{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T03:10:29Z","timestamp":1775445029456,"version":"3.50.1"},"reference-count":64,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["404825\/2023-0"],"award-info":[{"award-number":["404825\/2023-0"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["312195\/2021-4"],"award-info":[{"award-number":["312195\/2021-4"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["403719\/2024-0"],"award-info":[{"award-number":["403719\/2024-0"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["443393\/2023-0"],"award-info":[{"award-number":["443393\/2023-0"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["310313\/2022-8"],"award-info":[{"award-number":["310313\/2022-8"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["408040\/2025-4"],"award-info":[{"award-number":["408040\/2025-4"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005669","name":"Funda\u00e7\u00e3o de Apoio \u00e0 Pesquisa do Estado da Para\u00edba","doi-asserted-by":"publisher","award":["268\/2025"],"award-info":[{"award-number":["268\/2025"]}],"id":[{"id":"10.13039\/501100005669","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.jss.2026.112825","type":"journal-article","created":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:00:48Z","timestamp":1772294448000},"page":"112825","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Refactoring for novices in Java: An eye tracking study on the extract vs. inline methods"],"prefix":"10.1016","volume":"237","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8918-1749","authenticated-orcid":false,"given":"Jos\u00e9 Aldo","family":"Silva Da Costa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5562-4449","authenticated-orcid":false,"given":"Rohit","family":"Gheyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4008-7717","authenticated-orcid":false,"given":"Jos\u00e9 J\u00fanior","family":"Silva Da Costa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4293-4261","authenticated-orcid":false,"given":"M\u00e1rcio","family":"Ribeiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2380-2829","authenticated-orcid":false,"given":"Rodrigo","family":"Bonif\u00e1cio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2808-8169","authenticated-orcid":false,"given":"Hyggo","family":"Almeida","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3730-9290","authenticated-orcid":false,"given":"Ana Carla","family":"Bibiano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5788-5215","authenticated-orcid":false,"given":"Alessandro","family":"Garcia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2026.112825_bib0001","series-title":"IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","first-page":"384","article-title":"Developer reading behavior while summarizing java methods: size and context matters","author":"Abid","year":"2019"},{"key":"10.1016\/j.jss.2026.112825_bib0002","doi-asserted-by":"crossref","first-page":"(","DOI":"10.1145\/3660795","article-title":"Predicting code comprehension: a novel approach to align human gaze with code using deep neural networks","volume":"1","author":"Alakmeh","year":"2024","journal-title":"Proc. ACM Softw. Eng."},{"issue":"1","key":"10.1016\/j.jss.2026.112825_bib0003","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s10664-014-9350-8","article-title":"Linguistic antipatterns: what they are and how developers perceive them","volume":"21","author":"Arnaoudova","year":"2016","journal-title":"Empirical Softw. Eng."},{"key":"10.1016\/j.jss.2026.112825_bib0004","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201917","first-page":"55","article-title":"Effects of variable names on comprehension: an empirical study","author":"Avidan","year":"2017"},{"key":"10.1016\/j.jss.2026.112825_bib0005","series-title":"The Goal Question Metric Approach, Encyclopedia of Software Engineering","author":"Basili","year":"1994"},{"key":"10.1016\/j.jss.2026.112825_bib0006","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2015.05.024","article-title":"An experimental investigation on the innate relationship between quality and refactoring","volume":"107","author":"Bavota","year":"2015","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.jss.2026.112825_bib0007","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","article-title":"Controlling the false discovery rate: a practical and powerful approach to multiple testing","volume":"57","author":"Benjamini","year":"1995","journal-title":"J. R. Stat. Soc. Ser. B Methodol."},{"issue":"2","key":"10.1016\/j.jss.2026.112825_bib0008","first-page":"219","volume":"18","author":"Binkley","year":"2013","journal-title":"The impact of identifier style on effort and comprehension"},{"key":"10.1016\/j.jss.2026.112825_bib0009","author":"Box","year":"2005"},{"issue":"6","key":"10.1016\/j.jss.2026.112825_bib0010","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/S0020-7373(77)80039-4","article-title":"Towards a theory of the cognitive processes in computer programming","volume":"9","author":"Brooks","year":"1977","journal-title":"Int. J. Man Mach. Stud."