{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T15:07:44Z","timestamp":1774883264931,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10664-025-10782-3","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T02:30:34Z","timestamp":1768185034000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An explanation of software architecture explanations"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9480-7216","authenticated-orcid":false,"given":"Satrio A.","family":"Rukmono","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3654-4935","authenticated-orcid":false,"given":"Filip","family":"Zamfirov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8767-036X","authenticated-orcid":false,"given":"Lina","family":"Ochoa","sequence":"additional","affiliation":[]},{"given":"Floris","family":"Pex","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7517-6666","authenticated-orcid":false,"given":"Michel R. V.","family":"Chaudron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"key":"10782_CR1","doi-asserted-by":"publisher","unstructured":"Aghajani E, Nagy C, Vega-M\u00e1rquez OL, Linares-V\u00e1squez M, Moreno L, Bavota G, Lanza M (2019) Software documentation issues unveiled. In: 41st ACM\/IEEE international conference on software engineering, pp 1199\u20131210. https:\/\/doi.org\/10.1109\/ICSE.2019.00122","DOI":"10.1109\/ICSE.2019.00122"},{"key":"10782_CR2","doi-asserted-by":"publisher","unstructured":"Al-Saiyd NA (2017) Source code comprehension analysis in software maintenance. In: 2nd international conference on computer and communication systems, pp 1\u20135. https:\/\/doi.org\/10.1109\/CCOMS.2017.8075175","DOI":"10.1109\/CCOMS.2017.8075175"},{"key":"10782_CR3","doi-asserted-by":"crossref","unstructured":"Arab M, LaToza TD, Liang J, Ko AJ (2022) An exploratory study of sharing strategic programming knowledge. In: Proceedings of the 2022 CHI conference on human factors in computing systems, pp 1\u201315","DOI":"10.1145\/3491102.3502070"},{"issue":"4","key":"10782_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MC.2010.108","volume":"43","author":"VR Basili","year":"2010","unstructured":"Basili VR, Lindvall M, Regardie M, Seaman C, Heidrich J, M\u00fcnch J, Rombach D, Trendowicz A (2010) Linking software development and business strategy through measurement. Computer 43(4):57\u201365. https:\/\/doi.org\/10.1109\/MC.2010.108","journal-title":"Computer"},{"key":"10782_CR5","volume-title":"Software architecture in practice","author":"L Bass","year":"2021","unstructured":"Bass L, Clements P, Kazman R (2021) Software architecture in practice. Addison-Wesley Professional"},{"key":"10782_CR6","doi-asserted-by":"publisher","unstructured":"Bird CA (2016) Interviews. In: Menzies T, Williams L, Zimmermann T (eds) Perspectives on data science for software engineering, Morgan Kaufmann, Boston, pp 125\u2013131. https:\/\/doi.org\/10.1016\/B978-0-12-804206-9.00025-8","DOI":"10.1016\/B978-0-12-804206-9.00025-8"},{"issue":"13","key":"10782_CR7","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1177\/1049732316654870","volume":"26","author":"L Birt","year":"2016","unstructured":"Birt L, Scott S, Cavers D, Campbell C, Walter F (2016) Member checking: a tool to enhance trustworthiness or merely a nod to validation? Qual Health Res 26(13):1802\u20131811","journal-title":"Qual Health Res"},{"key":"10782_CR8","doi-asserted-by":"crossref","unstructured":"Bosch J, Olsson HH, Crnkovic I (2021) Engineering AI systems: a research agenda. Artificial intelligence paradigms for smart cyber-physical systems, pp 1\u201319","DOI":"10.4018\/978-1-7998-5101-1.ch001"},{"issue":"6","key":"10782_CR9","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","volume":"18","author":"R Brooks","year":"1983","unstructured":"Brooks R (1983) Towards a theory of the