{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:17:11Z","timestamp":1759033031547,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338979","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"397-408","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Decomposing the rationale of code commits: the software developer\u2019s perspective"],"prefix":"10.1145","author":[{"given":"Khadijah Al","family":"Safwan","sequence":"first","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Francisco","family":"Servant","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.24"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330223"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(03)00244-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/850944.853130"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453146"},{"volume-title":"Snowball Sampling: Problems and Techniques of Chain Referral Sampling. Sociological Methods &amp","year":"1981","author":"Biernacki Patrick","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985469"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.05.004"},{"volume-title":"Rationale-Based Software Engineering","author":"Burge Janet E","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332446"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2652524.2652541"},{"volume-title":"Rationale Management in Software Engineering","author":"Dutoit Allen H.","key":"e_1_3_2_1_14_1"},{"volume-title":"Communicative Intention in Code Review Questions. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). 519\u2013523","year":"2018","author":"Ebert F.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806828"},{"volume-title":"ScottKnott: A Package for Performing the Scott-Knott Clustering Algorithm in R. TEMA (S\u00e3o Carlos) 15 (03","year":"2014","author":"Jelihovschi Enio G","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2031759.2031764"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1893"},{"key":"e_1_3_2_1_20_1","unstructured":"e1893 smr.1893.  e1893 smr.1893."},{"volume-title":"Russell","year":"1996","author":"Gruber Thomas R.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106270"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090025"},{"key":"e_1_3_2_1_24_1","unstructured":"ITU-T. 2018. User Requirements Notation (URN) \u2013 Language definition. http: \/\/handle.itu.int\/11.1002\/1000\/13711  ITU-T. 2018. User Requirements Notation (URN) \u2013 Language definition. http: \/\/handle.itu.int\/11.1002\/1000\/13711"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1992.183309"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155583"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.12"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9441-9"},{"volume-title":"Proceedings IEEE Joint International Conference on Requirements Engineering. 13\u201322","author":"Kaiya H.","key":"e_1_3_2_1_29_1"},{"volume-title":"Debugging Reinvented. In 2008 ACM\/IEEE 30th International Conference on Software Engineering. 301\u2013310","author":"Ko A.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.45"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.51.1.481"},{"volume-title":"Issues as Elements of Information Systems. Number 131 in California","author":"Kunz W.","key":"e_1_3_2_1_33_1"},{"volume-title":"2017 IEEE 25th International Requirements Engineering Conference (RE). 61\u201370","author":"Kurtanovi\u0107 Z.","key":"e_1_3_2_1_34_1"},{"volume-title":"Proceedings Fifth IEEE International Symposium on Requirements Engineering. 249\u2013262","year":"2001","author":"Lamsweerde A. Van","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1937117.1937125"},{"key":"e_1_3_2_1_37_1","unstructured":"1937125  1937125"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0603%264_3"},{"volume":"2","volume-title":"ChangeScribe: A Tool for Automatically Generating Commit Messages. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","author":"Linares-V\u00e1squez M.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2622669"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274404"},{"key":"e_1_3_2_1_42_1","first-page":"79","article-title":"Confirmation bias. In Cognitive Illusions: A Handbook on Fallacies and Biases in Thinking, Judgement and Memory. Psychology Press","volume":"4","author":"Pohl R.","year":"2004","journal-title":"Chapter"},{"volume-title":"Proceedings of the 10th International Conference on Software Engineering (ICSE \u201988)","author":"Potts C.","key":"e_1_3_2_1_43_1"},{"volume-title":"Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913)","year":"2019","author":"Rastkar Sarah","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337254"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803183"},{"volume-title":"Lethbridge","year":"2008","author":"Singer Janice","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180192"},{"volume-title":"Card Sorting: Designing Usable Categories. Rosenfeld Media. https:\/\/books.google.com\/books?id=_h4D9gqi5tsC","year":"2009","author":"Spencer D.","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.04.029"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.08.040"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393656"},{"volume-title":"The Uses of Argument (2 ed.)","author":"Toulmin Stephen E.","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.27"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568251"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Tallinn Estonia","acronym":"ESEC\/FSE '19"},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":55,"alternative-id":["10.1145\/3338906.3338979","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338979","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}