{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T14:10:59Z","timestamp":1765807859201,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3382494.3422164","type":"proceedings-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T16:59:24Z","timestamp":1603472364000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Trustworthiness Perceptions in Code Review"],"prefix":"10.1145","author":[{"given":"Ian","family":"Bertram","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]},{"given":"Jack","family":"Hong","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]},{"given":"Yu","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]},{"given":"Zohreh","family":"Sharafi","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan"}]}],"member":"320","published-online":{"date-parts":[[2020,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/23311908.2017.1389640"},{"volume-title":"Proceedings of the 51st Hawaii International Conference on System Sciences.","author":"Gene","key":"e_1_3_2_1_2_1","unstructured":"Gene M. Alarcon and Tyler J. Ryan. 2018. Trustworthiness Perceptions of Computer Code: A Heuristic-Systematic Processing Model . In Proceedings of the 51st Hawaii International Conference on System Sciences. Gene M. Alarcon and Tyler J. Ryan. 2018. Trustworthiness Perceptions of Computer Code: A Heuristic-Systematic Processing Model. In Proceedings of the 51st Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3216723.3216727"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/0031383930370305"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS.2019.00014"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336775"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Claudia Geitner Ben D Sawyer S Birrell P Jennings L Skyrypchuk Bruce Mehler and Bryan Reimer. 2017. A link between trust in technology and glance allocation in on-road driving. (2017).  Claudia Geitner Ben D Sawyer S Birrell P Jennings L Skyrypchuk Bruce Mehler and Bryan Reimer. 2017. A link between trust in technology and glance allocation in on-road driving. (2017).","DOI":"10.17077\/drivingassessment.1645"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.847"},{"volume-title":"Proceedings of the 3rd BE yond Time and Errors: Novel evaLuation Methods for Information Visualization Workshop","author":"Joseph","key":"e_1_3_2_1_10_1","unstructured":"Joseph H. Goldberg and Jonathan I. Helfman. 2010. Comparing Information Graphics: A Critical Look at Eye Tracking . In Proceedings of the 3rd BE yond Time and Errors: Novel evaLuation Methods for Information Visualization Workshop ( Atlanta, Georgia) (BELIV '10). ACM, New York, NY, USA, 71--78. https:\/\/doi.org\/10.1145\/2110192.2110203 10.1145\/2110192.2110203 Joseph H. Goldberg and Jonathan I. Helfman. 2010. Comparing Information Graphics: A Critical Look at Eye Tracking. In Proceedings of the 3rd BE yond Time and Errors: Novel evaLuation Methods for Information Visualization Workshop (Atlanta, Georgia) (BELIV '10). ACM, New York, NY, USA, 71--78. https:\/\/doi.org\/10.1145\/2110192.2110203"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Saemundur O. Haraldsson John R. Woodward Alexander E. I. Brownlee and Kristin Siggeirsdottir. 2017. Fixing Bugs in Your Sleep: How Genetic Improvement Became an Overnight Success. https:\/\/doi-org.proxy.lib.umich.edu\/10.1145\/3067695.3082517  Saemundur O. Haraldsson John R. Woodward Alexander E. I. Brownlee and Kristin Siggeirsdottir. 2017. Fixing Bugs in Your Sleep: How Genetic Improvement Became an Overnight Success. https:\/\/doi-org.proxy.lib.umich.edu\/10.1145\/3067695.3082517","DOI":"10.1145\/3067695.3082517"},{"key":"e_1_3_2_1_13_1","unstructured":"https:\/\/www.tobiipro.com\/. 2001. Online; Accessed 17-07-2020.  https:\/\/www.tobiipro.com\/. 2001. Online; Accessed 17-07-2020."},{"key":"e_1_3_2_1_14_1","volume-title":"Investigating Gender Bias and Differences in Code Review: Using Medical Imaging and Eye-Tracking. In International Symposium on the Foundations of Software Engineering (ESEC\/FSE). ACM\/SIGSOFT.","author":"Huang Yu","year":"2020","unstructured":"Yu Huang , Kevin Leach , Zohreh Sharafi , Nicholas McKay , Tyler Santander , and Westley Weimer . 2020 . Investigating Gender Bias and Differences in Code Review: Using Medical Imaging and Eye-Tracking. In International Symposium on the Foundations of Software Engineering (ESEC\/FSE). ACM\/SIGSOFT. Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander, and Westley Weimer. 2020. Investigating Gender Bias and Differences in Code Review: Using Medical Imaging and Eye-Tracking. In International Symposium on the Foundations of Software Engineering (ESEC\/FSE). ACM\/SIGSOFT."