{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:07:36Z","timestamp":1746245256118,"version":"3.40.4"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T00:00:00Z","timestamp":1734134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T00:00:00Z","timestamp":1734134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003170","name":"Stiftelsen f\u00f6r Kunskaps- och Kompetensutveckling","doi-asserted-by":"publisher","award":["2018\/010"],"award-info":[{"award-number":["2018\/010"]}],"id":[{"id":"10.13039\/501100003170","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:sec>\n            <jats:title>Context<\/jats:title>\n            <jats:p>In software development organizations employing weak or collective ownership, different teams are allowed and expected to autonomously perform changes in various components. This creates diversity both in the knowledge of, and in the responsibility for, individual components.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Objective<\/jats:title>\n            <jats:p>Our objective is to understand how and why different teams introduce technical debt in the form of code clones as they change different components.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Method<\/jats:title>\n            <jats:p>We collected data about change size and clone introductions made by ten teams in eight components which was part of a large industrial software system. We then designed a Multi-Level Generalized Linear Model (MLGLM), to illustrate the teams\u2019 differing behavior. Finally, we discussed the results with three development teams, plus line manager and the architect team, evaluating whether the model inferences aligned with what they expected. Responses were recorded and thematically coded.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Results<\/jats:title>\n            <jats:p>The results show that teams do behave differently in different components, and the feedback from the teams indicates that this method of illustrating team behavior can be useful as a complement to traditional summary statistics of ownership.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Conclusions<\/jats:title>\n            <jats:p>We find that our model-based approach produces useful visualizations of team introductions of code clones as they change different components. Practitioners stated that the visualizations gave them insights that were useful, and by comparing with an average team, inter-team comparisons can be avoided. Thus, this has the potential to be a useful feedback tool for teams in software development organizations that employ weak or collective ownership.<\/jats:p>\n          <\/jats:sec>","DOI":"10.1007\/s10664-024-10598-7","type":"journal-article","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T03:12:11Z","timestamp":1734145931000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Governing the commons: code ownership and code-clones in large-scale software development"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9898-2222","authenticated-orcid":false,"given":"Anders","family":"Sundelin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1350-7030","authenticated-orcid":false,"given":"Javier","family":"Gonzalez-Huerta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0118-8143","authenticated-orcid":false,"given":"Richard","family":"Torkar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3567-9300","authenticated-orcid":false,"given":"Krzysztof","family":"Wnuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,14]]},"reference":[{"key":"10598_CR1","doi-asserted-by":"publisher","unstructured":"Abrantes JF, Travassos GH (2011) Common agile practices in software processes. In: 2011 International Symposium on Empirical Software Engineering and Measurement, pp 355\u2013358, https:\/\/doi.org\/10.1109\/ESEM.2011.47","DOI":"10.1109\/ESEM.2011.47"},{"key":"10598_CR2","doi-asserted-by":"publisher","first-page":"86121","DOI":"10.1109\/ACCESS.2019.2918202","volume":"7","author":"QU