{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:34:10Z","timestamp":1747802050132,"version":"3.41.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11432-022-3611-3","type":"journal-article","created":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T11:01:38Z","timestamp":1711969298000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["What can we learn from quality assurance badges in open-source software?"],"prefix":"10.1007","volume":"67","author":[{"given":"Feng","family":"Li","sequence":"first","affiliation":[]},{"given":"Yiling","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zhenpeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jinhao","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuanzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,26]]},"reference":[{"key":"3611_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0164-1212(02)00064-X","volume":"66","author":"L Zhao","year":"2003","unstructured":"Zhao L, Elbaum S. Quality assurance under the open source development model. J Syst Softw, 2003, 66: 65\u201375","journal-title":"J Syst Softw"},{"key":"3611_CR2","unstructured":"Ma L, Xu F J F, Xue M, et al. Secure deep learning engineering: a software quality assurance perspective. 2018. ArXiv:1810.04538"},{"key":"3611_CR3","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.procs.2015.07.236","volume":"56","author":"S S Bahamdain","year":"2015","unstructured":"Bahamdain S S. Open source software (OSS) quality assurance: a survey paper. Procedia Comput Sci, 2015, 56: 459\u2013464","journal-title":"Procedia Comput Sci"},{"key":"3611_CR4","doi-asserted-by":"crossref","unstructured":"Trockman A, Zhou S, K\u00e4stner C, et al. Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem. In: Proceedings of the 40th International Conference on Software Engineering, 2018. 511\u2013522","DOI":"10.1145\/3180155.3180209"},{"key":"3611_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64822-4","volume-title":"Software Quality Assurance","author":"N Walkinshaw","year":"2017","unstructured":"Walkinshaw N. Software Quality Assurance. Berlin: Springer, 2017"},{"key":"3611_CR6","volume-title":"Software Quality Assurance","author":"C Y Laporte","year":"2018","unstructured":"Laporte C Y, April A. Software Quality Assurance. Hoboken: John Wiley & Sons, 2018"},{"key":"3611_CR7","doi-asserted-by":"crossref","unstructured":"Perera P, Silva R, Perera I. Improve software quality through practicing devops. In: Proceedings of the 17th International Conference on Advances in ICT for Emerging Regions (ICTer), 2017. 1\u20136","DOI":"10.1109\/ICTER.2017.8257807"},{"key":"3611_CR8","volume-title":"Software Quality Assurance, Testing and Metrics","author":"A Basu","year":"2015","unstructured":"Basu A. Software Quality Assurance, Testing and Metrics. New Delhi: PHI Learning Pvt. Ltd., 2015"},{"key":"3611_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TR.2016.2522518","volume":"65","author":"W E Wong","year":"2016","unstructured":"Wong W E. Special section on software quality assurance: research and practice. IEEE Trans Rel, 2016, 65: 3","journal-title":"IEEE Trans Rel"},{"key":"3611_CR10","unstructured":"Legay D, Decan A, Mens T. On the usage of badges in open source packages on GitHub. In: Proceedings of the 18th Belgium-Netherlands Software Evolution Workshop, Brussels, 2019"},{"key":"3611_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/9781118445112.stat05999","volume-title":"Stratified Sampling","author":"V L Parsons","year":"2014","unstructured":"Parsons V L. Stratified Sampling. Hoboken: John Wiley & Sons, 2014"},{"key":"3611_CR12","doi-asserted-by":"crossref","unstructured":"Avelino G, Constantinou E, Valente M T, et al. On the abandonment and survival of open source projects: an empirical investigation. In: Proceedings of ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019. 1\u201312","DOI":"10.1109\/ESEM.2019.8870181"},{"key":"3611_CR13","doi-asserted-by":"crossref","unstructured":"Steinmacher I, Pinto G, Wiese I S, et al. Almost there: a study on quasi-contributors in open-source software projects. In: Proceedings of the 40th International Conference on Software Engineering (ICSE), 2018. 