comprehension of computer programs. Int J Man Mach Stud 18(6):543\u2013554. https:\/\/doi.org\/10.1016\/S0020-7373(83)80031-5","journal-title":"Int J Man Mach Stud"},{"issue":"3","key":"10782_CR10","first-page":"219","volume":"3","author":"JJ Camacho","year":"2013","unstructured":"Camacho JJ, Sanchez-Torres JM, Galvis-Lista E (2013) Understanding the process of knowledge transfer in software engineering: a systematic literature review. Int J Soft Comput Softw Eng 3(3):219\u2013229","journal-title":"Int J Soft Comput Softw Eng"},{"key":"10782_CR11","doi-asserted-by":"publisher","unstructured":"Canfora G, Di\u00a0Penta M, Oliveto R, Panichella S (2012) Who is going to mentor newcomers in open source projects? In: 20th international symposium on the foundations of software engineering. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/2393596.2393647","DOI":"10.1145\/2393596.2393647"},{"issue":"3","key":"10782_CR12","first-page":"6","volume":"15","author":"A Collins","year":"1991","unstructured":"Collins A, Brown JS, Holum A et al (1991) Cognitive apprenticeship: making thinking visible. Am Educ 15(3):6\u201311","journal-title":"Am Educ"},{"key":"10782_CR13","unstructured":"Corbin J, Strauss A (2014) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage publications"},{"key":"10782_CR14","doi-asserted-by":"publisher","unstructured":"Dagenais B, Ossher H, Bellamy RKE, Robillard MP, de\u00a0Vries JP (2010) Moving into a new software project landscape. In: 32nd ACM\/IEEE international conference on software engineering. Association for Computing Machinery, New York, NY, USA, pp 275\u2013284. https:\/\/doi.org\/10.1145\/1806799.1806842","DOI":"10.1145\/1806799.1806842"},{"key":"10782_CR15","doi-asserted-by":"crossref","unstructured":"Easterbrook S, Singer J, Storey MA, Damian D (2008) Selecting empirical methods for software engineering research. In: Guide to advanced empirical software engineering. Springer, pp 285\u2013311","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"10782_CR16","unstructured":"Ebert F, Serebrenik A, Treude C, Novielli N, Castor F (2022) On recruiting experienced github contributors for interviews and surveys on prolific. In: International workshop on recruiting participants for empirical software engineering"},{"key":"10782_CR17","doi-asserted-by":"publisher","unstructured":"Edgar TW, Manz DO (2017) Chapter 4 - exploratory study. In: Edgar TW, Manz DO (eds) Research methods for cyber security, Syngress, pp 95\u2013130. https:\/\/doi.org\/10.1016\/B978-0-12-805349-2.00004-2","DOI":"10.1016\/B978-0-12-805349-2.00004-2"},{"key":"10782_CR18","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/s10664-023-10347-2","volume":"28","author":"NA Ernst","year":"2023","unstructured":"Ernst NA, Robillard MP (2023) A study of documentation for software architecture. Empir Softw Eng 28:122. https:\/\/doi.org\/10.1007\/s10664-023-10347-2","journal-title":"Empir Softw Eng"},{"key":"10782_CR19","unstructured":"European Commission (2003) Commission recommendation of 6 may 2003 concerning the definition of micro, small and medium-sized enterprises (text with eea relevance) (notified under document number c(2003) 1422)"},{"issue":"1","key":"10782_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.18680\/hss.2019.0004","volume":"5","author":"A Fadeev","year":"2019","unstructured":"Fadeev A (2019) Vygotsky\u2019s theory of mediation in digital learning environment: actuality and practice. Punctum 5(1):24\u201344. https:\/\/doi.org\/10.18680\/hss.2019.0004","journal-title":"Punctum"},{"key":"10782_CR21","doi-asserted-by":"publisher","unstructured":"Foucault M, Palyart M, Blanc X, Murphy GC, Falleri JR (2015) Impact of developer turnover on quality in open-source software. In: Proceedings of the 2015 10th joint meeting on foundations of software