{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T03:39:39Z","timestamp":1775533179469,"version":"3.50.1"},"reference-count":100,"publisher":"Association for Computing Machinery (ACM)","issue":"8","funder":[{"name":"National Science Foundation","award":["1901102 and 2120429"],"award-info":[{"award-number":["1901102 and 2120429"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:p>In Open Source Software, resources of any project are open for reuse by introducing dependencies or copying the resource itself. In contrast to dependency-based reuse, the infrastructure to systematically support copy-based reuse appears to be entirely missing. Our aim is to enable future research and tool development to increase efficiency and reduce the risks of copy-based reuse. We seek a better understanding of such reuse by measuring its prevalence and identifying factors affecting the propensity to reuse. To identify reused artifacts and trace their origins, our method exploits World of Code infrastructure. We begin with a set of theory-derived factors related to the propensity to reuse, sample instances of different reuse types, and survey developers to better understand their intentions. Our results indicate that copy-based reuse is common, with many developers being aware of it when writing code. The propensity for a file to be reused varies greatly among languages and between source code and binary files, consistently decreasing over time. Files introduced by popular projects are more likely to be reused, but at least half of reused resources originate from \u201csmall\u201d and \u201cmedium\u201d projects. Developers had various reasons for reuse but were generally positive about using a package manager.<\/jats:p>","DOI":"10.1145\/3715907","type":"journal-article","created":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T11:05:51Z","timestamp":1738321551000},"page":"1-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Beyond Dependencies: The Role of Copy-Based Reuse in Open Source Software Development"],"prefix":"10.1145","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4408-1183","authenticated-orcid":false,"given":"Mahmoud","family":"Jahanshahi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0973-7127","authenticated-orcid":false,"given":"David","family":"Reid","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7987-7598","authenticated-orcid":false,"given":"Audris","family":"Mockus","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,6]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"86121","DOI":"10.1109\/ACCESS.2019.2918202","article-title":"A systematic review on code clone detection","volume":"7","author":"Ain Qurat Ul","year":"2019","unstructured":"Qurat Ul Ain, Wasi Haider Butt, Muhammad Waseem Anwar, Farooque Azam, and Bilal Maqbool. 2019. A systematic review on code clone detection. IEEE Access 7 (2019), 86121\u201386144.","journal-title":"IEEE Access"},{"key":"e_1_3_2_3_2","first-page":"283","volume-title":"Proceedings of the IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER \u201817)","author":"An Le","year":"2017","unstructured":"Le An, Ons Mlouki, Foutse Khomh, and Giuliano Antoniol. 2017. Stack overflow: a code laundering platform?. In Proceedings of the IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER \u201817). IEEE, 283\u2013293."},{"issue":"8","key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1287\/mnsc.1100.1183","article-title":"Social contagion and information technology diffusion: The adoption of electronic medical records in US hospitals","volume":"56","author":"Angst Corey M","year":"2010","unstructured":"Corey M Angst, Ritu Agarwal, Vallabh Sambamurthy, and Ken Kelley. 2010. Social contagion and information technology diffusion: The adoption of electronic medical records in US hospitals. Management Science 56, 8 (2010), 1219\u20131241.","journal-title":"Management Science"},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/IWPSE.2004.1334766","volume-title":"Proceedings of the 7th International Workshop on Principles of Software Evolution, 2004","author":"Antoniol Giuliano","year":"2004","unstructured":"Giuliano Antoniol, Massimiliano Di Penta, and Ettore Merlo. 2004. An automatic approach to identify class evolution discontinuities. In Proceedings of the 7th International Workshop on Principles of Software Evolution, 2004. IEEE, 31\u201340."},{"issue":"6","key":"e_1_3_2_6_2","first-page":"436","article-title":"Qualitative research: Getting started","volume":"67","author":"Austin Zubin","year":"2014","unstructured":"Zubin Austin and Jane Sutton. 2014. Qualitative research: Getting started. The Canadian journal of hospital pharmacy 67, 6 (2014), 436.","journal-title":"The Canadian journal of hospital pharmacy"},{"key":"e_1_3_2_7_2","first-page":"303","volume-title":"Proceedings of the IEEE 37th Annual Computer Software and Applications Conference","author":"Bissyand\u00e9 Tegawend\u00e9 F","year":"2013","unstructured":"Tegawend\u00e9 F Bissyand\u00e9, Ferdian Thung, David Lo, Lingxiao Jiang, and Laurent R\u00e9veillere. 2013. Popularity, interoperability, and impact of programming languages in 100,000 open source projects. In Proceedings of the IEEE 37th Annual Computer Software and Applications Conference. IEEE, 303\u2013312."},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.infsof.2015.10.002","article-title":"Understanding the popular users: Following, affiliation influence and leadership on GitHub","volume":"70","author":"Blincoe Kelly","year":"2016","unstructured":"Kelly Blincoe, Jyoti Sheoran, Sean Goggins, Eva Petakovic, and Daniela Damian. 