{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:33:22Z","timestamp":1772642002354,"version":"3.50.1"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/tse.2019.2901490","type":"journal-article","created":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T19:58:36Z","timestamp":1551124716000},"page":"630-652","source":"Crossref","is-referenced-by-count":65,"title":["Exploring Community Smells in Open-Source: An Automated Approach"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1230-8961","authenticated-orcid":false,"given":"Damian A.","family":"Tamburri","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9337-5116","authenticated-orcid":false,"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[{"name":"University of Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0392-2783","authenticated-orcid":false,"given":"Rick","family":"Kazman","sequence":"additional","affiliation":[{"name":"University of Hawaii &#x0026; SEI\/CMU, Honolulu, Hawaii, USA"}]}],"member":"263","reference":[{"key":"ref73","article-title":"Respondent-driven sampling bias induced by clustering and community structure in social networks","volume":"abs 1503 5826","author":"da rocha","year":"2015","journal-title":"CoRR"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.73"},{"key":"ref71","article-title":"A socio-technical quality model for software engineering organisational structures: An empirical study","author":"magnoni","year":"2016","journal-title":"Copyright - Politecnico di Milano Master Thesis Series"},{"key":"ref70","first-page":"3","article-title":"On the evolution of social and organizational networks","volume":"16","author":"carley","year":"1999","journal-title":"Special Issue of Research in the Sociology of Organizations on Networks in and Around Organizations"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919083"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/52.795103"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2878377"},{"key":"ref39","first-page":"16","article-title":"The markov chain simulation method for generating connected power law random graphs","author":"gkantsidis","year":"2003","journal-title":"Proc 5th Workshop Algorithm Eng Experiments"},{"key":"ref75","first-page":"28","article-title":"How do committees invent?","volume":"4","author":"conway","year":"1968","journal-title":"j-DATAMATION"},{"key":"ref38","article-title":"Fast algorithm for detecting community structure in networks","volume":"69","author":"newman","year":"2003","journal-title":"Phys Rev E"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.29"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1539592"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/9781119205258"},{"key":"ref32","article-title":"Moving from dyad to triad: A triangular interdependent perspective on brand relationships","author":"stein","year":"2013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2883603"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.144"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-04-2013-0068"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.170"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0983-9_77"},{"key":"ref60","author":"fenton","year":"1997","journal-title":"Software Metrics A Rigorous and Practical Approach"},{"key":"ref62","first-page":"287","article-title":"Globalization and global software development","volume":"8","author":"cho","year":"2007","journal-title":"Issues in Inform Syst"},{"key":"ref61","first-page":"3286","article-title":"Paid versus volunteer work in open source","author":"riehle","year":"2014","journal-title":"Proc 47th Hawaii Int Conf Syst Sci"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/2189835.2189836","article-title":"Professional trust and privacy: the dangers of silo thinking","volume":"3","author":"gotterbarn","year":"2012","journal-title":"Inroads"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1985374.1985379"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/25148682"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2465387"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180929"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.239"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2016.06.003"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0022656"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.neucom.2014.04.025","article-title":"Being rational or aggressive? a revisit to dunbar's number in online social networks","volume":"142","author":"zhao","year":"2014","journal-title":"Neurocomputing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.1995.496949"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478417"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00063"},{"key":"ref21","author":"merton","year":"1968","journal-title":"Social Theory and Social Structure"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593896"},{"key":"ref23","first-page":"153","author":"coleman","year":"1987","journal-title":"Microfoundations and Macrosocial Behavior"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01230"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593887"},{"key":"ref50","article-title":"A technique for the measurement of attitudes","author":"likert","year":"1932","journal-title":"Archives of Psychology"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1086\/209351"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606617"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702549"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/E14-1058"},{"key":"ref56","author":"krippendorff","year":"2004","journal-title":"Content Analysis An Introduction to Its Methodology"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083117"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2015.16"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503718"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/mzg031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522971"},{"key":"ref11","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref40","first-page":"1","article-title":"Discovering community types in open-source: A systematic approach and its evaluation","author":"tamburri","year":"2017","journal-title":"Empirical Softw Eng"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2013.6614739"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.73"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2160718.2160733"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224286"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2735399.2735419"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940091"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2015.16"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.83"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070550"},{"key":"ref19","author":"pugh","year":"1984","journal-title":"Theory org"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205177"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3195836.3195856"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0024-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370230"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-03605-2","author":"sugar","year":"2014","journal-title":"Studies of ID Practices A Review and Synthesis of Research on ID Current Practices"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0024-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/13.2-3.263"},{"key":"ref45","article-title":"Exploring community smells in open-source: An automated approach","author":"tamburri","year":"2018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-13-3"},{"key":"ref47","author":"cohen","year":"1988","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00008-4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.05.001"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(88)90004-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1999.2875"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9378892\/08651329.pdf?arnumber=8651329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T22:54:07Z","timestamp":1694645647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8651329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":84,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2019.2901490","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}