{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:57:00Z","timestamp":1773442620356,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Swiss National Science Foundation","award":["PP00P2_170529"],"award-info":[{"award-number":["PP00P2_170529"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3183519.3183525","type":"proceedings-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T18:12:32Z","timestamp":1528827152000},"page":"181-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":224,"title":["Modern code review"],"prefix":"10.1145","author":[{"given":"Caitlin","family":"Sadowski","sequence":"first","affiliation":[{"name":"Google, Inc."}]},{"given":"Emma","family":"S\u00f6derberg","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Luke","family":"Church","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Michal","family":"Sipko","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[{"name":"University of Zurich"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Appendix to this paper. https:\/\/goo.gl\/dP4ekg. (2017).  2017. Appendix to this paper. https:\/\/goo.gl\/dP4ekg. (2017)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.28121"},{"key":"e_1_3_2_1_3_1","volume-title":"Symposium on Software validation: inspection-testing-verification-alternatives.","author":"Ackerman A.F.","unstructured":"A.F. Ackerman , P.J. Fowler , and R.G. Ebenau . 1984. Software inspections and the industrial production of software . In Symposium on Software validation: inspection-testing-verification-alternatives. A.F. Ackerman, P.J. Fowler, and R.G. Ebenau. 1984. Software inspections and the industrial production of software. In Symposium on Software validation: inspection-testing-verification-alternatives."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Alberto Bacchelli and Christian Bird. 2013. Expectations outcomes and challenges of modern code review. In ICSE.   Alberto Bacchelli and Christian Bird. 2013. Expectations outcomes and challenges of modern code review. In ICSE.","DOI":"10.1109\/ICSE.2013.6606617"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Vipin Balachandran. 2013. Reducing Human Effort and Improving Quality in Peer Code Reviews Using Automatic Static Analysis and Reviewer Recommendation. In ICSE.   Vipin Balachandran. 2013. Reducing Human Effort and Improving Quality in Peer Code Reviews Using Automatic Static Analysis and Reviewer Recommendation. In ICSE.","DOI":"10.1109\/ICSE.2013.6606642"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Mike Barnett Christian Bird Jo\u00e3o Brunet and Shuvendu K Lahiri. 2015. Helping developers help themselves: Automatic decomposition of code review changesets. In ICSE.   Mike Barnett Christian Bird Jo\u00e3o Brunet and Shuvendu K Lahiri. 2015. Helping developers help themselves: Automatic decomposition of code review changesets. In ICSE.","DOI":"10.1109\/ICSE.2015.35"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Olga Baysal Oleksii Kononenko Reid Holmes and Michael W Godfrey. 2013. The influence of non-technical factors on code review. In WCRE.  Olga Baysal Oleksii Kononenko Reid Holmes and Michael W Godfrey. 2013. The influence of non-technical factors on code review. In WCRE.","DOI":"10.1109\/WCRE.2013.6671287"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025119"},{"key":"e_1_3_2_1_10_1","unstructured":"Amiangshu Bosu and Jeffrey C Carver. 2013. Impact of peer code review on peer impression formation: A survey. In ESEM.  Amiangshu Bosu and Jeffrey C Carver. 2013. Impact of peer code review on peer impression formation: A survey. In ESEM."},{"key":"e_1_3_2_1_11_1","unstructured":"Amiangshu Bosu Michaela Greiler and Christian Bird. 2015. Characteristics of useful code reviews: an empirical study at Microsoft. In MSR.   Amiangshu Bosu Michaela Greiler and Christian Bird. 2015. Characteristics of useful code reviews: an empirical study at Microsoft. In MSR."},{"key":"e_1_3_2_1_12_1","volume-title":"Chromium developer guidelines. https:\/\/www.chromium.org\/developers\/contributing-code. (August","year":"2016","unstructured":"chromium 2016. Chromium developer guidelines. https:\/\/www.chromium.org\/developers\/contributing-code. (August 2016 ). chromium 2016. Chromium developer guidelines. https:\/\/www.chromium.org\/developers\/contributing-code. (August 2016)."