{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T02:40:25Z","timestamp":1726454425580},"reference-count":88,"publisher":"Elsevier","isbn-type":[{"type":"print","value":"9780124115194"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/b978-0-12-411519-4.00016-1","type":"book-chapter","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T15:03:17Z","timestamp":1441983797000},"page":"453-489","source":"Crossref","is-referenced-by-count":9,"title":["Lessons Learned from Software Analytics in Practice"],"prefix":"10.1016","author":[{"given":"Ayse","family":"Bener","sequence":"first","affiliation":[]},{"given":"Ayse Tosun","family":"Misirli","sequence":"additional","affiliation":[]},{"given":"Bora","family":"Caglayan","sequence":"additional","affiliation":[]},{"given":"Ekrem","family":"Kocaguneli","sequence":"additional","affiliation":[]},{"given":"Gul","family":"Calikli","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0010","doi-asserted-by":"crossref","first-page":"29","DOI":"10.17708\/DRMJ.2013.v02n02a03","article-title":"Implementing SCRUM using business process management and pattern analysis methodologies","author":"Kenett","year":"2013","journal-title":"Dyn Relationships Manage J"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0015","unstructured":"Powner DA. Software development: effective practices and federal challenges in applying agile methods. Technical report. US Office of Public Affairs, GAO-12-681; 2012."},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0020","first-page":"13","article-title":"The CRISP-DM model: the new blueprint for data mining","volume":"5","author":"Shearer","year":"2000","journal-title":"J Data Warehousing"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0025","series-title":"Research design: qualitative, quantitative, and mixed methods approaches","first-page":"3","article-title":"The selection of a research design","author":"Creswell","year":"2008"},{"year":"2004","series-title":"Empirical research methods for computer scientists","author":"Easterbrook","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0030"},{"year":"2011","series-title":"CMMI for development: guidelines for process integration and product improvement","author":"Chrissis","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0035"},{"year":"2014","series-title":"Why is measurements of data management maturity important","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0040"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0045","series-title":"Guide to advanced empirical software engineering","first-page":"285","article-title":"Selecting empirical methods for software engineering research","author":"Easterbrook","year":"2008"},{"issue":"11","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0050","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1016\/j.infsof.2010.06.006","article-title":"Practical considerations in deploying statistical methods for defect prediction: A case study within the Turkish telecommunications industry","volume":"52","author":"Tosun","year":"2010","journal-title":"Inform Software Technol"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0055","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TSE.2014.2321179","article-title":"Bayesian networks for evidence-based decision-making in software engineering","volume":"40","author":"Misirli","year":"2014","journal-title":"IEEE Trans Softw Eng"},{"year":"2012","series-title":"The PROMISE repository of empirical software engineering data","author":"Menzies","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0060"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0065","unstructured":"Basili VR. Software modeling and measurement: the goal\/question\/metric paradigm. Technical report. College Park, MD, USA; 1992."},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0070","series-title":"30th international conference on software engineering (ICSE 2008)","article-title":"The influence of organizational structure on software quality: An empirical case study","author":"Nagappan","year":"2008"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0075","series-title":"3rd international workshop on intelligent data analysis and management (IDAM)","article-title":"An information quality (InfoQ) framework for ex-ante and ex-post evaluation of empirical studies","author":"Shmueli","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0080","series-title":"Predictive models in software engineering conference (PROMISE)","article-title":"An algorithmic approach to missing data problem in modeling human aspects in software development","author":"Calikli","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0085","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.1976.233837","article-title":"A complexity measure","volume":"SE-2","author":"McCabe","year":"1976","journal-title":"IEEE Trans Software Eng"},{"year":"1977","series-title":"Elements of software science","author":"Halstead","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0090"},{"issue":"6","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0095","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","article-title":"A metrics suite for object oriented design","volume":"20","author":"Chidamber","year":"1994","journal-title":"IEEE Trans Software Eng"},{"issue":"3","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0100","first-page":"1","article-title":"A critique of software defect prediction models","volume":"25","author":"Fenton","year":"1999","journal-title":"IEEE Trans Software Eng"},{"issue":"8","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0105","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/32.879815","article-title":"Quantitative analysis of faults and failures in a complex software system","volume":"26","author":"Fenton","year":"2000","journal-title":"IEEE Trans Software