356000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["How programmers find online learning resources"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3719-5011","authenticated-orcid":false,"given":"Deeksha M.","family":"Arya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1782-1545","authenticated-orcid":false,"given":"Jin L. C.","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0248-1384","authenticated-orcid":false,"given":"Martin P.","family":"Robillard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,24]]},"reference":[{"key":"10246_CR1","unstructured":"Abdi H et al (2007) Bonferroni and \u0161id\u00e1k corrections for multiple comparisons. In: Encyclopedia of measurement and statistics, vol 3, pp 103\u2013107"},{"issue":"5","key":"10246_CR2","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1007\/s10664-020-09857-0","volume":"25","author":"DM Arya","year":"2020","unstructured":"Arya DM, Guo JLC, Robillard MP (2020) Information correspondence between types of documentation for APIs. Empir Softw Eng 25(5):4069\u20134096","journal-title":"Empir Softw Eng"},{"key":"10246_CR3","doi-asserted-by":"crossref","unstructured":"Arya DM, Nassif M, Robillard MP (2021) A data-centric study of software tutorial design. IEEE Softw","DOI":"10.1109\/MS.2021.3090978"},{"key":"10246_CR4","doi-asserted-by":"crossref","unstructured":"Bai GR, Kayani J, Stolee KT (2020) How graduate computing students search when using an unfamiliar programming language. In: Proceedings of the 28th international conference on program comprehension, ICPC, Association for computing machinery, pp 160\u2013171","DOI":"10.1145\/3387904.3389274"},{"key":"10246_CR5","doi-asserted-by":"crossref","unstructured":"Brandt J, Guo PJ, Lewenstein J, Dontcheva M, Klemmer SR (2009) Two studies of opportunistic programming: interleaving web foraging, learning, and writing code. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI \u201909. Association for Computing Machinery, pp 1589\u20131598","DOI":"10.1145\/1518701.1518944"},{"key":"10246_CR6","doi-asserted-by":"crossref","unstructured":"Carroll J (1990) An overview of minimalist instruction. In: Annual Hawaii international conference on system sciences, vol 4. IEEE Computer Society, pp 210\u2013219","DOI":"10.1109\/HICSS.1990.205259"},{"key":"10246_CR7","doi-asserted-by":"crossref","unstructured":"Chattopadhyay S, Nelson N, Au A, Morales N, Sanchez C, Pandita R, Sarma A (2020) A tale from the trenches: cognitive biases and software development. In: Proceedings of the 42nd ACM\/IEEE international conference on software engineering, ICSE \u201920. Association for Computing Machinery, New York, pp 654\u2013665","DOI":"10.1145\/3377811.3380330"},{"key":"10246_CR8","doi-asserted-by":"crossref","unstructured":"Dondio P, Shaheen S (2019) Is Stack Overflow an effective complement to gaining practical knowledge compared to traditional computer science learning?. In: Proceedings of the international conference on education technology and computers (ICETC), pp 132\u2013138","DOI":"10.1145\/3369255.3369258"},{"key":"10246_CR9","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko E, Robillard MP (2012) Asking and answering questions about unfamiliar apis: an exploratory study. In: 2012 34th International conference on software engineering (ICSE). IEEE, pp 266\u2013276","DOI":"10.1109\/ICSE.2012.6227187"},{"key":"10246_CR10","doi-asserted-by":"crossref","unstructured":"Earle RH, Rosso MA, Alexander KE (2015) User preferences of software documentation genres. In: Proceedings of the 33rd annual international conference on the design of communication, SIGDOC \u201915. Association for Computing Machinery","DOI":"10.1145\/2775441.2775457"},{"key":"10246_CR11","doi-asserted-by":"crossref","unstructured":"Erdem A, Marsella S, Johnson W (1998) Task oriented software understanding. In: Proceedings of international conference on automated software engineering. IEEE Computer Society, p 230","DOI":"10.1109\/ASE.1998.732658"},{"key":"10246_CR12","doi-asserted-by":"crossref","unstructured":"Erdos K, Sneed HM (1998) Partial comprehension of complex programs (enough to perform maintenance). In: Proceedings. 