{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:56:41Z","timestamp":1775696201175,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"H2020","award":["825328"],"award-info":[{"award-number":["825328"]}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.008.001"],"award-info":[{"award-number":["628.008.001"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ARC","award":["DE180100153"],"award-info":[{"award-number":["DE180100153"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409711","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:09:10Z","timestamp":1605042550000},"page":"245-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Selecting third-party libraries: the practitioners\u2019 perspective"],"prefix":"10.1145","author":[{"given":"Enrique","family":"Larios Vargas","sequence":"first","affiliation":[{"name":"Software Improvement Group, Netherlands"}]},{"given":"Maur\u00edcio","family":"Aniche","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"given":"Christoph","family":"Treude","sequence":"additional","affiliation":[{"name":"University of Adelaide, Australia"}]},{"given":"Magiel","family":"Bruntink","sequence":"additional","affiliation":[{"name":"Software Improvement Group, Netherlands"}]},{"given":"Georgios","family":"Gousios","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106267"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00208.x"},{"key":"e_1_3_2_2_3_1","volume-title":"Research design: Qualitative, quantitative, and mixed methods approaches","author":"Creswell John W"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3273934.3273937"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183399.3183418"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188103"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Egon G Guba. 1981. Criteria for assessing the trustworthiness of naturalistic inquiries. Educational Technology research and development 29 2 ( 1981 ) 75-91.  Egon G Guba. 1981. Criteria for assessing the trustworthiness of naturalistic inquiries. Educational Technology research and development 29 2 ( 1981 ) 75-91.","DOI":"10.1007\/BF02766777"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-618X.2004.tb02167.x"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332478"},{"key":"e_1_3_2_2_10_1","volume-title":"Software metrics","author":"Hove Siw Elisabeth","year":"2005"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/13814788.2017.1375092"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081869"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3979446"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183399.3183416"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-019-09476-z"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595808.1595821"},{"key":"e_1_3_2_2_18_1","volume-title":"Mining API Popularity","author":"Mileva Yana Momchilova"},{"key":"e_1_3_2_2_19_1","volume-title":"Bazerman","author":"Milkman Katherine L.","year":"2009"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.142"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896587"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110460"},{"key":"e_1_3_2_2_23_1","unstructured":"Amantia Pano Daniel Graziotin and Pekka Abrahamsson. 2016. What leads developers towards the choice of a JavaScript framework ? CoRR abs\/1605.04303 ( 2016 ). arXiv: 1605.04303 http:\/\/arxiv.org\/abs\/1605.04303  Amantia Pano Daniel Graziotin and Pekka Abrahamsson. 2016. What leads developers towards the choice of a JavaScript framework ? CoRR abs\/1605.04303 ( 2016 ). arXiv: 1605.04303 http:\/\/arxiv.org\/abs\/1605.04303"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.14"},{"key":"e_1_3_2_2_25_1","volume-title":"Grounded theory in practice","author":"Strauss Anselm"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Viswanath Venkatesh James Y. L. Thong and Xin Xu. 2012. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Quarterly 36 1 ( 2012 ) 157-178. http:\/\/www.jstor.org\/stable\/41410412  Viswanath Venkatesh James Y. L. Thong and Xin Xu. 2012. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Quarterly 36 1 ( 2012 ) 157-178. http:\/\/www.jstor.org\/stable\/41410412","DOI":"10.2307\/41410412"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09771-0"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.43"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2801081.2801087"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:40Z","timestamp":1750203880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":29,"alternative-id":["10.1145\/3368089.3409711","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409711","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}