Eng"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0110","series-title":"22nd international symposium on computer and information sciences (ISCIS 2007)","article-title":"Defect prediction for embedded software","author":"Oral","year":"2007"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0115","series-title":"EURIMICRO SEAA 2006","article-title":"Software defect identification using machine learning techniques","author":"Ceylan","year":"2006"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0120","series-title":"8th international software metrics symposium","article-title":"What we have learnt about fighting defects","author":"Shull","year":"2002"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0125","series-title":"20th international conference on software engineering and knowledge engineering","article-title":"Weighted static code attributes for software defect prediction","author":"Turhan","year":"2008"},{"issue":"1","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0130","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSE.2007.256941","article-title":"Data mining static code attributes to learn defect predictors","volume":"33","author":"Menzies","year":"2007","journal-title":"IEEE Trans Software Eng"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0135","series-title":"34th EUROMICRO software engineering and advanced applications (EUROMICRO-SEAA 2008)","article-title":"Software defect prediction using call graph based ranking (CGBR) framework","author":"Turhan","year":"2008"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0140","series-title":"ICSOFT","first-page":"284","article-title":"Predicting defects in a large telecommunication system","author":"Kocak","year":"2008"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0145","series-title":"Computer Networks and ISDN systems","first-page":"107","article-title":"The anatomy of a large-scale hypertextual web search engine","author":"Brin","year":"1998"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0150","series-title":"ESEM","first-page":"477","article-title":"Reducing false alarms in software defect prediction by decision threshold optimization","author":"Tosun","year":"2009"},{"issue":"6","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0155","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.infsof.2012.10.003","article-title":"Empirical evaluation of the effects of mixed project data on learning defect predictors","volume":"55","author":"Turhan","year":"2013","journal-title":"Information and Software Technology"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0160","series-title":"16th ACM SIGSOFT international symposium on foundations of software engineering, (FSE 2008)","article-title":"Can developer-module networks predict failures?","author":"Pinzger","year":"2008"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0165","series-title":"16th ACM SIGSOFT international symposium on foundations of software engineering (FSE2008)","article-title":"Predicting failures with developer networks and social network analysis","author":"Meneely","year":"2008"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0170","series-title":"Proceedings of the 2nd international workshop on emerging trends in software metrics","first-page":"45","article-title":"Different strokes for different folks: A case study on software metrics for different defect categories","author":"Misirli","year":"2011"},{"issue":"7","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0175","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/32.859533","article-title":"Predicting fault incidence using software change history","volume":"26","author":"Graves","year":"2000","journal-title":"IEEE Trans Software Eng"},{"issue":"5","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0180","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s10664-008-9082-8","article-title":"Do too many cooks spoil the broth? using the number of developers to enhance defect prediction models","volume":"13","author":"Weyuker","year":"2008","journal-title":"Empirical Software Eng"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0185","article-title":"Predicting risk of software changes","volume":"5","author":"Mockus","year":"2000","journal-title":"Bell Labs Tech J"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0190","series-title":"Proceedings of the third international workshop on predictor models in software engineering","first-page":"8","article-title":"Using developer information as a factor for fault prediction","author":"Weyuker","year":"2007"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0195","series-title":"ESEM","article-title":"Preliminary analysis of the effects of confirmation bias on software defect density","author":"Calikli","year":"2010"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0200","series-title":"PROMISE","article-title":"Empirical analyses of the factors affecting confirmation bias and the effects of confirmation bias on software developer\/tester performance","author":"Calikli","year":"2010"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0205","series-title":"ICSE","article-title":"An analysis of the effects of company culture, education and experience on confirmation bias levels of software developers and testers","author":"Calikli","year":"2010"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0210","series-title":"22nd annual psychology of programming interest group workshop","article-title":"Confirmation bias in software development and testing: An analysis of the effects of company size, experience and reasoning skills","author":"Calikli","year":"2010"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0215","series-title":"ESEM","article-title":"Towards a metric suite proposal to quantify confirmation biases of developers","author":"Calikli","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0220","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s11219-012-9180-0","article-title":"Influence