{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:56:33Z","timestamp":1773442593386,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["612.001.451"],"award-info":[{"award-number":["612.001.451"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["PP00P2_170529"],"award-info":[{"award-number":["PP00P2_170529"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236080","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"201-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["What makes a code change easier to review: an empirical investigation on code change reviewability"],"prefix":"10.1145","author":[{"given":"Achyudh","family":"Ram","sequence":"first","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Anand Ashok","family":"Sawant","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"given":"Marco","family":"Castelluccio","sequence":"additional","affiliation":[{"name":"Mozilla, UK \/ Federico II University of Naples, Italy"}]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[{"name":"University of Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accessed: 2018-01-31. 2016. Dev. Pull Requests: The Good The Bad and The Ugly. https:\/\/dev.to\/ backendandbbq\/pull-requests-the-good-the-bad-and-the-ugly. (2016). Accessed: 2018-01-31. 2016. Elastic. The Art of a Pull Request. https:\/\/www.elastic.co\/blog\/ art-of-pull-request. (2016). Accessed: 2018-01-31. 2017. Anorgan\u2019s Blog. Preparing Your Pull Request For Code Review. https:\/\/blog. anorgan.com\/2017\/04\/27\/preparing-your-pull-request-for-code-review\/. (2017).  Accessed: 2018-01-31. 2016. Dev. Pull Requests: The Good The Bad and The Ugly. https:\/\/dev.to\/ backendandbbq\/pull-requests-the-good-the-bad-and-the-ugly. (2016). Accessed: 2018-01-31. 2016. Elastic. The Art of a Pull Request. https:\/\/www.elastic.co\/blog\/ art-of-pull-request. (2016). Accessed: 2018-01-31. 2017. Anorgan\u2019s Blog. Preparing Your Pull Request For Code Review. https:\/\/blog. anorgan.com\/2017\/04\/27\/preparing-your-pull-request-for-code-review\/. (2017)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486882"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818773"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.54"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9366-8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597082"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820538"},{"key":"e_1_3_2_1_8_1","first-page":"329","article-title":"Modern Code Review. In Making Software, Andy Oram and Greg Wilson (Eds.). O\u2019Reilly","volume":"18","author":"Cohen Jason","year":"2010","journal-title":"Chapter"},{"key":"e_1_3_2_1_9_1","unstructured":"Jason Cohen Eric Brown Brandon DuRette and Steven Teleki. 2006. Best kept secrets of peer code review. Smart Bear.  Jason Cohen Eric Brown Brandon DuRette and Steven Teleki. 2006. Best kept secrets of peer code review. Smart Bear."},{"key":"e_1_3_2_1_10_1","unstructured":"J Corbet. 2018. How to participate in the linux community. http:\/\/ldn. linuxfoundation.org\/book\/how-participate-linux-community. (2018). Accessed: 2018-01-31.  J Corbet. 2018. How to participate in the linux community. http:\/\/ldn. linuxfoundation.org\/book\/how-participate-linux-community. (2018). Accessed: 2018-01-31."},{"key":"e_1_3_2_1_11_1","unstructured":"Vicki L Creswell JW Clark P John W. J.W. Creswell V.L. Vicki L Plano Clark Vicki L.P. Plano Clark and V.L. Vicki L Plano Clark. 2007. Designing and Conducting Mixed Methods Research. 275 pages. 00096.x  Vicki L Creswell JW Clark P John W. J.W. Creswell V.L. Vicki L Plano Clark Vicki L.P. Plano Clark and V.L. Vicki L Plano Clark. 2007. Designing and Conducting Mixed Methods Research. 275 pages. 00096.x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"e_1_3_2_1_13_1","unstructured":"Aubrey C Daniels. 1989. Performance management: Improving quality productivity through positive reinforcement. Performance Management Pub.  Aubrey C Daniels. 1989. Performance management: Improving quality productivity through positive reinforcement. Performance Management Pub."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081844"},{"key":"e_1_3_2_1_15_1","volume-title":"Software pioneers","author":"Fagan Michael"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2916008"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Vahid Garousi Michael Felderer and Mika V M\u00e4ntyl\u00e4. 2017. Guidelines for including the grey literature and conducting multivocal literature reviews in software engineering. arXiv preprint arXiv:1707.02553 (2017).  Vahid Garousi Michael Felderer and Mika V M\u00e4ntyl\u00e4. 2017. Guidelines for including the grey literature and conducting multivocal literature reviews in software engineering. arXiv preprint arXiv:1707.02553 (2017).","DOI":"10.1145\/2915970.2916008"},{"key":"e_1_3_2_1_18_1","unstructured":"Barney Glaser. 