{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:11:20Z","timestamp":1778343080427,"version":"3.51.4"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.scico.2026.103475","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:36:11Z","timestamp":1774542971000},"page":"103475","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Using real-world scenarios to bridge training and practice in evidence-based software engineering: An extended evaluation"],"prefix":"10.1016","volume":"253","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5535-8646","authenticated-orcid":false,"given":"Sebasti\u00e1n","family":"Pizard","sequence":"first","affiliation":[]},{"given":"Leticia","family":"Marenco","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.scico.2026.103475_bib0001","series-title":"International Conference on Software Engineering","article-title":"Evidence-based software engineering","author":"Kitchenham","year":"2004"},{"key":"10.1016\/j.scico.2026.103475_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2021.106609","article-title":"Grey literature in software engineering: a critical review","volume":"138","author":"Kamei","year":"2021","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.scico.2026.103475_bib0003","doi-asserted-by":"crossref","DOI":"10.1201\/b19467","article-title":"Evidence-based software engineering and systematic reviews","author":"Kitchenham","year":"2015"},{"key":"10.1016\/j.scico.2026.103475_bib0004","series-title":"International Conference on Evaluation and Assessment in Software Engineering","article-title":"Outcomes of a community workshop to identify and rank barriers to the systematic literature review process","author":"Hassler","year":"2014"},{"issue":"9","key":"10.1016\/j.scico.2026.103475_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2011.04.004","article-title":"Six years of systematic literature reviews in software engineering: an updated tertiary study","volume":"53","author":"Da Silva","year":"2011","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"10.1016\/j.scico.2026.103475_bib0006","doi-asserted-by":"crossref","DOI":"10.1007\/s10664-021-09953-9","article-title":"Training students in evidence-based software engineering and systematic reviews: a systematic review and empirical study","volume":"26","author":"Pizard","year":"2021","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"10.1016\/j.scico.2026.103475_bib0007","doi-asserted-by":"crossref","DOI":"10.5195\/jmla.2016.12","article-title":"Instructional methods used by health sciences librarians to teach evidence-based practice (EBP): a systematic review","volume":"104","author":"Swanberg","year":"2016","journal-title":"J. Med. Libr. Assoc."},{"key":"10.1016\/j.scico.2026.103475_bib0008","article-title":"A structured process to develop scenarios for use in evaluation of an evidence-based approach in clinical decision making","volume":"3","author":"Manns","year":"2012","journal-title":"Adv. Med. Educ. Pract."},{"key":"10.1016\/j.scico.2026.103475_bib0009","series-title":"IEEE\/ACM International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET)","article-title":"A longitudinal case study on the effects of an evidence-based software engineering training","author":"Pizard","year":"2022"},{"key":"10.1016\/j.scico.2026.103475_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2022.107101","article-title":"Assessing attitudes towards evidence-based software engineering in a government agency","volume":"154","author":"Pizard","year":"2023","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.scico.2026.103475_bib0011","series-title":"Ibero-American Conference on Software Engineering (CIBSE)","article-title":"Using real-world scenarios to bridge training and practice in evidence-Based software engineering","author":"Pizard","year":"2025"},{"issue":"2","key":"10.1016\/j.scico.2026.103475_bib0012","doi-asserted-by":"crossref","DOI":"10.1111\/medu.12288","article-title":"Methods of teaching medical trainees evidence-based medicine: a systematic review","volume":"48","author":"Ilic","year":"2014","journal-title":"Med. Educ."},{"issue":"1","key":"10.1016\/j.scico.2026.103475_bib0013","doi-asserted-by":"crossref","DOI":"10.1186\/s12909-019-1681-0","article-title":"Methods for teaching evidence-based practice: a scoping review","volume":"19","author":"Larsen","year":"2019","journal-title":"BMC Med. Educ."},{"key":"10.1016\/j.scico.2026.103475_bib0014","doi-asserted-by":"crossref","DOI":"10.1136\/bmj.329.7473.1017","article-title":"What is the evidence that postgraduate teaching in evidence based medicine changes anything? a systematic review","volume":"329","author":"Coomarasamy","year":"2004","journal-title":"BMJ"},{"key":"10.1016\/j.scico.2026.103475_bib0015","series-title":"International Software Metrics Symposium","article-title":"Teaching evidence-based software engineering to university students","author":"J\u00f8rgensen","year":"2005"},{"key":"10.1016\/j.scico.2026.103475_bib0016","series-title":"International Conference on Evaluation and Assessment in Software Engineering","article-title":"A preliminary empirical investigation of the use of evidence based software engineering by undergraduate students","author":"Rainer","year":"2006"},{"key":"10.1016\/j.scico.2026.103475_bib0017","series-title":"International Conference on Evaluation and Assessment in Software Engineering","article-title":"A follow-up empirical evaluation of evidence based software engineering by undergraduate students","author":"Rainer","year":"2008"},{"key":"10.1016\/j.scico.2026.103475_bib0018","series-title":"Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","author":"ACM","year":"2013"},{"key":"10.1016\/j.scico.2026.103475_bib0019","series-title":"Writing and using learning outcomes: A practical guide","author":"Kennedy","year":"2007"},{"issue":"7","key":"10.1016\/j.scico.2026.103475_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2013.01.005","article-title":"Analyzing an automotive testing process with evidence-based software engineering","volume":"55","author":"Kasoju","year":"2013","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"10.1016\/j.scico.2026.103475_bib0021","doi-asserted-by":"crossref","DOI":"10.25300\/MISQ\/2013\/37.1.02","article-title":"Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems","volume":"37","author":"Venkatesh","year":"2013","journal-title":"MIS Q."