engineering. Association for Computing Machinery, New York, USA, pp 829\u2013841. https:\/\/doi.org\/10.1145\/2786805.2786870","DOI":"10.1145\/2786805.2786870"},{"issue":"1","key":"10782_CR22","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1177\/1094428112452151","volume":"16","author":"D Gioia","year":"2013","unstructured":"Gioia D, Corley K, Hamilton A (2013) Seeking qualitative rigor in inductive research: notes on the Gioia methodology. Organ Res Methods 16(1):15\u201331. https:\/\/doi.org\/10.1177\/1094428112452151","journal-title":"Organ Res Methods"},{"issue":"1","key":"10782_CR23","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1177\/1525822X05279903","volume":"18","author":"G Guest","year":"2006","unstructured":"Guest G, Bunce A, Johnson L (2006) How many interviews are enough? an experiment with data saturation and variability. Field Methods 18(1):59\u201382","journal-title":"Field Methods"},{"issue":"5","key":"10782_CR24","doi-asserted-by":"publisher","first-page":"e0232076","DOI":"10.1371\/journal.pone.0232076","volume":"15","author":"G Guest","year":"2020","unstructured":"Guest G, Namey E, Chen M (2020) A simple method to assess and report thematic saturation in qualitative research. PLoS ONE 15(5):e0232076","journal-title":"PLoS ONE"},{"key":"10782_CR25","doi-asserted-by":"publisher","unstructured":"Ho-Quang T, Bergel A, Nurwidyantoro A, Jolak R, Chaudron MRV (2020) Interactive role stereotype-based visualization to comprehend software architecture. In: Working conference on software visualization, pp 122\u2013132. https:\/\/doi.org\/10.1109\/VISSOFT51673.2020.00018","DOI":"10.1109\/VISSOFT51673.2020.00018"},{"key":"10782_CR26","doi-asserted-by":"publisher","unstructured":"Hove S, Anda B (2005) Experiences from conducting semi-structured interviews in empirical software engineering research. In: 11th IEEE International Software Metrics Symposium (METRICS\u201905), pp 10\u201323. https:\/\/doi.org\/10.1109\/METRICS.2005.24","DOI":"10.1109\/METRICS.2005.24"},{"key":"10782_CR27","doi-asserted-by":"publisher","first-page":"4427","DOI":"10.1007\/s10664-020-09835-6","volume":"25","author":"R Jolak","year":"2020","unstructured":"Jolak R, Savary-Leblanc M, Dalibor M, Wortmann A, Hebig R, Vincur J, Polasek I, Le Pallec X, G\u00e9rard S, Chaudron MR (2020) Software engineering whispers: the effect of textual vs. graphical software design descriptions on software design communication. Empir Softw Eng 25:4427\u20134471","journal-title":"Empir Softw Eng"},{"key":"10782_CR28","doi-asserted-by":"crossref","unstructured":"Kitchenham BA, Budgen D, Brereton P (2015) Evidence-based software engineering and systematic reviews, vol 4. CRC Press","DOI":"10.1201\/b19467"},{"key":"10782_CR29","doi-asserted-by":"publisher","unstructured":"Krancher O, Dibbern J (2020) Knowledge transfer in software maintenance outsourcing: the key roles of software knowledge and guided learning tasks. Springer International Publishing, Cham, pp 147\u2013181. https:\/\/doi.org\/10.1007\/978-3-030-45819-5_7","DOI":"10.1007\/978-3-030-45819-5_7"},{"issue":"6","key":"10782_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P Kruchten","year":"1995","unstructured":"Kruchten P (1995) The 4+1 view model of architecture. IEEE Softw 12(6):42\u201350. https:\/\/doi.org\/10.1109\/52.469759","journal-title":"IEEE Softw"},{"key":"10782_CR31","doi-asserted-by":"crossref","unstructured":"Kubelka J, Robbes R, Bergel A (2019) Live programming and software evolution: questions during a programming change task. In: 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC). IEEE, pp 30\u201341","DOI":"10.1109\/ICPC.2019.00017"},{"issue":"6","key":"10782_CR32","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MS.2003.1241364","volume":"20","author":"T Lethbridge","year":"2003","unstructured":"Lethbridge