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00053"},{"key":"e_1_3_2_1_16_1","volume-title":"A theory of reading: from eye fixations to comprehension. Psychological review 87, 4","author":"Just Marcel A","year":"1980","unstructured":"Marcel A Just and Patricia A Carpenter . 1980. A theory of reading: from eye fixations to comprehension. Psychological review 87, 4 ( 1980 ), 329. Marcel A Just and Patricia A Carpenter. 1980. A theory of reading: from eye fixations to comprehension. Psychological review 87, 4 (1980), 329."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027796"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9577-2"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Software Engineering.","author":"Goues Claire Le","year":"2012","unstructured":"Claire Le Goues , Michael Dewey-Vogt , Stephanie Forrest , and Westley Weimer . 2012 . A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each . In International Conference on Software Engineering. Claire Le Goues, Michael Dewey-Vogt, Stephanie Forrest, and Westley Weimer. 2012. A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each. In International Conference on Software Engineering."},{"key":"#cr-split#-e_1_3_2_1_21_1.1","doi-asserted-by":"crossref","unstructured":"Fan Long and Martin Rinard. 2016. Automatic Patch Generation by Learning Correct Code. In Principles of Programming Languages. https:\/\/doi.org\/10.1145\/2837614.2837617 10.1145\/2837614.2837617","DOI":"10.1145\/2837614.2837617"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","doi-asserted-by":"crossref","unstructured":"Fan Long and Martin Rinard. 2016. Automatic Patch Generation by Learning Correct Code. In Principles of Programming Languages. https:\/\/doi.org\/10.1145\/2837614.2837617","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2019.2930980"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/mil0000124"},{"volume-title":"International Conference on Software Engineering: Software Engineering in Practice. 269--278","author":"Marginean A.","key":"e_1_3_2_1_24_1","unstructured":"A. Marginean , J. Bader , S. Chandra , M. Harman , Y. Jia , K. Mao , A. Mols , and A. Scott . 2019. SapFix: Automated End-to-End Repair at Scale . In International Conference on Software Engineering: Software Engineering in Practice. 269--278 . A. Marginean, J. Bader, S. Chandra, M. Harman, Y. Jia, K. Mao, A. Mols, and A. Scott. 2019. SapFix: Automated End-to-End Repair at Scale. In International Conference on Software Engineering: Software Engineering in Practice. 269--278."},{"key":"e_1_3_2_1_25_1","volume-title":"Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset","author":"Martinez Matias","year":"2016","unstructured":"Matias Martinez , Thomas Durieux , Romain Sommerard , Jifeng Xuan , and Martin Monperrus . 2016. Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset . Springer Empirical Software Engineering ( 2016 ). https:\/\/doi.org\/10.1007\/s10664-016-9470-4 10.1007\/s10664-016-9470-4 Matias Martinez, Thomas Durieux, Romain Sommerard, Jifeng Xuan, and Martin Monperrus. 2016. Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset. Springer Empirical Software Engineering (2016). https:\/\/doi.org\/10.1007\/s10664-016-9470-4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5334\/jopd.48"},{"key":"e_1_3_2_1_27_1","volume-title":"Article 17 (Jan.","author":"Monperrus Martin","year":"2018","unstructured":"Martin Monperrus . 2018. Automatic Software Repair: A Bibliography. ACM Comput. Surv. 51, 1 , Article 17 (Jan. 2018 ), 24 pages. https:\/\/doi.org\/10.1145\/3105906 10.1145\/3105906 Martin Monperrus. 2018. Automatic Software Repair: A Bibliography. ACM Comput. Surv. 51, 1, Article 17 (Jan. 2018), 24 pages. https:\/\/doi.org\/10.1145\/3105906"},{"key":"e_1_3_2_1_28_1","volume-title":"Repairnator Patches Programs Automatically. Ubiquity","author":"Monperrus Martin","year":"2019","unstructured":"Martin Monperrus , Simon Urli , Thomas Durieux , Matias Martinez , Benoit Baudry , and Lionel Seinturier . 2019. Repairnator Patches Programs Automatically. Ubiquity 2019 , July, Article 2 (July 2019), 12 pages. https:\/\/doi.org\/10.1145\/3349589 10.1145\/3349589 Martin Monperrus, Simon Urli, Thomas Durieux, Matias Martinez, Benoit Baudry, and Lionel Seinturier. 2019. Repairnator Patches Programs Automatically. Ubiquity 2019, July, Article 2 (July 2019), 12 pages. https:\/\/doi.org\/10.1145\/3349589"},{"key":"e_1_3_2_1_29_1","volume-title":"Ball","author":"Poole Alex","year":"2005","unstructured":"Alex Poole and Linden J . Ball . 2005 . Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future. In Prospects\", Chapter in C. Ghaoui (Ed.): Encyclopedia of Human-Computer Interaction. Pennsylvania : Idea Group, Inc. Information Science Reference, Hershey, PA , 1--5. Alex Poole and Linden J. Ball. 2005. Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future. In Prospects\", Chapter in C. Ghaoui (Ed.): Encyclopedia of Human-Computer Interaction. Pennsylvania: Idea Group, Inc. Information Science Reference, Hershey, PA, 1--5."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.85.3.618"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of Cybersecurity, Privacy and Trust - First International Conference, HCI-CPT 2019 Orlando, FL, USA, July (Lecture Notes in Computer Science), Abbas Moallem (Ed.)","volume":"11594","author":"Ryan Tyler J.","unstructured":"Tyler J. Ryan , Gene M. Alarcon , Charles Walter , Rose F. Gamble , Sarah A. Jessup , August A. Capiola , and Marc D. Pfahler . 2019. Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust . In Proceedings of Cybersecurity, Privacy and Trust - First International Conference, HCI-CPT 2019 Orlando, FL, USA, July (Lecture Notes in Computer Science), Abbas Moallem (Ed.) , Vol. 11594 . Springer, 452--470. https:\/\/doi.org\/10.1007\/978-3-030-22351-9_31 10.1007\/978-3-030-22351-9_31 Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose F. Gamble, Sarah A. Jessup, August A. Capiola, and Marc D. Pfahler. 2019. Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust. In Proceedings of Cybersecurity, Privacy and Trust - First International Conference, HCI-CPT 2019 Orlando, FL, USA, July (Lecture Notes in Computer Science), Abbas Moallem (Ed.), Vol. 11594. Springer, 452--470. https:\/\/doi.org\/10.1007\/978-3-030-22351-9_31"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803188"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/1088868306294790"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2015.53"},{"key":"e_1_3_2_1_35_1","volume-title":"A practical guide on conducting eye tracking studies in software engineering. Empirical Software Engineering","author":"Sharafi Zohreh","year":"2020","unstructured":"Zohreh Sharafi , Bonita Sharif , Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc , Andrew Begel , Roman Bednarik , and Martha Crosby . 2020. A practical guide on conducting eye tracking studies in software engineering. Empirical Software Engineering ( 2020 ), 1--47. Zohreh Sharafi, Bonita Sharif, Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc, Andrew Begel, Roman Bednarik, and Martha Crosby. 2020. A practical guide on conducting eye tracking studies in software engineering. Empirical Software Engineering (2020), 1--47."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.06.008"},{"volume-title":"An Eye-Tracking Study on the Role of Scan Time in Finding Source Code Defects. In Symposium on Eye Tracking Research and Applications. https:\/\/doi.org\/10","author":"Sharif Bonita","key":"e_1_3_2_1_37_1","unstructured":"Bonita Sharif , Michael Falcone , and Jonathan I. Maletic . 2012 . An Eye-Tracking Study on the Role of Scan Time in Finding Source Code Defects. In Symposium on Eye Tracking Research and Applications. https:\/\/doi.org\/10 .1145\/2168556.2168642 10.1145\/2168556.2168642 Bonita Sharif, Michael Falcone, and Jonathan I. Maletic. 2012. An Eye-Tracking Study on the Role of Scan Time in Finding Source Code Defects. In Symposium on Eye Tracking Research and Applications. https:\/\/doi.org\/10.1145\/2168556.2168642"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9286-4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.69.5.797"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.111"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Hidetake Uwano Masahide Nakamura Akito Monden and Ken-ichi Matsumoto. 2006. Analyzing Individual Performance of Source Code Review Using Reviewers' Eye Movement. In Eye Tracking Research Applications. 133--140.  Hidetake Uwano Masahide Nakamura Akito Monden and Ken-ichi Matsumoto. 2006. Analyzing Individual Performance of Source Code Review Using Reviewers' Eye Movement. In Eye Tracking Research Applications. 133--140.","DOI":"10.1145\/1117309.1117357"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"}],"event":{"name":"ESEM '20: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Bari Italy","acronym":"ESEM '20"},"container-title":["Proceedings of the 14th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382494.3422164","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3382494.3422164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:26Z","timestamp":1750199906000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382494.3422164"}},"subtitle":["An Eye-tracking Study"],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":42,"alternative-id":["10.1145\/3382494.3422164","10.1145\/3382494"],"URL":"https:\/\/doi.org\/10.1145\/3382494.3422164","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}