{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:53:17Z","timestamp":1762325597859,"version":"3.37.3"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T00:00:00Z","timestamp":1684540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T00:00:00Z","timestamp":1684540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP20K19774","JP20H05706"],"award-info":[{"award-number":["JP20K19774","JP20H05706"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s10664-023-10315-w","type":"journal-article","created":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T08:01:46Z","timestamp":1684569706000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding the role of external pull requests in the NPM ecosystem"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6247-280X","authenticated-orcid":false,"given":"Vittunyuta","family":"Maeprasart","sequence":"first","affiliation":[]},{"given":"Supatsara","family":"Wattanakriengkrai","sequence":"additional","affiliation":[]},{"given":"Raula Gaikovina","family":"Kula","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Treude","sequence":"additional","affiliation":[]},{"given":"Kenichi","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,20]]},"reference":[{"key":"10315_CR1","unstructured":"(2016) Big-21501 - eu cookie warning (bugfix) by mickr $$\\cdot $$ pull request #50 $$\\cdot $$ bigcommerce\/stencil-utils. https:\/\/github.com\/bigcommerce\/stencil-utils\/pull\/50. Accessed 20 Jan 2022"},{"key":"10315_CR2","unstructured":"(2017a) Merging cards theme into master by grtjn $$\\cdot $$ pull request #445 $$\\cdot $$ marklogic-community\/slush-marklogic-node. https:\/\/github.com\/marklogic-community\/slush-marklogic-node\/pull\/445. Accessed 20 Jan 2022"},{"key":"10315_CR3","unstructured":"(2017b) Remove tls account creation tests by dmitrizagidulin $$\\cdot $$ pull request #495 $$\\cdot $$ solid\/node-solid-server. https:\/\/github.com\/solid\/node-solid-server\/pull\/495. Accessed 20 Jan 2022"},{"key":"10315_CR4","unstructured":"(2017c) Update writingtests.md by mattmilburn $$\\cdot $$ pull request #2654 $$\\cdot $$ reduxjs\/redux. https:\/\/github.com\/reduxjs\/redux\/pull\/2654. Accessed 20 Jan 2022"},{"key":"10315_CR5","unstructured":"(2019a) feat: Add \u2018twitch\u2018 icon by ahtohbi4 $$\\cdot $$ pull request #677 $$\\cdot $$ feathericons\/feather. https:\/\/github.com\/feathericons\/feather\/pull\/677. Accessed 20 Jan 2022"},{"key":"10315_CR6","unstructured":"(2019b) Major refactoring by szmarczak $$\\cdot $$ pull request #921 $$\\cdot $$ sindresorhus\/got. https:\/\/github.com\/sindresorhus\/got\/pull\/921. Accessed 20 Jan 2022"},{"key":"10315_CR7","unstructured":"(2019c) Mark the package as having no side effects by stof $$\\cdot $$ pull request #77 $$\\cdot $$ d3\/d3-format. https:\/\/github.com\/d3\/d3-format\/pull\/77. Accessed 20 Jan 2022"},{"key":"10315_CR8","unstructured":"(2022) Libraries.io - the open source discovery service. https:\/\/libraries.io\/. Accessed 17 Dec 2022"},{"key":"10315_CR9","doi-asserted-by":"crossref","unstructured":"Abdalkareem R, Nourry O, Wehaibi S, Mujahid S, Shihab E (2017) Why do developers use trivial packages? an empirical case study on npm. In: Proceedings of the 2017 11th joint meeting on foundations of software engineering, pp 385\u2013395","DOI":"10.1145\/3106237.3106267"},{"key":"10315_CR10","doi-asserted-by":"crossref","unstructured":"Alfadel M, Costa DE, Shihab E, Mkhallalati M (2021) On the use of dependabot security pull requests. In: 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR), IEEE, pp 254\u2013265","DOI":"10.1109\/MSR52588.2021.00037"},{"key":"10315_CR11","doi-asserted-by":"crossref","unstructured":"Alrubaye H, Mkaouer MW, Khokhlov I, Reznik L, Ouni A, Mcgoff J (2020) Learning to recommend third-party library migration opportunities at the api level. Appl Soft Comput","DOI":"10.1016\/j.asoc.2020.106140"},{"key":"10315_CR12","unstructured":"Assavakamhaenghan