},{"key":"e_1_3_2_1_13_1","volume-title":"Research design: Qualitative, quantitative, and mixed methods approaches","author":"Creswell J.W.","unstructured":"J.W. Creswell . 2009. Research design: Qualitative, quantitative, and mixed methods approaches ( 3 rd ed.). Sage Publications . J.W. Creswell. 2009. Research design: Qualitative, quantitative, and mixed methods approaches (3rd ed.). Sage Publications.","edition":"3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Jacek Czerwonka Michaela Greiler and Jack Tilford. 2015. Code Reviews Do Not Find Bugs: How the Current Code Review Best Practice Slows Us Down. In ICSE (SEIP).   Jacek Czerwonka Michaela Greiler and Jack Tilford. 2015. Code Reviews Do Not Find Bugs: How the Current Code Review Best Practice Slows Us Down. In ICSE (SEIP).","DOI":"10.1109\/ICSE.2015.131"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Mart\u00edn Dias Alberto Bacchelli Georgios Gousios Damien Cassou and St\u00e9phane Ducasse. 2015. Untangling fine-grained code changes. In SANER.  Mart\u00edn Dias Alberto Bacchelli Georgios Gousios Damien Cassou and St\u00e9phane Ducasse. 2015. Untangling fine-grained code changes. In SANER.","DOI":"10.1109\/SANER.2015.7081844"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0182"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.gerritcodereview.com\/. (August","year":"2016","unstructured":"gerrit 2016. https:\/\/www.gerritcodereview.com\/. (August 2016 ). gerrit 2016. https:\/\/www.gerritcodereview.com\/. (August 2016)."},{"key":"e_1_3_2_1_18_1","unstructured":"githubpull 2016. GitHub pull request process. https:\/\/help.github.com\/articles\/using-pull-requests\/. (2016).  githubpull 2016. GitHub pull request process. https:\/\/help.github.com\/articles\/using-pull-requests\/. (2016)."},{"key":"e_1_3_2_1_19_1","volume-title":"The discovery of grounded theory: Strategies for qualitative research","author":"Glaser Barney G","unstructured":"Barney G Glaser and Anselm L Strauss . 2009. The discovery of grounded theory: Strategies for qualitative research . Transaction Books . Barney G Glaser and Anselm L Strauss. 2009. The discovery of grounded theory: Strategies for qualitative research. Transaction Books."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884826"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Georgios Gousios Andy Zaidman Margaret-Anne Storey and Arie van Deursen. 2015. Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective. In ICSE.   Georgios Gousios Andy Zaidman Margaret-Anne Storey and Arie van Deursen. 2015. Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective. In ICSE.","DOI":"10.1109\/ICSE.2015.55"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39225-7_8"},{"key":"e_1_3_2_1_23_1","volume-title":"Forum Qualitative Sozialforschung","volume":"11","author":"Jansen Harrie","year":"2010","unstructured":"Harrie Jansen . 2010 . The logic of qualitative survey research and its position in the field of social research methods . In Forum Qualitative Sozialforschung , Vol. 11 . Harrie Jansen. 2010. The logic of qualitative survey research and its position in the field of social research methods. In Forum Qualitative Sozialforschung, Vol. 11."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Yujuan Jiang Bram Adams and Daniel M German. 2013. Will my patch make it? and how fast?: Case study on the linux kernel. In MSR.   Yujuan Jiang Bram Adams and Daniel M German. 2013. Will my patch make it? and how fast?: Case study on the linux kernel. In MSR.","DOI":"10.1109\/MSR.2013.6624016"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2174\/1874107X00903010015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884840"},{"key":"e_1_3_2_1_27_1","volume-title":"Qualitative data analysis: An expanded sourcebook","author":"Miles Matthew B","unstructured":"Matthew B Miles and A Michael Huberman . 1994. Qualitative data analysis: An expanded sourcebook . Sage . Matthew B Miles and A Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. Sage."