},{"key":"10.1016\/j.jss.2026.112825_bib0011","series-title":"Proceedings of the International Conference on Software Engineering, ICSE\u201978","first-page":"196","article-title":"Using a behavioral theory of program comprehension in software engineering","author":"Brooks","year":"1978"},{"key":"10.1016\/j.jss.2026.112825_bib0012","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201915","first-page":"255","article-title":"Eye movements in code reading: relaxing the linear order","author":"Busjahn","year":"2015"},{"key":"10.1016\/j.jss.2026.112825_bib0013","series-title":"Proceedings of the Koli Calling International Conference on Computing Education Research, Koli Calling\u201911","first-page":"1","article-title":"Analysis of code reading to gain more insight in program comprehension","author":"Busjahn","year":"2011"},{"key":"10.1016\/j.jss.2026.112825_bib0014","series-title":"Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR\u201910","first-page":"156","article-title":"Exploring the influence of identifier names on code quality: an empirical study","author":"Butler","year":"2010"},{"key":"10.1016\/j.jss.2026.112825_bib0015","series-title":"Proceedings of the Joint Meeting on Foundations of Software Engineering","first-page":"465","article-title":"Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects","author":"Cedrim","year":"2017"},{"key":"10.1016\/j.jss.2026.112825_bib0016","series-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","year":"1988"},{"issue":"4","key":"10.1016\/j.jss.2026.112825_bib0017","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10664-023-10311-0","article-title":"Seeing confusion through a new lens: on the impact of atoms of confusion on novices\u2019 code comprehension","volume":"28","author":"Costa","year":"2023","journal-title":"Empirical Softw. Eng."},{"key":"10.1016\/j.jss.2026.112825_bib0018","author":"Costa"},{"key":"10.1016\/j.jss.2026.112825_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-021-10002-8","article-title":"Evaluating refactorings for disciplining #ifdef annotations: an eye tracking study with novices","volume":"26","author":"Costa","year":"2021","journal-title":"Empirical Softw. Eng."},{"key":"10.1016\/j.jss.2026.112825_bib0020","series-title":"Workshop of the Psychology of Programming Interest Group, PPIG\u201902","first-page":"5","article-title":"The roles beacons play in comprehension for novice and expert programmers","author":"Crosby","year":"2002"},{"key":"10.1016\/j.jss.2026.112825_bib0021","series-title":"Proceedings of the International Symposium on Empirical Software Engineering and Measurement (ESEM\u201924)","first-page":"96","article-title":"Data analysis tools affect outcomes of eye-tracking studies","author":"D\u00f6rzapf","year":"2024"},{"key":"10.1016\/j.jss.2026.112825_bib0022","series-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler","year":"2018"},{"key":"10.1016\/j.jss.2026.112825_bib0023","series-title":"Fixation Durations: Why are They so Highly Variable, Advances in Visual Perception Research","first-page":"83-106","author":"Galley","year":"2015"},{"key":"10.1016\/j.jss.2026.112825_bib0024","series-title":"Foundations of Software Engineering","first-page":"1303-1313","article-title":"One thousand and one stories: a large-scale survey of software refactoring","author":"Golubev","year":"2021"},{"key":"10.1016\/j.jss.2026.112825_bib0025","series-title":"Proceedings of the Joint Meeting on Foundations of Software Engineering, ESEC\/FSE\u201917","first-page":"129-139","article-title":"Understanding misunderstandings in source code","author":"Gopstein","year":"2017"},{"key":"10.1016\/j.jss.2026.112825_bib0026","series-title":"Proceedings of the Symposium on Eye Tracking Research and Applications (ETRA\u201918)","first-page":"1","article-title":"itrace: eye tracking infrastructure for development environments","author":"Guarnera","year":"2018"},{"issue":"3","key":"10.1016\/j.jss.2026.112825_bib0027","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/MS.2017.81","article-title":"Peter hilton on naming","volume":"34","author":"Hermans","year":"2017","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2026.112825_bib0028","series-title":"IEEE 24th International Conference on Program Comprehension (ICPC)","first-page":"1","article-title":"Do code smells hamper novice programming? A controlled experiment on scratch programs","author":"Hermans","year":"2016"},{"key":"10.1016\/j.jss.2026.112825_bib0029","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s10664-018-9621-x","article-title":"Shorter identifier names take longer to comprehend","volume":"24","author":"Hofmeister","year":"2019","journal-title":"Empirical Softw. Eng."