T, Singer J, Forward A (2003) How software engineers use documentation: the state of the practice. IEEE Softw 20(6):35\u201339. https:\/\/doi.org\/10.1109\/MS.2003.1241364","journal-title":"IEEE Softw"},{"issue":"4","key":"10782_CR33","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/0164-1212(87)90032-X","volume":"7","author":"S Letovsky","year":"1987","unstructured":"Letovsky S (1987) Cognitive processes in program comprehension. J Syst Softw 7(4):325\u2013339. https:\/\/doi.org\/10.1016\/0164-1212(87)90032-X","journal-title":"J Syst Softw"},{"key":"10782_CR34","first-page":"1","volume":"50","author":"J Linaker","year":"2015","unstructured":"Linaker J, Sulaman SM, H\u00f6st M, de Mello RM (2015) Guidelines for conducting surveys in software engineering v. 1.1. Lund University 50:1\u201364","journal-title":"Lund University"},{"issue":"4","key":"10782_CR35","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/0164-1212(87)90033-1","volume":"7","author":"DC Littman","year":"1987","unstructured":"Littman DC, Pinto J, Letovsky S, Soloway E (1987) Mental models and software maintenance. J Syst Softw 7(4):341\u2013355. https:\/\/doi.org\/10.1016\/0164-1212(87)90033-1","journal-title":"J Syst Softw"},{"issue":"2","key":"10782_CR36","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s00607-019-00758-9","volume":"102","author":"I Lytra","year":"2020","unstructured":"Lytra I, Carrillo C, Capilla R, Zdun U (2020) Quality attributes use in architecture design decision methods: research and practice. Computing 102(2):551\u2013572","journal-title":"Computing"},{"key":"10782_CR37","doi-asserted-by":"publisher","unstructured":"Manning J (2017) In Vivo Coding. John Wiley & Sons, Ltd, pp 1\u20132. https:\/\/doi.org\/10.1002\/9781118901731.iecrm0270","DOI":"10.1002\/9781118901731.iecrm0270"},{"issue":"2","key":"10782_CR38","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.ijinfomgt.2012.11.004","volume":"33","author":"S Nidhra","year":"2013","unstructured":"Nidhra S, Yanamadala M, Afzal W, Torkar R (2013) Knowledge transfer challenges and mitigation strategies in global software development\u2014a systematic literature review and industrial validation. Int J Inf Manage 33(2):333\u2013355. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2012.11.004","journal-title":"Int J Inf Manage"},{"issue":"1","key":"10782_CR39","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1111\/j.1468-2958.1976.tb00504.x","volume":"3","author":"R Norton","year":"2006","unstructured":"Norton R, Warnick B (2006) Assertiveness as a communication construct. Hum Commun Res 3(1):62\u201366. https:\/\/doi.org\/10.1111\/j.1468-2958.1976.tb00504.x","journal-title":"Hum Commun Res"},{"issue":"3","key":"10782_CR40","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B Nuseibeh","year":"2001","unstructured":"Nuseibeh B (2001) Weaving together requirements and architectures. Computer 34(3):115\u2013119. https:\/\/doi.org\/10.1109\/2.910904","journal-title":"Computer"},{"key":"10782_CR41","doi-asserted-by":"crossref","unstructured":"Oberauer K (2019) Working memory and attention\u2013a conceptual analysis and review. J Cogn 2(1)","DOI":"10.5334\/joc.58"},{"key":"10782_CR42","unstructured":"Ratanotayanon S, Sim S (2006) When programmers don\u2019t ask. In: Proceedings of the 21st International Conference on Automated Software Engineering. Citeseer, pp 9\u201316"},{"key":"10782_CR43","unstructured":"Reid B, Wagner M, d\u2019Amorim M, Treude C (2022) Software engineering user study recruitment on prolific: an experience report. In: International Workshop on Recruiting Participants for Empirical Software Engineering (RoPES). https:\/\/arxiv.org\/abs\/2201.05348"},{"key":"10782_CR44","doi-asserted-by":"publisher","unstructured":"Robillard MP, Marcus A, Treude C, Bavota