{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:18:46Z","timestamp":1769876326114,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3183519.3183549","type":"proceedings-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T18:12:32Z","timestamp":1528827152000},"page":"245-253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["We don't need another hero?"],"prefix":"10.1145","author":[{"given":"Amritanshu","family":"Agrawal","sequence":"first","affiliation":[{"name":"NCSU"}]},{"given":"Akond","family":"Rahman","sequence":"additional","affiliation":[{"name":"NCSU"}]},{"given":"Rahul","family":"Krishna","sequence":"additional","affiliation":[{"name":"NCSU"}]},{"given":"Alexander","family":"Sobran","sequence":"additional","affiliation":[{"name":"IBM Corp"}]},{"given":"Tim","family":"Menzies","sequence":"additional","affiliation":[{"name":"NCSU"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2342227"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.368273"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 15th Colloquium for Information Systems Security Education.","author":"Bier Norman","year":"2011","unstructured":"Norman Bier , Marsha Lovett , and Robert Seacord . 2011 . An online learning approach to information systems security education . In Proceedings of the 15th Colloquium for Information Systems Security Education. Norman Bier, Marsha Lovett, and Robert Seacord. 2011. An online learning approach to information systems security education. In Proceedings of the 15th Colloquium for Information Systems Security Education."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069475"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698918"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134288"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Frederick P Brooks  Jr. 1975. The Mythical Man-Month: Essays on Software Engineering Anniversary Edition 1\/E. Pearson Education India.   Frederick P Brooks Jr. 1975. The Mythical Man-Month: Essays on Software Engineering Anniversary Edition 1\/E. Pearson Education India.","DOI":"10.1145\/800027.808439"},{"key":"e_1_3_2_1_9_1","volume-title":"Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on. IEEE, 550--554","author":"Cabot Jordi","year":"2015","unstructured":"Jordi Cabot , Javier Luis C\u00e1novas Izquierdo , Valerio Cosentino , and Bel\u00e9n Rolandi . 2015 . Exploring the use of labels to categorize issues in open-source software projects. In Software Analysis , Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on. IEEE, 550--554 . Jordi Cabot, Javier Luis C\u00e1novas Izquierdo, Valerio Cosentino, and Bel\u00e9n Rolandi. 2015. Exploring the use of labels to categorize issues in open-source software projects. In Software Analysis, Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on. IEEE, 550--554."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682323"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Software Development: Cowboy or Samurai","volume":"6","author":"Cullom Charmayne","year":"2006","unstructured":"Charmayne Cullom and Richard Cullom . 2006 . Software Development: Cowboy or Samurai . Communications of the IIMA 6 , 2 (2006), 1 . Charmayne Cullom and Richard Cullom. 2006. Software Development: Cowboy or Samurai. Communications of the IIMA 6, 2 (2006), 1.","journal-title":"Communications of the IIMA"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.78"},{"key":"e_1_3_2_1_13_1","volume-title":"An introduction to the bootstrap","author":"Efron Bradley","unstructured":"Bradley Efron and Robert J Tibshirani . 1994. An introduction to the bootstrap . Chapman and Hall , London . Bradley Efron and Robert J Tibshirani. 1994. An introduction to the bootstrap. Chapman and Hall, London."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.38"},{"key":"e_1_3_2_1_15_1","volume-title":"37th ICSE-Volume 1","author":"Ghotra Baljinder","unstructured":"Baljinder Ghotra , Shane McIntosh , and Ahmed E Hassan . 2015. Revisiting the impact of classification techniques on the performance of defect prediction models . In 37th ICSE-Volume 1 . IEEE Press , 789--800. Baljinder Ghotra, Shane McIntosh, and Ahmed E Hassan. 2015. Revisiting the impact of classification techniques on the performance of defect prediction models. In 37th ICSE-Volume 1. IEEE Press, 789--800."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/github.com\/showcases. (2017). {Online","author":"Showcases Github","year":"2017","unstructured":"Github. 2017. Github Showcases . https:\/\/github.com\/showcases. (2017). {Online ; accessed 13- October - 2017 }. Github. 2017. Github Showcases. https:\/\/github.com\/showcases. (2017). {Online; accessed 13-October-2017}."},{"key":"e_1_3_2_1_17_1","volume-title":"the Joint Porceedings of the 1st International workshop on Model Driven Software Maintenance and 5th International Workshop on Software Quality and Maintainability. 74--82","author":"Goeminne Mathieu","year":"2011","unstructured":"Mathieu Goeminne and Tom Mens . 2011 . Evidence for the pareto principle in open source software activity . In the Joint Porceedings of the 1st International workshop on Model Driven Software Maintenance and 5th International Workshop on Software Quality and Maintainability. 