{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:33:32Z","timestamp":1761989612461,"version":"3.41.0"},"reference-count":102,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1423054, CCF-1814826"],"award-info":[{"award-number":["CNS-1423054, CCF-1814826"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IBM"},{"name":"Ripple"},{"DOI":"10.13039\/100000005","name":"US Department of Defense","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>Programming language design requires making many usability-related design decisions. However, existing HCI methods can be impractical to apply to programming languages: languages have high iteration costs, programmers require significant learning time, and user performance has high variance. To address these problems, we adapted both formative and summative HCI methods to make them more suitable for programming language design. We integrated these methods into a new process, PLIERS, for designing programming languages in a user-centered way. We assessed PLIERS by using it to design two new programming languages. Glacier extends Java to enable programmers to express immutability properties effectively and easily. Obsidian is a language for blockchains that includes verification of critical safety properties. Empirical studies showed that the PLIERS process resulted in languages that could be used effectively by many programmers and revealed additional opportunities for language improvement.<\/jats:p>","DOI":"10.1145\/3452379","type":"journal-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T13:33:16Z","timestamp":1627047196000},"page":"1-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["PLIERS"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9369-4069","authenticated-orcid":false,"given":"Michael","family":"Coblenz","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Gauri","family":"Kambhatla","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI"}]},{"given":"Paulette","family":"Koronkevich","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Jenna L.","family":"Wise","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Celeste","family":"Barnaby","sequence":"additional","affiliation":[{"name":"Facebook, Inc., Menlo Park, CA"}]},{"given":"Joshua","family":"Sunshine","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Jonathan","family":"Aldrich","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Brad A.","family":"Myers","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047203"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640073"},{"volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"Alt Leonardo","key":"e_1_2_1_3_1","unstructured":"Leonardo Alt and Christian Reitwiessner . 2018. SMT-based verification of solidity smart contracts . In Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice . Springer Leonardo Alt and Christian Reitwiessner. 2018. SMT-based verification of solidity smart contracts. In Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice. Springer"},{"key":"e_1_2_1_4_1","volume-title":"Workshop on Evaluation and Usability of Programming Languages and Tools (PLATEAU\u201917)","author":"Barnaby Celeste","year":"2017","unstructured":"Celeste Barnaby , Michael Coblenz , Tyler Etzel , Eliezer Kanal , Joshua Sunshine , Brad Myers , and Jonathan Aldrich . 2017 . A user study to inform the design of the obsidian blockchain DSL . In Workshop on Evaluation and Usability of Programming Languages and Tools (PLATEAU\u201917) . Celeste Barnaby, Michael Coblenz, Tyler Etzel, Eliezer Kanal, Joshua Sunshine, Brad Myers, and Jonathan Aldrich. 2017. A user study to inform the design of the obsidian blockchain DSL. In Workshop on Evaluation and Usability of Programming Languages and Tools (PLATEAU\u201917)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_2"},{"key":"e_1_2_1_6_1","unstructured":"E. D. Berger S. M. Blackburn M. Hauswirth and M. Hicks. 2018. Empirical Evaluation Checklist (beta). Retrieved from http:\/\/www.sigplan.org\/Resources\/EmpiricalEvaluation\/.  E. D. Berger S. M. Blackburn M. Hauswirth and M. Hicks. 2018. Empirical Evaluation Checklist (beta). Retrieved from http:\/\/www.sigplan.org\/Resources\/EmpiricalEvaluation\/."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2016.7739684"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297050"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370213"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HCC.2002.1046337"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814570"},{"volume-title":"Effective Java","author":"Bloch Joshua","key":"e_1_2_1_13_1","unstructured":"Joshua Bloch . 2008. Effective Java , Second Edition. Addison-Wesley . Joshua Bloch. 2008. Effective Java, Second Edition. Addison-Wesley."