{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:17:02Z","timestamp":1729624622826,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/vlhcc.2016.7739678","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T21:40:55Z","timestamp":1478814055000},"page":"152-156","source":"Crossref","is-referenced-by-count":2,"title":["Examining active error in software development"],"prefix":"10.1109","author":[{"given":"Tamara","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Marian","family":"Petrel","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Nuseibehl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.45"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/248448.248456"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1998.0203"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/208666.208675"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/0144929031000081341"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1002_2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227166"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227110"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541848"},{"key":"ref34","first-page":"36","article-title":"A case study of team programming during perfective software maintenance","author":"flor","year":"1991","journal-title":"Empirical Studies of Programmers Fourth Workshop"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2004.08.003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.111"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2012.6223030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/00140139008925325"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009716016693"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/52.819967"},{"key":"ref15","article-title":"Secondary data","author":"mcginn","year":"2008","journal-title":"The Sage encyclopedia of qualitative researchmethods"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.4324\/9780203944769","author":"hammersley","year":"2007","journal-title":"Ethnography Principles in Practice"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8325.1993.tb00541.x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.1994.tb00841.x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368123"},{"key":"ref4","volume":"12","author":"scott","year":"1990","journal-title":"A matter of record documentary sources in social research"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718972"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367"},{"key":"ref6","article-title":"Dependability-a unifying concept","author":"randell","year":"1998","journal-title":"Proceedings of the Conference on Computer Security Dependability and Assurance From Needs to Solutions"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958887"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45236-2_3"},{"key":"ref8","first-page":"453","article-title":"Where do most software flaws come from?","author":"perry","year":"2010","journal-title":"Making Software What Really Works and Why We Believe It"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/800027.808455"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.88.1.1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8157-6_13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0364-0213(84)80009-9"},{"article-title":"Introduction to test driven development","year":"2012","author":"ambler","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1201\/b15703-20","article-title":"Designing for Error","author":"lewis","year":"1986","journal-title":"User Centered System Design"},{"key":"ref24","article-title":"Human error data. Facts or fiction?","author":"rasmussen","year":"1985","journal-title":"National Laboratory Roskilde Denmark"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0629-1_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070530"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-009-9106-y"}],"event":{"name":"2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","start":{"date-parts":[[2016,9,4]]},"location":"Cambridge, United Kingdom","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7602835\/7739650\/07739678.pdf?arnumber=7739678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T02:43:16Z","timestamp":1657680196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7739678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2016.7739678","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}