{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T03:40:05Z","timestamp":1775533205056,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":114,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["2206859,2106853,2131477"],"award-info":[{"award-number":["2206859,2106853,2131477"]}]},{"name":"NSF Graduate Research Fellowship Program","award":["DGE2140739"],"award-info":[{"award-number":["DGE2140739"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616293","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1281-1293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["\u201cWe Feel Like We\u2019re Winging It:\u201d A Study on Navigating Open-Source Dependency Abandonment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5297-4523","authenticated-orcid":false,"given":"Courtney","family":"Miller","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4450-4572","authenticated-orcid":false,"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4418-5783","authenticated-orcid":false,"given":"Bogdan","family":"Vasilescu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.8102547"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64694-3_15"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00072"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870181"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503718"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.39"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2005.03.001"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950325"},{"key":"e_1_3_2_2_9_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology, 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054834"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/BotSE.2019.00021"},{"key":"e_1_3_2_2_12_1","volume-title":"pre-play communication and equilibrium. Games and economic behavior, 46, 1","author":"Burton Anthony","year":"2004","unstructured":"Anthony Burton and Martin Sefton. 2004. Risk, pre-play communication and equilibrium. Games and economic behavior, 46, 1 (2004), 23\u201340."},{"key":"e_1_3_2_2_13_1","volume-title":"Giuseppe Iaffaldano, Filippo Lanubile, and Igor Steinmacher.","author":"Calefato Fabio","year":"2022","unstructured":"Fabio Calefato, Marco Aurelio Gerosa, Giuseppe Iaffaldano, Filippo Lanubile, and Igor Steinmacher. 2022. Will you come back to contribute? Investigating the inactivity of OSS core developers in GitHub. Empirical Software Engineering."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33442-9_12"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3382140"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565039"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106246"},{"key":"e_1_3_2_2_18_1","volume-title":"Luciano Milen, and Luciana L Silva.","author":"Coelho Jailton","year":"2020","unstructured":"Jailton Coelho, Marco Tulio Valente, Luciano Milen, and Luciana L Silva. 2020. Is this GitHub project maintained? Measuring the level of maintenance activity of open-source projects. Information and Software Technology (IST)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-017-0303-4"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Russell Cooper Douglas V DeJong Robert Forsythe and Thomas W Ross. 1989. Communication in the battle of the sexes game: some experimental results. The RAND Journal of Economics 568\u2013587.","DOI":"10.2307\/2555734"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Russell Cooper Douglas V DeJong Robert Forsythe and Thomas W Ross. 1992. Communication in coordination games. The Quarterly Jrnl. of Econ..","DOI":"10.2307\/2118488"},{"key":"e_1_3_2_2_22_1","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Corbin Juliet","unstructured":"Juliet Corbin and Anselm Strauss. 2014. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393661"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089127"},{"key":"e_1_3_2_2_25_1","volume-title":"Proc. Openforum Academy Conf..","author":"Daffara Carlo","year":"2012","unstructured":"Carlo Daffara. 2012. Estimating the economic contribution of open source software to the European economy. In Proc. Openforum Academy Conf.."},{"key":"e_1_3_2_2_26_1","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE). 241\u2013250","author":"de Souza Cleidson RB","year":"2008","unstructured":"Cleidson RB de Souza and David F Redmiles. 2008. An empirical study of software developers\u2019 management of dependencies and changes. In Proc. Int\u2019l Conf. Software Engineering (ICSE). 