2016. Understanding the popular users: Following, affiliation influence and leadership on GitHub. Information and Software Technology 70 (2016), 30\u201339.","journal-title":"Information and Software Technology"},{"key":"e_1_3_2_9_2","first-page":"1","volume-title":"Proceedings of the 12th International Conference on Predictive Models and Data Analytics in Software Engineering","author":"Borges Hudson","year":"2016","unstructured":"Hudson Borges, Andre Hora, and Marco Tulio Valente. 2016. Predicting the popularity of GitHub repositories. In Proceedings of the 12th International Conference on Predictive Models and Data Analytics in Software Engineering, 1\u201310."},{"key":"e_1_3_2_10_2","first-page":"57","volume-title":"Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results","author":"Boughton Lina","year":"2024","unstructured":"Lina Boughton, Courtney Miller, Yasemin Acar, Dominik Wermke, and Christian K\u00e4stner. 2024. Decomposing and measuring trust in open-source software supply chains. In Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, 57\u201361."},{"issue":"2","key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77\u2013101.","journal-title":"Qualitative Research in Psychology"},{"issue":"5","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/52.714622","article-title":"The current state of CBSE","volume":"15","author":"Brown Alan W.","year":"1998","unstructured":"Alan W. Brown and Kurt C. Wallnau. 1998. The current state of CBSE. IEEE Software 15, 5 (1998), 37\u201346.","journal-title":"IEEE Software"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1109\/CSMR.2003.1192440","volume-title":"Proceedings of the 7th European Conference on Software Maintenance and Reengineering, 2003","author":"Capiluppi Andrea","year":"2003","unstructured":"Andrea Capiluppi, Patricia Lago, and Maurizio Morisio. 2003. Characteristics of open source projects. In Proceedings of the 7th European Conference on Software Maintenance and Reengineering, 2003. IEEE, 317\u2013327."},{"issue":"6","key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1016\/j.cptl.2018.03.019","article-title":"Thematic analysis of qualitative research data: Is it as easy as it sounds","volume":"10","author":"Castleberry Ashley","year":"2018","unstructured":"Ashley Castleberry and Amanda Nolen. 2018. Thematic analysis of qualitative research data: Is it as easy as it sounds? Currents in Pharmacy Teaching and Learning 10, 6 (2018), 807\u2013815.","journal-title":"Currents in Pharmacy Teaching and Learning"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/sim.5408"},{"issue":"2","key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/3329781.3344149","article-title":"Surviving software dependencies: Software reuse is finally here but comes with risks","volume":"17","author":"Cox Russ","year":"2019","unstructured":"Russ Cox. 2019. Surviving software dependencies: Software reuse is finally here but comes with risks. Queue 17, 2 (2019), 24\u201347.","journal-title":"Queue"},{"key":"e_1_3_2_17_2","volume-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","author":"Creswell John W","year":"2017","unstructured":"John W Creswell and J David Creswell. 2017. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v10i2.1207"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","DOI":"10.4324\/9781315134543","volume-title":"The Research Act: A Theoretical Introduction to Sociological Methods","author":"Denzin Norman K.","year":"2017","unstructured":"Norman K. Denzin. 2017. The Research Act: A Theoretical Introduction to Sociological Methods. Routledge."},{"key":"e_1_3_2_20_2","first-page":"145","volume-title":"Proceedings of the ACM\/IEEE 32nd International Conference on Software Engineering","volume":"1","author":"Di Penta Massimiliano","year":"2010","unstructured":"Massimiliano Di Penta, Daniel M German, Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc, and Giuliano Antoniol. 2010. An exploratory study of the evolution of software licensing. In Proceedings of the ACM\/IEEE 32nd International Conference on Software Engineering, Vol. 1. IEEE, 145\u2013154."},{"key":"e_1_3_2_21_2","first-page":"564","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER \u201819)","author":"Feng Muyue","year":"2019","unstructured":"Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, et al. 2019. Open-source license violations of binary software at large scale. In Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER \u201819). IEEE, 564\u2013568."},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/SP.2017.31","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP \u201817)","author":"Fischer Felix","year":"2017","unstructured":"Felix Fischer, Konstantin B\u00f6ttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. 2017. Stack overflow considered harmful? The impact of copy&paste on android application security. In Proceedings of the IEEE Symposium on Security and Privacy (SP \u201817), 121\u2013136. DOI: 10.1109\/SP.2017.31"},{"key":"e_1_3_2_23_2","first-page":"85","volume-title":"Proceedings of the IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR \u201821)","author":"Flint Samuel W","year":"2021","unstructured":"Samuel W Flint, Jigyasa Chauhan, and Robert Dyer. 2021. Escaping the time pit: Pitfalls and guidelines for using time-based git data. In Proceedings of the IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR \u201821). IEEE, 85\u201396."