Ain","year":"2019","unstructured":"Ain QU, Butt WH, Anwar MW et al (2019) A systematic review on code clone detection. IEEE Access 7:86121\u201386144. https:\/\/doi.org\/10.1109\/ACCESS.2019.2918202","journal-title":"IEEE Access"},{"key":"10598_CR3","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.infsof.2015.10.008","volume":"70","author":"NS Alves","year":"2016","unstructured":"Alves NS, Mendes TS, de Mendon\u00e7a MG et al (2016) Identification and management of technical debt: A systematic mapping study. Inf Softw Technol 70:100\u2013121. https:\/\/doi.org\/10.1016\/j.infsof.2015.10.008","journal-title":"Inf Softw Technol"},{"key":"10598_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.scico.2019.03.001","volume":"176","author":"G Avelino","year":"2019","unstructured":"Avelino G, Passos L, Hora A et al (2019) Measuring and analyzing code authorship in 1 + 118 open source projects. Sci Comput Program 176:14\u201332. https:\/\/doi.org\/10.1016\/j.scico.2019.03.001","journal-title":"Sci Comput Program"},{"issue":"1","key":"10598_CR5","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MS.2016.13","volume":"33","author":"P Avgeriou","year":"2016","unstructured":"Avgeriou P, Kruchten P, Nord RL et al (2016) Reducing friction in software development. IEEE Softw 33(1):66\u201372. https:\/\/doi.org\/10.1109\/MS.2016.13","journal-title":"IEEE Softw"},{"key":"10598_CR6","doi-asserted-by":"publisher","unstructured":"Avgeriou P, Kruchten P, Ozkaya I et al (2016) Managing technical debt in software engineering. Rep Dagstuhl Semin 16162. https:\/\/doi.org\/10.4230\/DagRep.6.4.110","DOI":"10.4230\/DagRep.6.4.110"},{"issue":"5","key":"10598_CR7","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1080\/08874417.2018.1520056","volume":"60","author":"S Ba\u0161karada","year":"2020","unstructured":"Ba\u0161karada S, Nguyen V, Koronios A (2020) Architecting microservices: Practical opportunities and challenges. J Comput Inf Syst 60(5):428\u2013436. https:\/\/doi.org\/10.1080\/08874417.2018.1520056","journal-title":"J Comput Inf Syst"},{"key":"10598_CR8","unstructured":"Beck K, Andres C (2001) Extreme Programming Explained: Embrace Change. Addison-Wesley Professional"},{"issue":"9","key":"10598_CR9","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G et al (2007) Comparison and evaluation of clone detection tools. IEEE Trans Softw Eng 33(9):577\u2013591. https:\/\/doi.org\/10.1109\/TSE.2007.70725","journal-title":"IEEE Trans Softw Eng"},{"key":"10598_CR10","doi-asserted-by":"crossref","unstructured":"Bird C, Nagappan N, Murphy B et\u00a0al (2011) Don\u2019t touch my code! examining the effects of ownership on software quality. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, pp 4\u201314","DOI":"10.1145\/2025113.2025119"},{"key":"10598_CR11","doi-asserted-by":"publisher","unstructured":"Borg M, Tornhill A, Mones E (2023) U owns the code that changes and how marginal owners resolve issues slower in low-quality source code. In: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering. Association for Computing Machinery, New York, NY, USA, EASE \u201923, p 368\u2013377, https:\/\/doi.org\/10.1145\/3593434.3593480","DOI":"10.1145\/3593434.3593480"},{"key":"10598_CR12","doi-asserted-by":"publisher","unstructured":"B\u00fcrkner PC (2017) brms: An R package for Bayesian multilevel models using Stan. J Stat Softw 80(1):1\u201328. https:\/\/doi.org\/10.18637\/jss.v080.i01","DOI":"10.18637\/jss.v080.i01"},{"key":"10598_CR13","doi-asserted-by":"publisher","unstructured":"B\u00fcrkner PC (2018) Advanced Bayesian multilevel modeling with the R package brms. R J 10(1):395\u2013411. https:\/\/doi.org\/10.32614\/RJ-2018-017","DOI":"10.32614\/RJ-2018-017"},{"key":"10598_CR14","doi-asserted-by":"crossref","unstructured":"Carpenter B, Gelman A, Hoffman MD et\u00a0al (2017) Stan: A probabilistic programming