{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:22Z","timestamp":1750219762902,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["IIS-1813935, SaTC-2135156, POSE-2229703"],"award-info":[{"award-number":["IIS-1813935, SaTC-2135156, POSE-2229703"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","award":[""],"award-info":[{"award-number":[""]}],"id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000767","name":"Rolls-Royce","doi-asserted-by":"publisher","award":[""],"award-info":[{"award-number":[""]}],"id":[{"id":"10.13039\/501100000767","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3613075","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"2112-2116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8749-9697","authenticated-orcid":false,"given":"Kelechi G.","family":"Kalu","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2181-5527","authenticated-orcid":false,"given":"Taylor R.","family":"Schorlemmer","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4133-4910","authenticated-orcid":false,"given":"Sophie","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6365-6645","authenticated-orcid":false,"given":"Kyle A.","family":"Robinson","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9151-5008","authenticated-orcid":false,"given":"Erik","family":"Kocinare","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2495-686X","authenticated-orcid":false,"given":"James C.","family":"Davis","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"ACM SIGSOFT Empirical Standards. https:\/\/github.com\/acmsigsoft\/EmpiricalStandards Accessed","author":"ACM SIGSOFT.","year":"2023","unstructured":"ACM SIGSOFT. 2021. ACM SIGSOFT Empirical Standards. https:\/\/github.com\/acmsigsoft\/EmpiricalStandards Accessed: May 3, 2023"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3560879"},{"key":"e_1_3_2_2_3_1","volume-title":"Reflecting on Recurring Failures in IoT Development. In 37th IEEE\/ACM International Conference on Automated Software Engineering. IEEE\/ACM, 1\u20135.","author":"Anandayuvaraj Dharun","year":"2022","unstructured":"Dharun Anandayuvaraj and James C Davis. 2022. Reflecting on Recurring Failures in IoT Development. In 37th IEEE\/ACM International Conference on Automated Software Engineering. IEEE\/ACM, 1\u20135."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/01596306.2015.1015279"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2006.34"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/9781118823096"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44387"},{"key":"e_1_3_2_2_9_1","volume-title":"A coefficient of agreement for nominal scales. Educational and psychological measurement, 20, 1","author":"Cohen Jacob","year":"1960","unstructured":"Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement, 20, 1 (1960), 37\u201346."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.4337\/9781784714871.00005"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0059-9"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549114"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.44"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","unstructured":"Naranker Dulay Emil Lupu Morris Sloman and N. Damianou. 2001. A policy deployment model for the Ponder language. IEEE Press. Seattle. isbn:978-0-7803-6719-7 https:\/\/doi.org\/10.1109\/INM.2001.918064 Pages: 543 10.1109\/INM.2001.918064","DOI":"10.1109\/INM.2001.918064"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9181-9"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468571"},{"key":"e_1_3_2_2_17_1","volume-title":"Embedded Software Development for Safety-Critical Systems","author":"Hobbs Chris","unstructured":"Chris Hobbs. 2016. Software Development Standards. In Embedded Software Development for Safety-Critical Systems (2nd ed.), Chris Hobbs (Ed.). Elsevier, 65\u201391. isbn:978-0-08-100599-5","edition":"2"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.493023"},{"key":"e_1_3_2_2_19_1","volume-title":"IEEE Standard for Software Quality Assurance Processes","author":"IEEE.","year":"2014","unstructured":"IEEE. 2014. IEEE Standard for Software Quality Assurance Processes. IEEE Standards Association. https:\/\/ieeexplore.ieee.org\/document\/6838485 IEEE Std 730-2014"},{"key":"e_1_3_2_2_20_1","volume-title":"Quality management systems \u2013 Requirements","author":"ISO.","year":"2085","unstructured":"ISO. 2015. Quality management systems \u2013 Requirements. International Organization for Standardization. https:\/\/www.iso.org\/standard\/62085.html ISO Standard 9001"},{"key":"e_1_3_2_2_21_1","unstructured":"ISO\/IEC 12207. 2017. Systems and software engineering\u2013Software life cycle processes. https:\/\/www.iso.org\/standard\/63711.html"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.55"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273458"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027796"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169146"},{"key":"e_1_3_2_2_26_1","volume-title":"MISRA C 2012: Guidelines for the Use of the C Language in Critical Systems","author":"MISRA.","year":"2013","unstructured":"MISRA. 2013. MISRA C 2012: Guidelines for the Use of the C Language in Critical Systems: March 2013. Motor Industry Software Research Association."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882415"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491415"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036931"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560596"},{"key":"e_1_3_2_2_31_1","unstructured":"NIST. [n. d.]. NIST SP 800-12: Chapter 5 - Computer Security Policy. https:\/\/csrc.nist.rip\/publications\/nistpubs\/800-12\/800-12-html\/chapter5.html"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560835.3564556"},{"volume-title":"Software metrics: an analysis and evaluation. 5","author":"Perlis Alan J","key":"e_1_3_2_2_33_1","unstructured":"Alan J Perlis, Frederick Sayward, and Mary Shaw. 1981. Software metrics: an analysis and evaluation. 5, Mit Press."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316010"},{"volume-title":"Software engineering: a practitioner\u2019s approach","author":"Pressman Roger S","key":"e_1_3_2_2_35_1","unstructured":"Roger S Pressman. 2014. Software engineering: a practitioner\u2019s approach. McGraw-Hill Education."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468591"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.24"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"e_1_3_2_2_39_1","volume-title":"Software engineering","author":"Sommerville Ian","unstructured":"Ian Sommerville. 2011. Software engineering (9th ed ed.). Pearson, Boston. isbn:978-0-13-703515-1 978-0-13-705346-9 OCLC: ocn462909026","edition":"9"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-218"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34890-2_4"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings ICSE Workshop on Empirical Studies of Software Development and Evolution.","author":"Wohlin Claes","year":"1999","unstructured":"Claes Wohlin, Martin H\u00f6st, and Anders Wessl\u00e9n. 1999. Can the personal software process be used for empirical studies. In Proceedings ICSE Workshop on Empirical Studies of Software Development and Evolution."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730773"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2017.7965698"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Francisco CA USA","acronym":"ESEC\/FSE '23"},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3613075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:10Z","timestamp":1750178230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":45,"alternative-id":["10.1145\/3611643.3613075","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3613075","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}