{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:00Z","timestamp":1750309080923,"version":"3.41.0"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[1981,4,1]],"date-time":"1981-04-01T00:00:00Z","timestamp":354931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[1981,4]]},"DOI":"10.1145\/1010865.1010869","type":"journal-article","created":{"date-parts":[[2004,7,21]],"date-time":"2004-07-21T23:30:10Z","timestamp":1090452610000},"page":"18-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["We have met the enemy and she is us"],"prefix":"10.1145","volume":"6","author":[{"given":"Dennis E.","family":"Hamilton","sequence":"first","affiliation":[{"name":"System Design Consultant, Penfield, NY"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[1981,4]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"1\n  .  (American National Standards Institute Sectional Committee X3). American National Standard Flowchart Symbols and Their Usage in Information Processing. ANSI New York: 1970. Standard ANS X3.5-1970.  1. (American National Standards Institute Sectional Committee X3). American National Standard Flowchart Symbols and Their Usage in Information Processing. ANSI New York: 1970. Standard ANS X3.5-1970."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359579"},{"key":"e_1_2_1_3_1","first-page":"11","article-title":"Who wants to communicate anyway?","volume":"23","author":"Bram V. A","journal-title":"IEEE Professional Communications Society Newsletter"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11802"},{"key":"e_1_2_1_5_1","first-page":"115","article-title":"Structured design","volume":"13","author":"Constantine L. L.","journal-title":"IBM Systems J."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1980.6330359"},{"key":"e_1_2_1_7_1","first-page":"213 3","volume-title":"Proc. IFIP Congress 65 (Spartan, Washington DC","author":"Dijkstra E.","year":"1965"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363143"},{"key":"e_1_2_1_9_1","unstructured":"9\n  .  Dijkstra Edsger W. A discipline of programming. Prentice-Hall Englewood Cliffs NJ: 1976. ISBN 0-13-215871-X.   9. Dijkstra Edsger W. A discipline of programming . Prentice-Hall Englewood Cliffs NJ: 1976. ISBN 0-13-215871-X."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"10\n  .  Dijkstra Edsger W. A programmer's early memories. pp. 563-573.  10. Dijkstra Edsger W. A programmer's early memories. pp. 563-573.","DOI":"10.1016\/B978-0-12-491650-0.50041-1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/321420.321422"},{"key":"e_1_2_1_12_1","unstructured":"12\n  .  Gilb Tom. Software metrics. Winthrop Cambridge MA: 1977. ISBN 0-87626-855-6.  12. Gilb Tom. Software metrics . Winthrop Cambridge MA: 1977. ISBN 0-87626-855-6."},{"key":"e_1_2_1_13_1","first-page":"118","article-title":"High-level system architecture: design by objectives","volume":"17","author":"Gilb Tom","journal-title":"IEEE Spectrum"},{"key":"e_1_2_1_14_1","unstructured":"14\n  .  Gildersleeve Thomas R. Data processing project management. Van Nostrand Reinhold New York: 1974. ISBN 0-442-25309-5.   14. Gildersleeve Thomas R. Data processing project management . Van Nostrand Reinhold New York: 1974. ISBN 0-442-25309-5."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/358855.358857"},{"key":"e_1_2_1_16_1","first-page":"19","article-title":"Sometimes quality is only skin deep","volume":"14","author":"Glass Robert L","year":"1980","journal-title":"Computerworld"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005913.1005915"},{"key":"e_1_2_1_18_1","first-page":"73","article-title":"Software vs. hardware errors","volume":"13","author":"Glass Robert L","journal-title":"IEEE Computer"},{"key":"e_1_2_1_19_1","unstructured":"19\n  .  Cries David. Current ideas in programming methodology. pp. 254-275.  19. Cries David. Current ideas in programming methodology. pp. 254-275."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005913.1005916"},{"key":"e_1_2_1_21_1","unstructured":"21\n  .  Heinlein Robert A. Stranger in a strange land. Putnum New York: 1961.  21. Heinlein Robert A. Stranger in a strange land . Putnum New York: 1961."},{"key":"e_1_2_1_22_1","first-page":"1965","article-title":"The moon is a harsh mistress. Berkley","author":"Heinlein Robert A","year":"1966","journal-title":"New York"},{"key":"e_1_2_1_23_1","unstructured":"23\n  .  