language. J Stat Softw 76","DOI":"10.18637\/jss.v076.i01"},{"issue":"2","key":"10598_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/157710.157715","volume":"4","author":"W Cunningham","year":"1992","unstructured":"Cunningham W (1992) The wycash portfolio management system. ACM SIGPLAN OOPS Messenger 4(2):29\u201330","journal-title":"ACM SIGPLAN OOPS Messenger"},{"issue":"5652","key":"10598_CR16","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1126\/science.1091015","volume":"302","author":"T Dietz","year":"2003","unstructured":"Dietz T, Ostrom E, Stern PC (2003) The struggle to govern the commons. Sci 302(5652):1907\u20131912","journal-title":"Sci"},{"key":"10598_CR17","doi-asserted-by":"crossref","unstructured":"Farag\u00f3 C, Heged\u0171s P, Ferenc R (2015) Code ownership: Impact on maintainability. In: Computational Science and Its Applications\u2013ICCSA 2015: 15th International Conference, Banff, AB, Canada, June 22-25, 2015, Proceedings, Part V 15, Springer, pp 3\u201319","DOI":"10.1007\/978-3-319-21413-9_1"},{"issue":"2","key":"10598_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1177\/1077800405284363","volume":"12","author":"B Flyvbjerg","year":"2006","unstructured":"Flyvbjerg B (2006) Five misunderstandings about case-study research. Qual Inq 12(2):219\u2013245. https:\/\/doi.org\/10.1177\/1077800405284363","journal-title":"Qual Inq"},{"key":"10598_CR19","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.infsof.2015.01.013","volume":"64","author":"M Foucault","year":"2015","unstructured":"Foucault M, Teyton C, Lo D et al (2015) On the usefulness of ownership metrics in open-source software projects. Inf Softw Technol 64:102\u2013112","journal-title":"Inf Softw Technol"},{"key":"10598_CR20","unstructured":"Fowler M (2006) Codeownership. https:\/\/martinfowler.com\/bliki\/CodeOwnership.html, Online. Accessed 11 July 2023"},{"key":"10598_CR21","doi-asserted-by":"publisher","unstructured":"Furia CA, Torkar R, Feldt R (2023) Towards causal analysis of empirical software engineering data: The impact of programming languages on coding competitions. ACM Trans Softw Eng Methodol 33(1). https:\/\/doi.org\/10.1145\/3611667","DOI":"10.1145\/3611667"},{"key":"10598_CR22","unstructured":"Gelman A, Vehtari A, Simpson D et\u00a0al (2020) Bayesian workflow. arXiv:2011.01808"},{"key":"10598_CR23","doi-asserted-by":"crossref","unstructured":"Greiler M, Herzig K, Czerwonka J (2015) Code ownership and software quality: A replication study. In: 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories, IEEE, pp 2\u201312","DOI":"10.1109\/MSR.2015.8"},{"issue":"3859","key":"10598_CR24","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","volume":"162","author":"G Hardin","year":"1968","unstructured":"Hardin G (1968) The tragedy of the commons: the population problem has no technical solution; it requires a fundamental extension in morality. Sci 162(3859):1243\u20131248","journal-title":"Sci"},{"key":"10598_CR25","doi-asserted-by":"publisher","unstructured":"Herzig K, Nagappan N (2014) The impact of test ownership and team structure on the reliability and effectiveness of quality test runs. In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement. Association for Computing Machinery, New York, NY, USA, ESEM \u201914, https:\/\/doi.org\/10.1145\/2652524.2652535","DOI":"10.1145\/2652524.2652535"},{"key":"10598_CR26","unstructured":"Hunt A, Thomas D (2000) The Pragmatic programmer : from journeyman to master. Addison-Wesley, Boston [etc.]"