241\u2013250."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.12"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00050"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196401"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Andreas Diekmann. 1985. Volunteer\u2019s dilemma. Jrnl of conflict resolution.","DOI":"10.1177\/0022002785029004003"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.328"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9000-1"},{"key":"e_1_3_2_2_33_1","volume-title":"Roads and bridges: The unseen labor behind our digital infrastructure","author":"Eghbal Nadia","unstructured":"Nadia Eghbal. 2016. Roads and bridges: The unseen labor behind our digital infrastructure. Ford Foundation."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2652524.2652540"},{"key":"e_1_3_2_2_35_1","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE).","author":"Fang Hongbo","year":"2022","unstructured":"Hongbo Fang, Hemank Lamba, James Herbsleb, and Bogdan Vasilescu. 2022. \u201cThis is damn slick!\u201d Estimating the impact of tweets on open source project popularity and new contributors. In Proc. Int\u2019l Conf. Software Engineering (ICSE)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10683-015-9442-3"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422392.3422433"},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. of the ACM on Human-Computer Interaction, 5, CSCW2","author":"Ferreira Isabella","year":"2021","unstructured":"Isabella Ferreira, Jinghui Cheng, and Bram Adams. 2021. The \u201cshut the f**k up\u201d phenomenon: Characterizing incivility in open source code review discussions. Proc. of the ACM on Human-Computer Interaction, 5, CSCW2 (2021)."},{"key":"e_1_3_2_2_39_1","unstructured":"Nicole Forsgren. 2021. 2020 State of the Octoverse: Securing the World\u2019s Software. arXiv preprint arXiv:2110.10246."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786870"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Jill J Francis. 2010. What is an adequate sample size? Operationalising data saturation for theory-based interview studies. Psychology and Health.","DOI":"10.1080\/08870440903194015"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20883-7_9"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00098"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9332-x"},{"key":"e_1_3_2_2_45_1","unstructured":"GitHub. 2022. Exploring the dependencies of a repository. https:\/\/docs.github.com\/en\/code-security\/supply-chain-security\/understanding-your-software-supply-chain\/exploring-the-dependencies-of-a-repository Accessed: 2022-09-23"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3084015"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624034"},{"key":"e_1_3_2_2_48_1","unstructured":"Egon Guba. 1979. Naturalistic inquiry.. Improving Human Performance Qtrly.."},{"key":"e_1_3_2_2_49_1","volume-title":"Int\u2019l Conf. on Software Engineering: Software Engineering in Society (ICSE-SEIS).","author":"Guizani Mariam","year":"2022","unstructured":"Mariam Guizani, Thomas Zimmermann, Anita Sarma, and Denae Ford. 2022. Attracting and retaining oss contributors with a maintainer dashboard. In Int\u2019l Conf. on Software Engineering: Software Engineering in Society (ICSE-SEIS)."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555553"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2015.9"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558922"},{"key":"e_1_3_2_2_53_1","volume-title":"Int\u2019l Congress on Modelling and Simulation.","author":"Healy A","year":"2009","unstructured":"A Healy and J Pate. 2009. Asymmetry and incomplete information in an experimental volunteer\u2019s dilemma. In Int\u2019l Congress on Modelling and Simulation."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553570"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080799"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3475716.3475789"},{"key":"e_1_3_2_2_57_1","unstructured":"Giuseppe Iaffaldano Igor Steinmacher Fabio Calefato Marco Gerosa and Filippo Lanubile. 2019. Why do developers take breaks from contributing to OSS projects? A preliminary analysis. arXiv preprint arXiv:1903.09528."},{"key":"e_1_3_2_2_58_1","volume-title":"Proc. Hawaii Int\u2019l Conf. System Sciences (HICSS). 1\u201310","author":"Izquierdo-Cortazar Daniel","year":"2009","unstructured":"Daniel Izquierdo-Cortazar, Gregorio Robles, Felipe Ortega, and Jesus M Gonzalez-Barahona. 