},{"key":"10.1016\/j.jss.2026.112825_bib0030","author":"Holmqvist","year":"2011"},{"issue":"3","key":"10.1016\/j.jss.2026.112825_bib0031","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1007\/s10664-020-09809-8","article-title":"Characteristics of method extractions in java: a large scale empirical study","volume":"25","author":"Hora","year":"2020","journal-title":"Empirical Softw. Eng."},{"issue":"10","key":"10.1016\/j.jss.2026.112825_bib0032","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1080\/08839514.2019.1637138","article-title":"Comparison of performance of data imputation methods for numeric dataset","volume":"33","author":"Jadhav","year":"2019","journal-title":"Appl. Artif. Intell."},{"key":"10.1016\/j.jss.2026.112825_bib0033","series-title":"Using Eye-Tracking Data to Compare Differences in Code Comprehension and Code Perceptions Between Expert and Novice Programmers","author":"Jessup","year":"2021"},{"issue":"4","key":"10.1016\/j.jss.2026.112825_bib0034","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1037\/0033-295X.87.4.329","article-title":"A theory of reading: from eye fixations to comprehension","volume":"87","author":"Just","year":"1980","journal-title":"Psychol. Rev."},{"issue":"2","key":"10.1016\/j.jss.2026.112825_bib0035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3480171","article-title":"Through (tracking) their eyes: abstraction and complexity in program comprehension","volume":"22","author":"Kather","year":"2021","journal-title":"ACM Trans. Comput. Educ."},{"key":"10.1016\/j.jss.2026.112825_bib0036","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201906","first-page":"3","article-title":"What\u2019s in a name? A study of identifiers","author":"Lawrie","year":"2006"},{"key":"10.1016\/j.jss.2026.112825_bib0038","series-title":"Eyes on code smells: analyzing developers\u2019 responses during code snippet analysis","first-page":"302","author":"Martins","year":"2024"},{"key":"10.1016\/j.jss.2026.112825_bib0039","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201917","first-page":"34","article-title":"Variability through the eyes of the programmer","author":"Melo","year":"2017"},{"issue":"4","key":"10.1016\/j.jss.2026.112825_bib0040","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MS.2006.105","article-title":"How are java software developers using the elipse ide?","volume":"23","author":"Murphy","year":"2006","journal-title":"IEEE Softw."},{"issue":"1","key":"10.1016\/j.jss.2026.112825_bib0041","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2011.41","article-title":"How we refactor, and how we know it","volume":"38","author":"Murphy-Hill","year":"2011","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/j.jss.2026.112825_bib0042","doi-asserted-by":"crossref","first-page":"188","DOI":"10.3758\/BRM.42.1.188","article-title":"An adaptive algorithm for fixation, saccade, and glissade detection in eyetracking data","volume":"42","author":"Nystr\u00f6m","year":"2010","journal-title":"Behav. Res. Methods"},{"key":"10.1016\/j.jss.2026.112825_bib0043","series-title":"Proceedings of the Brazilian Symposium on Software Engineering, SBES\u201920","first-page":"243","article-title":"Atoms of confusion: the eyes do not lie","author":"Oliveira","year":"2020"},{"key":"10.1016\/j.jss.2026.112825_bib0044","series-title":"Proceedings of the International Conference on Software Maintenance and Evolution, ICSME\u201920","article-title":"Evaluating code readability and legibility: an examination of human-centric studies","author":"Oliveira","year":"2020"},{"key":"10.1016\/j.jss.2026.112825_bib0045","series-title":"International Conference on Software Engineering (ICSE\u201921)","first-page":"524","article-title":"Program comprehension and code complexity metrics: an fMRI study","author":"Peitek","year":"2021"},{"key":"10.1016\/j.jss.2026.112825_bib0046","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201920","first-page":"342","article-title":"What drives the reading order of programmers? An eye tracking study","author":"Peitek","year":"2020"},{"issue":"3","key":"10.1016\/j.jss.2026.112825_bib0047","first-page":"372","volume":"124","author":"Rayner","year":"1998","journal-title":"Eye movements in reading and information processing: 20 years of research"},{"key":"10.1016\/j.jss.2026.112825_bib0048","series-title":"Proceedings of the Symposium on Eye Tracking Research & Applications, ETRA\u201900","first-page":"71","article-title":"Identifying fixations and saccades in eye-tracking protocols","author":"Salvucci","year":"2000"},{"issue":"3\/4","key":"10.1016\/j.jss.2026.112825_bib0049","doi-asserted-by":"crossref","first-page":"591","DOI":"10.2307\/2333709","article-title":"An analysis of variance test for normality (complete