6th International workshop on program comprehension. IWPC\u201998, pp 98\u2013105","DOI":"10.1109\/WPC.1998.693322"},{"key":"10246_CR13","doi-asserted-by":"crossref","unstructured":"Escobar-Avila J, Venuti D, Di Penta M, Haiduc S (2019) A survey on online learning preferences for computer science and programming. In: Proceedings of international conference on software engineering: software engineering education and training (ICSE-SEET), pp 170\u2013181","DOI":"10.1109\/ICSE-SEET.2019.00026"},{"key":"10246_CR14","doi-asserted-by":"crossref","unstructured":"Gallardo-Valencia RE, Sim SE (2011) What kinds of development problems can be solved by searching the web?: a field study. In: Proceedings\u2014international conference on software engineering, pp 41\u201344","DOI":"10.1145\/1985429.1985440"},{"key":"10246_CR15","doi-asserted-by":"crossref","unstructured":"J\u00e4\u00e4skel\u00e4inen R (2010) Think-aloud protocol. In: Handbook of translation studies, vol 1, pp 371\u2013374","DOI":"10.1075\/hts.1.thi1"},{"key":"10246_CR16","doi-asserted-by":"crossref","unstructured":"Ko AJ, DeLine R, Venolia G (2007) Information needs in collocated software development teams. In: 29th International conference on software engineering, pp 344\u2013353","DOI":"10.1109\/ICSE.2007.45"},{"key":"10246_CR17","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch G (1977) The measurement of observer agreement for categorical data. Biometrics 33:159\u2013174","journal-title":"Biometrics"},{"key":"10246_CR18","doi-asserted-by":"crossref","unstructured":"Lawrance J, Bellamy R, Burnett M, Rector K (2008) Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI \u201908. Association for Computing Machinery, pp 1323\u20131332","DOI":"10.1145\/1357054.1357261"},{"key":"10246_CR19","doi-asserted-by":"crossref","unstructured":"Lazar J, Feng JH, Hochheiser H Lazar J, Feng J H, Hochheiser H (eds) (2017a) Chapter 11\u2014analyzing qualitative data. Morgan Kaufmann, Boston","DOI":"10.1016\/B978-0-12-805390-4.00011-X"},{"key":"10246_CR20","doi-asserted-by":"crossref","unstructured":"Lazar J, Feng JH, Hochheiser H (2017b) Chapter 6\u2014diaries. In: Lazar J, Feng J H, Hochheiser H (eds) Research methods in human computer interaction, 2nd edn. Morgan Kaufmann, Boston, pp 135\u2013152","DOI":"10.1016\/B978-0-12-805390-4.00006-6"},{"key":"10246_CR21","doi-asserted-by":"crossref","unstructured":"Liu MX, Kittur A, Myers BA (2021) To reuse or not to reuse? A framework and system for evaluating summarized knowledge. In: Proceedings of the ACM on human-computer interaction (CSCW1)","DOI":"10.1145\/3449240"},{"key":"10246_CR22","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10791-017-9305-y","volume":"20","author":"Y Lu","year":"2017","unstructured":"Lu Y, Hsiao IH (2017) Personalized information seeking assistant (pisa): from programming information seeking to learning. Inf Retr 20:433\u2013455","journal-title":"Inf Retr"},{"issue":"3","key":"10246_CR23","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1145\/357436.357440","volume":"1","author":"RL Mack","year":"1983","unstructured":"Mack RL, Lewis CH, Carroll JM (1983) Learning to use word processors: problems and prospects. ACM Trans Inf Syst 1(3):254\u2013271","journal-title":"ACM Trans Inf Syst"},{"key":"10246_CR24","doi-asserted-by":"crossref","unstructured":"Marques A, Bradley NC, Murphy GC (2020) Characterizing task-relevant information in natural language software artifacts. In: IEEE international conference on software maintenance and evolution (ICSME), pp 476\u2013487","DOI":"10.1109\/ICSME46990.2020.00052"},{"key":"10246_CR25","volume-title":"IBM SPSS exact tests","author":"CR Mehta","year":"2011","unstructured":"Mehta CR, Patel NR (2011) IBM SPSS exact tests. IBM Corporation, Armonk"},{"key":"10246_CR26","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/3358931.3358937","volume":"7","author":"M Meng","year":"2019","unstructured":"Meng M, Steinhardt S, Schubert A (2019) How developers use API documentation: an observation study. Commun Des Q Rev 7:40\u201349","journal-title":"Commun Des Q Rev"},{"key":"10246_CR27","doi-asserted-by":"crossref","unstructured":"Nadi S, Treude C (2020) Essential sentences for navigating stack overflow answers. In: International conference on software analysis, evolution and reengineering (SANER). IEEE, pp 229\u2013239","DOI":"10.1109\/SANER48275.2020.9054828"},{"key":"10246_CR28","doi-asserted-by":"crossref","unstructured":"Piorkowski D, Fleming SD, Scaffidi C, Burnett M, Kwan I, Henley AZ, Macbeth J, Hill C, Horvath A (2015) To fix or to learn? How production bias affects developers\u2019 information foraging during debugging. In: IEEE International conference on software maintenance and evolution (ICSME), pp 11\u201320","DOI":"10.1109\/ICSM.2015.7332447"},{"key":"10246_CR29","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1037\/0033-295X.106.4.643","volume":"106","author":"P Pirolli","year":"1999","unstructured":"Pirolli P, Card S (1999) Information foraging. Psychol