1998. Doing Grounded Theory: Issues and Discussions. Sociology Press.  Barney Glaser. 1998. Doing Grounded Theory: Issues and Discussions. Sociology Press."},{"key":"e_1_3_2_1_19_1","unstructured":"Barney G Glaser. 1998. Doing grounded theory: Issues and discussions. Sociology Press.  Barney G Glaser. 1998. Doing grounded theory: Issues and discussions. Sociology Press."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884826"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818800"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820539"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0040518"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487111"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2174\/1874107X00903010015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884840"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195836.3195842"},{"key":"e_1_3_2_1_29_1","unstructured":"Klaus Krippendorff. 2011. Computing Krippendorff\u2019s alpha-reliability. (2011).  Klaus Krippendorff. 2011. Computing Krippendorff\u2019s alpha-reliability. (2011)."},{"key":"e_1_3_2_1_30_1","unstructured":"William Lidwell Kritina Holden and Jill Butler. 2010. Universal Principles of Design Revised and Updated: 125 Ways to Enhance Usability Influence Perception Increase Appeal Make Better Design Decisions and Teach through Design (2nd ed.). Rockport Publishers.  William Lidwell Kritina Holden and Jill Butler. 2010. Universal Principles of Design Revised and Updated: 125 Ways to Enhance Usability Influence Perception Increase Appeal Make Better Design Decisions and Teach through Design (2nd ed.). Rockport Publishers."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441792"},{"key":"e_1_3_2_1_32_1","unstructured":"Michael C Medlock Dennis Wixon Mark Terrano Ramon Romero and Bill Fulton. 2002. Using the RITE method to improve products: A definition and a case study. Usability Professionals Association 51 (2002).  Michael C Medlock Dennis Wixon Mark Terrano Ramon Romero and Bill Fulton. 2002. Using the RITE method to improve products: A definition and a case study. Usability Professionals Association 51 (2002)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983929"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597113"},{"key":"e_1_3_2_1_35_1","unstructured":"Achyudh Ram Anand Ashok Sawant Marco Castelluccio and Alberto Bacchelli. 2018. Data and Material for \u201cWhat Makes A Code Change Easier To Review?\u201d. (2018).  Achyudh Ram Anand Ashok Sawant Marco Castelluccio and Alberto Bacchelli. 2018. Data and Material for \u201cWhat Makes A Code Change Easier To Review?\u201d. (2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"P. Rigby B. Cleary F. Painchaud M.A. Storey and D. German. 2012. Open Source Peer Review\u2013Lessons and Recommendations for Closed Source. IEEE Software (2012).  P. Rigby B. Cleary F. Painchaud M.A. Storey and D. German. 2012. Open Source Peer Review\u2013Lessons and Recommendations for Closed Source. IEEE Software (2012)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491444"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183525"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(06)69005-0"},{"key":"e_1_3_2_1_40_1","unstructured":"Marcelino Campos Oliveira Silva Marco Tulio Valente and Ricardo Terra. 2016. Does Technical Debt Lead to the Rejection of Pull Requests? arXiv preprint arXiv:1604.01450 (2016).  Marcelino Campos Oliveira Silva Marco Tulio Valente and Ricardo Terra. 2016. Does Technical Debt Lead to the Rejection of Pull Requests? arXiv preprint arXiv:1604.01450 (2016)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695856"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180192"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393656"},{"key":"e_1_3_2_1_44_1","unstructured":"B.C. Taylor and T.R. Lindlof. 2010. Qualitative communication research methods. Sage Publications Incorporated.  B.C. Taylor and T.R. Lindlof. 2010. Qualitative communication research methods. Sage Publications Incorporated."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635882"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370767"},{"key":"e_1_3_2_1_48_1","unstructured":"William Foote Ed Whyte. 1991. Participatory action research. Sage Publications Inc.  William Foote Ed Whyte. 1991. Participatory action research. Sage Publications Inc."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_3_2_1_50_1","volume-title":"Mining software repositories (MSR)","author":"Yu Yue","year":"2015"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:26Z","timestamp":1750208246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":50,"alternative-id":["10.1145\/3236024.3236080","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236080","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}