2009. Using software archaeology to measure knowledge loss in software projects due to developer turnover. In Proc. Hawaii Int\u2019l Conf. System Sciences (HICSS). 1\u201310."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socec.2019.04.004"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9521-5"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"Piergiorgio Ladisa Henrik Plate Matias Martinez and Olivier Barais. 2022. Taxonomy of attacks on open-source software supply chains. arXiv preprint arXiv:2204.04008.","DOI":"10.1145\/3560835.3564546"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409711"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11805"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0017737"},{"key":"e_1_3_2_2_65_1","article-title":"Solving the Volunteer\u2019s Dilemma: The Efficiency of Rewards Versus Punishments. American Law and","author":"Leshem Shmuel","year":"2016","unstructured":"Shmuel Leshem and Avraham Tabbach. 2016. Solving the Volunteer\u2019s Dilemma: The Efficiency of Rewards Versus Punishments. American Law and Econ. Rev..","journal-title":"Econ. Rev.."},{"key":"e_1_3_2_2_66_1","volume-title":"Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16, 4","author":"Lewis Sarah","year":"2015","unstructured":"Sarah Lewis. 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16, 4 (2015), 473\u2013475."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2017.11"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"Yvonna S Lincoln and Egon G Guba. 1985. Naturalistic inquiry. sage.","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Shakun D Mago and Jennifer Pate. 2022. Greed and fear: Competitive and charitable priming in a threshold volunteer\u2019s dilemma. Economic Inquiry.","DOI":"10.1111\/ecin.13117"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.2005.00335.x"},{"key":"e_1_3_2_2_71_1","volume-title":"Fundamentals of Qualitative Data Analysis","author":"Miles Matthew B","unstructured":"Matthew B Miles, A Michael Huberman, and Johnny Saldana. 2014. Fundamentals of Qualitative Data Analysis. Sage Los Angeles, CA."},{"key":"e_1_3_2_2_72_1","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE).","author":"Miller Courtney","year":"2022","unstructured":"Courtney Miller, Sophie Cohen, Daniel Klug, Bogdan Vasilescu, and Christian KaUstner. 2022. \u201cDid you miss my comment or what?\u201d Understanding toxicity in open source discussions. In Proc. Int\u2019l Conf. Software Engineering (ICSE)."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20883-7_11"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"crossref","unstructured":"Suhaib Mujahid Rabe Abdalkareem and Emad Shihab. 2022. What are the characteristics of highly-selected packages? A case study on the npm ecosystem. arXiv preprint arXiv:2204.04562.","DOI":"10.2139\/ssrn.4070797"},{"key":"e_1_3_2_2_75_1","article-title":"Toward using package centrality trend to identify packages in decline","author":"Mujahid Suhaib","year":"2021","unstructured":"Suhaib Mujahid, Diego Elias Costa, Rabe Abdalkareem, Emad Shihab, Mohamed Aymen Saied, and Bram Adams. 2021. Toward using package centrality trend to identify packages in decline. IEEE Transactions on Engineering Mgmt..","journal-title":"IEEE Transactions on Engineering Mgmt.."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.64"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406917733847"},{"key":"e_1_3_2_2_78_1","unstructured":"npm Docs. 2022. npm-deprecate. https:\/\/docs.npmjs.com\/cli\/v6\/commands\/npm-deprecate#synopsis Accessed: 2022-07-07"},{"key":"e_1_3_2_2_79_1","volume-title":"This year in JavaScript: 2018 in review and npm\u2019s predictions for","author":"npm Inc. 2018.","year":"2019","unstructured":"npm Inc. 2018. This year in JavaScript: 2018 in review and npm\u2019s predictions for 2019. https:\/\/medium.com\/npm-inc\/this-year-in-javascript-2018-in-review-and-npms-predictions-for-2019-3a3d7e5298ef Accessed: 2022-08-19"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507153"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296790"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108818"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.68"},{"key":"e_1_3_2_2_84_1","unstructured":"Gauthami Polasani. 2022. Announcing the private beta of FOSSA Risk Intelligence. https:\/\/fossa.com\/blog\/announcing-private-beta-risk-intelligence\/"},{"key":"e_1_3_2_2_85_1","unstructured":"Gede Artha Azriadi Prana. 