{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:56:26Z","timestamp":1761976586320,"version":"build-2065373602"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,7]]},"DOI":"10.1109\/icsme64153.2025.00037","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:08:56Z","timestamp":1761930536000},"page":"321-332","source":"Crossref","is-referenced-by-count":0,"title":["Characterizing the System Evolution That is Proposed After a Software Incident"],"prefix":"10.1109","author":[{"given":"Matt","family":"Pope","sequence":"first","affiliation":[{"name":"Brigham Young University,Department of Computer Science,Provo,USA"}]},{"given":"Jonathan","family":"Sillito","sequence":"additional","affiliation":[{"name":"Brigham Young University,Department of Computer Science,Provo,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3542929.3563482"},{"key":"ref2","first-page":"359","article-title":"\\{AutoARTS\\}: Taxonomy, insights and tools for root cause labelling of incidents in microsoft azure","volume-title":"2023 USENIX Annual Technical Conference (USENIX ATC 23)","author":"Dogga","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/10803548.2013.11076966"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2307\/40183951"},{"issue":"2","key":"ref5","first-page":"107","volume-title":"Organizational learning ii: Theory, method and practice","volume":"305","author":"Sch\u00f6n","year":"1996"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2013.02.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613898"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3552326.3587448"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00027"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417055"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00029"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629553"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417054"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00149"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639754"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613891"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3403\/30488876"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780190263362.013.29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.09.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2011.01.011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1108\/13665621011071109"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2011.12.032"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2010.02.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/13678868.2013.792490"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2014.07.027"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2017.09.018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FOSM.2008.4659256"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/359511.359522"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.1990.101064"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/smr.220"},{"key":"ref33","article-title":"Towards a taxonomy of software evolution","volume-title":"Proceedings of the International Workshop on Unanticipated Software Evolution, no. CONF","author":"Mens","year":"2003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/smr.319"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593893"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3643666.3648578","article-title":"Post-incident action items: Crossroads of requirements engineering and software evolution","volume-title":"Proceedings of the 1st IEEE\/ACM Workshop on Multi-disciplinary, Open, and RElevant Requirements Engineering","author":"Pope","year":"2024"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101248"},{"key":"ref39","first-page":"80","article-title":"Crowd disasters: A socio-technical systems perspective","volume-title":"Crowds in the 21st Century","author":"Challenger"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4135\/9781452230153"},{"issue":"1","key":"ref41","article-title":"Postmortem action items: Plan the work and work the plan","volume":"42","author":"Lunney","year":"2017","journal-title":"login Usenix Mag."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500304"},{"key":"ref43","first-page":"1932","article-title":"What\u2019s the difference between reliability and resilience","author":"Clark-Ginsberg","year":"2016","journal-title":"Department of Homeland Security. March"},{"volume-title":"Thinking in systems: A primer","year":"2008","author":"Meadows","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.3930230410"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8179.001.0001"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.h4672"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"}],"event":{"name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2025,9,7]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185055\/11185853\/11186081.pdf?arnumber=11186081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:51:30Z","timestamp":1761976290000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11186081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,7]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/icsme64153.2025.00037","relation":{},"subject":[],"published":{"date-parts":[[2025,9,7]]}}}