of confirmation biases of developers on software quality: an empirical study","volume":"21","author":"Calikli","year":"2013","journal-title":"Software Qual J"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0225","series-title":"Proceedings of the 2009 20th international symposium on software reliability engineering","first-page":"109","article-title":"Putting it all together: Using socio-technical networks to predict failures","author":"Bird","year":"2009"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0230","series-title":"Proceedings of the 18th IEEE international symposium on software reliability","first-page":"227","article-title":"Predicting subsystem failures using dependency graph complexities","author":"Zimmermann","year":"2007"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0235","series-title":"International conference on software systems and process (ICSSP 2011)","first-page":"63","article-title":"Defect prediction using social network analysis on issue repositories","author":"Bicer","year":"2011"},{"year":"2010","series-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"Easley","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0240"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0245","series-title":"16th international symposium on foundations of software engineering (ACM SIGSOFT FSE 2008)","article-title":"Enna: Software effort estimation using ensemble of neural networks with associative memory","author":"Kultur","year":"2008"},{"issue":"6","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0250","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.knosys.2009.05.001","article-title":"Ensemble of neural networks with associative memory (enna) for estimating software development costs","volume":"22","author":"Kultur","year":"2009","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0255","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/s11219-010-9112-9","article-title":"A comparative study for estimating software development effort intervals","volume":"19","author":"Bakir","year":"2011","journal-title":"Software Qual J"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0260","series-title":"International conference on artificial intelligence and pattern recognition","article-title":"Xiruxe: an intelligent fault tracking tool","author":"Bakir","year":"2009"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0270","series-title":"Euromicro SEAA conference","article-title":"Experience on developer participation and effort estimation","author":"Kocaguneli","year":"2011"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0265","series-title":"EUROMICRO-SEAA","first-page":"323","article-title":"AI-based models for software effort estimation","author":"Kocaguneli","year":"2010"},{"issue":"5","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0275","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/52.951491","article-title":"Organizational benchmarking using ISBSG data repository","volume":"18","author":"Lokan","year":"2001","journal-title":"IEEE Software"},{"issue":"3","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0280","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11219-009-9081-z","article-title":"A new perspective on data homogeneity in software cost estimation: a study in the embedded systems domain","volume":"18","author":"Bakir","year":"2010","journal-title":"Software Qual J"},{"issue":"5","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0285","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MS.2013.93","article-title":"A retrospective study of software analytics projects: in-depth interviews with practitioners","volume":"30","author":"Misirli","year":"2013","journal-title":"IEEE Softw"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0290","series-title":"Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering","first-page":"20:1","article-title":"Dione: an integrated measurement and defect prediction solution","author":"Caglayan","year":"2012"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0295","series-title":"PROMISE","first-page":"8","article-title":"Usage of multiple prediction models based on defect categories","author":"Caglayan","year":"2010"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0300","series-title":"SEKE","first-page":"637","article-title":"Prest: an intelligent software metrics extraction, analysis and defect prediction tool","author":"Kocaguneli","year":"2009"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0305","series-title":"PROMISE","first-page":"1","article-title":"Factors characterizing reopened issues: a case study","author":"Caglayan","year":"2012"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0310","series-title":"9th international workshop on software quality, collocated with FSE","article-title":"Issue ownership activity in two large software projects","author":"Caglayan","year":"2012"},{"issue":"5","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0315","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/s10664-008-9103-7","article-title":"On the relative value of cross-company and within-company data for defect prediction","volume":"14","author":"Turhan","year":"2009","journal-title":"Empirical Software Eng"},{"year":"2006","series-title":"The definitive guide to SQLite","author":"Owens","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0320"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0325","series-title":"ESEM","first-page":"497","article-title":"Evaluation of feature extraction methods on software cost estimation","author":"Turhan","year":"2007"},{"year":"2009","series-title":"Case study research: design and methods","author":"Yin","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0330"},{"year":"2001","series-title":"The visual display of quantitative