{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:42:49Z","timestamp":1768340569110,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1717370"],"award-info":[{"award-number":["1717370"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416640","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"697-708","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Team discussions and dynamics during DevOps tool adoptions in OSS projects"],"prefix":"10.1145","author":[{"given":"Likang","family":"Yin","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Vladimir","family":"Filkov","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-013-9192-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718972"},{"key":"e_1_3_2_1_3_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","unstructured":"David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research 3, Jan (2003), 993--1022.","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_4_1","volume-title":"Social judgment theory and the analysis of interpersonal conflict. Psychological bulletin 83, 6","author":"Brehmer Berndt","year":"1976","unstructured":"Berndt Brehmer. 1976. Social judgment theory and the analysis of interpersonal conflict. Psychological bulletin 83, 6 (1976), 985."},{"key":"e_1_3_2_1_5_1","volume-title":"2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 128--128","author":"Calefato Fabio","year":"2018","unstructured":"Fabio Calefato, Filippo Lanubile, Federico Maiorano, and Nicole Novielli. 2018. [Journal First] Sentiment Polarity Detection for Software Development. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). IEEE, 128--128."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.36"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the RSA Conference","author":"Cornell Dan","year":"2012","unstructured":"Dan Cornell. 2012. Remediation statistics: what does fixing application vulnerabilities cost. Proceedings of the RSA Conference, San Fransisco, CA, USA (2012)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901776"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242124"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.107"},{"key":"e_1_3_2_1_11_1","volume-title":"Behavioral decision making","author":"Ferrell William R","unstructured":"William R Ferrell. 1985. Combining individual judgments. In Behavioral decision making. Springer, 111--145."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.147"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.83.2.187"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Sarra Habchi Xavier Blanc and Romain Rouvoy. 2018. On adopting linters to deal with performance concerns in android apps.","DOI":"10.1145\/3238147.3238197"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460611"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1289800.1289805"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Michael Hilton Jonathan Bell and Darko Marinov. 2018. A large-scale study of test coverage evolution. In ASE. 53--63.","DOI":"10.1145\/3238147.3238183"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330245"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115626"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950304"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663887.2663900"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.02.055"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00060"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0073506"},{"key":"e_1_3_2_1_26_1","unstructured":"J Kottmann G Ingersoll J Kosin and B Galitsky. [n.d.]. The Apache OpenNLP library."},{"key":"e_1_3_2_1_27_1","volume-title":"Social media, knowledge sharing, and innovation: Toward a theory of communication visibility. Information systems research 25, 4","author":"Leonardi Paul M","year":"2014","unstructured":"Paul M Leonardi. 2014. Social media, knowledge sharing, and innovation: Toward a theory of communication visibility. Information systems research 25, 4 (2014), 796--816."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191629"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441794"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115621"},{"key":"e_1_3_2_1_31_1","volume-title":"A general and simple method for obtaining R2 from generalized linear mixed-effects models. Methods in ecology and evolution 4, 2","author":"Nakagawa Shinichi","year":"2013","unstructured":"Shinichi Nakagawa and Holger Schielzeth. 2013. A general and simple method for obtaining R2 from generalized linear mixed-effects models. Methods in ecology and evolution 4, 2 (2013), 133--142."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00031-X"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998191"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9660-3"},{"key":"e_1_3_2_1_35_1","volume-title":"Davis","author":"Riemenschneider Cynthia K.","year":"2002","unstructured":"Cynthia K. Riemenschneider, Bill C. Hardgrave, and Fred D. Davis. 2002. Explaining software developer acceptance of methodologies: a comparison of five theoretical models. IEEE transactions on Software Engineering 28, 12 (2002), 1135--1145."},{"key":"e_1_3_2_1_36_1","volume-title":"Diffusion of preventive innovations. Addictive behaviors 27, 6","author":"Rogers Everett M","year":"2002","unstructured":"Everett M Rogers. 2002. Diffusion of preventive innovations. Addictive behaviors 27, 6 (2002), 989--993."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(79)90017-5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99133-7_22"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00099"},{"key":"e_1_3_2_1_40_1","unstructured":"Leif-Gerrit Singer. 2013. Improving the adoption of software engineering practices through persuasive interventions. Lulu. com."},{"key":"e_1_3_2_1_41_1","volume-title":"Studying Minified and Obfuscated Code in the Web. In The World Wide Web Conference. ACM, 1735--1746","author":"Skolka Philippe","year":"2019","unstructured":"Philippe Skolka, Cristian-Alexandru Staicu, and Michael Pradel. 2019. Anything to Hide? Studying Minified and Obfuscated Code in the Web. In The World Wide Web Conference. ACM, 1735--1746."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1908369116"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584053"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.10.005"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110416"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1994.1040"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155634"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180209"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.35"},{"key":"e_1_3_2_1_50_1","volume-title":"joining, and specialization in open source software innovation: a case study. Research policy 32, 7","author":"Krogh Georg Von","year":"2003","unstructured":"Georg Von Krogh, Sebastian Spaeth, and Karim R Lakhani. 2003. Community, joining, and specialization in open source software innovation: a case study. Research policy 32, 7 (2003), 1217--1241."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786816"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531722"},{"key":"e_1_3_2_1_53_1","volume-title":"Washington, DC","author":"Zelkowitz Marvin V","year":"1995","unstructured":"Marvin V Zelkowitz. 1995. Assessing software engineering technology transfer within NASA. NASA technical report NASA-RPT-003095. National Aeronautics and Space Administration, Washington, DC (1995)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950364"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416640","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:22Z","timestamp":1750193242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":54,"alternative-id":["10.1145\/3324884.3416640","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416640","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}