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.174"},{"volume-title":"Software Architectures and Tools for Computer Aided Process Engineering. Computer Aided Chemical Engineering","author":"Braunschweig Bertrand","key":"e_1_2_1_15_1","unstructured":"Bertrand Braunschweig and Rafiqul Gani . 2002. Software Architectures and Tools for Computer Aided Process Engineering. Computer Aided Chemical Engineering , Vol. 11 . Elsevier . Bertrand Braunschweig and Rafiqul Gani. 2002. Software Architectures and Tools for Computer Aided Process Engineering. Computer Aided Chemical Engineering, Vol. 11. Elsevier."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048117"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133850.3133851"},{"key":"e_1_2_1_18_1","volume-title":"Helena: Web Automation for End Users.","author":"Chasins Sarah","year":"2017","unstructured":"Sarah Chasins . 2017 . Helena: Web Automation for End Users. Retrieved from http:\/\/helena-lang.org\/. Sarah Chasins. 2017. Helena: Web Automation for End Users. Retrieved from http:\/\/helena-lang.org\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1184\/R1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276954.3276965"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Michael Coblenz Jonathan Aldrich Brad A. Myers and Joshua Sunshine. 2020. Can advanced type systems be usable? An empirical study of ownership assets and typestate in obsidian. In Object-oriented Programming Systems Languages and Applications (OOPSLA\u201920).  Michael Coblenz Jonathan Aldrich Brad A. Myers and Joshua Sunshine. 2020. Can advanced type systems be usable? An empirical study of ownership assets and typestate in obsidian. In Object-oriented Programming Systems Languages and Applications (OOPSLA\u201920).","DOI":"10.1145\/3428200"},{"key":"e_1_2_1_23_1","volume-title":"Myers","author":"Coblenz Michael","year":"2019","unstructured":"Michael Coblenz , Gauri Kambhatla , Paulette Koronkevich , Jenna L. Wise , Celeste Barnaby , Joshua Sunshine , Jonathan Aldrich , and Brad A . Myers . 2019 . Usability Methods for Designing Programming Languages for Software Engineers . arxiv:1912.04719 Michael Coblenz, Gauri Kambhatla, Paulette Koronkevich, Jenna L. Wise, Celeste Barnaby, Joshua Sunshine, Jonathan Aldrich, and Brad A. Myers. 2019. Usability Methods for Designing Programming Languages for Software Engineers. arxiv:1912.04719"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.52"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1184\/R1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3417516"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884798"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00013"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-7051(93)90017-N"},{"key":"e_1_2_1_31_1","volume-title":"Retrieved","author":"Daian Phil","year":"2016","unstructured":"Phil Daian . 2016 . Analysis of the DAO exploit . Retrieved August 21, 2018 from http:\/\/hackingdistributed.com\/2016\/06\/18\/analysis-of-the-dao-exploit\/. Phil Daian. 2016. Analysis of the DAO exploit. Retrieved August 21, 2018 from http:\/\/hackingdistributed.com\/2016\/06\/18\/analysis-of-the-dao-exploit\/."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"e_1_2_1_33_1","volume-title":"Dumas and Janice Redish","author":"Joseph","year":"1999","unstructured":"Joseph S. Dumas and Janice Redish . 1999 . A Practical Guide to Usability Testing. Intellect Books . Joseph S. Dumas and Janice Redish. 1999. A Practical Guide to Usability Testing. Intellect Books."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174032"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568299"},{"key":"e_1_2_1_36_1","volume-title":"Simon","author":"Anders Ericsson K.","year":"1984","unstructured":"K. Anders Ericsson and Herbert A . Simon . 1984 . Protocol Analysis : Verbal Reports as Data.MIT Press . K. Anders Ericsson and Herbert A. Simon. 1984. Protocol Analysis: Verbal Reports as Data.MIT Press."},{"key":"e_1_2_1_37_1","volume-title":"Retrieved","author":"Foundation Ethereum","year":"2020","unstructured":"Ethereum Foundation . 2020 . Common Patterns . Retrieved February 18, 2020 from http:\/\/solidity.readthedocs.io\/en\/develop\/common-patterns.html. Ethereum Foundation. 2020. Common Patterns. Retrieved February 18, 2020 from http:\/\/solidity.readthedocs.io\/en\/develop\/common-patterns.html."},{"key":"e_1_2_1_38_1","volume-title":"Retrieved","author":"Foundation Ethereum","year":"2020","unstructured":"Ethereum Foundation . 2020 . Solidity . Retrieved February 18, 2020 from https:\/\/solidity.readthedocs.io\/en\/develop\/. Ethereum Foundation. 2020. Solidity. Retrieved February 18, 2020 from https:\/\/solidity.readthedocs.io\/en\/develop\/."},{"key":"e_1_2_1_39_1","unstructured":"Luke Graham. 