{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T04:09:11Z","timestamp":1747714151038,"version":"3.40.5"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"German Federal Ministry of Education and Research","doi-asserted-by":"publisher","award":["Q-SOFT","01IS22001A"],"award-info":[{"award-number":["Q-SOFT","01IS22001A"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["AP 206\/14-1"],"award-info":[{"award-number":["AP 206\/14-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tse.2025.3556248","type":"journal-article","created":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:29:53Z","timestamp":1743218993000},"page":"1554-1568","source":"Crossref","is-referenced-by-count":0,"title":["Prioritizing Test Gaps by Risk in Industrial Practice: An Automated Approach and Multimethod Study"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3248-3401","authenticated-orcid":false,"given":"Roman","family":"Haas","sequence":"first","affiliation":[{"name":"Saarbr&#x00FC;cken Graduate School of Computer Science, Saarbr&#x00FC;cken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4125-4942","authenticated-orcid":false,"given":"Michael","family":"Sailer","sequence":"additional","affiliation":[{"name":"CQSE GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8812-3379","authenticated-orcid":false,"given":"Mitchell","family":"Joblin","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr&#x00FC;cken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1692-6839","authenticated-orcid":false,"given":"Elmar","family":"Juergens","sequence":"additional","affiliation":[{"name":"CQSE GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3687-2233","authenticated-orcid":false,"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr&#x00FC;cken, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2770124"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330264"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110493"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0148"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877678"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107192"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232222"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/52.476287"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2013.6595800"},{"article-title":"Did we test the right thing? Experience with test gap analysis in practice","year":"2016","author":"Juergens","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TestVis57757.2022.00008"},{"article-title":"How to use analytics to eliminate the risk of your team\u2019s technical debt","year":"2019","author":"Schwartz","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09781-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.56"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095559"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3567550"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2015.7208254"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3368267"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.187"},{"article-title":"Grouping and Prioritization of Test Gaps","year":"2019","author":"Sailer","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639721"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.112"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3051492"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659747"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.113"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00056"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10261-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3144348"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3503723"},{"article-title":"Directive 2008\/104\/ec of the european parliament and of the council of 19 november 2008 on temporary agency work","volume-title":"Official J. Eur. Union","year":"2022","key":"ref43"},{"article-title":"The pagerank citation ranking: Bringing order to the web","year":"1999","author":"Page","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.500-235"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TechDebt.2019.00016"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.95"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3241743"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-044-5_8"},{"article-title":"Regulation on digital operational resilience for the financial sector and amending regulations (ec) no 1060\/2009, (eu) no 648\/2012, (eu) no 600\/2014, (eu) no 909\/2014 and (eu) 2016\/1011","volume-title":"Official J. Eur. Union","year":"2022","key":"ref54"},{"author":"Popeea-Simeth","key":"ref55","article-title":"Monthly assessments: How often to inspect the code quality in a code quality control process? Last retrieved 2024-01-16"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/33.3.239"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0686-2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4754(00)00270-6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.06.032"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00097"},{"volume-title":"Qualitative Content Analysis: A Step-by-Step Guide","year":"2021","author":"Mayring","key":"ref61"},{"volume-title":"Statistical Power Analysis for the Behavioral Sciences\u20142nd ed.","year":"1988","author":"Cohen","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.24"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9478-9"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3504003"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11006365\/10945563.pdf?arnumber=10945563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T17:56:59Z","timestamp":1747677419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10945563\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":65,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3556248","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}