{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:54:58Z","timestamp":1771516498481,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,14]]},"DOI":"10.1145\/3593434.3593480","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T12:54:01Z","timestamp":1685451241000},"page":"368-377","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["U Owns the Code That Changes and How Marginal Owners Resolve Issues Slower in Low-Quality Source Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7879-4371","authenticated-orcid":false,"given":"Markus","family":"Borg","sequence":"first","affiliation":[{"name":"CodeScene, Sweden and Dept. of Computer Science, Lund University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2784-9808","authenticated-orcid":false,"given":"Adam","family":"Tornhill","sequence":"additional","affiliation":[{"name":"CodeScene, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7724-0094","authenticated-orcid":false,"given":"Enys","family":"Mones","sequence":"additional","affiliation":[{"name":"CodeScene, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.47"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21072329"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111093"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194164.3194175"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070530"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2218"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3113558"},{"key":"e_1_3_2_1_8_1","volume-title":"Standardized Code Quality Benchmarking for Improving Software Maintainability. Software Quality Journal2","author":"Baggen Robert","year":"2012","unstructured":"Robert Baggen, Jos\u00e9\u00a0Pedro Correia, Katrin Schill, and Joost Visser. 2012. Standardized Code Quality Benchmarking for Improving Software Maintainability. Software Quality Journal2 (2012), 287\u2013307."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/RESER.2013.14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236061"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.06.004"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of the the 8th Joint Meeting of the European Software Engineering Conference and the Symposium on The Foundations of Software Engineering.","author":"Bird Christian","year":"2011","unstructured":"Christian Bird, Nachi Nagappan, Brendan Murphy, Harald Gall, and Premkumar Devanbu. 2011. Don\u2019t Touch My Code! Examining the Effects of Ownership on Software Quality. In Proc. of the the 8th Joint Meeting of the European Software Engineering Conference and the Symposium on The Foundations of Software Engineering."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(83)90003-1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.18"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Markus Borg Adam Tornhill and Enys Mones. 2023. U Owns the Code Replication Package. https:\/\/doi.org\/10.5281\/zenodo.7852985","DOI":"10.5281\/zenodo.7852985"},{"key":"e_1_3_2_1_16_1","unstructured":"Frederick Brooks. 1995. The Mythical Man-Month: Essays On Software Engineering. Pearson Education."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.268921"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601283"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.01.013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512207"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084242"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9145-5"},{"key":"e_1_3_2_1_24_1","first-page":"2021","article-title":"Information Technology - Software Measurement - Software Quality Measurement - Automated Source Code Quality Measures","volume":"5055","author":"International Organization for Standardization.","year":"2021","unstructured":"International Organization for Standardization. 2021. Information Technology - Software Measurement - Software Quality Measurement - Automated Source Code Quality Measures. Technical Report ISO\/IEC 5055:2021. International Organization for Standardization.","journal-title":"Technical Report ISO\/IEC"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256943"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106964"},{"key":"e_1_3_2_1_27_1","article-title":"Cross-Project Defect Prediction with Respect to Code Ownership Model: An Empirical Study","volume":"9","author":"Jureczko Marian","year":"2015","unstructured":"Marian Jureczko and Lech Madeyski. 2015. Cross-Project Defect Prediction with Respect to Code Ownership Model: An Empirical Study. e-Informatica Software Engineering Journal 9, 1 (2015).","journal-title":"e-Informatica Software Engineering Journal"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884840"},{"key":"e_1_3_2_1_29_1","volume-title":"Venkata Sarath\u00a0Chandra Manyam, and Kai Petersen","author":"Kurapati Narendra","year":"2012","unstructured":"Narendra Kurapati, Venkata Sarath\u00a0Chandra Manyam, and Kai Petersen. 2012. Agile Software Development Practice Adoption Survey. In Agile Processes in Software Engineering and Extreme Programming(Lecture Notes in Business Information Processing), Claes Wohlin (Ed.). Springer, Berlin, Heidelberg, 16\u201330."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820567"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110610"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9647-0"},{"key":"e_1_3_2_1_33_1","volume-title":"Do Automated Program Repair Techniques Repair Hard and Important Bugs?Empirical Software Engineering 23, 5","author":"Motwani Manish","year":"2018","unstructured":"Manish Motwani, Sandhya Sankaranarayanan, Rene Just, and Yuriy Brun. 2018. Do Automated Program Repair Techniques Repair Hard and Important Bugs?Empirical Software Engineering 23, 5 (2018), 2901\u20132947."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of the International Conference on Software Maintenance. 24\u201331","author":"Munson J.C.","unstructured":"J.C. Munson and S.G. Elbaum. 1998. Code Churn: A Measure for Estimating the Impact of Code Change. In Proc. of the International Conference on Software Maintenance. 24\u201331."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.11.015"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.03.044"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868357"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3070559"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/Agile.2015.21"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. of the 35th International Conference on Software Maintenance and Evolution. 181\u2013185","author":"Almeida Rodrigo Reboucas\u00a0de","year":"2019","unstructured":"Rodrigo Reboucas\u00a0de Almeida, Christoph Treude, and Uira Kulesza. 2019. Tracy: A Business-Driven Technical Debt Prioritization Framework. In Proc. of the 35th International Conference on Software Maintenance and Evolution. 181\u2013185."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314233"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.05.010"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372275"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2916002"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1824017"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869542.1869560"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544902.3546238"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524843.3528091"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01026"},{"key":"e_1_3_2_1_53_1","volume-title":"Software Engineering: A Practical Guide","author":"Wohlin C.","year":"2012","unstructured":"C. Wohlin, P. Runeson, M. H\u00f6st, M. Ohlsson, B. Regnell, and A. Wessl\u00e9n. 2012. Experimentation in Software Engineering: A Practical Guide. Springer."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2734091"}],"event":{"name":"EASE '23: The International Conference on Evaluation and Assessment in Software Engineering","location":"Oulu Finland","acronym":"EASE '23"},"container-title":["Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593434.3593480","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593434.3593480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:09:31Z","timestamp":1755846571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593434.3593480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":54,"alternative-id":["10.1145\/3593434.3593480","10.1145\/3593434"],"URL":"https:\/\/doi.org\/10.1145\/3593434.3593480","relation":{},"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"2023-06-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}