2021. Out of sight out of mind? How vulnerable dependencies affect open-source projects. Empirical Software Engineering."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00078"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359224"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884851"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393662"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"crossref","unstructured":"Steven G Rogelberg. 2003. Profiling active and passive nonrespondents to an organizational survey. Jrnl. of Applied Psych..","DOI":"10.5465\/ambpp.2003.13792519"},{"key":"e_1_3_2_2_91_1","volume-title":"IEE Proceedings-Software.","author":"Schach Stephen R.","unstructured":"Stephen R. Schach, Bo Jin, David R. Wright, Gillian Z. Heller, and A. Jefferson Offutt. 2002. Maintainability of the Linux kernel. IEE Proceedings-Software."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510116"},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-020-09543-w"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884806"},{"key":"e_1_3_2_2_96_1","volume-title":"Marco Aurelio Gerosa, and David Redmiles.","author":"Steinmacher Igor","year":"2015","unstructured":"Igor Steinmacher, Marco Aurelio Graciotto Silva, Marco Aurelio Gerosa, and David Redmiles. 2015. A systematic literature review on the barriers faced by newcomers to open source software projects. Information and Software Tech.."},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.110162131"},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.38"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1660"},{"key":"e_1_3_2_2_100_1","unstructured":"Martin Thoma. 2021. Dependency vendoring. https:\/\/medium.com\/plain-and-simple\/dependency-vendoring-dd765be75655 Accessed: 2022-08-04"},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884606"},{"key":"e_1_3_2_2_102_1","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE). 511\u2013522","author":"Trockman Asher","year":"2018","unstructured":"Asher Trockman, Shurui Zhou, Christian K\u00e4stner, and Bogdan Vasilescu. 2018. Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem. In Proc. Int\u2019l Conf. Software Engineering (ICSE). 511\u2013522."},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635882"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236062"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"crossref","unstructured":"Georg Von Krogh Sebastian Spaeth and Karim Lakhani. 2003. Community joining and specialization in open source software innovation: a case study. Research Policy.","DOI":"10.2139\/ssrn.387500"},{"key":"e_1_3_2_2_107_1","unstructured":"Wikipedia. 2022. Volunteer\u2019s Dilemma. https:\/\/en.wikipedia.org\/wiki\/Volunteer\u2019s_dilemma Accessed: 2022-09-11"},{"key":"e_1_3_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.29"},{"key":"e_1_3_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510196"},{"key":"e_1_3_2_2_110_1","unstructured":"Liguo Yu Stephen R Schach and Kai Chen. 2005. Measuring the maintainability of open-source software. In Empirical Software Engineering."},{"key":"e_1_3_2_2_111_1","volume-title":"Proc. Int\u2019l Conf. Software Engineering: Software Engineering in Practice (ICSE-SEIP).","author":"Zahan Nusrat","year":"2022","unstructured":"Nusrat Zahan. 2022. What are weak links in the NPM supply chain? In Proc. Int\u2019l Conf. Software Engineering: Software Engineering in Practice (ICSE-SEIP)."},{"key":"e_1_3_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501822"},{"key":"e_1_3_2_2_113_1","article-title":"Who will stay in the FLOSS community? Modeling participant\u2019s initial behavior","author":"Zhou Minghui","year":"2014","unstructured":"Minghui Zhou and Audris Mockus. 2014. Who will stay in the FLOSS community? Modeling participant\u2019s initial behavior. IEEE Trans. Softw. Eng. (TSE).","journal-title":"IEEE Trans. Softw. Eng. (TSE)."},{"key":"e_1_3_2_2_114_1","volume-title":"Predicting the maintainability of open source software using design metrics","author":"Zhou Yuming","unstructured":"Yuming Zhou and Baowen Xu. 2008. Predicting the maintainability of open source software using design metrics. Wuhan University Jrnl. of Natural Sciences."}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:04Z","timestamp":1750178164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":114,"alternative-id":["10.1145\/3611643.3616293","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616293","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}