},{"issue":"2","key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1145\/234528.234531","article-title":"Software reuse: Metrics and models","volume":"28","author":"Frakes William","year":"1996","unstructured":"William Frakes and Carol Terry. 1996. Software reuse: Metrics and models. ACM Computing Surveys (CSUR) 28, 2 (1996), 415\u2013435.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"6","key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/203241.203260","article-title":"Sixteen questions about software reuse","volume":"38","author":"Frakes William B","year":"1995","unstructured":"William B Frakes and Christopher J. Fox. 1995. Sixteen questions about software reuse. Communications of the ACM 38, 6 (1995), 75\u2013ff.","journal-title":"Communications of the ACM"},{"issue":"7","key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TSE.2005.85","article-title":"Software reuse research: Status and future","volume":"31","author":"Frakes William B.","year":"2005","unstructured":"William B. Frakes and Kyo Kang. 2005. Software reuse research: Status and future. IEEE Transactions on Software Engineering 31, 7 (2005), 529\u2013536.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/S0164-1212(00)00121-7","article-title":"An industrial study of reuse, quality, and productivity","volume":"57","author":"Frakes William B.","year":"2001","unstructured":"William B. Frakes and Giancarlo Succi. 2001. An industrial study of reuse, quality, and productivity. Journal of Systems and Software 57, 2 (2001), 99\u2013106.","journal-title":"Journal of Systems and Software"},{"key":"e_1_3_2_28_2","first-page":"147","volume-title":"Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"Gabel Mark","year":"2010","unstructured":"Mark Gabel and Zhendong Su. 2010. A study of the uniqueness of source code. In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 147\u2013156."},{"key":"e_1_3_2_29_2","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jss.2013.11.1077","article-title":"Sustainability of open source software communities beyond a fork: How and why has the LibreOffice project evolved","volume":"89","author":"Gamalielsson Jonas","year":"2014","unstructured":"Jonas Gamalielsson and Bj\u00f6rn Lundell. 2014. Sustainability of open source software communities beyond a fork: How and why has the LibreOffice project evolved? Journal of Systems and Software 89 (2014), 128\u2013145.","journal-title":"Journal of Systems and Software"},{"key":"e_1_3_2_30_2","first-page":"9","volume-title":"Proceedings of the 5th International Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems (ICCBSS\u201905)","author":"Geisterfer C. J. Michael","year":"2006","unstructured":"C. J. Michael Geisterfer and Sudipto Ghosh. 2006. Software component specification: a study in perspective of component selection and reuse. In Proceedings of the 5th International Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems (ICCBSS\u201905). IEEE, 9\u2013pp."},{"key":"e_1_3_2_31_2","first-page":"20","volume-title":"Proceedings of the 2nd Workshop on Open Source Software Engineering","author":"German Daniel M.","year":"2002","unstructured":"Daniel M. German. 2002. The evolution of the GNOME Project. In Proceedings of the 2nd Workshop on Open Source Software Engineering, 20\u201324."},{"key":"e_1_3_2_32_2","first-page":"81","volume-title":"Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories","author":"German Daniel M.","year":"2009","unstructured":"Daniel M. German, Massimiliano Di Penta, Yann-Gael Gueheneuc, and Giuliano Antoniol. 2009. Code siblings: Technical and legal implications of copying code between applications. In Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories. IEEE, 81\u201390."},{"key":"e_1_3_2_33_2","first-page":"188","volume-title":"Proceedings of the IEEE 31st International Conference on Software Engineering","author":"German Daniel M.","year":"2009","unstructured":"Daniel M. German and Ahmed E. Hassan. 2009. License integration patterns: Addressing license mismatches in component-based development. In Proceedings of the IEEE 31st International Conference on Software Engineering. IEEE, 188\u2013198."},{"key":"e_1_3_2_34_2","first-page":"291","volume-title":"Proceedings of the IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR \u201817)","author":"Gharehyazie Mohammad","year":"2017","unstructured":"Mohammad Gharehyazie, Baishakhi Ray, and Vladimir Filkov. 2017. Some from here, some from there: Cross-project code reuse in GitHub. In Proceedings of the IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR \u201817). IEEE, 291\u2013301."},{"issue":"3","key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.1007\/s10664-018-9648-z","article-title":"Cross-project code clones in GitHub","volume":"24","author":"Gharehyazie Mohammad","year":"2019","unstructured":"Mohammad Gharehyazie, Baishakhi Ray, Mehdi Keshani, Masoumeh Soleimani Zavosht, Abbas Heydarnoori, and Vladimir Filkov. 2019. Cross-project code clones in GitHub. Empirical Software Engineering 24, 3 (2019), 1538\u20131573.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","first-page":"110653","DOI":"10.1016\/j.jss.2020.110653","article-title":"Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities","volume":"172","author":"Gkortzis Antonios","year":"2021","unstructured":"Antonios Gkortzis, Daniel Feitosa, and Diomidis Spinellis. 2021. Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities. Journal of Systems and Software 172 (2021), 110653.","journal-title":"Journal of Systems and Software"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/MSR.2013.6624034","volume-title":"Proceedings of the 10th Working Conference on Mining Software Repositories (MSR \u201813)","author":"Georgios Gousios","year":"2013","unstructured":"Georgios Gousios. 