N, Wattanakriengkrai S, Shimada N, Kula RG, Ishio T, ichi Matsumoto K (2021) Does the first-response matter for future contributions? a study of first contributions. In: Proceedings of the 18th international conference on mining software repositories"},{"key":"10315_CR13","unstructured":"Berger A (2021) Log4j vulnerability explained: What is log4shell? https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/. Accessed 04 July 2022"},{"key":"10315_CR14","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s12130-006-1003-9","volume":"18","author":"A Bonaccorsi","year":"2006","unstructured":"Bonaccorsi A, Rossi-Lamastra C (2006) Comparing motivations of individual programmers and firms to take part in the open source movement: from community to business. Knowl Policy 18:40\u201364","journal-title":"Knowl Policy"},{"issue":"3","key":"10315_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-09951-x","volume":"26","author":"B Chinthanet","year":"2021","unstructured":"Chinthanet B, Kula RG, McIntosh S, Ishio T, Ihara A, Matsumoto K (2021) Lags in the release, adoption, and propagation of npm vulnerability fixes. Empir Softw Eng 26(3):1\u201328","journal-title":"Empir Softw Eng"},{"key":"10315_CR16","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1037\/0033-2909.114.3.494","volume":"114","author":"N Cliff","year":"1993","unstructured":"Cliff N (1993) Dominance statistics: Ordinal analyses to answer ordinal questions. Psychol Bull 114:494","journal-title":"Psychol Bull"},{"key":"10315_CR17","unstructured":"Cogo FR, Oliva GA, Hassan AE (2019) An empirical study of dependency downgrades in the npm ecosystem. IEEE Transactions on Software Engineering, pp 1\u20131"},{"key":"10315_CR18","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"1988","unstructured":"Cohen J (1988) Statistical Power Analysis for the Behavioral Sciences. Routledge"},{"key":"10315_CR19","volume-title":"Mathematical Methods of Statistics (PMS-9),","author":"H Cram\u00e9r","year":"2016","unstructured":"Cram\u00e9r H (2016) Mathematical Methods of Statistics (PMS-9), vol 9. Princeton University Press"},{"key":"10315_CR20","doi-asserted-by":"crossref","unstructured":"Decan A, Mens T, Constantinou E (2018) On the impact of security vulnerabilities in the npm package dependency network. In: Proceedings of the 15th International Conference on Mining Software Repositories, pp 181\u2013191","DOI":"10.1145\/3196398.3196401"},{"key":"10315_CR21","doi-asserted-by":"crossref","unstructured":"Dey T, Mockus A (2020) Effect of technical and social factors on pull request quality for the npm ecosystem. In: Proceedings of the 14th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), Association for Computing Machinery, New York, NY, USA, ESEM \u201920","DOI":"10.1145\/3382494.3410685"},{"key":"10315_CR22","doi-asserted-by":"crossref","unstructured":"Dey T, Ma Y, Mockus A (2019) Patterns of effort contribution and demand and user classification based on participation patterns in npm ecosystem. PROMISE\u201919, p 36\u201345","DOI":"10.1145\/3345629.3345634"},{"key":"10315_CR23","doi-asserted-by":"crossref","unstructured":"Dey T, Mousavi S, Ponce E, Fry T, Vasilescu B, Filippova A, Mockus A (2020) Detecting and characterizing bots that commit code. In: Proceedings of the 17th international conference on mining software repositories, pp 209\u2013219","DOI":"10.1145\/3379597.3387478"},{"issue":"1","key":"10315_CR24","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1177\/1536867X1501500117","volume":"15","author":"A Dinno","year":"2015","unstructured":"Dinno A (2015) Nonparametric pairwise multiple comparisons in independent groups using dunn\u2019s test. Stata J 15(1):292\u2013300","journal-title":"Stata J"},{"key":"10315_CR25","doi-asserted-by":"crossref","unstructured":"Durumeric Z, Li F, Kasten J, Amann J, Beekman