256\u2013266","DOI":"10.1145\/3180155.3180208"},{"key":"3611_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"C B Seaman","year":"1999","unstructured":"Seaman C B. Qualitative methods in empirical studies of software engineering. IEEE Trans Softw Eng, 1999, 25: 557\u2013572","journal-title":"IEEE Trans Softw Eng"},{"key":"3611_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"J R Landis","year":"1977","unstructured":"Landis J R, Koch G G. The measurement of observer agreement for categorical data. Biometrics, 1977, 33: 159","journal-title":"Biometrics"},{"key":"3611_CR16","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.1109\/TSE.2019.2961897","volume":"47","author":"J M Zhang","year":"2021","unstructured":"Zhang J M, Li F, Hao D, et al. A study of bug resolution characteristics in popular programming languages. IEEE Trans Softw Eng, 2021, 47: 2684\u20132697","journal-title":"IEEE Trans Softw Eng"},{"key":"3611_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3340571","volume":"41","author":"E D Berger","year":"2019","unstructured":"Berger E D, Hollenbeck C, Maj P, et al. On the impact of programming languages on code quality. ACM Trans Program Lang Syst, 2019, 41: 1\u201324","journal-title":"ACM Trans Program Lang Syst"},{"key":"3611_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jss.2018.09.016","volume":"146","author":"H Borges","year":"2018","unstructured":"Borges H, Valente M T. What\u2019s in a GitHub star? Understanding repository starring practices in a social coding platform. J Syst Softw, 2018, 146: 112\u2013129","journal-title":"J Syst Softw"},{"key":"3611_CR19","doi-asserted-by":"crossref","unstructured":"Ortu M, Marchesi M, Tonelli R. Empirical analysis of affect of merged issues on GitHub. In: Proceedings of the 4th International Workshop on Emotion Awareness in Software Engineering (SEmotion), 2019. 46\u201348","DOI":"10.1109\/SEmotion.2019.00017"},{"key":"3611_CR20","doi-asserted-by":"crossref","unstructured":"Ray B, Posnett D, Filkov V, et al. A large scale study of programming languages and code quality in GitHub. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014. 155\u2013165","DOI":"10.1145\/2635868.2635922"},{"key":"3611_CR21","unstructured":"ISO Central Secretary. Systems and software engineering \u2014 systems and software quality requirements and evaluation (square) \u2014 system and software quality models. Standard ISO\/IEC 25010:2011. https:\/\/www.iso.org\/standard\/35733.html"},{"key":"3611_CR22","doi-asserted-by":"crossref","unstructured":"Fischer-Nielsen A, Fu Z, Su T, et al. The forgotten case of the dependency bugs: on the example of the robot operating system. In: Proceedings of the 42nd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2020. 21\u201330","DOI":"10.1145\/3377813.3381364"},{"key":"3611_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s13174-017-0055-2","volume":"8","author":"S A Asadollah","year":"2017","unstructured":"Asadollah S A, Sundmark D, Eldh S, et al. Concurrency bugs in open source software: a case study. J Int Serv Appl, 2017, 8: 4","journal-title":"J Int Serv Appl"},{"key":"3611_CR24","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2345156.2254075","volume":"47","author":"G Jin","year":"2012","unstructured":"Jin G, Song L, Shi X, et al. Understanding and detecting real-world performance bugs. SIGPLAN Not, 2012, 47: 77\u201388","journal-title":"SIGPLAN Not"},{"key":"3611_CR25","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/sej.1994.0025","volume":"9","author":"J J Chilenski","year":"1994","unstructured":"Chilenski J J, Miller S P. Applicability of modified condition\/decision coverage to software testing. Softw Eng J UK, 1994, 9: 193\u2013200","journal-title":"Softw Eng J UK"},{"key":"3611_CR26","doi-asserted-by":"publisher","first-page":"190102","DOI":"10.1007\/s11432-019-2859-8","volume":"63","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Feng Y, Wang Y, et al. Quality assessment of crowdsourced test cases. Sci China Inf Sci, 2020, 63: 190102","journal-title":"Sci