2013. The GHTorent dataset and tool suite. In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR \u201813). IEEE, 233\u2013236."},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSR.2012.6224294","volume-title":"Proceedings of the 9th IEEE Working Conference on Mining Software Repositories (MSR \u201812)","author":"Gousios Georgios","year":"2012","unstructured":"Georgios Gousios and Diomidis Spinellis. 2012. GHTorrent: GitHub\u2019s data from a firehose. In Proceedings of the 9th IEEE Working Conference on Mining Software Repositories (MSR \u201812). IEEE, 12\u201321."},{"issue":"1","key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1177\/1525822X05279903","article-title":"How many interviews are enough? An experiment with data saturation and variability","volume":"18","author":"Guest Greg","year":"2006","unstructured":"Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How many interviews are enough? An experiment with data saturation and variability. Field Methods 18, 1 (2006), 59\u201382.","journal-title":"Field Methods"},{"issue":"1","key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1287\/mnsc.1070.0748","article-title":"Code reuse in open source software","volume":"54","author":"Haefliger Stefan","year":"2008","unstructured":"Stefan Haefliger, Georg Von Krogh, and Sebastian Spaeth. 2008. Code reuse in open source software. Management Science 54, 1 (2008), 180\u2013193.","journal-title":"Management Science"},{"key":"e_1_3_2_41_2","first-page":"62","volume-title":"Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Hanna Steve","year":"2012","unstructured":"Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, and Dawn Song. 2012. Juxtapp: A scalable system for detecting code reuse among android applications. In Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 62\u201381."},{"key":"e_1_3_2_42_2","first-page":"192","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion \u201821)","author":"Hata Hideaki","year":"2021","unstructured":"Hideaki Hata, Raula Gaikovina Kula, Takashi Ishio, and Christoph Treude. 2021. Research artifact: The potential of meta-maintenance on GitHub. In Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion \u201821). IEEE, 192\u2013193."},{"key":"e_1_3_2_43_2","first-page":"773","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE \u201821)","author":"Hata Hideaki","year":"2021","unstructured":"Hideaki Hata, Raula Gaikovina Kula, Takashi Ishio, and Christoph Treude. 2021. Same file, different changes: the potential of meta-maintenance on GitHub. In Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE \u201821). IEEE, 773\u2013784."},{"key":"e_1_3_2_44_2","first-page":"207","volume-title":"International Conference on Software Reuse","author":"Heinemann Lars","year":"2011","unstructured":"Lars Heinemann, Florian Deissenboeck, Mario Gleirscher, Benjamin Hummel, and Maximilian Irlbeck. 2011. On the extent and nature of software reuse in open source Java projects. In International Conference on Software Reuse. Springer, 207\u2013222."},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume-title":"Applied Logistic Regression","author":"Hosmer David W","year":"2013","unstructured":"David W Hosmer Jr, Stanley Lemeshow, and Rodney X. Sturdivant. 2013. Applied Logistic Regression. John Wiley & Sons."},{"key":"e_1_3_2_46_2","first-page":"28","volume-title":"Proceedings of the 17th IFIP WG 2.13 International Conference on Open Source Systems (OSS \u201821)","author":"Inoue Katsuro","year":"2021","unstructured":"Katsuro Inoue, Yuya Miyamoto, Daniel M. German, and Takashi Ishio. 2021. Finding code-clone snippets in large source-code collection by CCgrep. In Proceedings of the 17th IFIP WG 2.13 International Conference on Open Source Systems (OSS \u201821). Springer, 28\u201341."},{"key":"e_1_3_2_47_2","first-page":"42","volume-title":"Proceedings of the IEEE\/ACM 21st International Conference on Mining Software Repositories (MSR \u201824)","author":"Jahanshahi Mahmoud","year":"2024","unstructured":"Mahmoud Jahanshahi and Audris Mockus. 2024. Dataset: Copy-based Reuse in Open Source Software. In Proceedings of the IEEE\/ACM 21st International Conference on Mining Software Repositories (MSR \u201824). IEEE, 42\u201347."},{"key":"e_1_3_2_48_2","first-page":"96","volume-title":"Proceedings of the 29th International Conference on Software Engineering (ICSE\u201907)","author":"Jiang Lingxiao","year":"2007","unstructured":"Lingxiao Jiang, Ghassan Misherghi, Zhendong Su, and Stephane Glondu. 2007. Deckard: Scalable and accurate tree-based detection of code clones. In Proceedings of the 29th International Conference on Software Engineering (ICSE\u201907). IEEE, 96\u2013105."},{"key":"e_1_3_2_49_2","first-page":"485","volume-title":"Proceedings of the IEEE 31st International Conference on Software Engineering","author":"Juergens Elmar","year":"2009","unstructured":"Elmar Juergens, Florian Deissenboeck, Benjamin Hummel, and Stefan Wagner. 2009. Do code clones matter?. In Proceedings of the IEEE 31st International Conference on Software Engineering. IEEE, 485\u2013495."},{"issue":"2008","key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","article-title":"\u201cCloning considered harmful\u201d considered harmful: patterns of cloning in software","volume":"13","author":"Kapser Cory J","year":"2008","unstructured":"Cory J Kapser and Michael W Godfrey. 