},{"key":"10598_CR27","doi-asserted-by":"crossref","unstructured":"Juergens E, Deissenboeck F, Hummel B et\u00a0al (2009) Do code clones matter? In: 2009 IEEE 31st International Conference on Software Engineering, IEEE, pp 485\u2013495","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"10598_CR28","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"CJ Kapser","year":"2008","unstructured":"Kapser CJ, Godfrey MW (2008) \u201ccloning considered harmful\" considered harmful: Patterns of cloning in software. Empir Softw Eng 13:645\u2013692. https:\/\/doi.org\/10.1007\/s10664-008-9076-6","journal-title":"Empir Softw Eng"},{"key":"10598_CR29","doi-asserted-by":"crossref","unstructured":"Kaur M, Rattan D (2023) A systematic literature review on the use of machine learning in code clone research. Comput Sci Rev 47","DOI":"10.1016\/j.cosrev.2022.100528"},{"issue":"3","key":"10598_CR30","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1080\/00031305.2016.1173590","volume":"70","author":"C Kleiber","year":"2016","unstructured":"Kleiber C, Zeileis A (2016) Visualizing count data regressions using rootograms. Am Stat 70(3):296\u2013303","journal-title":"Am Stat"},{"key":"10598_CR31","unstructured":"Koschke R (2007) Survey of research on software clones. In: Dagstuhl Seminar Proceedings, Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik"},{"key":"10598_CR32","volume-title":"Managing Technical Debt","author":"P Kruchten","year":"2019","unstructured":"Kruchten P, Nord R, Ozkaya I (2019) Managing Technical Debt. Addison-Wesley Professional"},{"issue":"4","key":"10598_CR33","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10664-024-10456-6","volume":"29","author":"W Lev\u00e9n","year":"2024","unstructured":"Lev\u00e9n W, Broman H, Besker T et al (2024) The broken windows theory applies to technical debt. Empir Softw Eng 29(4):73. https:\/\/doi.org\/10.1007\/s10664-024-10456-6","journal-title":"Empir Softw Eng"},{"key":"10598_CR34","doi-asserted-by":"publisher","unstructured":"Ljung K, Gonzalez-Huerta J (2022) \u201cto clean code or not to clean code\" a survey among practitioners. In: 23rd International Conference on Product-Focused Software Process Improvement. Elsevier, pp 298\u2013315, https:\/\/doi.org\/10.1007\/978-3-031-21388-5_21","DOI":"10.1007\/978-3-031-21388-5_21"},{"key":"10598_CR35","unstructured":"Martin RC (2011) The clean coder: a code of conduct for professional programmers. Pearson Education"},{"key":"10598_CR36","volume-title":"Clean Architecture: A Craftsman\u2019s Guide to Software Structure and Design","author":"RC Martin","year":"2017","unstructured":"Martin RC (2017) Clean Architecture: A Craftsman\u2019s Guide to Software Structure and Design. Robert C, Martin Series, Prentice Hall, Boston, MA"},{"key":"10598_CR37","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1057\/ejis.2009.24","volume":"18","author":"LM Maruping","year":"2009","unstructured":"Maruping LM, Zhang X, Venkatesh V (2009) Role of collective ownership and coding standards in coordinating expertise in software project teams. Eur J Inf Syst 18:355\u2013371","journal-title":"Eur J Inf Syst"},{"key":"10598_CR38","doi-asserted-by":"crossref","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng pp 308\u2013320","DOI":"10.1109\/TSE.1976.233837"},{"key":"10598_CR39","doi-asserted-by":"crossref","unstructured":"McElreath R (2020) Statistical rethinking: A Bayesian course with examples in R and Stan. CRC press","DOI":"10.1201\/9780429029608"},{"key":"10598_CR40","unstructured":"Newman S (2021) Building microservices. O\u2019Reilly Media, Inc"},{"issue":"2","key":"10598_CR41","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MS.2003.1184163","volume":"20","author":"M Nordberg","year":"2003","unstructured":"Nordberg M (2003) Managing code ownership. IEEE Softw 20(2):26\u201333. https:\/\/doi.org\/10.1109\/MS.2003.1184163","journal-title":"IEEE Softw"},{"key":"10598_CR42","doi-asserted-by":"publisher","unstructured":"Orr\u00fa M, Marchesi M (2016) A case study on the relationship between code ownership and refactoring activities in a java software system. In: Proceedings of the 7th International Workshop on Emerging Trends in Software Metrics. Association for Computing Machinery, New York, NY, USA, WETSoM \u201916, p 