2017. $32 million worth of digital currency ether stolen by hackers. Retrieved November 2 2017 from https:\/\/www.cnbc.com\/2017\/07\/20\/32-million-worth-of-digital-currency-ethe r-stolen-by-hackers.html.  Luke Graham. 2017. $32 million worth of digital currency ether stolen by hackers. Retrieved November 2 2017 from https:\/\/www.cnbc.com\/2017\/07\/20\/32-million-worth-of-digital-currency-ethe r-stolen-by-hackers.html."},{"key":"e_1_2_1_40_1","unstructured":"Paul Graham. 2001. Five Questions about Language Design. Retrieved from http:\/\/www.paulgraham.com\/langdes.html.  Paul Graham. 2001. Five Questions about Language Design. Retrieved from http:\/\/www.paulgraham.com\/langdes.html."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0009"},{"key":"e_1_2_1_42_1","unstructured":"Christian Gr\u00fcn. 2016. Map: remove and check values. Retrieved from https:\/\/github.com\/BaseXdb\/basex\/issues\/1297.  Christian Gr\u00fcn. 2016. Map: remove and check values. Retrieved from https:\/\/github.com\/BaseXdb\/basex\/issues\/1297."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80120-8"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/54968.54973"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290310001624329"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.plm.2015.09.001"},{"key":"e_1_2_1_47_1","volume-title":"Retrieved","author":"Review Harvard Business","year":"2017","unstructured":"Harvard Business Review . 2017 . The Potential for Blockchain to Transform Electronic Health Records . Retrieved February 18, 2020 from https:\/\/hbr.org\/2017\/03\/the-potential-for-blockchain-to-transform-electro nic-health-records. Harvard Business Review. 2017. The Potential for Blockchain to Transform Electronic Health Records. Retrieved February 18, 2020 from https:\/\/hbr.org\/2017\/03\/the-potential-for-blockchain-to-transform-electro nic-health-records."},{"key":"e_1_2_1_48_1","unstructured":"Dominik Harz and William Knottenbelt. 2018. Towards Safer Smart Contracts: A Survey of Languages and Verification Methods. arxiv:1809.09805.  Dominik Harz and William Knottenbelt. 2018. Towards Safer Smart Contracts: A Survey of Languages and Verification Methods. arxiv:1809.09805."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209623"},{"key":"e_1_2_1_50_1","volume-title":"Retrieved","author":"Hoare C. A. R.","year":"2009","unstructured":"C. A. R. Hoare . 2009 . Null References: The Billion Dollar Mistake . Retrieved February 18, 2020 from https:\/\/www.infoq.com\/presentations\/Null-References-The-Billion-Dollar-Mistake-Tony-Hoare\/. C. A. R. Hoare. 2009. Null References: The Billion Dollar Mistake. Retrieved February 18, 2020 from https:\/\/www.infoq.com\/presentations\/Null-References-The-Billion-Dollar-Mistake-Tony-Hoare\/."},{"key":"e_1_2_1_51_1","volume-title":"Retrieved","author":"IBM.","year":"2019","unstructured":"IBM. 2019 . Blockchain for supply chain . Retrieved March 31, 2019 from https:\/\/www.ibm.com\/blockchain\/supply-chain\/. IBM. 2019. Blockchain for supply chain. Retrieved March 31, 2019 from https:\/\/www.ibm.com\/blockchain\/supply-chain\/."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/944705.944721"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089733.1089734"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922658"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9279-3"},{"key":"e_1_2_1_56_1","volume-title":"Communication Breakdowns and Boundary Spanning Activities on Large Programming Projects. In Empirical Studies of Programmers: 2nd Workshop.47\u201364","author":"Krasner Herb","year":"1987","unstructured":"Herb Krasner , Bill Curtis , and Neil Iscoe . 1987 . Communication Breakdowns and Boundary Spanning Activities on Large Programming Projects. In Empirical Studies of Programmers: 2nd Workshop.47\u201364 . Herb Krasner, Bill Curtis, and Neil Iscoe. 1987. Communication Breakdowns and Boundary Spanning Activities on Large Programming Projects. In Empirical Studies of Programmers: 2nd Workshop.47\u201364."},{"key":"e_1_2_1_57_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2010","unstructured":"Jonathan Lazar , Jinjuan Heidi Feng, and Harry Hochheiser . 2010 . Research Methods in Human-Computer Interaction. Wiley Publishing . Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2010. Research Methods in Human-Computer Interaction. Wiley Publishing."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858252"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054099"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(74)80004-0"},{"key":"e_1_2_1_61_1","unstructured":"Marianne Mueller. 1997. Class.getSigners() returns an array of signers instead of a copy of the array. Retrieved from https:\/\/bugs.openjdk.java.net\/browse\/JDK-4048143.  Marianne Mueller. 1997. Class.getSigners() returns an array of signers instead of a copy of the array. Retrieved from https:\/\/bugs.openjdk.java.net\/browse\/JDK-4048143."