{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:13:48Z","timestamp":1760955228622},"reference-count":38,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1989,1,1]],"date-time":"1989-01-01T00:00:00Z","timestamp":599616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Man-Machine Studies"],"published-print":{"date-parts":[[1989,1]]},"DOI":"10.1016\/s0020-7373(89)80019-7","type":"journal-article","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T07:18:48Z","timestamp":1290755928000},"page":"23-46","source":"Crossref","is-referenced-by-count":36,"title":["Toward a theory of computer program bugs: an empirical test"],"prefix":"10.1016","volume":"30","author":[{"given":"Iris","family":"Vessey","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0020-7373(89)80019-7_bib1","series-title":"NTIS, AD-A060522\/0","article-title":"Cognitive structures in the comprehension and memory of computer programs: an investigation of computer program debugging.","author":"Atwood","year":"1978"},{"key":"10.1016\/S0020-7373(89)80019-7_bib2","series-title":"Theory Construction: From Verbal to Mathematical Formulations.","author":"Blalock","year":"1969"},{"key":"10.1016\/S0020-7373(89)80019-7_bib3","series-title":"Multivariate Statistical Methods in Behavioral Research","author":"Bock","year":"1975"},{"key":"10.1016\/S0020-7373(89)80019-7_bib4","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TC.1976.1674590","article-title":"Software engineering.","volume":"C-25","author":"Boehm","year":"1976","journal-title":"IEEE Transactions on Computing"},{"key":"10.1016\/S0020-7373(89)80019-7_bib5","series-title":"The Mythical Man-Month","author":"Brooks","year":"1975"},{"key":"10.1016\/S0020-7373(89)80019-7_bib6","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/358841.358847","article-title":"Studying programmer behavior experimentally: the problems of proper methodology","volume":"23","author":"Brooks","year":"1980","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0020-7373(89)80019-7_bib7","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/S0020-7373(83)80031-5","article-title":"Towards a theory of the comprehension of computer programs","volume":"18","author":"Brooks","year":"1983","journal-title":"International Journal of Man-Machine Studies"},{"key":"10.1016\/S0020-7373(89)80019-7_bib8","series-title":"Experimental and Quasi-Experimental Designs for Research.","author":"Campbell","year":"1963"},{"key":"10.1016\/S0020-7373(89)80019-7_bib9","series-title":"Language and Comprehension.","article-title":"Do we really mean schemata?","author":"Denhiere","year":"1982"},{"key":"10.1016\/S0020-7373(89)80019-7_bib10","series-title":"Protocol Analysis: Verbal Reports as Data.","author":"Ericsson","year":"1984"},{"key":"10.1016\/S0020-7373(89)80019-7_bib11","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/S0020-7373(75)80005-8","article-title":"Some psychological evidence on how people debug computer programs","volume":"7","author":"Gould","year":"1975","journal-title":"International Journal of Man-Machine Studies"},{"key":"10.1016\/S0020-7373(89)80019-7_bib12","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1177\/001872087401600308","article-title":"An exploratory study of computer program debugging","volume":"16","author":"Gould","year":"1974","journal-title":"Human Factors"},{"key":"10.1016\/S0020-7373(89)80019-7_bib13","series-title":"Psychonomics Society Meetings","article-title":"Computer program debugging by experts","author":"Jeffries","year":"1981"},{"key":"10.1016\/S0020-7373(89)80019-7_bib14","series-title":"AERA Annual Meeting","article-title":"A comparison of the debugging behavior of expert and novice programmers.","author":"Jeffries","year":"1982"},{"key":"10.1016\/S0020-7373(89)80019-7_bib15","series-title":"The Representation of Meaning in Memory.","author":"Kintsch","year":"1974"},{"key":"10.1016\/S0020-7373(89)80019-7_bib16","series-title":"Empirical Studies of Programmers","first-page":"58","article-title":"Cognitive processes in program comprehension.","author":"Letovsky","year":"1986"},{"key":"10.1016\/S0020-7373(89)80019-7_bib17","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1145\/359588.359602","article-title":"A controlled experiment in program testing and code walkthroughs\/inspections","volume":"21","author":"Myers","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0020-7373(89)80019-7_bib18","series-title":"Applied Linear Statistical Models.","author":"Neter","year":"1974"},{"key":"10.1016\/S0020-7373(89)80019-7_bib19","series-title":"Technical Report No. 46","article-title":"Cognitive components of expertise in computer programming: a review of the