information","author":"Tufte","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0335"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0340","series-title":"8th international workshop on software quality","first-page":"26","article-title":"An explanatory analysis on eclipse beta-release bugs through in-process metrics","author":"Misirli","year":"2011"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0345","series-title":"CHASE workshop colocated with ICSE","article-title":"Emergence of developer teams in the collaboration network","author":"Caglayan","year":"2013"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0350","series-title":"ICT for sustainability","article-title":"The impact of improving software functionality on environmental sustainability","author":"Kocak","year":"2013"},{"year":"2013","series-title":"Methods and applications of lLinear models: Regression and the Analysis of Variance","author":"Hocking","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0355"},{"year":"2014","series-title":"Nonparametric statistical methods","author":"Hollande","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0360"},{"year":"1988","series-title":"Statistical power analysis for the behavioral sciences","author":"Cohen","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0365"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0370","series-title":"11th international conference on agile software development (XP)","article-title":"A quantitative comparison of test-first and test-last code in an industrial project","author":"Turhan","year":"2010"},{"year":"2004","series-title":"Introduction to machine learning","author":"Alpaydin","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0375"},{"year":"2006","series-title":"Pattern recognition and machine learning","author":"Bishop","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0380"},{"year":"2005","series-title":"Data mining: practical machine learning tools and techniques","author":"Witten","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0385"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0390","series-title":"PROMISE","first-page":"5","article-title":"Validation of network measures as indicators of defective modules in software systems","author":"Tosun","year":"2009"},{"issue":"6","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0395","doi-asserted-by":"crossref","first-page":"9986","DOI":"10.1016\/j.eswa.2008.12.028","article-title":"Data mining source code for locating software bugs: A case study in telecommunication industry","volume":"36","author":"Turhan","year":"2009","journal-title":"Expert Syst Appl"},{"issue":"2","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0400","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TSE.2011.27","article-title":"Exploiting the essential assumptions of analogy-based effort estimation","volume":"38","author":"Kocaguneli","year":"2012","journal-title":"IEEE Trans Softw Eng"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0405","series-title":"ICSOFT (SE\/MUSE\/GSDCA)","first-page":"274","article-title":"Software effort estimation as a classification problem","author":"Bakir","year":"2008"},{"issue":"5","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0410","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","article-title":"Multilayer feedforward networks are universal approximators","volume":"2","author":"Hornik","year":"1989","journal-title":"Neural Networks"},{"issue":"1","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0415","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/neco.1992.4.1.1","article-title":"Neural networks and the bias\/variance dilemma","volume":"4","author":"Geman","year":"1992","journal-title":"Neural Comput"},{"year":"1984","series-title":"Classification and regression trees","author":"Breiman","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0420"},{"issue":"2","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0425","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1609\/aimag.v32i2.2348","article-title":"AI-based software defect predictors: applications and benefits in a case study","volume":"32","author":"Misirli","year":"2011","journal-title":"AI Magazine"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0430","series-title":"ESEM","first-page":"318","article-title":"Ensemble of software defect predictors: a case study","author":"Tosun","year":"2008"},{"issue":"6","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0435","doi-asserted-by":"crossref","first-page":"10000","DOI":"10.1016\/j.eswa.2008.12.066","article-title":"An expert system for determining candidate software classes for refactoring","volume":"36","author":"Kosker","year":"2009","journal-title":"Expert Syst Appl"},{"key":"10.1016\/B978-0-12-411519-4.00016-1_bb0440","series-title":"22nd international symposium on computer and information sciences (ISCIS)","first-page":"126","article-title":"Software effort estimation using machine learning methods","author":"Baskeles","year":"2007"},{"issue":"6","key":"10.1016\/B978-0-12-411519-4.00016-1_bb0445","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TSE.2011.111","article-title":"On the value of ensemble effort estimation","volume":"38","author":"Kocaguneli","year":"2012","journal-title":"IEEE Trans Softw Eng"}],"container-title":["The Art and Science of Analyzing Software Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780124115194000161?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780124115194000161?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T07:24:33Z","timestamp":1567149873000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780124115194000161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9780124115194"],"references-count":88,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-411519-4.00016-1","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}