{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:08:36Z","timestamp":1773374916189,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,14]],"date-time":"2017-05-14T00:00:00Z","timestamp":1494720000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Defense","award":["FA 8721-05-C-0003"],"award-info":[{"award-number":["FA 8721-05-C-0003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2901739.2901754","type":"proceedings-article","created":{"date-parts":[[2016,5,21]],"date-time":"2016-05-21T22:39:36Z","timestamp":1463870376000},"page":"327-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Got technical debt?"],"prefix":"10.1145","author":[{"given":"Stephany","family":"Bellomo","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Robert L.","family":"Nord","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Ipek","family":"Ozkaya","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Mary","family":"Popeck","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"Towards an ontology of terms on technical debt","volume":"40","author":"Alves N. S. R.","year":"2014","unstructured":"Alves, N. S. R., Ribeiro, L. F., Caires, V., Mendes, T. S., and Sp\u00ednola, R. O. 2014. Towards an ontology of terms on technical debt. ACM SIGSOFT 40, 2 (Mar. 2015), 32--34.","journal-title":"ACM SIGSOFT"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Ampatzoglou A. Ampatzoglou A. Chatzigeorgiou A. and Avgeriou P. 2015. The financial aspect of managing technical debt: A systematic literature review. Inform. Software Tech. 64 (Aug. 2015) 52--73. 10.1016\/j.infsof.2015.04.001","DOI":"10.1016\/j.infsof.2015.04.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE International Conference on Software Maintenance","author":"Bettenburg N.","year":"2008","unstructured":"Bettenburg, N., Premraj, R., Zimmermann, T., and Kim, S. 2008. Duplicate bug reports considered harmful ... really? In IEEE International Conference on Software Maintenance (Beijing, China, Sep. 28-Oct. 4, 2008). ICSM '08. IEEE Press, Piscataway, NJ, 337--345."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820551"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820552"},{"key":"e_1_3_2_1_8_1","unstructured":"Chromium Issues. https:\/\/code.google.com\/p\/chromium\/issues\/list"},{"key":"e_1_3_2_1_9_1","unstructured":"CONNECT Health IT Exchange U.S. Health and Human Services. 2009-2015 {open source project}. http:\/\/www.connectopensource.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Connect Health IT Exchange Issue Tracker. https:\/\/connectopensource.atlassian.net\/secure\/Dashboard.jspa"},{"key":"e_1_3_2_1_11_1","volume-title":"Sage","author":"Corbin J.","year":"2008","unstructured":"Corbin, J. and Strauss, A. 2008. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 3rd ed. Sage, Thousand Oaks, CA, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786848"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666036.2666039"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080824"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486840"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE Standard Categorization for Software Anomalies","author":"Std","year":"2009","unstructured":"IEEE Std 1044-2009: IEEE Standard Categorization for Software Anomalies. 2009. IEEE Computer Society, Washington, DC."},{"key":"e_1_3_2_1_18_1","volume-title":"Software Engineering -- Software Life Cycle Processes -- Maintenance","year":"2006","unstructured":"ISO\/IEC 14764:2006(E): Software Engineering -- Software Life Cycle Processes -- Maintenance. 2006. ISO\/IEC, Geneva Switzerland."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666036.2666040"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819037"},{"key":"e_1_3_2_1_21_1","volume-title":"Good and bad technical debt (and how TDD helps","author":"Kniberg H.","year":"2013","unstructured":"Kniberg, H. 2013. Good and bad technical debt (and how TDD helps. Oct. 2013. http:\/\/blog.crisp.se\/2013\/10\/11\/henrikkniberg\/good-and-badtechnical-debt."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.167"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Li Z. Avgeriou P. and Liang P. 2015. A systematic mapping study on technical debt and its management. J. Syst. Softw. 101 (Mar. 2015) 193--220. 10.1016\/j.jss.2014.12.027","DOI":"10.1016\/j.jss.2014.12.027"},{"key":"e_1_3_2_1_24_1","volume-title":"Eds. Elsevier","author":"Li Z.","year":"2014","unstructured":"Li, Z., Liang, P., and Avgeriou, P. 2014. Architectural debt management. In Economics-Driven Software Architecture, I. Mistrik, R. Bahsoon, Y. Zhang, K. Sullivan, and R. Kazman, Eds. Elsevier, San Diego, CA, 2014, 183--204."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.130"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2012.2204512"},{"key":"e_1_3_2_1_27_1","first-page":"2007","article-title":"Technical debt","volume":"1","author":"McConnell S.","year":"2007","unstructured":"McConnell, S. 2007. Technical debt. Construx, Nov. 1, 2007. http:\/\/www.construx. http:\/\/www.construx.com\/10x_Software_Development\/Technical_Debt\/","journal-title":"Construx"},{"key":"e_1_3_2_1_28_1","volume-title":"Guide to Advanced Empirical Software Engineering","author":"Mockus A.","unstructured":"Mockus, A. 2008. Missing data in software engineering. In Guide to Advanced Empirical Software Engineering, F. Shull, J. Singer, and D. Sjoberg, Eds. Springer Verlag, New York, NY, 185--200."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.31"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Shull F. Falessi D. Seaman C. Diep M. and Layman L. 2013. Technical debt: Showing the way for better transfer of empirical results. In Perspectives on the Future of Software Engineering. Springer Berlin Germany 179--190.","DOI":"10.1007\/978-3-642-37395-4_12"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2663297.2663298"},{"key":"e_1_3_2_1_32_1","unstructured":"Technical Debt Classification Approach Document and Technical Debt Issue Examples. 2016 Sample Data Set http:\/\/sei.cmu.edu\/architecture\/research\/arch_tech_debt\/gottechnical-debt.cfm"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.052"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461005"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.63"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\DATC IEEE Computer Society","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 13th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2901739.2901754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2901739.2901754","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2901739.2901754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:27:48Z","timestamp":1763458068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2901739.2901754"}},"subtitle":["surfacing elusive technical debt in issue trackers"],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":35,"alternative-id":["10.1145\/2901739.2901754","10.1145\/2901739"],"URL":"https:\/\/doi.org\/10.1145\/2901739.2901754","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}