Heinlein Robert A. The number of the beast. Fawcett New York: 1980. ISBN 0-449-90019-3 pbk.  23. Heinlein Robert A. The number of the beast . Fawcett New York: 1980. ISBN 0-449-90019-3 pbk."},{"key":"e_1_2_1_24_1","first-page":"31","article-title":"More execs buy small-business CPUs: Survey shows many bypass EDP chiefs","volume":"1","author":"Kozma Robert J","year":"1980","journal-title":"MIS Week"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359511.359528"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/954063.954067"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/356802.356806"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/363744.363749"},{"key":"e_1_2_1_29_1","unstructured":"29\n  .  MacDonald John D. The green ripper. Fawcett New York: 1975. ISBN 0-449-14345-7 pbk.  29. MacDonald John D. The green ripper . Fawcett New York: 1975. ISBN 0-449-14345-7 pbk."},{"key":"e_1_2_1_30_1","unstructured":"30\n  .  Metropolis N. Howlett J. Rota Gian-Carlo (eds). A history of computing in the twentieth century. Academic Press New York: 1980. ISBN 0-12-491650-3.   30. Metropolis N. Howlett J. Rota Gian-Carlo (eds). A history of computing in the twentieth century . Academic Press New York: 1980. ISBN 0-12-491650-3."},{"key":"e_1_2_1_31_1","unstructured":"31\n  .  Myers Glenford J. Reliable software through composite design. Petrocelli\/Charter New York: 1975. ISBN 0-88405-284-2.   31. Myers Glenford J. Reliable software through composite design . Petrocelli\/Charter New York: 1975. ISBN 0-88405-284-2."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1010792.1010796"},{"key":"e_1_2_1_33_1","first-page":"1976","article-title":"Ballantine Books","author":"Pohl Frederick","year":"1977","journal-title":"New York"},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"34\n  .  Simon Julian L. Resources population environment: An oversupply of false bad news. science 208 (June 27 1980) 1431-1437.  34. Simon Julian L. Resources population environment: An oversupply of false bad news. science 208 (June 27 1980) 1431-1437.","DOI":"10.1126\/science.7384784"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.208.4448.1114"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7455683"},{"key":"e_1_2_1_37_1","unstructured":"37\n  .  Wegner Peter (ed). Research directions in software technology. MIT Press Cambridge MA: 1979. ISBN 0-262-23096-8.  37. Wegner Peter (ed). Research directions in software technology . MIT Press Cambridge MA: 1979. ISBN 0-262-23096-8."},{"key":"e_1_2_1_38_1","unstructured":"38\n  .  Wegner Peter. Programming languages -- concepts and research directions. pp. 425-489.  38. Wegner Peter. Programming languages -- concepts and research directions. pp. 425-489."},{"key":"e_1_2_1_39_1","unstructured":"39\n  .  Weinberg Gerald M. The psychology of computer programming. Van Nostrand Reinhold New York: 1971. ISBN 0-442-29264-3.   39. Weinberg Gerald M. The psychology of computer programming . Van Nostrand Reinhold New York: 1971. ISBN 0-442-29264-3."},{"key":"e_1_2_1_40_1","unstructured":"40\n  .  Weinberg Gerald M. Phase Two (column). Computer Career. News various 1980.  40. Weinberg Gerald M. Phase Two (column). Computer Career. News various 1980."},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"41\n  .  Wilkes M. V. Early programming developments in Cambridge. pp. 497-501.  41. Wilkes M. V. Early programming developments in Cambridge. pp. 497-501.","DOI":"10.1016\/B978-0-12-491650-0.50036-8"},{"key":"e_1_2_1_42_1","unstructured":"42\n  .  Yourdon Edward Nash (ed). Classics in Software Engineering. Yourdon New York: 1979. ISBN 0-917072-14-6 pbk.   42. Yourdon Edward Nash (ed). Classics in Software Engineering . Yourdon New York: 1979. ISBN 0-917072-14-6 pbk."}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1010865.1010869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1010865.1010869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:25Z","timestamp":1750286605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1010865.1010869"}},"subtitle":["a mixup'd search for software engineering"],"short-title":[],"issued":{"date-parts":[[1981,4]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1981,4]]}},"alternative-id":["10.1145\/1010865.1010869"],"URL":"https:\/\/doi.org\/10.1145\/1010865.1010869","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[1981,4]]},"assertion":[{"value":"1981-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}