{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:48:49Z","timestamp":1760586529059,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T00:00:00Z","timestamp":1297987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMIS Database"],"published-print":{"date-parts":[[2011,2,18]]},"abstract":"<jats:p>Information systems portfolio management assumes that software will evolve to maintain alignment with operational needs, a goal that must be met through effective ongoing maintenance. Thus, a primary goal of software maintainers is to ensure that production code is updated without the introduction of defects. However, there is a dearth of research that examines the work product defects that occur as these applications evolve.<\/jats:p>\n          <jats:p>The goal of this study is to characterize software evolution lifecycle work product defects and factors that may increase or reduce their occurrence. The study takes place within a global consulting organization conducting ongoing software maintenance for a Fortune 100 telecommunications firm by a project team assessed at Capability Maturity Model Integration (CMMI) Level 3. This study reports on 991 work product reviews conducted across the evolution activities of the ISO\/IEC 12207 Software Development Life Cycle Processes.<\/jats:p>\n          <jats:p>After controlling for team and expertise differences, the study's major finding is that corrective evolution projects inject a greater number of work product defects than enhancive evolution projects. This result does not arise from the schedule compression often associated with corrective evolution. Rather, it is concluded that the increase in work product defects is associated with the increased complexity of analysis-stage problem diagnosis found in corrective evolution projects. The analysis is augmented by additional covariates including the number of work product reviewers, preparation time of reviewers, and size of the project.<\/jats:p>","DOI":"10.1145\/1952712.1952716","type":"journal-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T14:52:22Z","timestamp":1299595942000},"page":"59-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of work product defects during corrective &amp; enhancive software evolution"],"prefix":"10.1145","volume":"42","author":[{"given":"David P.","family":"Hale","sequence":"first","affiliation":[{"name":"University of Alabama, Tuscaloosa, AL, USA"}]},{"given":"Joanne E.","family":"Hale","sequence":"additional","affiliation":[{"name":"University of Alabama, Tuscaloosa, AL, USA"}]},{"given":"Randy K.","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Alabama, Tuscaloosa, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,2,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.243"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00023-6"},{"key":"e_1_2_1_3_1","first-page":"6","volume-title":"IEEE Computer Society","author":"Chapin N.","year":"1988"},{"key":"e_1_2_1_4_1","first-page":"1","article-title":"Types of software evolution and maintenance","author":"Chapin N.","year":"2001","journal-title":"Journal of Software Maintenance and Evolution, (13:1)"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1241366"},{"volume-title":"Carnegie Mellon University\/SEI-2002-TR-012","author":"Product Team","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","first-page":"1441","volume-title":"Chichester: John Wiley","author":"Dayton C.M.","year":"2005"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2496(03)00003-8"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0182"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368195"},{"key":"e_1_2_1_11_1","first-page":"69","volume-title":"Monterey CA.","author":"Gefen D.","year":"1996"},{"volume-title":"Software Inspection","author":"Gilb T.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360030204"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199903\/04)11:2%3C73::AID-SMR187%3E3.0.CO;2-A"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199709\/10)9:5%3C281::AID-SMR154%3E3.3.CO;2-G"},{"volume-title":"Software Engineering: Software Life Cycle Processes.","year":"2008","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/383371.383376"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/269012.269020"},{"key":"e_1_2_1_19_1","first-page":"1","volume-title":"IEEE","author":"Kajko-Mattsson M.","year":"2001"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2004.11.013"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90022-7"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00073-4"},{"volume-title":"Software Maintenance Management","author":"Lientz B.P.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89403-2_28"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0001-6918(00)00033-0"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.402076"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199709\/10)9:5%3C299::AID-SMR157%3E3.3.CO;2-J"},{"volume-title":"Practical Software Maintenance: Best Practices for Managing Your Software Investment","author":"Pigoski T.","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390673.1390679"},{"key":"e_1_2_1_30_1","first-page":"103","volume-title":"IEEE","author":"Porter A.A.","year":"1994"},{"volume-title":"Software Engineering: A Practitioners Approach","year":"2005","author":"Pressman R.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/13287260910955093"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/957758.957763"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449603.1449609"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.825763"},{"volume-title":"Object-Oriented and Classical Software Engineering","author":"Schach S.","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.869376"},{"volume-title":"Software Engineering","author":"Sommerville I.","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","first-page":"492","volume-title":"Long Beach CA","author":"Swanson E.B.","year":"1976"},{"key":"e_1_2_1_40_1","first-page":"106","volume-title":"IEEE","author":"Tripp L.","year":"1991"},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","article-title":"Judgment under uncertainty: heuristics and biases","author":"Tversky A.","year":"1974","journal-title":"Science, (185:4157)"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/256428.167070"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.345"},{"volume-title":"Peer Reviews in Software: A Practical Guide","author":"Wiegers K.","key":"e_1_2_1_44_1"}],"container-title":["ACM SIGMIS Database: the DATABASE for Advances in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1952712.1952716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1952712.1952716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:56Z","timestamp":1750246796000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1952712.1952716"}},"subtitle":["a field study comparison"],"short-title":[],"issued":{"date-parts":[[2011,2,18]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2,18]]}},"alternative-id":["10.1145\/1952712.1952716"],"URL":"https:\/\/doi.org\/10.1145\/1952712.1952716","relation":{},"ISSN":["0095-0033","1532-0936"],"issn-type":[{"type":"print","value":"0095-0033"},{"type":"electronic","value":"1532-0936"}],"subject":[],"published":{"date-parts":[[2011,2,18]]},"assertion":[{"value":"2011-02-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}