Rev 106:643\u2013675","journal-title":"Psychol Rev"},{"key":"10246_CR30","doi-asserted-by":"crossref","unstructured":"Pirolli P, Fu WT (2003) SNIF-ACT: a model of information foraging on the World Wide Web","DOI":"10.1007\/3-540-44963-9_8"},{"key":"10246_CR31","doi-asserted-by":"crossref","unstructured":"Rao N, Bansal C, Zimmermann T, Awadallah AH, Nagappan N (2019) Analyzing web search behavior for software engineering tasks. arXiv:1912.09519","DOI":"10.1109\/BigData50022.2020.9378083"},{"key":"10246_CR32","doi-asserted-by":"crossref","unstructured":"Robillard MP, Marcus A, Treude C, Bavota G, Chaparro O, Ernst N, Gerosa MA, Godfrey M, Lanza M, Linares-v\u00e1squez M, Murphy GC, Moreno L, Shepherd D, Wong E (2017) On-demand developer documentation. In: International conference on software maintenance and evolution (ICSME). IEEE, pp 479\u2013483","DOI":"10.1109\/ICSME.2017.17"},{"key":"10246_CR33","doi-asserted-by":"crossref","unstructured":"Sadowski C, Stolee KT, Elbaum S (2015) How developers search for code: a case study. In: Proceedings of the 10th joint meeting on foundations of software engineering, ESEC\/FSE. Association for Computing Machinery, pp 191\u2013201","DOI":"10.1145\/2786805.2786855"},{"issue":"1","key":"10246_CR34","first-page":"8","volume":"20","author":"D Sharpe","year":"2015","unstructured":"Sharpe D (2015) Chi-square test is statistically significant: now what? Pract Assess Res Eval 20(1):8","journal-title":"Pract Assess Res Eval"},{"key":"10246_CR35","doi-asserted-by":"crossref","unstructured":"Sillito J, Murphy GC, De Volder K (2006) Questions programmers ask during software evolution tasks. In: Proceedings of the SIGSOFT international symposium on foundations of software engineering (FSE). Association for Computing Machinery, pp 23\u201334","DOI":"10.1145\/1181775.1181779"},{"key":"10246_CR36","first-page":"524","volume-title":"Fisher exact test","author":"P Sprent","year":"2011","unstructured":"Sprent P (2011) Fisher exact test. Springer, Berlin, pp 524\u2013525"},{"key":"10246_CR37","doi-asserted-by":"crossref","unstructured":"Srinivasa Ragavan S, Kuttal SK, Hill C, Sarma A, Piorkowski D, Burnett M (2016) Foraging among an overabundance of similar variants. In: Proceedings of the 2016 CHI conference on human factors in computing systems, CHI \u201916. Association for Computing Machinery, New York, pp 3509\u20133521","DOI":"10.1145\/2858036.2858469"},{"key":"10246_CR38","doi-asserted-by":"crossref","unstructured":"Teevan J, Alvarado C, Ackerman MS, Karger DR (2004) The perfect search engine is not enough: a study of orienteering behavior in directed search. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 415\u2013422","DOI":"10.1145\/985692.985745"},{"key":"10246_CR39","doi-asserted-by":"crossref","unstructured":"Treude C, Aniche M (2018) Where does google find API documentation?. In: Proceedings of international conference on software engineering. ACM, pp 23\u201326","DOI":"10.1145\/3194793.3194796"},{"key":"10246_CR40","doi-asserted-by":"publisher","first-page":"3149","DOI":"10.1007\/s10664-017-9514-4","volume":"22","author":"X Xia","year":"2017","unstructured":"Xia X, Bao L, Lo D, Kochhar PS, Hassan A, Xing Z (2017) What do developers search for on the web? Empir Softw Eng 22:3149\u20133185","journal-title":"Empir Softw Eng"},{"issue":"2","key":"10246_CR41","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.ipm.2011.08.009","volume":"48","author":"I Xie","year":"2012","unstructured":"Xie I, Joo S (2012) Factors affecting the selection of search tactics: tasks, knowledge, process, and systems. Inf Process Manag 48(2):254\u2013270","journal-title":"Inf Process Manag"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10246-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10246-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10246-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T06:50:03Z","timestamp":1680504603000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10246-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,24]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10246"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10246-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2022,12,24]]},"assertion":[{"value":"30 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study is approved by the Research Ethics Board Office at McGill University (file number: 20-07-039).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"The authors have no conflicts of interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing Interests"}}],"article-number":"23"}}