2008. \u201cCloning considered harmful\u201d considered harmful: patterns of cloning in software. Empirical Software Engineering 13 (2008), 645\u2013692.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_51_2","first-page":"305","volume-title":"Proceedings of the IEEE 14th International Working Conference on Source Code Analysis and Manipulation","author":"Kawamitsu Naohiro","year":"2014","unstructured":"Naohiro Kawamitsu, Takashi Ishio, Tetsuya Kanda, Raula Gaikovina Kula, Coen De Roover, and Katsuro Inoue. 2014. Identifying source code reuse across repositories using LCS-based source code similarity. In Proceedings of the IEEE 14th International Working Conference on Source Code Analysis and Manipulation. IEEE, 305\u2013314."},{"issue":"1","key":"e_1_3_2_52_2","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1046\/j.1365-2575.2002.00110.x","article-title":"Effort, co-operation and co-ordination in an open source software project: GNOME","volume":"12","author":"Koch Stefan","year":"2002","unstructured":"Stefan Koch and Georg Schneider. 2002. Effort, co-operation and co-ordination in an open source software project: GNOME. Information Systems Journal 12, 1 (2002), 27\u201342.","journal-title":"Information Systems Journal"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Rainer Koschke. Survey of Research on Software Clones. In Duplication Redundancy and Similarity in Software. Dagstuhl Seminar Proceedings Volume 6301 pp. 1\u201324 Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik (2007) 10.4230\/DagSemProc.06301.13","DOI":"10.4230\/DagSemProc.06301.13"},{"issue":"3","key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1177\/001316447003000308","article-title":"Determining sample size for research activities","volume":"30","author":"Krejcie Robert V.","year":"1970","unstructured":"Robert V. Krejcie and Daryle W. Morgan. 1970. Determining sample size for research activities. Educational and Psychological Measurement 30, 3 (1970), 607\u2013610.","journal-title":"Educational and Psychological Measurement"},{"key":"e_1_3_2_55_2","first-page":"282","volume-title":"International Workshop on Software Product-Family Engineering","author":"Krueger Charles W.","year":"2001","unstructured":"Charles W. Krueger. 2001. Easing the transition to software mass customization. In International Workshop on Software Product-Family Engineering. Springer, 282\u2013293."},{"issue":"2","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/130844.130856","article-title":"Software reuse","volume":"24","author":"Krueger Charles W.","year":"1992","unstructured":"Charles W. Krueger. 1992. Software reuse. ACM Computing Surveys (CSUR) 24, 2 (1992), 131\u2013183.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_57_2","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1109\/SP46215.2023.10179304","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP \u201823)","author":"Ladisa Piergiorgio","year":"2023","unstructured":"Piergiorgio Ladisa, Henrik Plate, Matias Martinez, and Olivier Barais. 2023. Sok: Taxonomy of attacks on open-source software supply chains. In Proceedings of the IEEE Symposium on Security and Privacy (SP \u201823). IEEE, 1509\u20131526."},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1145\/1150402.1150479","volume-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Leskovec Jure","year":"2006","unstructured":"Jure Leskovec and Christos Faloutsos. 2006. Sampling from large graphs. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 631\u2013636."},{"issue":"3","key":"e_1_3_2_59_2","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSE.2006.28","article-title":"CP-Miner: Finding copy-paste and related bugs in large-scale software code","volume":"32","author":"Li Zhenmin","year":"2006","unstructured":"Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou. 2006. CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on software Engineering 32, 3 (2006), 176\u2013192.","journal-title":"IEEE Transactions on software Engineering"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.10.017"},{"key":"e_1_3_2_61_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3133908","article-title":"D\u00e9j\u00e0Vu: a map of code duplicates on GitHub","volume":"1","author":"Lopes Cristina V","year":"2017","unstructured":"Cristina V Lopes, Petr Maj, Pedro Martins, Vaibhav Saini, Di Yang, Jakub Zitny, Hitesh Sajnani, and Jan Vitek. 2017. D\u00e9j\u00e0Vu: a map of code duplicates on GitHub. Proceedings of the ACM on Programming Languages 1, OOPSLA (2017), 1\u201328.","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"e_1_3_2_62_2","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1145\/568760.568893","volume-title":"Proceedings of the 14th International Conference on Software Engineering and Knowledge Engineering","author":"Lozano-Tello Adolfo","year":"2002","unstructured":"Adolfo Lozano-Tello and Asunci\u00f3n G\u00f3mez-P\u00e9rez. 2002. BAREMO: how to choose the appropriate software component using the analytic hierarchy process. In Proceedings of the 14th International Conference on Software Engineering and Knowledge Engineering, 781\u2013788."},{"key":"e_1_3_2_63_2","first-page":"143","volume-title":"Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR \u201819)","author":"Ma Yuxing","year":"2019","unstructured":"Yuxing Ma, Chris Bogart, Sadika Amreen, Russell Zaretzki, and Audris Mockus. 2019. World of code: An infrastructure for mining the universe of open source VCS data. In Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR \u201819). IEEE, 143\u2013154."