{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:31Z","timestamp":1750309351278,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Department of Defense","award":["ARO W911NF-21-1-0335"],"award-info":[{"award-number":["ARO W911NF-21-1-0335"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF DMS-1513644"],"award-info":[{"award-number":["NSF DMS-1513644"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,8]]},"DOI":"10.1145\/3670865.3673519","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T20:13:33Z","timestamp":1734466413000},"page":"863-892","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Strategic Model of Software Dependency Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7781-223X","authenticated-orcid":false,"given":"Cornelius","family":"Fritz","sequence":"first","affiliation":[{"name":"Penn State University, State College, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6403-941X","authenticated-orcid":false,"given":"Co-Pierre","family":"Georg","sequence":"additional","affiliation":[{"name":"University of Cape Town, Cape Town, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2890-6042","authenticated-orcid":false,"given":"Angelo","family":"Mele","sequence":"additional","affiliation":[{"name":"Johns Hopkins University - Carey School of Business, Baltimore, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3649-5386","authenticated-orcid":false,"given":"Michael","family":"Schweinberger","sequence":"additional","affiliation":[{"name":"Penn State University, State College, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Gerald Jay Sussman, and Julie Sussman","author":"Abelson Harold","year":"1996","unstructured":"Harold Abelson, Gerald Jay Sussman, and Julie Sussman. 1996. Structure and Interpretation of Computer Programs. MIT Press, Cambridge, MA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0440"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1070.0771"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2020.107029"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.06.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOS1124"},{"key":"e_1_3_2_1_7_1","volume-title":"Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment P1008","author":"Blondel Vincent D","year":"2008","unstructured":"Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment P1008 (2008)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465769.2465771"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA15722"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/ectj.12096"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9469.00296"},{"volume-title":"Oxford handbook on the economics of networks., yann bramoulle, andrea galeotti, and brian rogers (Eds.)","author":"Chandrasekhar Arun G.","key":"e_1_3_2_1_12_1","unstructured":"Arun G. Chandrasekhar. 2016. Econometrics of network formation. In Oxford handbook on the economics of networks., yann bramoulle, andrea galeotti, and brian rogers (Eds.). Oxford Univerisity Press."},{"key":"e_1_3_2_1_14_1","volume-title":"Identifying the roles of race-based choice and chance in high school friendship network formation. the Proceedings of the National Academy of Sciences 107, 11 (March","author":"Currarini Sergio","year":"2010","unstructured":"Sergio Currarini, Matthew O. Jackson, and Paolo Pin. 2010. Identifying the roles of race-based choice and chance in high school friendship network formation. the Proceedings of the National Academy of Sciences 107, 11 (March 2010), 4857\u00ef\u00bf1\/24861."},{"key":"e_1_3_2_1_15_1","volume-title":"A structural model of business cards exchange networks. (August","author":"Martinez Dahbura Juan Nelson","year":"2021","unstructured":"Juan Nelson Martinez Dahbura, Shota Komatsu, Takanori Nishida, and Angelo Mele. 2021. A structural model of business cards exchange networks. (August 2021). working paper, https:\/\/arxiv.org\/abs\/2105.12704.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9589-y"},{"key":"e_1_3_2_1_17_1","volume-title":"Econometrics of Network Models. In Advances in Economics and Econometrics: Eleventh World Congress, B. Honore, A. Pakes, M. Piazzesi, and L. Samuelson (Eds.)","author":"DePaula Aureo","year":"2017","unstructured":"Aureo DePaula. 2017. Econometrics of Network Models. In Advances in Economics and Econometrics: Eleventh World Congress, B. Honore, A. Pakes, M. Piazzesi, and L. Samuelson (Eds.). Cambridge University Press."},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Identifying Preferences in Networks with Bounded Degree","volume":"86","author":"DePaula Aureo","year":"2018","unstructured":"Aureo DePaula, Seth Richards-Shubik, and Elie Tamer. 2018. Identifying Preferences in Networks with Bounded Degree. Econometrica 86, 1 (January 2018), 263--288.","journal-title":"Econometrica"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_21_1","unstructured":"Federal Trade Commission. 2024. Equifax Data Breach Settlement. Federal Trade Commission - Enforcement. https:\/\/www.ftc.gov\/enforcement\/refunds\/equifax-data-breach-settlement"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20171452"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA12679"},{"volume-title":"Handbook of econometrics 7A","author":"Graham Bryan","key":"e_1_3_2_1_24_1","unstructured":"Bryan Graham. 2020. Network data. In Handbook of econometrics 7A, S. Durlauf, L. Hansen, J. Heckman, and R. Matzkin (Eds.). Amsterdam: North-Holland,."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1541-0420.2012.01748.x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/263698.264352"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/609784.609818"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Matthew Jackson (Ed.). 2008. Social and economic networks. Princeton.","DOI":"10.1515\/9781400833993"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.1996.0108"},{"key":"e_1_3_2_1_31_1","unstructured":"Alan C. Kay. 1993. The Early History of Smalltalk. URL: http:\/\/gagne.homedns.org\/~tgagne\/contrib\/EarlyHistoryST.html. ACM."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character 115","author":"Kermack William Ogilvy","year":"1972","unstructured":"William Ogilvy Kermack and Anderson G McKendrick. 