China Inf Sci"},{"key":"3611_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v023.i07","volume":"23","author":"D M Stasinopoulos","year":"2007","unstructured":"Stasinopoulos D M, Rigby R A. Generalized additive models for location scale and shape (GAMLSS) in R. J Stat Soft, 2007, 23: 1\u201346","journal-title":"J Stat Soft"},{"key":"3611_CR28","doi-asserted-by":"crossref","unstructured":"Hastie T J, Tibshirani R J. Generalized additive models. Routledge, 2017. https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781118445112.stat03141","DOI":"10.1201\/9780203753781"},{"key":"3611_CR29","first-page":"158","volume":"36","author":"E R Mansfield","year":"1982","unstructured":"Mansfield E R, Helms B P. Detecting multicollinearity. Am Statist, 1982, 36: 158\u2013160","journal-title":"Am Statist"},{"key":"3611_CR30","doi-asserted-by":"publisher","first-page":"132101","DOI":"10.1007\/s11432-019-2745-5","volume":"64","author":"W Liu","year":"2021","unstructured":"Liu W, Chen B, Peng X, et al. Identifying change patterns of API misuses from code changes. Sci China Inf Sci, 2021, 64: 132101","journal-title":"Sci China Inf Sci"},{"key":"3611_CR31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0164-1212(97)00146-5","volume":"40","author":"A Rai","year":"1998","unstructured":"Rai A, Song H, Troutt M. Software quality assurance: an analytical survey and research prioritization. J Syst Softw, 1998, 40: 67\u201383","journal-title":"J Syst Softw"},{"key":"3611_CR32","first-page":"1","volume":"11","author":"J Holck","year":"2003","unstructured":"Holck J, J\u00f8rgensen N. Continuous integration and quality assurance: a case study of two open source projects. Australas J Inform Syst, 2003, 11: 1","journal-title":"Australas J Inform Syst"},{"key":"3611_CR33","doi-asserted-by":"crossref","unstructured":"Khanjani A, Sulaiman R. The process of quality assurance under open source software development. In: Proceedings of IEEE Symposium on Computers and Informatics, 2011. 548\u2013552","DOI":"10.1109\/ISCI.2011.5958975"},{"key":"3611_CR34","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jss.2015.12.020","volume":"114","author":"J Axelsson","year":"2016","unstructured":"Axelsson J, Skoglund M. Quality assurance in software ecosystems: a systematic literature mapping and research agenda. J Syst Softw, 2016, 114: 69\u201381","journal-title":"J Syst Softw"},{"key":"3611_CR35","first-page":"214","volume":"10","author":"M U Hassan","year":"2018","unstructured":"Hassan M U, Mubashir M, Shabir M A, et al. Software quality assurance techniques: a review. Int J Inform Bus Manag, 2018, 10: 214\u2013221","journal-title":"Int J Inform Bus Manag"},{"key":"3611_CR36","doi-asserted-by":"crossref","unstructured":"Felderer M, Ramler R. Quality assurance for AI-based systems: overview and challenges (introduction to interactive session). In: Proceedings of International Conference on Software Quality, 2021. 33\u201342","DOI":"10.1007\/978-3-030-65854-0_3"},{"key":"3611_CR37","doi-asserted-by":"crossref","unstructured":"Bird C, Gourley A, Devanbu P, et al. Mining email social networks. In: Proceedings of International Workshop on Mining Software Repositories, 2006. 137\u2013143","DOI":"10.1145\/1137983.1138016"},{"key":"3611_CR38","doi-asserted-by":"crossref","unstructured":"Guzzi A, Bacchelli A, Lanza M, et al. Communication in open source software development mailing lists. In: Proceedings of the 10th Working Conference on Mining Software Repositories (MSR), 2013. 277\u2013286","DOI":"10.1109\/MSR.2013.6624039"},{"key":"3611_CR39","doi-asserted-by":"crossref","unstructured":"Joblin M, Apel S, Hunsen C, et al. Classifying developers into core and peripheral: an empirical study on count and network metrics. In: Proceedings of the 39th International Conference on Software Engineering (ICSE), 2017. 164\u2013174","DOI":"10.1109\/ICSE.2017.23"},{"key":"3611_CR40","doi-asserted-by":"crossref","unstructured":"Singer L, Filho F F, Storey M A. Software engineering at the speed of light: how developers stay current using twitter. In: Proceedings of the 36th International Conference on Software Engineering, 2014. 