G, Chaparro O, Ernst N, Gerosa MA, Godfrey M, Lanza M, Linares-V\u00e1squez M et\u00a0al (2017) On-demand developer documentation. In: 2017 IEEE International conference on software maintenance and evolution (ICSME). IEEE, pp 479\u2013483. https:\/\/doi.org\/10.1109\/ICSME.2017.17","DOI":"10.1109\/ICSME.2017.17"},{"key":"10782_CR45","unstructured":"Roller MR, Lavrakas PJ (2015) Applied qualitative research design: a total quality framework approach. Guilford Publications"},{"key":"10782_CR46","doi-asserted-by":"publisher","unstructured":"Schr\u00f6ter I, Kr\u00fcger J, Siegmund J, Leich T (2017) Comprehending studies on program comprehension. In: 25th international conference on program comprehension, pp 308\u2013311. https:\/\/doi.org\/10.1109\/ICPC.2017.9","DOI":"10.1109\/ICPC.2017.9"},{"issue":"4","key":"10782_CR47","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"CB Seaman","year":"1999","unstructured":"Seaman CB (1999) Qualitative methods in empirical studies of software engineering. IEEE Trans Software Eng 25(4):557\u2013572","journal-title":"IEEE Trans Software Eng"},{"key":"10782_CR48","doi-asserted-by":"publisher","first-page":"f6304","DOI":"10.1136\/bmj.f6304","volume":"347","author":"P Sedgwick","year":"2013","unstructured":"Sedgwick P (2013) Convenience sampling. BMJ 347:f6304","journal-title":"BMJ"},{"key":"10782_CR49","doi-asserted-by":"publisher","unstructured":"Shahin M, Liang P, Li Z (2014) Do Architectural design decisions improve the understanding of software architecture? Two controlled experiments. In: 22nd international conference on program comprehension, association for computing machinery, New York, pp 3\u201313. https:\/\/doi.org\/10.1145\/2597008.2597139","DOI":"10.1145\/2597008.2597139"},{"key":"10782_CR50","doi-asserted-by":"crossref","unstructured":"Sillito J, Murphy GC, De\u00a0Volder K (2006) Questions programmers ask during software evolution tasks. In: Proceedings of the 14th ACM SIGSOFT international symposium on foundations of software engineering, pp 23\u201334","DOI":"10.1145\/1181775.1181779"},{"key":"10782_CR51","doi-asserted-by":"publisher","unstructured":"Smulowitz S (2017) Interview guide. John Wiley & Sons, Ltd, pp 1\u20132. https:\/\/doi.org\/10.1002\/9781118901731.iecrm0124","DOI":"10.1002\/9781118901731.iecrm0124"},{"key":"10782_CR52","doi-asserted-by":"publisher","unstructured":"Steinmacher I, Conte TU, Treude C, Gerosa MA (2016) Overcoming open source project entry barriers with a portal for newcomers. In: 38th ACM\/IEEE international conference on software engineering. Association for Computing Machinery, New York, pp 273\u2013284. https:\/\/doi.org\/10.1145\/2884781.2884806","DOI":"10.1145\/2884781.2884806"},{"key":"10782_CR53","doi-asserted-by":"crossref","unstructured":"Stol KJ, Fitzgerald B (2020) Guidelines for conducting software engineering research. In: Contemporary empirical methods in software engineering. Springer, pp 27\u201362","DOI":"10.1007\/978-3-030-32489-6_2"},{"key":"10782_CR54","doi-asserted-by":"crossref","unstructured":"Stol KJ, Ralph P, Fitzgerald B (2016) Grounded theory in software engineering research: a critical review and guidelines. In: Proceedings of the 38th international conference on software engineering, pp 120\u2013131","DOI":"10.1145\/2884781.2884833"},{"key":"10782_CR55","doi-asserted-by":"publisher","unstructured":"Storey MA (2005) Theories, methods and tools in program comprehension: past, present and future. In: 13th International workshop on program comprehension, pp 181\u2013191. https:\/\/doi.org\/10.1109\/WPC.2005.38","DOI":"10.1109\/WPC.2005.38"},{"key":"10782_CR56","doi-asserted-by":"crossref","unstructured":"Strandberg PE (2019) Ethical interviews in software engineering. In: 2019 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), IEEE. IEEE, pp 