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.200"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015888"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0103_1"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2019.2908576"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169166"},{"key":"e_1_2_1_67_1","volume-title":"Retrieved","author":"University of Washington.","year":"2019","unstructured":"University of Washington. 2019 . Professional Master\u2019s Program . Retrieved February 18, 2020 from https:\/\/www.cs.washington.edu\/academics\/pmp. University of Washington. 2019. Professional Master\u2019s Program. Retrieved February 18, 2020 from https:\/\/www.cs.washington.edu\/academics\/pmp."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647358"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/HCC.2002.1046372"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(87)90007-7"},{"key":"e_1_2_1_71_1","volume-title":"Retrieved","author":"Pernice Kara","year":"2017","unstructured":"Kara Pernice and Kathryn Whintenton . 2017 . How to Deal With Bad Design Suggestions . Retrieved February 18, 2020 from https:\/\/www.nngroup.com\/articles\/bad-design-suggestions\/. Kara Pernice and Kathryn Whintenton. 2017. How to Deal With Bad Design Suggestions. Retrieved February 18, 2020 from https:\/\/www.nngroup.com\/articles\/bad-design-suggestions\/."},{"volume-title":"International Conference on Software Engineering (ICSE\u201904)","author":"Perry Dewayne E.","key":"e_1_2_1_72_1","unstructured":"Dewayne E. Perry , Susan Elliott Sim , and Steve M. Easterbrook . 2004. Case studies for software engineers . In International Conference on Software Engineering (ICSE\u201904) . IEEE, 736\u2013738. Dewayne E. Perry, Susan Elliott Sim, and Steve M. Easterbrook. 2004. Case studies for software engineers. In International Conference on Software Engineering (ICSE\u201904). IEEE, 736\u2013738."},{"volume-title":"Types and Programming Languages","author":"Pierce Benjamin C.","key":"e_1_2_1_73_1","unstructured":"Benjamin C. Pierce . 2002. Types and Programming Languages . MIT Press . Benjamin C. Pierce. 2002. Types and Programming Languages. MIT Press."},{"key":"e_1_2_1_74_1","volume-title":"PL Grand Challenges. Retrieved","author":"Benjamin","year":"2020","unstructured":"Benjamin C. Pierce and Yitzhak Mandelbaum. 2009 . PL Grand Challenges. Retrieved February 18, 2020 from http:\/\/plgrand.blogspot.com. Benjamin C. Pierce and Yitzhak Mandelbaum. 2009. PL Grand Challenges. Retrieved February 18, 2020 from http:\/\/plgrand.blogspot.com."},{"key":"e_1_2_1_75_1","unstructured":"Qualtrics. 2020. Qualtrics Software. Retrieved from http:\/\/www.qualtrics.com\/.  Qualtrics. 2020. Qualtrics Software. Retrieved from http:\/\/www.qualtrics.com\/."},{"key":"e_1_2_1_76_1","volume-title":"Retrieved","author":"Microsoft Corp.","year":"2020","unstructured":"Microsoft Corp. 2008. Framework Design Guidelines . Retrieved February 18, 2020 from https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/design-guidelines\/struct. Microsoft Corp.2008. Framework Design Guidelines. Retrieved February 18, 2020 from https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/design-guidelines\/struct."},{"key":"e_1_2_1_77_1","volume-title":"Retrieved","author":"Oracle Corp.","year":"2020","unstructured":"Oracle Corp. 2019. Secure Coding Guidelines for the Java SE, version 4.0 . Retrieved February 18, 2020 from https:\/\/www.oracle.com\/technetwork\/java\/seccodeguide-139067.html. Oracle Corp.2019. Secure Coding Guidelines for the Java SE, version 4.0. Retrieved February 18, 2020 from https:\/\/www.oracle.com\/technetwork\/java\/seccodeguide-139067.html."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592779"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2008.06.007"},{"volume-title":"The Sage Encyclopedia of Qualitative Research Methods. SAGE","author":"Rothbauer Paulette M.","key":"e_1_2_1_80_1","unstructured":"Paulette M. Rothbauer . 2008. The Sage Encyclopedia of Qualitative Research Methods. SAGE . Paulette M. Rothbauer. 2008. The Sage Encyclopedia of Qualitative Research Methods. SAGE."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2467091"},{"key":"e_1_2_1_82_1","volume-title":"Empirical studies of programmers: The territory, paths, and destinations. Empirical Studies of Programmers","author":"Shneiderman Ben","year":"1986","unstructured":"Ben Shneiderman . 1986. Empirical studies of programmers: The territory, paths, and destinations. Empirical Studies of Programmers ( 1986 ), 1\u201312. Ben Shneiderman. 1986. Empirical studies of programmers: The territory, paths, and destinations. Empirical Studies of Programmers (1986), 1\u201312."