},{"issue":"2","key":"e_1_3_2_64_2","first-page":"1","article-title":"World of code: Enabling a research workflow for mining and analyzing the universe of open source vcs data","volume":"26","author":"Ma Yuxing","year":"2021","unstructured":"Yuxing Ma, Tapajit Dey, Chris Bogart, Sadika Amreen, Marat Valiev, Adam Tutko, David Kennard, Russell Zaretzki, and Audris Mockus. 2021. World of code: Enabling a research workflow for mining and analyzing the universe of open source vcs data. Empirical Software Engineering 26, 2 (2021), 1\u201342.","journal-title":"Empirical Software Engineering"},{"issue":"2","key":"e_1_3_2_65_2","first-page":"485","article-title":"A methodology for analyzing uptake of software technologies among developers","volume":"48","author":"Ma Yuxing","year":"2020","unstructured":"Yuxing Ma, Audris Mockus, Russel Zaretzki, Randy Bradley, and Bogdan Bichescu. 2020. A methodology for analyzing uptake of software technologies among developers. IEEE Transactions on Software Engineering 48, 2 (2020), 485\u2013501.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_66_2","article-title":"Sample size and saturation in PhD studies using qualitative interviews","author":"Mason Mark","year":"2010","unstructured":"Mark Mason. 2010. Sample size and saturation in PhD studies using qualitative interviews. Forum Qualitative Sozialforschung \/ Forum: Qualitative Social Research. 11, 3 (Aug. 2010). DOI: https:\/\/doi.org\/10.17169\/fqs-11.3.1428.","journal-title":"Forum Qualitative Sozialforschung \/ Forum: Qualitative Social Research"},{"issue":"6","key":"e_1_3_2_67_2","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/32.391379","article-title":"Reusing software: Issues and research directions","volume":"21","author":"Mili Hafedh","year":"1995","unstructured":"Hafedh Mili, Fatma Mili, and Ali Mili. 1995. Reusing software: Issues and research directions. IEEE Transactions on Software Engineering 21, 6 (1995), 528\u2013562.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_68_2","volume-title":"Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis","author":"Mitzenmacher Michael","year":"2017","unstructured":"Michael Mitzenmacher and Eli Upfal. 2017. Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis. Cambridge University Press."},{"key":"e_1_3_2_69_2","first-page":"7","volume-title":"Proceedings of the 1st International Workshop on Emerging Trends in FLOSS Research and Development (FLOSS\u201907: ICSE Workshops 2007)","author":"Mockus Audris","year":"2007","unstructured":"Audris Mockus. 2007. Large-scale code reuse in open source software. In Proceedings of the 1st International Workshop on Emerging Trends in FLOSS Research and Development (FLOSS\u201907: ICSE Workshops 2007). IEEE, 7\u20137."},{"key":"e_1_3_2_70_2","volume-title":"Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE \u201819)","volume":"3","author":"Mockus Audris","year":"2019","unstructured":"Audris Mockus. 2019. Insights from open source software supply chains (keynote). In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE \u201819). ACM, New York, NY, 3. DOI: 10.1145\/3338906.3342813"},{"key":"e_1_3_2_71_2","unstructured":"Audris Mockus. 2022. Tutorial: Open Source Software Supply Chains. Retrieved from https:\/\/mockus.org\/papers\/SSCISEC22.pdf"},{"key":"e_1_3_2_72_2","unstructured":"Audris Mockus. 2023. Securing Large Language Model Software Supply Chains. Retrieved from https:\/\/mockus.org\/papers\/wocllm.pdf"},{"key":"e_1_3_2_73_2","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1145\/3379597.3387499","volume-title":"Proceedings of the 17th International Conference on Mining Software Repositories","author":"Mockus Audris","year":"2020","unstructured":"Audris Mockus, Diomidis Spinellis, Zoe Kotti, and Gabriel John Dusing. 2020. A complete set of related git repositories identified via community detection approaches based on shared commits. In Proceedings of the 17th International Conference on Mining Software Repositories, 513\u2013517."},{"key":"e_1_3_2_74_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3560835.3564556","volume-title":"Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","author":"Okafor Chinenye","year":"2022","unstructured":"Chinenye Okafor, Taylor R. Schorlemmer, Santiago Torres-Arias, and James C. Davis. 2022. Sok: Analysis of software supply chain security by establishing secure design properties. In Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 15\u201324."},{"key":"e_1_3_2_75_2","first-page":"130","volume-title":"Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR \u201810)","author":"Ossher Joel","year":"2010","unstructured":"Joel Ossher, Sushil Bajracharya, and Cristina Lopes. 2010. Automated dependency resolution for open source software. In Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR \u201810). IEEE, 130\u2013140."},{"issue":"12","key":"e_1_3_2_76_2","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1145\/361598.361623","article-title":"On the criteria to be used in decomposing systems into modules","volume":"15","author":"David Lorge Parnas.","year":"1972","unstructured":"David Lorge Parnas. 1972. On the criteria to be used in decomposing systems into modules. Communications of the ACM 15, 12 (1972), 1053\u20131058.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_77_2","doi-asserted-by":"crossref","first-page":"296","DOI":"10.2197\/ipsjjip.29.296","article-title":"Empirical study on dependency-related license violation in the javascript package ecosystem","volume":"29","author":"Qiu Shi","year":"2021","unstructured":"Shi Qiu, Daniel M German, and Katsuro Inoue. 