1\u201311","DOI":"10.1109\/ESEM.2019.8870192"},{"issue":"2","key":"10782_CR57","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1207\/s15516709cog1202_4","volume":"12","author":"J Sweller","year":"1988","unstructured":"Sweller J (1988) Cognitive load during problem solving: effects on learning. Cogn Sci 12(2):257\u2013285","journal-title":"Cogn Sci"},{"issue":"3","key":"10782_CR58","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1097\/00001888-200403000-00005","volume":"79","author":"O Ten Cate","year":"2004","unstructured":"Ten Cate O, Snell L, Mann K, Vermunt J (2004) Orienting teaching toward the learning process. Acad Med 79(3):219\u2013228 (LWW)","journal-title":"Acad Med"},{"key":"10782_CR59","doi-asserted-by":"publisher","first-page":"147","DOI":"10.17348\/era.5.0.147-158","volume":"5","author":"MDC Tongco","year":"2007","unstructured":"Tongco MDC (2007) Purposive sampling as a tool for informant selection. Ethnobot Res Appl 5:147\u2013158","journal-title":"Ethnobot Res Appl"},{"key":"10782_CR60","doi-asserted-by":"publisher","unstructured":"Treude C, Middleton J, Atapattu T (2020) Beyond accuracy: assessing software documentation quality. In: 28th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering. Association for Computing Machinery, New York, pp 1509\u20131512. https:\/\/doi.org\/10.1145\/3368089.3417045","DOI":"10.1145\/3368089.3417045"},{"issue":"4","key":"10782_CR61","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MS.2014.80","volume":"32","author":"G Uddin","year":"2015","unstructured":"Uddin G, Robillard MP (2015) How API documentation fails. IEEE Softw 32(4):68\u201375. https:\/\/doi.org\/10.1109\/MS.2014.80","journal-title":"IEEE Softw"},{"issue":"11","key":"10782_CR62","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1016\/j.jss.2010.06.043","volume":"83","author":"H Unphon","year":"2010","unstructured":"Unphon H, Dittrich Y (2010) Software architecture awareness in long-term software product evolution. J Syst Softw 83(11):2211\u20132226. https:\/\/doi.org\/10.1016\/j.jss.2010.06.043","journal-title":"J Syst Softw"},{"key":"10782_CR63","unstructured":"Ward PT, Mellor SJ (1885) Structured development for real-time systems\u2014volume 1: introduction and tools. Pearson Education"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10782-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10782-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10782-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:35:35Z","timestamp":1774881335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10782-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["10782"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10782-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"11 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The presented research methodology was evaluated and approved by the Ethical Review Board at Eindhoven University of Technology (reference number ERB2023MCS26) before conducting the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"A consent form was shared with and signed by the study\u2019s participants before the interview to guarantee an ethical approach.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"We have no conflicts of interest with any individuals or organisations that could negatively bias our work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Number"}},{"value":"We declare that AI solutions (i.e., Grammarly, Writefull, and ChatGPT) were used for grammar checking and rephrasing. We declare that the content of this article and the whole research procedure were developed and fully conducted by the authors, taking full responsibility for the publication\u2019s content.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Generative AI Use"}}],"article-number":"59"}}