samples)","volume":"52","author":"Shapiro","year":"1965","journal-title":"Biometrika"},{"key":"10.1016\/j.jss.2026.112825_bib0050","series-title":"Proceedings of the Asia-Pacific Software Engineering Conference, APSEC\u201915","first-page":"96","author":"Sharafi","year":"2015"},{"issue":"5","key":"10.1016\/j.jss.2026.112825_bib0051","first-page":"3128","volume":"25","author":"Sharafi","year":"2020","journal-title":"A practical guide on conducting eye tracking studies in software engineering"},{"key":"10.1016\/j.jss.2026.112825_bib0052","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201912","first-page":"27","article-title":"Women and men-different but equal: on the impact of identifier style on source code reading","author":"Sharafi","year":"2012"},{"key":"10.1016\/j.jss.2026.112825_bib0053","series-title":"Proceedings of the Symposium on Eye Tracking Research & Applications, ETRA\u201912","first-page":"381","article-title":"An eye-tracking study on the role of scan time in finding source code defects","author":"Sharif","year":"2012"},{"key":"10.1016\/j.jss.2026.112825_bib0054","series-title":"Proceedings of the International Conference on Program Comprehension, ICPC\u201910","first-page":"196","article-title":"An eye tracking study on camelcase and under_score identifier styles","author":"Sharif","year":"2010"},{"key":"10.1016\/j.jss.2026.112825_bib0055","series-title":"Handbook of Parametric and Nonparametric Statistical Procedures","author":"Sheskin","year":"2020"},{"key":"10.1016\/j.jss.2026.112825_bib0056","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF00977789","article-title":"Syntactic\/semantic interactions in programmer behavior: a model and experimental results","volume":"8","author":"Shneiderman","year":"1979","journal-title":"Int. J. Comput. Inf. Sci."},{"key":"10.1016\/j.jss.2026.112825_bib0057","series-title":"Proceedings of the Foundations of Software Engineering","first-page":"140","article-title":"Measuring neural efficiency of program comprehension","author":"Siegmund","year":"2017"},{"key":"10.1016\/j.jss.2026.112825_bib0058","series-title":"Proceedings of the International Symposium on Foundations of Software Engineering, FSE\u201916","first-page":"858","article-title":"Why we refactor? Confessions of GitHub contributors","author":"Silva","year":"2016"},{"key":"10.1016\/j.jss.2026.112825_bib0059","series-title":"Basics of Qualitative Research Techniques","author":"Strauss","year":"1998"},{"key":"10.1016\/j.jss.2026.112825_bib0060","first-page":"403","article-title":"When and why your code starts to smell bad","volume":"1","author":"Tufano","year":"2015","journal-title":"Int. Conf. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112825_bib0061","series-title":"Proceedings of the Symposium on Eye Tracking Research and Applications","first-page":"231","article-title":"An eye-tracking study assessing the comprehension of c and python source code","author":"Turner","year":"2014"},{"key":"10.1016\/j.jss.2026.112825_bib0062","series-title":"Source Code Comprehension: A Contemporary Definition and Conceptual Model for Empirical Investigation","author":"Wyrich","year":"2023"},{"key":"10.1016\/j.jss.2026.112825_bib0063","series-title":"Proceedings of the International Workshop on Methodological Issues with Empirical Studies in Software Engineering (WSESE\u201924)","first-page":"42","article-title":"Apples, oranges, and software engineering: study selection challenges for secondary research on latent variables","author":"Wyrich","year":"2024"},{"issue":"4","key":"10.1016\/j.jss.2026.112825_bib0064","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3626522","article-title":"40 Years of designing code comprehension experiments: a systematic mapping study","volume":"56","author":"Wyrich","year":"2023","journal-title":"ACM Comput. Surv."},{"issue":"12","key":"10.1016\/j.jss.2026.112825_bib0037","doi-asserted-by":"crossref","first-page":"2528","DOI":"10.1080\/0144929X.2021.1933182","article-title":"Identifying program confusion using electroencephalogram measurements","volume":"41","author":"Yeh","year":"2022","journal-title":"Behav. Inf. Technol."}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000592?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000592?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T02:03:13Z","timestamp":1775440993000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121226000592"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":64,"alternative-id":["S0164121226000592"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2026.112825","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Refactoring for novices in Java: An eye tracking study on the extract vs. inline methods","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2026.112825","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112825"}}