{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:39:49Z","timestamp":1766579989174,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3382494.3422172","type":"proceedings-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T16:59:24Z","timestamp":1603472364000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Profiling Developers Through the Lens of Technical Debt"],"prefix":"10.1145","author":[{"given":"Zadia","family":"Codabux","sequence":"first","affiliation":[{"name":"University of Saskatchewan"}]},{"given":"Christopher","family":"Dutchyn","sequence":"additional","affiliation":[{"name":"University of Saskatchewan"}]}],"member":"320","published-online":{"date-parts":[[2020,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1139113.1139116"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.62"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Software Engineering Research and Practice. WASET.","author":"Codabux Zadia","year":"2014","unstructured":"Zadia Codabux , Byron J Williams , and Nan Niu . 2014 . A quality assurance approach to technical debt . In International Conference on Software Engineering Research and Practice. WASET. Zadia Codabux, Byron J Williams, and Nan Niu. 2014. A quality assurance approach to technical debt. In International Conference on Software Engineering Research and Practice. WASET."},{"key":"e_1_3_2_1_4_1","first-page":"2","article-title":"The WyCash Portfolio Management System, OOPSLA, 1992","volume":"4","author":"Cunningham Ward","year":"1992","unstructured":"Ward Cunningham . 1992 . The WyCash Portfolio Management System, OOPSLA, 1992 . SIGPLAN OOPS Messenger 4 , 2 (December 1992), 29--30. Ward Cunningham. 1992. The WyCash Portfolio Management System, OOPSLA, 1992. SIGPLAN OOPS Messenger 4, 2 (December 1992), 29--30.","journal-title":"SIGPLAN OOPS Messenger"},{"key":"e_1_3_2_1_5_1","unstructured":"Martin Fowler. 2018. Refactoring: improving the design of existing code. AW.  Martin Fowler. 2018. Refactoring: improving the design of existing code. AW."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362684"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.41"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Karim R Lakhani and Robert G Wolf. 2003. Why hackers do what they do: Understanding motivation and effort in free\/open source software projects. MIT Sloan working paper.  Karim R Lakhani and Robert G Wolf. 2003. Why hackers do what they do: Understanding motivation and effort in free\/open source software projects. MIT Sloan working paper.","DOI":"10.2139\/ssrn.443040"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345630"},{"key":"e_1_3_2_1_10_1","volume-title":"Research on Software Project Developer Behaviors with K-means Clustering Analysis. In SSSME 2019: Summer School on Software Maintenance and Evolution. CEUR-WS.","author":"Li Xiaozhou","year":"2019","unstructured":"Xiaozhou Li . 2019 . Research on Software Project Developer Behaviors with K-means Clustering Analysis. In SSSME 2019: Summer School on Software Maintenance and Evolution. CEUR-WS. Xiaozhou Li. 2019. Research on Software Project Developer Behaviors with K-means Clustering Analysis. In SSSME 2019: Summer School on Software Maintenance and Evolution. CEUR-WS."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671282"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337227"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106336"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2639037.2639042"}],"event":{"name":"ESEM '20: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Bari Italy","acronym":"ESEM '20"},"container-title":["Proceedings of the 14th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382494.3422172","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3382494.3422172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:26Z","timestamp":1750199906000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382494.3422172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":15,"alternative-id":["10.1145\/3382494.3422172","10.1145\/3382494"],"URL":"https:\/\/doi.org\/10.1145\/3382494.3422172","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}