43\u201349, https:\/\/doi.org\/10.1145\/2897695.2897702","DOI":"10.1145\/2897695.2897702"},{"issue":"3","key":"10598_CR43","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1002\/smr.579","volume":"25","author":"JR Pate","year":"2013","unstructured":"Pate JR, Tairas R, Kraft NA (2013) Clone evolution: a systematic review. Int J Softw Evol Process 25(3):261\u2013283. https:\/\/doi.org\/10.1002\/smr.579","journal-title":"Int J Softw Evol Process"},{"key":"10598_CR44","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161","volume-title":"Causality","author":"J Pearl","year":"2009","unstructured":"Pearl J (2009) Causality, 2nd edn. Cambridge University Press","edition":"2"},{"issue":"2","key":"10598_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0296858","volume":"19","author":"FH Quradaa","year":"2024","unstructured":"Quradaa FH, Shahzad S, Almoqbily RS (2024) A systematic literature review on the applications of recurrent neural networks in code clone research. PLOS ONE 19(2):1\u201340. https:\/\/doi.org\/10.1371\/journal.pone.0296858","journal-title":"PLOS ONE"},{"issue":"7","key":"10598_CR46","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","volume":"55","author":"D Rattan","year":"2013","unstructured":"Rattan D, Bhatia R, Singh M (2013) Software clone detection: A systematic review. Inf Softw Technol 55(7):1165\u20131199. https:\/\/doi.org\/10.1016\/j.infsof.2013.01.008","journal-title":"Inf Softw Technol"},{"key":"10598_CR47","doi-asserted-by":"crossref","unstructured":"Ribeiro DM, da\u00a0Silva FQ, Valen\u00e7a D et\u00a0al (2016) Advantages and disadvantages of using shared code from the developers perspective: a qualitative study. In: Proceedings of the 10th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp 1\u20136","DOI":"10.1145\/2961111.2962624"},{"key":"10598_CR48","doi-asserted-by":"publisher","unstructured":"Rongrong S, Liping Z, Fengrong Z (2019) A method for identifying and recommending reconstructed clones. In: Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences. Association for Computing Machinery, New York, NY, USA, ICMSS 2019, p 39\u201344, https:\/\/doi.org\/10.1145\/3312662.3312709","DOI":"10.1145\/3312662.3312709"},{"issue":"115","key":"10598_CR49","first-page":"64","volume":"541","author":"CK Roy","year":"2007","unstructured":"Roy CK, Cordy JR (2007) A survey on software clone detection research. Queen\u2019s Sch Comput TR 541(115):64\u201368","journal-title":"Queen\u2019s Sch Comput TR"},{"issue":"7","key":"10598_CR50","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci Comput Program 74(7):470\u2013495. https:\/\/doi.org\/10.1016\/j.scico.2009.02.007","journal-title":"Sci Comput Program"},{"key":"10598_CR51","doi-asserted-by":"crossref","unstructured":"Runeson P, H\u00f6st M, Rainer A et\u00a0al (2012) Case Study Research in Software Engineering: Guidelines and Examples. John Wiley & Sons","DOI":"10.1002\/9781118181034"},{"key":"10598_CR52","doi-asserted-by":"crossref","unstructured":"Sedano T, Ralph P, P\u00e9raire C (2016) Practice and perception of team code ownership. In: Proceedings of the 20th international conference on evaluation and assessment in software engineering, pp 1\u20136","DOI":"10.1145\/2915970.2916002"},{"key":"10598_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-1949-1","volume-title":"Coders at Work: Reflections on the Craft of Programming","author":"P Seibel","year":"2009","unstructured":"Seibel P (2009) Coders at Work: Reflections on the Craft of Programming. Apress, IT Pro"},{"issue":"1","key":"10598_CR54","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TSE.2018.2880977","volume":"47","author":"EVdP Sobrinho","year":"2021","unstructured":"Sobrinho EVdP, De Lucia A, Maia MdA (2021) A systematic literature review on bad smells\u20135 w\u2019s: Which, when, what, who, where. IEEE Trans Softw Eng 47(1):17\u201366. https:\/\/doi.org\/10.1109\/TSE.2018.2880977","journal-title":"IEEE Trans Softw Eng"},{"key":"10598_CR55","doi-asserted-by":"publisher","unstructured":"Sundelin