{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:44:33Z","timestamp":1763534673448,"version":"3.41.2"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empirical Software Engineering"],"published-print":{"date-parts":[[1998,3]]},"DOI":"10.1023\/a:1009787822215","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T17:50:41Z","timestamp":1040579441000},"page":"9-35","source":"Crossref","is-referenced-by-count":60,"title":["Does Every Inspection Really Need a Meeting?"],"prefix":"10.1007","volume":"3","author":[{"given":"Philip M.","family":"Johnson","sequence":"first","affiliation":[]},{"given":"Danu","family":"Tjahjono","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"159018_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman, A. F., Buchwald, L. S., and Lewski, F. H. 1989. Software inspections: An effective verification process. IEEE Software, 31\u201336.","DOI":"10.1109\/52.28121"},{"issue":"10","key":"159018_CR2","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TSE.1989.559782","volume":"15","author":"D. B. Bisant","year":"1989","unstructured":"Bisant, D. B., and Lyle, J. R. 1989. A two-person inspection method to improve programming productivity. IEEE Transactions on Software Engineering 15(10): 1294\u20131304.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"159018_CR3","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1037\/0022-3514.53.3.497","volume":"53","author":"M. Diehl","year":"1987","unstructured":"Diehl, M., and Stroebe, W. 1987. Productivity loss in brainstorming groups: Toward the solution of a riddle. Journal of Personality and Social Psychology 53(3): 497\u2013509.","journal-title":"Journal of Personality and Social Psychology"},{"key":"159018_CR4","volume-title":"The Cleanroom Approach to Quality Software Development","author":"M. Dyer","year":"1992","unstructured":"Dyer, M. 1992. The Cleanroom Approach to Quality Software Development. John Wiley & Sons, Inc."},{"key":"159018_CR5","doi-asserted-by":"crossref","unstructured":"Eick, S. G., Loader, C. R., Long, M. D., Vander Wiel, S. A., and Votta, L. G. Jr. 1992. Estimating software fault content before coding. Proceedings of the 14th International Conference on Software Engineering, Melbourne, Australia, 59\u201365.","DOI":"10.1109\/ICSE.1992.753490"},{"issue":"3","key":"159018_CR6","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1147\/sj.153.0182","volume":"15","author":"M. E. Fagan","year":"1976","unstructured":"Fagan, M. E. 1976. Design and code inspections to reduce errors in program development. IBM Systems Journal 15(3): 182\u2013211.","journal-title":"IBM Systems Journal"},{"issue":"7","key":"159018_CR7","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSE.1986.6312976","volume":"SE-12","author":"M. E. Fagan","year":"1986","unstructured":"Fagan, M. E. 1986. Advances in software inspections. IEEE Transactions on Software Engineering SE-12(7): 744\u2013751.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"159018_CR8","volume-title":"Statistical Analysis In Psychology And Education","author":"G. A. Ferguson","year":"1989","unstructured":"Ferguson, G. A., and Takane, Y. 1989. Statistical Analysis In Psychology And Education, 6th edition. McGraw-Hill Book Company.","edition":"6th edition"},{"key":"159018_CR9","unstructured":"Freedman, D. P., and Weinberg, G. M. 1990. Handbook of Walkthroughs, Inspections and Technical Reviews, 4th edition. Little, Brown."},{"key":"159018_CR10","unstructured":"Gilb, T., and Graham, D. 1993. Software Inspection. Addison-Wesley."},{"key":"159018_CR11","unstructured":"Humphrey, W. S. 1990. Managing the Software Process. Addison Wesley Publishing Company Inc."},{"key":"159018_CR12","doi-asserted-by":"crossref","unstructured":"Johnson, P. M. 1994. An instrumented approach to improving software quality through formal technical review. Proceedings of the 16th International Conference on Software Engineering, Sorrento, Italy, 113\u2013122.","DOI":"10.1109\/ICSE.1994.296771"},{"issue":"11","key":"159018_CR13","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/163359.163366","volume":"11","author":"J. C. Knight","year":"1993","unstructured":"Knight, J. C., and Myers, E. A. 1993. An improved inspection technique. Communications of the ACM 11(11): 51\u201361.","journal-title":"Communications of the ACM"},{"issue":"2","key":"159018_CR14","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/75577.75587","volume":"33","author":"J. Martin","year":"1990","unstructured":"Martin, J., and Tsai, W.-T. 1990. N-fold inspection: A requirement analysis technique. Communications of the ACM 33(2): 225\u2013232.","journal-title":"Communications of the ACM"},{"issue":"2","key":"159018_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1207\/s15324834basp1201_1","volume":"12","author":"B. Mullen","year":"1991","unstructured":"Mullen, B., Johnson, C. and Salas, E. 1991. Productivity loss in brainstorming groups. Basic and Applied Social Psychology 12(2): 3\u201324.","journal-title":"Basic and Applied Social Psychology"},{"key":"159018_CR16","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/0164-1212(87)90025-2","volume":"7","author":"D. L. Parnas","year":"1987","unstructured":"Parnas, D. L., and Weiss, D. M. 1987. Active design reviews: Principles and practices. Journal of Systems and Software 7: 259\u2013265.","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"159018_CR17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/32.585501","volume":"23","author":"A. A. Porter","year":"1997","unstructured":"Porter, A. A., and Johnson, P. M. 1997. Assessing software review meetings: Results of a comparative analysis of two experimental studies. IEEE Transactions on Software Engineering, 23(3): 129\u2013145.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"159018_CR18","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/32.391380","volume":"21","author":"A. A. Porter","year":"1995","unstructured":"Porter, A. A., Votta, L. G., Jr., and Basili, V. R. 1995. Comparing detection methods for software requirements inspections: A replicated experiment. IEEE Transactions on Software Engineering 21(6): 563\u2013575.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"159018_CR19","doi-asserted-by":"crossref","unstructured":"Russell, G. W. 1991. Experience with inspection in ultralarge-scale developments. IEEE Software, January: 25\u201331.","DOI":"10.1109\/52.62929"},{"key":"159018_CR20","unstructured":"Strauss, S. H., and Ebenau, R. G. 1994. Software Inspection Process. McGraw-Hill."},{"key":"159018_CR21","unstructured":"Tjahjono, D. 1996. Exploring the effectiveness of formal technical review factors with CSRS, a collaborative software review system. PhD thesis, Department of Information and Computer Sciences, University of Hawaii."},{"issue":"5","key":"159018_CR22","first-page":"107","volume":"18","author":"L. G. Votta Jr","year":"1993","unstructured":"Votta, L. G., Jr. 1993. Does every inspection need a meeting? Proceedings of the ACM SIGSOFT 1993 Symposium on Foundations of Software Engineering, volume 18(5) of ACM Software Engineering Notes, December: 107\u2013114.","journal-title":"Proceedings of the ACM SIGSOFT 1993 Symposium on Foundations of Software Engineering"},{"key":"159018_CR23","doi-asserted-by":"crossref","unstructured":"Weller, E. F. 1993. Lessons learned from three years of inspection data. IEEE Software, September: 38\u201345.","DOI":"10.1109\/52.232397"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009787822215.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1009787822215\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009787822215.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T05:58:58Z","timestamp":1753855138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1009787822215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,3]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,3]]}},"alternative-id":["159018"],"URL":"https:\/\/doi.org\/10.1023\/a:1009787822215","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[1998,3]]}}}