211\u2013221","DOI":"10.1145\/2568225.2568305"},{"key":"3611_CR41","doi-asserted-by":"crossref","unstructured":"Bogart C, K\u00e4stner C, Herbsleb J, et al. How to break an API: cost negotiation and community values in three software ecosystems. In: Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016. 109\u2013120","DOI":"10.1145\/2950290.2950325"},{"key":"3611_CR42","doi-asserted-by":"crossref","unstructured":"Decan A, Mens T, Claes M. An empirical comparison of dependency issues in OSS packaging ecosystems. In: Proceedings of the 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2017. 2\u201312","DOI":"10.1109\/SANER.2017.7884604"},{"key":"3611_CR43","doi-asserted-by":"crossref","unstructured":"Raemaekers S, van Deursen A, Visser J. Semantic versioning versus breaking changes: a study of the maven repository. In: Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulation, 2014. 215\u2013224","DOI":"10.1109\/SCAM.2014.30"},{"key":"3611_CR44","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1007\/s10664-014-9325-9","volume":"20","author":"G Bavota","year":"2015","unstructured":"Bavota G, Canfora G, Di Penta M, et al. How the Apache community upgrades dependencies: an evolutionary study. Empir Softw Eng, 2015, 20: 1275\u20131317","journal-title":"Empir Softw Eng"},{"key":"3611_CR45","doi-asserted-by":"crossref","unstructured":"Cox J, Bouwers E, van Eekelen M, et al. Measuring dependency freshness in software systems. In: Proceedings of the 37th IEEE International Conference on Software Engineering, 2015. 109\u2013118","DOI":"10.1109\/ICSE.2015.140"},{"key":"3611_CR46","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/s10664-017-9521-5","volume":"23","author":"R G Kula","year":"2018","unstructured":"Kula R G, German D M, Ouni A, et al. Do developers update their library dependencies? Empir Softw Eng, 2018, 23: 384\u2013417","journal-title":"Empir Softw Eng"},{"key":"3611_CR47","doi-asserted-by":"crossref","unstructured":"Mirhosseini S, Parnin C. Can automated pull requests encourage software developers to upgrade out-of-date dependencies? In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2017. 84\u201394","DOI":"10.1109\/ASE.2017.8115621"},{"key":"3611_CR48","doi-asserted-by":"crossref","unstructured":"Zampetti F, Scalabrino S, Oliveto R, et al. How open source projects use static code analysis tools in continuous integration pipelines. In: Proceedings of the 14th International Conference on Mining Software Repositories (MSR), 2017. 334\u2013344","DOI":"10.1109\/MSR.2017.2"},{"key":"3611_CR49","doi-asserted-by":"crossref","unstructured":"Hilton M, Tunnell T, Huang K, et al. Usage, costs, and benefits of continuous integration in open-source projects. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2016. 426\u2013437","DOI":"10.1145\/2970276.2970358"},{"key":"3611_CR50","doi-asserted-by":"crossref","unstructured":"Vasilescu B, Yu Y, Wang H, et al. Quality and productivity outcomes relating to continuous integration in GitHub. In: Proceedings of the 10th Joint Meeting on Foundations of Software Engineering, 2015. 805\u2013816","DOI":"10.1145\/2786805.2786850"},{"key":"3611_CR51","doi-asserted-by":"crossref","unstructured":"Zhao Y, Serebrenik A, Zhou Y, et al. The impact of continuous integration on other software development practices: a large-scale empirical study. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2017. 60\u201371","DOI":"10.1109\/ASE.2017.8115619"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3611-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-022-3611-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3611-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T19:44:16Z","timestamp":1747770256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-022-3611-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,26]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["3611"],"URL":"https:\/\/doi.org\/10.1007\/s11432-022-3611-3","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2024,3,26]]},"assertion":[{"value":"2 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"142103"}}