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168149.1168158"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(77)80045-X"},{"key":"e_1_2_1_85_1","volume-title":"Retrieved","author":"Sirer Emin G\u00fcn","year":"2016","unstructured":"Emin G\u00fcn Sirer . 2016 . Thoughts on The DAO Hack . Retrieved February 18, 2020 from http:\/\/hackingdistributed.com\/2016\/06\/17\/thoughts-on-the-dao-hack\/. Emin G\u00fcn Sirer. 2016. Thoughts on The DAO Hack. Retrieved February 18, 2020 from http:\/\/hackingdistributed.com\/2016\/06\/17\/thoughts-on-the-dao-hack\/."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"e_1_2_1_87_1","volume-title":"Retrieved","author":"Overflow Stack","year":"2019","unstructured":"Stack Overflow . 2019 . Developer Survey Results 2019 . Retrieved February 18, 2020 from https:\/\/insights.stackoverflow.com\/survey\/2019. Stack Overflow. 2019. Developer Survey Results 2019. Retrieved February 18, 2020 from https:\/\/insights.stackoverflow.com\/survey\/2019."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661136.2661156"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3001257"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089155.2089159"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bmc.2006.06.024"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.17"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048122"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884849"},{"key":"e_1_2_1_95_1","volume-title":"Retrieved","author":"Carnegie Mellon University","year":"2019","unstructured":"Carnegie Mellon University . 2019 . Master\u2019s Programs . Retrieved February 18, 2020 from https:\/\/www.cs.cmu.edu\/masters-programs. Carnegie Mellon University. 2019. Master\u2019s Programs. Retrieved February 18, 2020 from https:\/\/www.cs.cmu.edu\/masters-programs."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0268"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29863-9_31"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2009.5089295"},{"key":"e_1_2_1_99_1","volume-title":"Empirical Studies of Programmers: 2nd Workshop (ESP2). 217\u2013230","author":"Visser Willemien","year":"1987","unstructured":"Willemien Visser . 1987 . Strategies in programming programmable controllers: A field study on a professional programmer . In Empirical Studies of Programmers: 2nd Workshop (ESP2). 217\u2013230 . Retrieved from https:\/\/hal.inria.fr\/hal-00641376\/document. Willemien Visser. 1987. Strategies in programming programmable controllers: A field study on a professional programmer. In Empirical Studies of Programmers: 2nd Workshop (ESP2). 217\u2013230. Retrieved from https:\/\/hal.inria.fr\/hal-00641376\/document."},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.402076"},{"key":"e_1_2_1_101_1","volume-title":"Empirical Studies of Programmers: 2nd Workshop. 83\u201399","author":"Walz Diane B.","year":"1987","unstructured":"Diane B. Walz , Joyce J. Elam , Herb Krasner , and Bill Curtis . 1987 . A methodology for studying software design teams: An investigation of conflict behaviors in the requirements definition phase . In Empirical Studies of Programmers: 2nd Workshop. 83\u201399 . Diane B. Walz, Joyce J. Elam, Herb Krasner, and Bill Curtis. 1987. A methodology for studying software design teams: An investigation of conflict behaviors in the requirements definition phase. In Empirical Studies of Programmers: 2nd Workshop. 83\u201399."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(86)80083-9"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133850.3133863"},{"key":"e_1_2_1_104_1","volume-title":"Ernst","author":"Zibin Yoav","year":"2007","unstructured":"Yoav Zibin , Alex Potanin , Mahmood Ali , Shay Artzi , Adam Kielun , and Michael D . Ernst . 2007 . Object and reference immutability using Java generics. In Foundations of Software Engineering (FSE\u201907). ACM , 75\u201384. Yoav Zibin, Alex Potanin, Mahmood Ali, Shay Artzi, Adam Kielun, and Michael D. Ernst. 2007. Object and reference immutability using Java generics. In Foundations of Software Engineering (FSE\u201907). ACM, 75\u201384."}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3452379","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3452379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:40Z","timestamp":1750191460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452379"}},"subtitle":["A Process that Integrates User-Centered Methods into Programming Language Design"],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":102,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3452379"],"URL":"https:\/\/doi.org\/10.1145\/3452379","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"type":"print","value":"1073-0516"},{"type":"electronic","value":"1557-7325"}],"subject":[],"published":{"date-parts":[[2021,7,23]]},"assertion":[{"value":"2020-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}