{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:20Z","timestamp":1773840200625,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swiss National Science Foundation (SNF Project)","award":["PP00P2_170529"],"award-info":[{"award-number":["PP00P2_170529"]}]},{"name":"Netherlands Organization for Scientific Research (NWO)","award":["612.001.451"],"award-info":[{"award-number":["612.001.451"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3180170","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"561-571","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Understanding developers' needs on deprecation as a language feature"],"prefix":"10.1145","author":[{"given":"Anand Ashok","family":"Sawant","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, The Netherlands"}]},{"given":"Maur\u00edcio","family":"Aniche","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, The Netherlands"}]},{"given":"Arie","family":"van Deursen","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, The Netherlands"}]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[{"name":"University of Zurich Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950325"},{"key":"e_1_3_2_1_2_1","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Brito Gleison","year":"2016","unstructured":"Gleison Brito, Andre Hora, Marco Tulio Valente, and Romain Robbes. 2016. Do developers deprecate APIs with replacement messages? A large-scale analysis on Java systems. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, Vol. 1. IEEE, 360--369."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393661"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747226"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1133105.1133107"},{"key":"e_1_3_2_1_6_1","volume-title":"JSR 308: Type annotations specification. https:\/\/jcp.org\/ en\/jsr\/detail?id=308. (2008). last accessed","author":"Ernst Michael D","year":"2017","unstructured":"Michael D Ernst. 2008. JSR 308: Type annotations specification. https:\/\/jcp.org\/ en\/jsr\/detail?id=308. (2008). last accessed May 2017."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747228"},{"key":"e_1_3_2_1_8_1","volume-title":"Response bias, social desirability and dissimulation. Personality and individual differences 7, 3","author":"Furnham Adrian","year":"1986","unstructured":"Adrian Furnham. 1986. Response bias, social desirability and dissimulation. Personality and individual differences 7, 3 (1986), 385--400."},{"key":"e_1_3_2_1_9_1","volume-title":"Understanding reliability and validity in qualitative research. The qualitative report 8, 4","author":"Golafshani Nahid","year":"2003","unstructured":"Nahid Golafshani. 2003. Understanding reliability and validity in qualitative research. The qualitative report 8, 4 (2003), 597--606."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062512"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0040518"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.24"},{"key":"e_1_3_2_1_13_1","unstructured":"TIOBE Index. {n. d.}. TIOBE.-2017.{Electronic resource}. Mode of access http:\/\/www.tiobe.com\/tiobe_index ({n. d.})."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491428"},{"key":"e_1_3_2_1_15_1","volume-title":"Qualitative communication research methods","author":"Lindlof Thomas R","unstructured":"Thomas R Lindlof and Bryan C Taylor. 2011. Qualitative communication research methods. Sage."},{"key":"e_1_3_2_1_16_1","unstructured":"Stuart Marks. 2014--2017. JEP 277: Enhanced Deprecation. http:\/\/ openjdk.java.net\/jeps\/277. (2014--2017). last accessed Aug 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"Java One presentation on JEP 277. https: \/\/oracle.rainfocus.com\/scripts\/catalog\/oow16.jsp?event=javaone&search=CON3297&search.event=javaone. (2016). last accessed","author":"Marks Stuart","year":"2017","unstructured":"Stuart Marks. 2016. Java One presentation on JEP 277. https: \/\/oracle.rainfocus.com\/scripts\/catalog\/oow16.jsp?event=javaone&search=CON3297&search.event=javaone. (2016). last accessed May 2017."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/msdn.microsoft.com\/enus\/library\/system.obsoleteattribute(v=vs.110).aspx. (2012). last accessed","author":"Class ObsoleteAttribute","year":"2017","unstructured":"Microsoft. 2012. C# ObsoleteAttribute Class. https:\/\/msdn.microsoft.com\/enus\/library\/system.obsoleteattribute(v=vs.110).aspx. (2012). last accessed May 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"10 usability heuristics for user interface design","author":"Nielsen Jakob","year":"1995","unstructured":"Jakob Nielsen. 1995. 10 usability heuristics for user interface design. Nielsen Norman Group 1, 1 (1995)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108818"},{"key":"e_1_3_2_1_21_1","volume-title":"JSR 305: Annotations for software defect detection. https: \/\/jcp.org\/en\/jsr\/detail?id=305. (2006). last accessed","author":"Pugh William","year":"2017","unstructured":"William Pugh. 2006. JSR 305: Annotations for software defect detection. https: \/\/jcp.org\/en\/jsr\/detail?id=305. (2006). last accessed May 2017."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.30"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.04.008"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393662"},{"key":"e_1_3_2_1_25_1","volume-title":"Diffusion of innovations","author":"Rogers Everett M","unstructured":"Everett M Rogers. 2010. Diffusion of innovations. Simon and Schuster."},{"key":"e_1_3_2_1_26_1","volume-title":"How and When To Deprecate APIs. http: \/\/www.oracle.com\/technetwork\/java\/javasebusiness\/downloads\/java-archive-downloads-javase11-419415.html#7122-jdk-1.1-doc-oth-JPR. (1996). last accessed","author":"Rose John R.","year":"2017","unstructured":"John R. Rose. 1996. How and When To Deprecate APIs. http: \/\/www.oracle.com\/technetwork\/java\/javasebusiness\/downloads\/java-archive-downloads-javase11-419415.html#7122-jdk-1.1-doc-oth-JPR. (1996). last accessed May 2017."},{"key":"e_1_3_2_1_27_1","volume-title":"https:\/\/www.dropbox.com\/s\/cwchbspdeek6iuh\/ replication_package.zip?dl=0. (2017). last accessed","author":"Sawant A.A","year":"2017","unstructured":"A.A Sawant, Mauricio Aniche, Arie van Deursen, and Alberto Bacchelli. 2017. Replication Package. https:\/\/www.dropbox.com\/s\/cwchbspdeek6iuh\/ replication_package.zip?dl=0. (2017). last accessed May 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"fine-GRAPE: fine-grained APi usage extractor - an approach and dataset to investigate API usage. Empirical Software Engineering","author":"Sawant Anand Ashok","year":"2016","unstructured":"Anand Ashok Sawant and Alberto Bacchelli. 2016. fine-GRAPE: fine-grained APi usage extractor - an approach and dataset to investigate API usage. Empirical Software Engineering (2016), 1--24."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 32nd IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE press","author":"Sawant A. A.","unstructured":"A. A. Sawant and A. Bacchelli. 2016. On the reaction to deprecation of 25,357 clients of 4+1 popular Java APIs.. In Proceedings of the 32nd IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE press, in press."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1086\/268650"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Sally Thorne S Reimer Kirkham Janet MacDonald-Emes et al. 1997. Focus on qualitative methods. Interpretive description: a noncategorical qualitative alternative for developing nursing knowledge. Research in nursing & health 20 2 (1997) 169--177.","DOI":"10.1002\/(SICI)1098-240X(199704)20:2<169::AID-NUR9>3.3.CO;2-B"},{"key":"e_1_3_2_1_32_1","volume-title":"Evolution and Reengineering (SANER), 2017 IEEE 24th International Conference on. IEEE, 138--147","author":"Xavier Laerte","year":"2017","unstructured":"Laerte Xavier, Aline Brito, Andre Hora, and Marco Tulio Valente. 2017. Historical and impact analysis of API breaking changes: A large-scale study. In Software Analysis, Evolution and Reengineering (SANER), 2017 IEEE 24th International Conference on. IEEE, 138--147."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70747"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:18Z","timestamp":1750208898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":33,"alternative-id":["10.1145\/3180155.3180170","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3180170","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}