1972. A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character 115, 772 (1972), 700--721."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.55"},{"key":"e_1_3_2_1_34_1","volume-title":"The art of computer programming","author":"Knuth Donald E.","unstructured":"Donald E. Knuth. 1997. The art of computer programming, volume 1 (3rd ed.): Fundamental algorithms. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.","edition":"3"},{"volume-title":"The Cost of Poor Quality Software in the US: A 2018 Report. Report","author":"Krasner Herb","key":"e_1_3_2_1_35_1","unstructured":"Herb Krasner. 2018. The Cost of Poor Quality Software in the US: A 2018 Report. Report. Consortium for IT Software Quality (CISQ)."},{"key":"e_1_3_2_1_36_1","unstructured":"Nathan LaBelle and Eugene Wallingford. 2004. Inter-package dependency networks in open-source software. (2004). Working paper https:\/\/arxiv.org\/pdf\/cs\/0411096.pdf."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6451.00174"},{"key":"e_1_3_2_1_38_1","volume-title":"Schulman","author":"Lewis John A.","year":"1991","unstructured":"John A. Lewis, Sallie M. Henry, Dennis G. Kafura, and Robert S. Schulman. 1991. An Empirical Study of the Object-Oriented Paradigm and Software Reuse. In OOSPLA 91. 184--196."},{"key":"e_1_3_2_1_39_1","unstructured":"John McCarthy. 1996. The implementation of LISP. Stanford AI Lab: The History of LISP. Stanford AI Lab."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA10400"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/07350015.2021.1930013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/07350015.2022.2139709"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1162\/rest_a_01023"},{"volume-title":"Software Errors Cost U.S. Economy $59.5 Billion Annually","author":"National Institute of Standards and Technology. 2002.","key":"e_1_3_2_1_44_1","unstructured":"National Institute of Standards and Technology. 2002. Software Errors Cost U.S. Economy $59.5 Billion Annually. Press Release. National Institute of Standards and Technology."},{"key":"e_1_3_2_1_45_1","unstructured":"NIST. 2024. The National Vulnerabilities Database. https:\/\/nvd.nist.gov\/vuln. Accessed: 2024-01-31."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11569596_31"},{"key":"e_1_3_2_1_47_1","volume-title":"Probabilistic Procedures for SIR and SIS Epidemic Models on Erd\u0151s-R\u00e9nyi Contact Networks: Analyzing the Relationship Between Epidemic Threshold and Topological Entropy. Applied Mathematics 3, 4","author":"Rocha J. L.","year":"2023","unstructured":"J. L. Rocha, S. Carvalho, and Beatriz Coimbra. 2023. Probabilistic Procedures for SIR and SIS Epidemic Models on Erd\u0151s-R\u00e9nyi Contact Networks: Analyzing the Relationship Between Epidemic Threshold and Topological Entropy. Applied Mathematics 3, 4 (2023)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"William Schueller Johannes Wachs V. Servedio S. Thurner and V. Loreto. 2022. Curated data on the Rust ecosystem: Collaboration networks and library dependencies. Scientific Data 9 703 (2022).","DOI":"10.1038\/s41597-022-01819-z"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3150\/19-BEJ1153"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/10485252.2021.1972294"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12081"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1214\/19-AOS1810"},{"key":"e_1_3_2_1_53_1","article-title":"Markov Chain Monte Carlo Estimation of Exponential Random Graph Models","volume":"3","author":"Snijders Tom A.B","year":"2002","unstructured":"Tom A.B Snijders. 2002. Markov Chain Monte Carlo Estimation of Exponential Random Graph Models. Journal of Social Structure 3, 2 (2002).","journal-title":"Journal of Social Structure"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1155\/S168712000402009X"},{"key":"e_1_3_2_1_55_1","unstructured":"J. R. Stewart and M. Schweinberger. 2023. Pseudo-likelihood-based M-estimators for random graphs with dependent edges and parameter vectors of increasing dimension. arxiv.org\/abs\/2012.07167 (2023). Invited major revision by The Annals of Statistics."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00286"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1214\/12-AOAS617"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1523420"},{"key":"e_1_3_2_1_59_1","volume-title":"Analyzing open-source software systems as complex networks. Physica A: Statistical Mechanics and its Applications 387, 24","author":"Zheng Xiaolong","year":"2008","unstructured":"Xiaolong Zheng, Daniel Zeng, Huiqian Li, and Feiyue Wang. 2008. Analyzing open-source software systems as complex networks. Physica A: Statistical Mechanics and its Applications 387, 24 (2008), 6190--6200."},{"key":"e_1_3_2_1_60_1","volume-title":"2019 USENIX Security Symposium, USENIX Security '19","author":"Zimmermann Markus","year":"2019","unstructured":"Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, and Michael Pradel. 2019. Small World with High Risks: A Study of Security Threats in the npm Ecosystem. In 2019 USENIX Security Symposium, USENIX Security '19."}],"event":{"name":"EC '24: 25th ACM Conference on Economics and Computation","sponsor":["SIGecom Special Interest Group on Economics and Computation"],"location":"New Haven CT USA","acronym":"EC '24"},"container-title":["Proceedings of the 25th ACM Conference on Economics and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670865.3673519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670865.3673519","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670865.3673519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:42Z","timestamp":1750291542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670865.3673519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":58,"alternative-id":["10.1145\/3670865.3673519","10.1145\/3670865"],"URL":"https:\/\/doi.org\/10.1145\/3670865.3673519","relation":{},"subject":[],"published":{"date-parts":[[2024,7,8]]},"assertion":[{"value":"2024-12-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}