2021. Empirical study on dependency-related license violation in the javascript package ecosystem. Journal of Information Processing 29 (2021), 296\u2013304.","journal-title":"Journal of Information Processing"},{"key":"e_1_3_2_78_2","first-page":"155","volume-title":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"Ray Baishakhi","year":"2014","unstructured":"Baishakhi Ray, Daryl Posnett, Vladimir Filkov, and Premkumar Devanbu. 2014. A large scale study of programming languages and code quality in GitHub. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, 155\u2013165."},{"key":"e_1_3_2_79_2","doi-asserted-by":"crossref","first-page":"2104","DOI":"10.1145\/3510003.3510216","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"Reid David","year":"2022","unstructured":"David Reid, Mahmoud Jahanshahi, and Audris Mockus. 2022. The extent of orphan vulnerabilities from code reuse in open source software. In Proceedings of the 44th International Conference on Software Engineering, 2104\u20132115."},{"issue":"7","key":"e_1_3_2_80_2","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1287\/mnsc.1060.0554","article-title":"Understanding the motivations, participation, and performance of open source software developers: A longitudinal study of the Apache projects","volume":"52","author":"Roberts Jeffrey A.","year":"2006","unstructured":"Jeffrey A. Roberts, Il-Horn Hann, and Sandra A. Slaughter. 2006. Understanding the motivations, participation, and performance of open source software developers: A longitudinal study of the Apache projects. Management Science 52, 7 (July 2006), 984\u2013999.","journal-title":"Management Science"},{"issue":"115","key":"e_1_3_2_81_2","first-page":"64","article-title":"A survey on software clone detection research","volume":"541","author":"Roy Chanchal Kumar","year":"2007","unstructured":"Chanchal Kumar Roy and James R. Cordy. 2007. A survey on software clone detection research. Queen\u2019s School of Computing TR 541, 115 (2007), 64\u201368.","journal-title":"Queen\u2019s School of Computing TR"},{"issue":"7","key":"e_1_3_2_82_2","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","article-title":"Comparison and evaluation of code clone detection techniques and tools: A qualitative approach","volume":"74","author":"Roy Chanchal K.","year":"2009","unstructured":"Chanchal K. Roy, James R. Cordy, and Rainer Koschke. 2009. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming 74, 7 (2009), 470\u2013495.","journal-title":"Science of Computer Programming"},{"key":"e_1_3_2_83_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-642-36654-3_2","article-title":"A survey of feature location techniques","author":"Rubin Julia","year":"2013","unstructured":"Julia Rubin and Marsha Chechik. 2013. A survey of feature location techniques. In Domain Engineering: Product Lines, Languages, and Conceptual Models, Iris Reinhartz-Berger, Arnon Sturm, Tony Clark, Sholom Cohen, and Jorn Bettin (Eds.). Springer, Berlin, Heidelberg, 29\u201358.","journal-title":"Domain Engineering: Product Lines, Languages, and Conceptual Models"},{"key":"e_1_3_2_84_2","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1145\/2884781.2884877","volume-title":"Proceedings of the 38th International Conference on Software Engineering","author":"Sajnani Hitesh","year":"2016","unstructured":"Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, and Cristina V. Lopes. 2016. Sourcerercc: Scaling code clone detection to big-code. In Proceedings of the 38th International Conference on Software Engineering, 1157\u20131168."},{"key":"e_1_3_2_85_2","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.omega.2015.06.014","article-title":"A subjective evidence model for influence maximization in social networks","volume":"59","author":"Samadi Mohammadreza","year":"2016","unstructured":"Mohammadreza Samadi, Alexander Nikolaev, and Rakesh Nagi. 2016. A subjective evidence model for influence maximization in social networks. Omega 59 (2016), 263\u2013278.","journal-title":"Omega"},{"key":"e_1_3_2_86_2","first-page":"180","volume-title":"Proceedings. 6th International Workshop on Program Comprehension. (IWPC \u201998) (Cat. No. 98TB100242)","author":"Sim Susan Elliott","year":"1998","unstructured":"Susan Elliott Sim, Charles L. A. Clarke, and Richard C. Holt. 1998. Archetypal source code searches: A survey of software developers and maintainers. In Proceedings. 6th International Workshop on Program Comprehension. (IWPC \u201998) (Cat. No. 98TB100242). IEEE, 180\u2013187."},{"issue":"12","key":"e_1_3_2_87_2","first-page":"2","article-title":"Code reuse in open source software development: Quantitative evidence, drivers, and impediments","volume":"11","author":"Sojer Manuel","year":"2010","unstructured":"Manuel Sojer and Joachim Henkel. 2010. Code reuse in open source software development: Quantitative evidence, drivers, and impediments. Journal of the Association for Information Systems 11, 12 (2010), 2.","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1016\/j.procs.2014.05.358","article-title":"Clustering and classification of software component for efficient component retrieval and building component reuse libraries","volume":"31","author":"Srinivas Chintakindi","year":"2014","unstructured":"Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2014. Clustering and classification of software component for efficient component retrieval and building component reuse libraries. Procedia Computer Science 31 (2014), 1044\u20131050.","journal-title":"Procedia Computer Science"},{"key":"e_1_3_2_89_2","doi-asserted-by":"crossref","DOI":"10.1093\/biomet\/6.2-3.302","article-title":"The probable error of a mean","volume":"6","author":"Student","year":"1908","unstructured":"Student. 