74--82 . Mathieu Goeminne and Tom Mens. 2011. Evidence for the pareto principle in open source software activity. In the Joint Porceedings of the 1st International workshop on Model Driven Software Maintenance and 5th International Workshop on Software Quality and Maintainability. 74--82."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597081"},{"key":"e_1_3_2_1_19_1","volume-title":"Integrating agile practices into software engineering courses. Computer science education 12, 3","author":"Hislop Gregory W","year":"2002","unstructured":"Gregory W Hislop , Michael J Lutz , J Fernando Naveda , W Michael McCracken , Nancy R Mead , and Laurie A Williams . 2002. Integrating agile practices into software engineering courses. Computer science education 12, 3 ( 2002 ), 169--185. Gregory W Hislop, Michael J Lutz, J Fernando Naveda, W Michael McCracken, Nancy R Mead, and Laurie A Williams. 2002. Integrating agile practices into software engineering courses. Computer science education 12, 3 (2002), 169--185."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13734-6_6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597074"},{"key":"e_1_3_2_1_22_1","volume-title":"2013 35th International Conference on Software Engineering (ICSE). 882--890","author":"Kocaguneli E.","unstructured":"E. Kocaguneli , T. Zimmermann , C. Bird , N. Nagappan , and T. Menzies . 2013. Distributed development considered harmful? . In 2013 35th International Conference on Software Engineering (ICSE). 882--890 . E. Kocaguneli, T. Zimmermann, C. Bird, N. Nagappan, and T. Menzies. 2013. Distributed development considered harmful?. In 2013 35th International Conference on Software Engineering (ICSE). 882--890."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Sandeep Krishnamurthy. 2002. Cave or community?: An empirical examination of 100 mature open source projects. (2002).  Sandeep Krishnamurthy. 2002. Cave or community?: An empirical examination of 100 mature open source projects. (2002).","DOI":"10.5210\/fm.v7i6.960"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/09537325.2013.850158"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.45"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"e_1_3_2_1_27_1","volume-title":"Comparative study on agile software development methodologies. arXiv preprint arXiv:1307.3356","author":"Moniruzzaman ABM","year":"2013","unstructured":"ABM Moniruzzaman and Dr Syed Akhter Hossain . 2013. Comparative study on agile software development methodologies. arXiv preprint arXiv:1307.3356 ( 2013 ). ABM Moniruzzaman and Dr Syed Akhter Hossain. 2013. Comparative study on agile software development methodologies. arXiv preprint arXiv:1307.3356 (2013)."},{"key":"e_1_3_2_1_28_1","first-page":"115","article-title":"Complex IT Projects in Education: The Challenge","volume":"2","author":"Morcov Stefan","year":"2012","unstructured":"Stefan Morcov . 2012 . Complex IT Projects in Education: The Challenge . International Journal of Computer Science Research and Application 2 (2012), 115 -- 125 . Stefan Morcov. 2012. Complex IT Projects in Education: The Challenge. International Journal of Computer Science Research and Application 2 (2012), 115--125.","journal-title":"International Journal of Computer Science Research and Application"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597113"},{"key":"e_1_3_2_1_32_1","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Pinto Gustavo","year":"2016","unstructured":"Gustavo Pinto , Igor Steinmacher , and Marco Aur\u00e9lio Gerosa . 2016 . More common than you think: An in-depth study of casual contributors. In Software Analysis, Evolution, and Reengineering (SANER) , 2016 IEEE 23rd International Conference on , Vol. 1 . IEEE, 112--123. Gustavo Pinto, Igor Steinmacher, and Marco Aur\u00e9lio Gerosa. 2016. More common than you think: An in-depth study of casual contributors. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, Vol. 1. IEEE, 112--123."},{"key":"e_1_3_2_1_34_1","unstructured":"Arturo Reyes L\u00f3pez. 2017. Analyzing GitHub as a Collaborative Software Development Platform: A Systematic Review. (2017).  Arturo Reyes L\u00f3pez. 2017. Analyzing GitHub as a Collaborative Software Development Platform: A Systematic Review. (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069497"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2011.25"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840510585918"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2804360.2804366"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776867"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183519.3183549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183519.3183549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:12Z","timestamp":1750208892000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183519.3183549"}},"subtitle":["the impact of \"heroes\" on software development"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":38,"alternative-id":["10.1145\/3183519.3183549","10.1145\/3183519"],"URL":"https:\/\/doi.org\/10.1145\/3183519.3183549","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}