literature.","author":"Pennington","year":"1982"},{"key":"10.1016\/S0020-7373(89)80019-7_bib20","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0010-0285(87)90007-7","article-title":"Stimulus structures and mental representations in expert comprehension of computer programs","volume":"19","author":"Pennington","year":"1987","journal-title":"Cognitive Psychology"},{"key":"10.1016\/S0020-7373(89)80019-7_bib21","series-title":"Formal representation for plans in the programmer's apprentice.","author":"Rich","year":"1981"},{"key":"10.1016\/S0020-7373(89)80019-7_bib22","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TSE.1978.233869","article-title":"Initial report on a LISP programmer's apprentice.","volume":"SE-4","author":"Rich","year":"1978","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0020-7373(89)80019-7_bib23","article-title":"Design of a programmer's apprentice.","volume":"Volume 1","author":"Rich","year":"1979"},{"key":"10.1016\/S0020-7373(89)80019-7_bib24","series-title":"Representation and Understanding: Studies in Cognitive Science","article-title":"Notes on a schema for stories.","author":"Rumelhart","year":"1975"},{"key":"10.1016\/S0020-7373(89)80019-7_bib25","series-title":"Basic Processes in Reading: Perception and Comprehension","article-title":"Understanding and summarizing brief stories.","author":"Rumelhart","year":"1977"},{"key":"10.1016\/S0020-7373(89)80019-7_bib26","series-title":"Theoretical Issues in Reading Comprehension.","article-title":"Schemata: the building blocks of cognition.","author":"Rumelhart","year":"1981"},{"key":"10.1016\/S0020-7373(89)80019-7_bib27","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/356835.356840","article-title":"The psychological study of programming","volume":"13","author":"Sheil","year":"1981","journal-title":"Computing Surveys"},{"key":"10.1016\/S0020-7373(89)80019-7_bib28","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.1979.1658575","article-title":"Modern coding practices and programmer performance","volume":"12","author":"Sheppard","year":"1979","journal-title":"Computer"},{"key":"10.1016\/S0020-7373(89)80019-7_bib29","series-title":"Software Psychology","author":"Shneiderman","year":"1980"},{"key":"10.1016\/S0020-7373(89)80019-7_bib30","series-title":"Experimental investigations of computer program debugging and modification","author":"Shneiderman","year":"1976"},{"key":"10.1016\/S0020-7373(89)80019-7_bib31","series-title":"SPSSX User's Manual.","year":"1983"},{"key":"10.1016\/S0020-7373(89)80019-7_bib32","series-title":"Semantic Macrostructures.","author":"Van Dyck","year":"1980"},{"key":"10.1016\/S0020-7373(89)80019-7_bib33","series-title":"An investigation of the psychological processes underlying the debugging of computer programs","author":"Vessey","year":"1984"},{"key":"10.1016\/S0020-7373(89)80019-7_bib34","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/S0020-7373(85)80054-7","article-title":"Expertise in debugging computer programs: a process analysis","volume":"23","author":"Vessey","year":"1985","journal-title":"International Journal of Man-Machine Studies"},{"key":"10.1016\/S0020-7373(89)80019-7_bib35","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TSE.1984.5010252","article-title":"Research on structured programming: an empiricist's evaluation.","volume":"SE-10","author":"Vessey","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0020-7373(89)80019-7_bib36","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/TSE.1979.234185","article-title":"A method for analyzing loop programs.","volume":"SE-5","author":"Waters","year":"1979","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0020-7373(89)80019-7_bib37","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/S0022-5371(81)90560-0","article-title":"An evaluation of alternative functional models of narrative schemata","volume":"20","author":"Yekovitch","year":"1981","journal-title":"Journal of Verbal Learning and Verbal Behavior"},{"key":"10.1016\/S0020-7373(89)80019-7_bib38","series-title":"Structured Design.","author":"Yourdon","year":"1979"}],"container-title":["International Journal of Man-Machine Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020737389800197?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020737389800197?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T10:50:41Z","timestamp":1544093441000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020737389800197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1989,1]]}},"alternative-id":["S0020737389800197"],"URL":"https:\/\/doi.org\/10.1016\/s0020-7373(89)80019-7","relation":{},"ISSN":["0020-7373"],"issn-type":[{"value":"0020-7373","type":"print"}],"subject":[],"published":{"date-parts":[[1989,1]]}}}