1908. The probable error of a mean. Biometrika 6 (1908), 25 pages.","journal-title":"Biometrika"},{"issue":"3","key":"e_1_3_2_90_2","first-page":"226","article-title":"Qualitative research: Data collection, analysis, and management","volume":"68","author":"Sutton Jane","year":"2015","unstructured":"Jane Sutton and Zubin Austin. 2015. Qualitative research: Data collection, analysis, and management. The Canadian journal of hospital pharmacy 68, 3 (2015), 226.","journal-title":"The Canadian journal of hospital pharmacy"},{"key":"e_1_3_2_91_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/IWSC.2013.6613037","volume-title":"Proceedings of the 7th International Workshop on Software Clones (IWSC \u201813)","author":"Svajlenko Jeffrey","year":"2013","unstructured":"Jeffrey Svajlenko, Iman Keivanloo, and Chanchal K. Roy. 2013. Scaling classical clone detection tools for ultra-large datasets: An exploratory study. In Proceedings of the 7th International Workshop on Software Clones (IWSC \u201813). IEEE, 16\u201322."},{"key":"e_1_3_2_92_2","first-page":"321","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution","author":"Svajlenko Jeffrey","year":"2014","unstructured":"Jeffrey Svajlenko and Chanchal K. Roy. 2014. Evaluating modern clone detection tools. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution. IEEE, 321\u2013330."},{"key":"e_1_3_2_93_2","first-page":"131","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME \u201815)","author":"Svajlenko Jeffrey","year":"2015","unstructured":"Jeffrey Svajlenko and Chanchal K. Roy. 2015. Evaluating clone detection tools with bigclonebench. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME \u201815). IEEE, 131\u2013140."},{"key":"e_1_3_2_94_2","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1145\/2568225.2568315","volume-title":"Proceedings of the 36th International Conference on Software Engineering","author":"Tsay Jason","year":"2014","unstructured":"Jason Tsay, Laura Dabbish, and James Herbsleb. 2014. Influence of social and technical factors for evaluating contribution in GitHub. In Proceedings of the 36th International Conference on Software Engineering, 356\u2013366."},{"key":"e_1_3_2_95_2","first-page":"514","volume-title":"Proceedings of the IEEE\/ACM 12th Working Conference on Mining Software Repositories","author":"Vasilescu Bogdan","year":"2015","unstructured":"Bogdan Vasilescu, Alexander Serebrenik, and Vladimir Filkov. 2015. A data set for social diversity studies of GitHub teams. In Proceedings of the IEEE\/ACM 12th Working Conference on Mining Software Repositories. IEEE, 514\u2013517."},{"key":"e_1_3_2_96_2","volume-title":"Software Product-Line Engineering: A Family-Based Software Development Process","author":"Weiss David M","year":"1999","unstructured":"David M Weiss and Chi Tau Robert Lai. 1999. Software Product-Line Engineering: A Family-Based Software Development Process. Addison-Wesley Longman Publishing Co., Inc."},{"key":"e_1_3_2_97_2","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1145\/2908131.2908172","volume-title":"Proceedings of the 8th ACM Conference on Web Science","author":"Weller Katrin","year":"2016","unstructured":"Katrin Weller and Katharina E. Kinder-Kurlanda. 2016. A manifesto for data sharing in social media research. In Proceedings of the 8th ACM Conference on Web Science, 166\u2013172."},{"key":"e_1_3_2_98_2","first-page":"87","volume-title":"2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"White Martin","year":"2016","unstructured":"Martin White, Michele Tufano, Christopher Vendome, and Denys Poshyvanyk. 2016. Deep learning code fragments for code clone detection. In 2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 87\u201398."},{"key":"e_1_3_2_99_2","first-page":"493","volume-title":"Proceedings of the IEEE 21st International Conference on Software Quality, Reliability and Security (QRS \u201821)","author":"Yan Dapeng","year":"2021","unstructured":"Dapeng Yan, Yuqing Niu, Kui Liu, Zhe Liu, Zhiming Liu, and Tegawend\u00e9 F. Bissyand\u00e9. 2021. Estimating the attack surface from residual vulnerabilities in open source software supply chain. In Proceedings of the IEEE 21st International Conference on Software Quality, Reliability and Security (QRS \u201821). IEEE, 493\u2013502."},{"key":"e_1_3_2_100_2","volume-title":"Qualitative Research From Start to Finish","author":"Yin Robert K.","year":"2015","unstructured":"Robert K. Yin. 2015. Qualitative Research From Start to Finish. Guilford Publications."},{"key":"e_1_3_2_101_2","first-page":"1","article-title":"Evaluation indicators for open-source software: A review","volume":"4","author":"Zhao Yuhang","year":"2021","unstructured":"Yuhang Zhao, Ruigang Liang, Xiang Chen, and Jing Zou. 2021. Evaluation indicators for open-source software: A review. Cybersecurity 4 (2021), 1\u201324.","journal-title":"Cybersecurity"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T13:41:38Z","timestamp":1759758098000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715907"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":100,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1145\/3715907"],"URL":"https:\/\/doi.org\/10.1145\/3715907","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,6]]},"assertion":[{"value":"2023-12-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}