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581401"},{"key":"e_1_3_2_1_29_1","volume-title":"Meet Phabricator, The Witty Code Review Tool Built Inside Facebook. https:\/\/techcrunch.com\/2011\/08\/07\/oh-what-noble-scribe-hath-penned-these-words\/. (August","year":"2016","unstructured":"phabricator 2016 . Meet Phabricator, The Witty Code Review Tool Built Inside Facebook. https:\/\/techcrunch.com\/2011\/08\/07\/oh-what-noble-scribe-hath-penned-these-words\/. (August 2016). phabricator 2016. Meet Phabricator, The Witty Code Review Tool Built Inside Facebook. https:\/\/techcrunch.com\/2011\/08\/07\/oh-what-noble-scribe-hath-penned-these-words\/. (August 2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854146"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Teade Punter Marcus Ciolkowski Bernd Freimut and Isabel John. 2003. Conducting on-line surveys in software engineering. In Empirical Software Engineering.   Teade Punter Marcus Ciolkowski Bernd Freimut and Isabel John. 2003. Conducting on-line surveys in software engineering. In Empirical Software Engineering.","DOI":"10.1109\/ISESE.2003.1237967"},{"key":"e_1_3_2_1_32_1","unstructured":"P. Rigby B. Cleary F. Painchaud M.A. Storey and D. German. 2012. Open Source Peer Review---Lessons and Recommendations for Closed Source. IEEE Software (2012).  P. Rigby B. Cleary F. Painchaud M.A. Storey and D. German. 2012. Open Source Peer Review---Lessons and Recommendations for Closed Source. IEEE Software (2012)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491444"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594458"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9681(79)90012-2"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Caitlin Sadowski Jeffrey van Gogh Ciera Jaspan Emma S\u00f6derberg and Collin Winter. 2015. Tricorder: building a program analysis ecosystem. In ICSE.   Caitlin Sadowski Jeffrey van Gogh Ciera Jaspan Emma S\u00f6derberg and Collin Winter. 2015. Tricorder: building a program analysis ecosystem. In ICSE.","DOI":"10.1109\/ICSE.2015.76"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Andrew Sutherland and Gina Venolia. 2009. Can peer code reviews be exploited for later information needs?. In ICSE.  Andrew Sutherland and Gina Venolia. 2009. Can peer code reviews be exploited for later information needs?. In ICSE.","DOI":"10.1109\/ICSE-COMPANION.2009.5070996"},{"key":"e_1_3_2_1_39_1","volume-title":"The methodology of behavior study. The child in America: Behavior problems and programs","author":"Thomas William Isaac","year":"1928","unstructured":"William Isaac Thomas and Dorothy Swaine Thomas . 1928. The methodology of behavior study. The child in America: Behavior problems and programs ( 1928 ), 553--576. William Isaac Thomas and Dorothy Swaine Thomas. 1928. The methodology of behavior study. The child in America: Behavior problems and programs (1928), 553--576."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884852"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9452-6"},{"key":"e_1_3_2_1_42_1","volume-title":"Norihiro Yoshida, Hajimu Iida, and Ken-ichi Matsumoto.","author":"Thongtanunam Patanamon","year":"2015","unstructured":"Patanamon Thongtanunam , Chakkrit Tantithamthavorn , Raula Gaikovina Kula , Norihiro Yoshida, Hajimu Iida, and Ken-ichi Matsumoto. 2015 . Who should review my code? A file location-based code-reviewer recommendation approach for modern code review. In SANER. Patanamon Thongtanunam, Chakkrit Tantithamthavorn, Raula Gaikovina Kula, Norihiro Yoshida, Hajimu Iida, and Ken-ichi Matsumoto. 2015. Who should review my code? A file location-based code-reviewer recommendation approach for modern code review. In SANER."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2500238"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882313"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183519.3183525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183519.3183525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:11Z","timestamp":1750208891000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183519.3183525"}},"subtitle":["a case study at google"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":44,"alternative-id":["10.1145\/3183519.3183525","10.1145\/3183519"],"URL":"https:\/\/doi.org\/10.1145\/3183519.3183525","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}