{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:28Z","timestamp":1750220728793,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T00:00:00Z","timestamp":1555286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,15]]},"DOI":"10.1145\/3319008.3319028","type":"proceedings-article","created":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T19:07:28Z","timestamp":1554923248000},"page":"167-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Perceived Relevance of Automatic Code Inspection in End-User Development"],"prefix":"10.1145","author":[{"given":"Sohon","family":"Roy","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, The Netherlands"}]},{"given":"Arie van","family":"Deursen","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, The Netherlands"}]},{"given":"Felienne","family":"Hermans","sequence":"additional","affiliation":[{"name":"Leiden University, Leiden, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,4,15]]},"reference":[{"volume-title":"IEEE Standard Glossary of Software Engineering Terminology","year":"1990","key":"e_1_3_2_1_1_1","unstructured":"1990. IEEE Standard Glossary of Software Engineering Terminology . IEEE Std 610.12-- 1990 (Dec 1990), 1--84. 1990. IEEE Standard Glossary of Software Engineering Terminology. IEEE Std 610.12--1990 (Dec 1990), 1--84."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251536"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.105"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970347"},{"volume-title":"Research design: Qualitative, quantitative, and mixed methods approaches","author":"Creswell John W","key":"e_1_3_2_1_5_1","unstructured":"John W Creswell . 2013. Research design: Qualitative, quantitative, and mixed methods approaches . Sage publications. John W Creswell. 2013. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications."},{"volume-title":"Checking C Programs with lint. \" O'Reilly Media","author":"Darwin Ian F","key":"e_1_3_2_1_6_1","unstructured":"Ian F Darwin . 1988. Checking C Programs with lint. \" O'Reilly Media , Inc .\". Ian F Darwin. 1988. Checking C Programs with lint. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_7_1","unstructured":"EuSpRIG. {n. d.}. EuSpRIG Horror Stories. http:\/\/www.eusprig.org\/horror-stories.htm  EuSpRIG. {n. d.}. EuSpRIG Horror Stories. http:\/\/www.eusprig.org\/horror-stories.htm"},{"key":"e_1_3_2_1_8_1","volume-title":"Criteria for assessing the trustworthiness of naturalistic inquiries. ECTJ 29, 2 (01","author":"Guba Egon G.","year":"1981","unstructured":"Egon G. Guba . 1981. Criteria for assessing the trustworthiness of naturalistic inquiries. ECTJ 29, 2 (01 Jun 1981 ), 75. Egon G. Guba. 1981. Criteria for assessing the trustworthiness of naturalistic inquiries. ECTJ 29, 2 (01 Jun 1981), 75."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.86"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985855"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.03.058"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Bas Jansen Felienne Hermans and Edwin Tazelaar. 2018. Detecting and Predicting Evolution in Spreadsheets: A Case Study in an Energy Network Company.  Bas Jansen Felienne Hermans and Edwin Tazelaar. 2018. Detecting and Predicting Evolution in Spreadsheets: A Case Study in an Energy Network Company.","DOI":"10.1109\/ICSME.2018.00074"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297964"},{"key":"e_1_3_2_1_14_1","unstructured":"Jetbrains. {n. d.}. IntelliJ IDEA. https:\/\/www.jetbrains.com\/idea\/  Jetbrains. {n. d.}. IntelliJ IDEA. https:\/\/www.jetbrains.com\/idea\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Jetbrains. {n. d.}. ReSharper. https:\/\/www.jetbrains.com\/resharper\/  Jetbrains. {n. d.}. ReSharper. https:\/\/www.jetbrains.com\/resharper\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486877"},{"volume-title":"End user development","author":"Lieberman Henry","key":"e_1_3_2_1_17_1","unstructured":"Henry Lieberman , Fabio Patern\u00f2 , Markus Klann , and Volker Wulf . 2006. End-user development: An emerging paradigm . In End user development . Springer , 1--8. Henry Lieberman, Fabio Patern\u00f2, Markus Klann, and Volker Wulf. 2006. End-user development: An emerging paradigm. In End user development. Springer, 1--8."},{"key":"e_1_3_2_1_18_1","unstructured":"Microsoft. 2018. Call statement. https:\/\/docs.microsoft.com\/en-us\/office\/vba\/language\/reference\/user-interface-help\/call-statement  Microsoft. 2018. Call statement. https:\/\/docs.microsoft.com\/en-us\/office\/vba\/language\/reference\/user-interface-help\/call-statement"},{"key":"e_1_3_2_1_19_1","unstructured":"Stack Overflow user ThunderFrame. 2016. Global statement. https:\/\/stackoverflow.com\/questions\/39639488\/make-a-global-variable-in-visual-basic-for-applications  Stack Overflow user ThunderFrame. 2016. Global statement. https:\/\/stackoverflow.com\/questions\/39639488\/make-a-global-variable-in-visual-basic-for-applications"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/795711.799152"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.009"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/795699.798442"},{"key":"e_1_3_2_1_23_1","volume-title":"Evolution and Reengineering (SANER), 2017 IEEE 24th International Conference on. IEEE, 338--348","author":"Roy Sohon","year":"2017","unstructured":"Sohon Roy , Felienne Hermans , and Arie van Deursen . 2017 . Spreadsheet testing in practice. In Software Analysis , Evolution and Reengineering (SANER), 2017 IEEE 24th International Conference on. IEEE, 338--348 . Sohon Roy, Felienne Hermans, and Arie van Deursen. 2017. Spreadsheet testing in practice. In Software Analysis, Evolution and Reengineering (SANER), 2017 IEEE 24th International Conference on. IEEE, 338--348."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818828"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.34"},{"volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Strauss Anselm","key":"e_1_3_2_1_26_1","unstructured":"Anselm Strauss and Juliet Corbin . 1998. Basics of qualitative research: Techniques and procedures for developing grounded theory . Sage Publications, Inc. Anselm Strauss and Juliet Corbin. 1998. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage Publications, Inc."},{"key":"e_1_3_2_1_27_1","volume-title":"The Adoption of JavaScript Linters in Practice: A Case Study on ESLint","author":"T\u00f3masd\u00f3ttir Krist\u00edn Fj\u00f3la","year":"2018","unstructured":"Krist\u00edn Fj\u00f3la T\u00f3masd\u00f3ttir , Mauricio Aniche , and Arie Van Deursen . 2018. The Adoption of JavaScript Linters in Practice: A Case Study on ESLint . IEEE Transactions on Software Engineering ( 2018 ). Krist\u00edn Fj\u00f3la T\u00f3masd\u00f3ttir, Mauricio Aniche, and Arie Van Deursen. 2018. The Adoption of JavaScript Linters in Practice: A Case Study on ESLint. IEEE Transactions on Software Engineering (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330195"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.72"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.63"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.21"}],"event":{"name":"EASE '19: Evaluation and Assessment in Software Engineering","sponsor":["IT University of Copenhagen"],"location":"Copenhagen Denmark","acronym":"EASE '19"},"container-title":["Proceedings of the Evaluation and Assessment on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319008.3319028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319008.3319028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:20Z","timestamp":1750199900000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319008.3319028"}},"subtitle":["A Study on VBA"],"short-title":[],"issued":{"date-parts":[[2019,4,15]]},"references-count":31,"alternative-id":["10.1145\/3319008.3319028","10.1145\/3319008"],"URL":"https:\/\/doi.org\/10.1145\/3319008.3319028","relation":{},"subject":[],"published":{"date-parts":[[2019,4,15]]},"assertion":[{"value":"2019-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}