J, Payer M, Weaver N, Adrian D, Paxson V, Bailey M, Halderman JA (2014) The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, Association for Computing Machinery, New York, NY, USA, IMC \u201914, pp 475\u2013488","DOI":"10.1145\/2663716.2663755"},{"key":"10315_CR26","doi-asserted-by":"crossref","unstructured":"Fagerholm F, Guinea AS, M\u00fcnch J, Borenstein J (2014) The role of mentoring and project characteristics for onboarding in open source software projects. In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, Association for Computing Machinery, New York, NY, USA, ESEM \u201914","DOI":"10.1145\/2652524.2652540"},{"key":"10315_CR27","unstructured":"Friedman N (2020) npm is joining github | the github blog. https:\/\/github.blog\/2020-03-16-npm-is-joining-github\/. Accessed 04 July 2022"},{"key":"10315_CR28","doi-asserted-by":"crossref","unstructured":"FRS KP (1900) X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Lond Edinb Dublin Philos Mag J Sci 50(302):157\u2013175","DOI":"10.1080\/14786440009463897"},{"key":"10315_CR29","doi-asserted-by":"crossref","unstructured":"Golzadeh M, Legay D, Decan A, Mens T (2020) Bot or not? detecting bots in github pull request activity based on comment similarity. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops, pp 31\u201335","DOI":"10.1145\/3387940.3391503"},{"key":"10315_CR30","doi-asserted-by":"crossref","unstructured":"Gousios G (2013) The GHTorrent dataset and tool suite. In: Proceedings of the 10th Working Conference on Mining Software Repositories, pp 233\u2013236","DOI":"10.1109\/MSR.2013.6624034"},{"key":"10315_CR31","doi-asserted-by":"crossref","unstructured":"Gousios G, Storey MA, Bacchelli A (2016) Work practices and challenges in pull-based development: The contributor\u2019s perspective. In: 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE), pp 285\u2013296","DOI":"10.1145\/2884781.2884826"},{"key":"10315_CR32","unstructured":"Hars A, Ou S (2001) Working for free? motivations of participating in open source projects. In: Proceedings of the 34th Annual Hawaii International Conference on System Sciences"},{"key":"10315_CR33","doi-asserted-by":"crossref","unstructured":"Hata H, Treude C, Kula RG, Ishio T (2019) 9.6 million links in source code comments: Purpose, evolution, and decay. In: Proceedings of the 41st International Conference on Software Engineering, IEEE Press, ICSE \u201919, pp 1211\u20131221","DOI":"10.1109\/ICSE.2019.00123"},{"key":"10315_CR34","doi-asserted-by":"crossref","unstructured":"He H, He R, Gu H, Zhou M (2021) A large-scale empirical study on java library migrations: Prevalence, trends, and rationales. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Association for Computing Machinery, New York, NY, USA, ESEC\/FSE 2021, pp 478\u2013490","DOI":"10.1145\/3468264.3468571"},{"key":"10315_CR35","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-21347-2_16","volume-title":"Top Productivity through Software Reuse","author":"L Heinemann","year":"2011","unstructured":"Heinemann L, Deissenboeck F, Gleirscher M, Hummel B, Irlbeck M (2011) On the extent and nature of software reuse in open source java projects. In: Schmid K (ed) Top Productivity through Software Reuse. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 207\u2013222"},{"key":"10315_CR36","doi-asserted-by":"crossref","unstructured":"Huang K, Chen B, Shi B, Wang Y, Xu C, Peng X (2020) Interactive, effort-aware library version harmonization. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp 518\u2013529","DOI":"10.1145\/3368089.3409689"},{"key":"10315_CR37","unstructured":"Iaffaldano G, Steinmacher I, Calefato F, Gerosa M, Lanubile F (2019) Why do developers take breaks from contributing to oss projects? a preliminary analysis. In: Proceedings of the 2nd International Workshop on Software Health, IEEE Press, SoHeal \u201919, pp 9\u201316"},{"key":"10315_CR38","doi-asserted-by":"crossref","unstructured":"Islam S, Kula RG, Treude C, Chinthanet B, Ishio T, Matsumoto K (2021) Contrasting third-party package management user experience. In: 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 664\u2013668","DOI":"10.1109\/ICSME52107.2021.00077"},{"issue":"260","key":"10315_CR39","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1080\/01621459.1952.10483441","volume":"47","author":"WH Kruskal","year":"1952","unstructured":"Kruskal WH, Wallis WA (1952) Use of ranks in one-criterion variance analysis. J Am Stat Assoc 47(260):583\u2013621","journal-title":"J Am Stat Assoc"},{"key":"10315_CR40","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/s10664-017-9521-5","volume":"23","author":"RG Kula","year":"2018","unstructured":"Kula RG, German DM, Ouni A, Ishio T, Inoue K (2018) Do developers update their library dependencies? Empir Softw Eng 23:384\u2013417","journal-title":"Empir Softw Eng"},{"key":"10315_CR41","doi-asserted-by":"crossref","unstructured":"Lee A, Carver JC, Bosu A (2017) Understanding the impressions, motivations, and barriers of one time code contributors to floss projects: A survey. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp 187\u2013197","DOI":"10.1109\/ICSE.2017.25"},{"key":"10315_CR42","doi-asserted-by":"publisher","unstructured":"Li Z, Yu Y, Wang T, Yin G, Li S, Wang H (2021) Are you still working on this an empirical study on pull request abandonment. IEEE Trans Softw Eng PP:1. https:\/\/doi.org\/10.1109\/TSE.2021.3053403","DOI":"10.1109\/TSE.2021.3053403"},{"key":"10315_CR43","doi-asserted-by":"crossref","unstructured":"M\u00e4ntyl\u00e4 MV, Novielli N, Lanubile F, Claes M, Kuutila M (2017) Bootstrapping a lexicon for emotional arousal in software engineering. In: Proceedings of the 14th International Conference on Mining Software Repositories, IEEE Press, MSR \u201917, pp 198\u2013202","DOI":"10.1109\/MSR.2017.47"},{"issue":"3","key":"10315_CR44","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability: the kappa statistic. Biochemia Med 22(3):276\u2013282","journal-title":"Biochemia Med"},{"key":"10315_CR45","doi-asserted-by":"crossref","unstructured":"Mirhosseini S, Parnin C (2017) Can automated pull requests encourage software developers to upgrade out-of-date dependencies? In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, IEEE Press, ASE 2017, p 84\u201394","DOI":"10.1109\/ASE.2017.8115621"},{"key":"10315_CR46","doi-asserted-by":"crossref","unstructured":"Nakakoji K, Yamamoto Y, NISHINAKA Y, Kishida K, Ye Y (2003) Evolution patterns of open-source software systems and communities. In: International Workshop on Principles of Software Evolution (IWPSE)","DOI":"10.1145\/512035.512055"},{"key":"10315_CR47","unstructured":"Nichols S (2022) Log4shell vulnerability continues to menace developers. https:\/\/bit.ly\/3yEDDrn. Accessed 04 July 2022"},{"key":"10315_CR48","unstructured":"OpenSSF (2022) Openssf announces the alpha-omega project to improve software supply chain security for 10,000 oss projects - open source security foundation. https:\/\/openssf.org\/press-release\/2022\/02\/01\/openssf-announces-the-alpha-omega-project-to-improve-software-supply-chain-security-for-10000-oss-projects\/. Accessed 04 July 2022"},{"key":"10315_CR49","doi-asserted-by":"crossref","unstructured":"Pinto G, Steinmacher I, Gerosa MA (2016) More common than you think: An in-depth study of casual contributors. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol\u00a01, pp 112\u2013123","DOI":"10.1109\/SANER.2016.68"},{"issue":"3","key":"10315_CR50","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s12130-999-1026-0","volume":"12","author":"E Raymond","year":"1999","unstructured":"Raymond E (1999) The cathedral and the bazaar. Knowl Technol Policy 12(3):23\u201349","journal-title":"Knowl Technol Policy"},{"key":"10315_CR51","doi-asserted-by":"crossref","unstructured":"Rehman I, Wang D, Kula RG, Ishio T, Matsumoto K (2020) Newcomer candidate: Characterizing contributions of a novice developer to github. In: Proceedings of the 36th international conference on software maintainance and evolution","DOI":"10.1109\/ICSME46990.2020.00110"},{"key":"10315_CR52","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1287\/mnsc.1060.0554","volume":"52","author":"J Roberts","year":"2006","unstructured":"Roberts J, Hann IH, Slaughter S (2006) Understanding the motivations, participation, and performance of open source software developers: A longitudinal study of the apache projects. Manag Sci 52:984\u2013999","journal-title":"Manag Sci"},{"key":"10315_CR53","doi-asserted-by":"crossref","unstructured":"Rombaut B, Roseiro\u00a0C\u00f4go F, Adams B, Hassan AE (2022) There\u2019s no such thing as a free lunch: Lessons learned from exploring the overhead introduced by the greenkeeper dependency bot in npm. ACM Transactions on Software Engineering and Methodology","DOI":"10.1145\/3522587"},{"key":"10315_CR54","unstructured":"Roth E (2022) Open source developer corrupts widely-used libraries, affecting tons of projects. https:\/\/www.theverge.com\/2022\/1\/9\/22874949\/developer-corrupts-open-source-libraries-projects-affected. Accessed 04 July 2022"},{"key":"10315_CR55","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.infsof.2010.05.001","volume":"52","author":"I Samoladas","year":"2010","unstructured":"Samoladas I, Angelis L, Stamelos I (2010) Survival analysis on the duration of open source projects. Inf Softw Technol 52:902\u2013922","journal-title":"Inf Softw Technol"},{"key":"10315_CR56","doi-asserted-by":"crossref","unstructured":"Schilling A, Laumer S, Weitzel T (2012) Who will remain? an evaluation of actual person-job and person-team fit to predict developer retention in floss projects. In: 2012 45th Hawaii International Conference on System Sciences, pp 3446\u20133455","DOI":"10.1109\/HICSS.2012.644"},{"key":"10315_CR57","unstructured":"Sharma A (2022) npm libraries \u2018colors\u2019 and \u2018faker\u2019 sabotaged in protest by their maintainer-what to do now? https:\/\/blog.sonatype.com\/npm-libraries-colors-and-faker-sabotaged-in-protest-by-their-maintainer-what-to-do-now. Accessed 04 July 2022"},{"key":"10315_CR58","doi-asserted-by":"crossref","unstructured":"Steinmacher I, Wiese I, Chaves AP, Gerosa MA (2013) Why do newcomers abandon open source software projects? In: 2013 6th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE), pp 25\u201332","DOI":"10.1109\/CHASE.2013.6614728"},{"key":"10315_CR59","doi-asserted-by":"crossref","unstructured":"Steinmacher I, Pinto G, Wiese IS, Gerosa MA (2018) Almost there: a study on quasi-contributors in open source software projects. In: Proceedings of the 40th International Conference on Software Engineering, Association for Computing Machinery, New York, NY, USA, ICSE \u201918, pp 256\u2013266","DOI":"10.1145\/3180155.3180208"},{"key":"10315_CR60","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MS.2020.3041241","volume":"39","author":"VN Subramanian","year":"2022","unstructured":"Subramanian VN, Rehman I, Nagappan M, Kula RG (2022) Analyzing first contributions on github: What do newcomers do? IEEE Softw 39:93\u2013101","journal-title":"IEEE Softw"},{"key":"10315_CR61","doi-asserted-by":"crossref","unstructured":"Thung F (2016) Api recommendation system for software development. In: 2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE), IEEE, pp 896\u2013899","DOI":"10.1145\/2970276.2975940"},{"key":"10315_CR62","doi-asserted-by":"crossref","unstructured":"Valiev M, Vasilescu B, Herbsleb J (2018) Ecosystem-level determinants of sustained activity in open-source projects: A case study of the pypi ecosystem. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2018, p 644\u2013655","DOI":"10.1145\/3236024.3236062"},{"key":"10315_CR63","first-page":"360","volume":"37","author":"A Viera","year":"2005","unstructured":"Viera A, Garrett J (2005) Understanding interobserver agreement: The kappa statistic. Fam Med 37:360\u20133","journal-title":"Fam Med"},{"key":"10315_CR64","doi-asserted-by":"crossref","unstructured":"Wang D, Xiao T, Thongtanunam P, Kula RG, Matsumoto K (2021) Understanding shared links and their intentions to meet information needs in modern code review: A case study of the openstack and qt projects. Empir Softw Eng 26:1\u201332","DOI":"10.1007\/s10664-021-09997-x"},{"key":"10315_CR65","doi-asserted-by":"publisher","first-page":"111117","DOI":"10.1016\/j.jss.2021.111117","volume":"183","author":"S Wattanakriengkrai","year":"2022","unstructured":"Wattanakriengkrai S, Chinthanet B, Hata H, Kula RG, Treude C, Guo J, Matsumoto K (2022) Github repositories with links to academic papers: Public access, traceability, and evolution. J Syst Softw 183:111117","journal-title":"J Syst Softw"},{"key":"10315_CR66","doi-asserted-by":"publisher","unstructured":"Wattanakriengkrai S, Wang D, Kula RG, Treude C, Thongtanunam P, Ishio T, Matsumoto K (2022) Giving back: Contributions congruent to library dependency changes in a software ecosystem. IEEE Trans Softw Eng 1\u201313. https:\/\/doi.org\/10.1109\/TSE.2022.3225197","DOI":"10.1109\/TSE.2022.3225197"},{"key":"10315_CR67","doi-asserted-by":"crossref","unstructured":"Wessel M, de\u00a0Souza BM, Steinmacher I, Wiese IS, Polato I, Chaves AP, Gerosa MA (2018) The power of bots: Characterizing and understanding bots in oss projects. Proc ACM Hum-Comput Interact 2(CSCW)","DOI":"10.1145\/3274451"},{"key":"10315_CR68","doi-asserted-by":"crossref","unstructured":"Xu B, An L, Thung F, Khomh F, Lo D (2020) Why reinventing the wheels? an empirical study on library reuse and re-implementation. Empir Softw Eng 25:755\u2013789","DOI":"10.1007\/s10664-019-09771-0"},{"key":"10315_CR69","unstructured":"Yaz\u0131c\u0131V (2021) Volkan Yaz\u0131c\u0131on twitter: log4j maintainers have been working sleeplessly on mitigation measures; fixes, docs, cve, replies to inquiries, etc. yet nothing is stopping people to bash us, for work we aren\u2019t paid for, for a feature we all dislike yet needed to keep due to backward compatibility concerns. \/ twitter. https:\/\/twitter.com\/yazicivo\/status\/1469349956880408583?lang=en. Accessed 04 July 2022"},{"key":"10315_CR70","doi-asserted-by":"crossref","unstructured":"Zerouali A, Constantinou E, Mens T, Robles G, Gonzalez-Barahona J (2018) An empirical analysis of technical lag in npm package dependencies. In: New Opportunities for Software Reuse: 17th International Conference, ICSR 2018, Madrid, Spain, May 21-23, 2018, Proceedings 17, Springer, pp 95\u2013110","DOI":"10.1007\/978-3-319-90421-4_6"},{"key":"10315_CR71","doi-asserted-by":"crossref","unstructured":"Zhou M, Mockus A (2012) What make long term contributors: Willingness and opportunity in oss community. In: 2012 34th International Conference on Software Engineering (ICSE), pp 518\u2013528","DOI":"10.1109\/ICSE.2012.6227164"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10315-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10315-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10315-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T09:15:04Z","timestamp":1695806104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10315-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,20]]},"references-count":71,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10315"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10315-w","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2023,5,20]]},"assertion":[{"value":"10 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Raula Gaikovina Kula and Christoph Treude are members of the EMSE Editorial Board.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}],"article-number":"84"}}