{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:51:07Z","timestamp":1777099867192,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,19]],"date-time":"2011-03-19T00:00:00Z","timestamp":1300492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,19]]},"DOI":"10.1145\/1958824.1958887","type":"proceedings-article","created":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T12:25:29Z","timestamp":1300796729000},"page":"395-404","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["\"Not my bug!\" and other reasons for software bug report reassignments"],"prefix":"10.1145","author":[{"given":"Philip J.","family":"Guo","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Brendan","family":"Murphy","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2011,3,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 6th Australian Conference on Computer-Human Interaction","author":"Randall D.","year":"1996","unstructured":"Randall , D. , Jon , O. , Rouncefield , M. , and Hughes , J.A . Organizational Memory and CSCW: Supporting the Mavis Phenomenon . In Proceedings of the 6th Australian Conference on Computer-Human Interaction ( 1996 ), 26--33. Randall, D., Jon, O., Rouncefield, M., and Hughes, J.A. Organizational Memory and CSCW: Supporting the Mavis Phenomenon. In Proceedings of the 6th Australian Conference on Computer-Human Interaction (1996), 26--33."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358994"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718973"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718972"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180883"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753576"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754219"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099203.1099238"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806871"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595715"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401964"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-006-9017-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070530"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"van Liere D.W. How Shallow is a Bug? Open Source Communities as Information Repositories and Solving Software Defects. In ERIM Report Series Reference Forthcoming. http:\/\/ssrn.com\/abstract=1507233 (2009).  van Liere D.W. How Shallow is a Bug? Open Source Communities as Information Repositories and Solving Software Defects. In ERIM Report Series Reference Forthcoming. http:\/\/ssrn.com\/abstract=1507233 (2009).","DOI":"10.2139\/ssrn.1507233"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2006.3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453146"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2008.4639063"},{"key":"e_1_3_2_1_21_1","volume-title":"What is information architecture?","author":"Barker I.","year":"2005","unstructured":"2 Barker , I. What is information architecture? , 2005 . KM Column , http:\/\/www.steptwo.com.au. 2Barker, I. What is information architecture?, 2005. KM Column, http:\/\/www.steptwo.com.au."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070550"},{"key":"e_1_3_2_1_24_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","unstructured":"Cohen , J. Statistical Power Analysis for the Behavioral Sciences . Routledge Academic , 1988 . Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Routledge Academic, 1988."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117696.1117704"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180929"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806856"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581401"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753706"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806866"}],"event":{"name":"CSCW '11: Computer Supported Cooperative Work","location":"Hangzhou China","acronym":"CSCW '11","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the ACM 2011 conference on Computer supported cooperative work"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1958824.1958887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1958824.1958887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:53:03Z","timestamp":1750243983000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1958824.1958887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,19]]},"references-count":32,"alternative-id":["10.1145\/1958824.1958887","10.1145\/1958824"],"URL":"https:\/\/doi.org\/10.1145\/1958824.1958887","relation":{},"subject":[],"published":{"date-parts":[[2011,3,19]]},"assertion":[{"value":"2011-03-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}