A, Bauer A (2024) epkanol\/governing-commons-code-clones: Initial submission. https:\/\/doi.org\/10.5281\/zenodo.11357296","DOI":"10.5281\/zenodo.11357296"},{"key":"10598_CR56","unstructured":"Tornhill A (2018) Software Design X-Rays - Fix Technical Debt with Behavioral Code Analysis. The Pragmatic Programmers, L.L.C"},{"key":"10598_CR57","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s11222-016-9696-4","volume":"27","author":"A Vehtari","year":"2017","unstructured":"Vehtari A, Gelman A, Gabry J (2017) Practical bayesian model evaluation using leave-one-out cross-validation and waic. Stat Comput 27:1413\u20131432. https:\/\/doi.org\/10.1007\/s11222-016-9696-4","journal-title":"Stat Comput"},{"key":"10598_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M et al (2012) Experimentation in software engineering. Springer, Berlin"},{"key":"10598_CR59","doi-asserted-by":"publisher","unstructured":"Yu L, Ramaswamy S, Vaidyanathan A (2012) Understanding the effects of code clones on modularity in software systems. In: 2012 19th Asia-Pacific Software Engineering Conference, pp 105\u2013111, https:\/\/doi.org\/10.1109\/APSEC.2012.49","DOI":"10.1109\/APSEC.2012.49"},{"key":"10598_CR60","doi-asserted-by":"publisher","unstructured":"Zabardast E, Gonzalez-Huerta J, Palma F (2022a) The impact of forced working-from-home on code technical debt: An industrial case study. In: 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp 298\u2013305, https:\/\/doi.org\/10.1109\/SEAA56994.2022.00054","DOI":"10.1109\/SEAA56994.2022.00054"},{"key":"10598_CR61","doi-asserted-by":"publisher","unstructured":"Zabardast E, Gonzalez-Huerta J, \u0160mite D (2020) Refactoring, bug fixing, and new development effect on technical debt: An industrial case study. In: 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE, pp 376\u2013384, https:\/\/doi.org\/10.1109\/SEAA51224.2020.00068","DOI":"10.1109\/SEAA51224.2020.00068"},{"key":"10598_CR62","doi-asserted-by":"crossref","unstructured":"Zabardast E, Gonzalez-Huerta J, Tanveer B (2022b) Ownership vs contribution: Investigating the alignment between ownership and contribution. In: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), IEEE, pp 30\u201334","DOI":"10.1109\/ICSA-C54293.2022.00013"},{"key":"10598_CR63","doi-asserted-by":"publisher","unstructured":"Zakeri-Nasrabadi M, Parsa S, Ramezani M et al (2023) A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges. J Syst Softw 204. https:\/\/doi.org\/10.1016\/j.jss.2023.111796","DOI":"10.1016\/j.jss.2023.111796"},{"key":"10598_CR64","doi-asserted-by":"publisher","unstructured":"Zhong Y, Zhang X, Tao W, et\u00a0al (2022) A systematic literature review of clone evolution. In: Proceedings of the 5th International Conference on Computer Science and Software Engineering. Association for Computing Machinery, New York, NY, USA, CSSE \u201922, p 461\u2013473, https:\/\/doi.org\/10.1145\/3569966.3570091","DOI":"10.1145\/3569966.3570091"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10598-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-024-10598-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10598-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:46:23Z","timestamp":1746193583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-024-10598-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,14]]},"references-count":64,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10598"],"URL":"https:\/\/doi.org\/10.1007\/s10664-024-10598-7","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2024,12,14]]},"assertion":[{"value":"26 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Mr Sundelin declares that he has been employed by Ericsson AB and Ericsson Mobile Financial Services AB during the writing of this study, but neither company nor any other would gain or lose financially from reporting this research. The other authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"43"}}