{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T23:17:08Z","timestamp":1774653428873,"version":"3.50.1"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/icse-seis55304.2022.9793879","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T17:37:34Z","timestamp":1655746654000},"page":"41-55","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Interpersonal Conflict in Issues and Code Review: Cross Pollinating Open- and Closed-Source Approaches"],"prefix":"10.1109","author":[{"given":"Huilian Sophie","family":"Qiu","sequence":"first","affiliation":[{"name":"Carnegie Mellon University,Pittsburgh,PA,USA"}]},{"given":"Bogdan","family":"Vasilescu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,Pittsburgh,PA,USA"}]},{"given":"Christian","family":"Kastner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,Pittsburgh,PA,USA"}]},{"given":"Carolyn","family":"Egelman","sequence":"additional","affiliation":[{"name":"Google,Sunnyvale,CA,USA"}]},{"given":"Ciera","family":"Jaspan","sequence":"additional","affiliation":[{"name":"Google,Sunnyvale,CA,USA"}]},{"given":"Emerson","family":"Murphy-Hill","sequence":"additional","affiliation":[{"name":"Google,Sunnyvale,CA,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpn018"},{"key":"ref38","article-title":"Did You Miss My Comment or What?","author":"miller","year":"0","journal-title":"Understanding Toxicity in Open Source Discussions In International Conference on Software Engineering (ICSE) ACM"},{"key":"ref33","first-page":"292","article-title":"The logic of politeness: Or, minding your p's and q's","volume":"9","author":"lakoff","year":"0","journal-title":"Proceedings from the Annual Meeting of the Chicago Linguistic Society"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12590"},{"key":"ref31","first-page":"425","article-title":"Variable importance using decision trees","author":"kazemitabar","year":"0","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems"},{"key":"ref30","first-page":"3658","article-title":"A just and comprehensive strategy for using NIP to address online abuse","author":"jurgens","year":"0","journal-title":"in 57th Annual Meeting of the Association for Computational Linguistics ACL 2019 Association for Computational Linguistics (ACL)"},{"key":"ref37","author":"lehnardt","year":"0","journal-title":"Sustainable Open Source The Maintainers Per-spective or How I Learned to Stop Caring and Love Open Source"},{"key":"ref36","first-page":"14","article-title":"Capturing Covertly Toxic Speech via Crowdsourcing","author":"lees","year":"0","journal-title":"Proceedings of the First Workshop on Bridging Human-Computer Interaction and Natural Language Pro-cessing"},{"key":"ref35","author":"lawson","year":"2017","journal-title":"What it feels like to be an open-source maintainer"},{"key":"ref34","first-page":"79","article-title":"What you can do with words: Politeness, pragmatics and per-formatives","author":"lakoff","year":"0","journal-title":"Proceedings of the Texas conference on performatives presuppositions and implicatures ERIC"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884606"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1002\/cbm.2116","article-title":"Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition","volume":"29","author":"sebastian","year":"2019","journal-title":"Criminal Behaviour and Mental Health"},{"key":"ref61","first-page":"3789","article-title":"Gender and tenure diversity in GitHub teams","author":"bogdan","year":"0","journal-title":"Proceedings of the 33rd annual ACM confer-ence on human factors in computing systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1214\/07-EJS039"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"ref27","first-page":"377","article-title":"Au-tomatically mining software-based, semantically-similar words from comment-code mappings","author":"matthew","year":"0","journal-title":"2013 10th Working Conference on Mining Software Repositories (MSR)"},{"key":"ref64","article-title":"Conversations gone awry: Detecting early signs of conversational failure","author":"justine","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9493-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00111"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115623"},{"key":"ref20","first-page":"17","article-title":"A longitu-dinal study on the maintainers&#x2018; sentiment of a large scale open source ecosystem","author":"ferreira","year":"0","journal-title":"2019 IEEE\/ACM 4nd International Workshop on Emotion Awareness in Software Engineering (SEmotion)"},{"key":"ref22","author":"geiger","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2017.18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224294"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.622"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597118"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3377816.3381732"},{"key":"ref51","first-page":"269","article-title":"Snorkel: Rapid training data creation with weak supervision","volume":"11","author":"alexander","year":"0","journal-title":"Proceedings of the 30th International Conference on Very Large Data Bases VLDB Endowment"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.623"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21690"},{"key":"ref56","first-page":"68","article-title":"Open source software commu-nity inclusion initiatives to support women participation","author":"singh","year":"0","journal-title":"IFIP International Conference on Open Source Systems"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2957792.2957801"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00030"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183525"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3463274.3463805"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811422887"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00060"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473492"},{"key":"ref13","author":"consalvo","year":"2012","journal-title":"Confronting toxic gamer culture A challenge for feminist game studies scholars"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"ref15","article-title":"A computational approach to politeness with application to social factors","author":"danescu-niculescu-mizil","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref17","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref18","first-page":"174","article-title":"Predicting develop-ers&#x2018; negative feelings about code review","author":"carolyn","year":"0","journal-title":"2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.06.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445157"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317083"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813085"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref8","article-title":"ConvoKit: A Toolkit for the Analysis of Conversations","author":"chang","year":"0","journal-title":"Proceedings of Special Interest Group on Discourse and Dialogue"},{"key":"ref49","article-title":"An Information Retrieval Approach to Building Datasets for Hate Speech Detection","author":"rahman","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9546-9"},{"key":"ref9","first-page":"20","article-title":"Norm violation in online communities-A study of Stack Overflow comments","author":"cheriyan","year":"2017","journal-title":"Coordination Organizations Institutions Norms and Ethics for Governance of Multi-Agent Systems XIII"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667987"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1037\/pspp0000020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3359224"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.396"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21741-9_22"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196453"},{"key":"ref44","first-page":"311","article-title":"Opinion mining and sentiment analysis","volume":"35","author":"pang","year":"2009","journal-title":"Comput Linguist"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.35"}],"event":{"name":"2022 IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,24]]}},"container-title":["2022 IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9793840\/9793553\/09793879.pdf?arnumber=9793879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T16:04:47Z","timestamp":1657555487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9793879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/icse-seis55304.2022.9793879","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}