},{"key":"10.1016\/j.scico.2026.103475_bib0022","series-title":"Handbook of Qualitative Research","article-title":"Ethnography and participant observation","author":"Atkinson","year":"1994"},{"issue":"1","key":"10.1016\/j.scico.2026.103475_bib0023","doi-asserted-by":"crossref","DOI":"10.1111\/j.1365-2575.2004.00162.x","article-title":"Principles of canonical action research","volume":"14","author":"Davison","year":"2004","journal-title":"Inf. Syst. J."},{"issue":"2","key":"10.1016\/j.scico.2026.103475_bib0024","doi-asserted-by":"crossref","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qual. Res. Psychol."},{"issue":"9","key":"10.1016\/j.scico.2026.103475_bib0025","doi-asserted-by":"crossref","DOI":"10.1097\/ACM.0000000000000388","article-title":"Standards for reporting qualitative research: a synthesis of recommendations","volume":"89","author":"O\u2019Brien","year":"2014","journal-title":"Acad. Med."},{"issue":"1","key":"10.1016\/j.scico.2026.103475_bib0026","article-title":"What support do systematic reviews provide for evidence-informed teaching about software engineering practice?","volume":"14","author":"Budgen","year":"2020","journal-title":"E-Inf. Softw. Eng. J."},{"key":"10.1016\/j.scico.2026.103475_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2014.06.011","article-title":"A systematic review on the relationship between user involvement and system success","volume":"58","author":"Bano","year":"2015","journal-title":"Inf. Softw. Technol."},{"issue":"9","key":"10.1016\/j.scico.2026.103475_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2012.04.075","article-title":"A systematic literature review of stakeholder identification methods in requirements elicitation","volume":"85","author":"Pacheco","year":"2012","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.scico.2026.103475_bib0029","doi-asserted-by":"crossref","DOI":"10.1136\/qshc.7.3.149","article-title":"Enabling the implementation of evidence based practice: a conceptual framework","volume":"7","author":"Kitson","year":"1998","journal-title":"Qual. Health Care"},{"issue":"1","key":"10.1016\/j.scico.2026.103475_bib0030","doi-asserted-by":"crossref","DOI":"10.1186\/s13643-016-0337-y","article-title":"Searching and synthesising \u2019grey literature\u2019 and \u2019grey information\u2019 in public health: critical reflections on three case studies","volume":"5","author":"Adams","year":"2016","journal-title":"Syst. Rev."},{"key":"10.1016\/j.scico.2026.103475_bib0031","series-title":"Effective inclusion of people with disabilities in software development teams","first-page":"447-453","author":"da Rocha","year":"2024"},{"key":"10.1016\/j.scico.2026.103475_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2024.107541","article-title":"On meetings involving remote software teams: a systematic literature review","volume":"175","author":"de Andrade","year":"2024","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.scico.2026.103475_bib0033","doi-asserted-by":"crossref","unstructured":"Kamei F., Wiese I., Neto C., Polato I., Nepomuceno V., Ferreira W., Ribeiro M., Pena C., Cartaxo B., Pinto G., Soares S., Grey Literature in Software Engineering: A Critical Review, 2022, 10.5281\/zenodo.6780520.","DOI":"10.1016\/j.infsof.2021.106609"},{"key":"10.1016\/j.scico.2026.103475_bib0034","series-title":"Taxonomy of educational objectives, the classification of educational Goals, handbook I: Cognitive domain","author":"Bloom","year":"1956"},{"issue":"03","key":"10.1016\/j.scico.2026.103475_bib0035","doi-asserted-by":"crossref","DOI":"10.1109\/MS.2024.3362649","article-title":"Experience report: it will never work in theory","volume":"41","author":"Wilson","year":"2024","journal-title":"IEEE Softw."},{"issue":"3","key":"10.1016\/j.scico.2026.103475_bib0036","doi-asserted-by":"crossref","first-page":"214","DOI":"10.5014\/ajot.45.3.214","article-title":"Rigor in qualitative research: the assessment of trustworthiness","volume":"45","author":"Krefting","year":"1991","journal-title":"Am. J. Occup. Ther."},{"issue":"2","key":"10.1016\/j.scico.2026.103475_bib0037","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/BF02766777","article-title":"Criteria for assessing the trustworthiness of naturalistic inquiries","volume":"29","author":"Guba","year":"1981","journal-title":"Educ. Commun. Technol."},{"issue":"3","key":"10.1016\/j.scico.2026.103475_bib0038","doi-asserted-by":"crossref","DOI":"10.1145\/3241743","article-title":"The ABC of software engineering research","volume":"27","author":"Stol","year":"2018","journal-title":"ACM Trans. Softw. Eng. Method."},{"key":"10.1016\/j.scico.2026.103475_bib0039","doi-asserted-by":"crossref","unstructured":"Pizard S. and Marenco L., Data & Codification from Stage 2 of the study \u201dUsing Real-world Scenarios to Bridge Training and Practice in Evidence-Based Software Engineering\u201d, 2025, 10.5281\/zenodo.14719220.","DOI":"10.5753\/cibse.2025.35288"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642326000419?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642326000419?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T15:46:22Z","timestamp":1778341582000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642326000419"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":39,"alternative-id":["S0167642326000419"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2026.103475","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Using real-world scenarios to bridge training and practice in evidence-based software engineering: An extended evaluation","name":"articletitle","label":"Article Title"},{"value":"Science of Computer Programming","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.scico.2026.103475","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103475"}}