{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T15:35:28Z","timestamp":1776008128290,"version":"3.50.1"},"reference-count":70,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T00:00:00Z","timestamp":1541462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Context: Code smells are associated to poor design and programming style, which often degrades code quality and hampers code comprehensibility and maintainability. Goal: identify published studies that provide evidence of the influence of code smells on the occurrence of software bugs. Method: We conducted a Systematic Literature Review (SLR) to reach the stated goal. Results: The SLR selected studies from July 2007 to September 2017, which analyzed the source code of open source software projects and several code smells. Based on evidence of 16 studies covered in this SLR, we conclude that 24 code smells are more influential in the occurrence of bugs relative to the remaining smells analyzed. In contrast, three studies reported that at least 6 code smells are less influential in such occurrences. Evidence from the selected studies also point out tools, techniques, and procedures that should be applied to analyze the influence of the smells. Conclusions: To the best of our knowledge, this is the first SLR to target this goal. This study provides an up-to-date and structured understanding of the influence of code smells on the occurrence of software bugs based on findings systematically collected from a list of relevant references in the latest decade.<\/jats:p>","DOI":"10.3390\/info9110273","type":"journal-article","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T03:45:22Z","timestamp":1541562322000},"page":"273","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["The Impact of Code Smells on Software Bugs: A Systematic Literature Review"],"prefix":"10.3390","volume":"9","author":[{"given":"Aloisio S.","family":"Cairo","sequence":"first","affiliation":[{"name":"Programa de P\u00f3s-Gradua\u00e7\u00e3o em Sistemas e Computa\u00e7\u00e3o (PPGCOMP), Universidade Salvador (UNIFACS), Salvador 41770-235, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6241-1612","authenticated-orcid":false,"given":"Glauco de F.","family":"Carneiro","sequence":"additional","affiliation":[{"name":"Programa de P\u00f3s-Gradua\u00e7\u00e3o em Sistemas e Computa\u00e7\u00e3o (PPGCOMP), Universidade Salvador (UNIFACS), Salvador 41770-235, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6043-8176","authenticated-orcid":false,"given":"Miguel P.","family":"Monteiro","sequence":"additional","affiliation":[{"name":"NOVA LINCS, Faculdade de Ci\u00eancias e Tecnologia da Universidade NOVA de Lisboa (FCT\/UNL), 2829-516 Caparica, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","article-title":"Clones: What is that smell?","volume":"17","author":"Rahman","year":"2012","journal-title":"Empir. Softw. Eng."},{"key":"ref_2","unstructured":"Fowler, M., and Beck, K. (1999). Refactoring: Improving the Design of Existing Code, Addison-Wesley Professional."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros, M., Bacchelli, A., and Lanza, M. (2010, January 14\u201315). On the impact of design flaws on software defects. Proceedings of the 10th International Conference on Quality Software (QSIC), Los Alamitos, CA, USA.","DOI":"10.1109\/QSIC.2010.58"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Rahman, M.S., and Roy, C.K. (2017, January 17\u201318). On the relationships between stability and bug-proneness of code clones: An empirical study. Proceedings of the 17th International Working Conference on Source Code Analysis and Manipulation (SCAM), Shanghai, China.","DOI":"10.1109\/SCAM.2017.26"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Jaafar, F., Lozano, A., Gu\u00e9h\u00e9neuc, Y.G., and Mens, K. (2017, January 25\u201329). On the Analysis of Co-Occurrence of Anti-Patterns and Clones. Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), Prague, Czech Republic.","DOI":"10.1109\/QRS.2017.38"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Khomh, F., Di Penta, M., and Gueheneuc, Y.G. (2009, January 13\u201316). An exploratory study of the impact of code smells on software change-proneness. Proceedings of the 16th Working Conference on Reverse Engineering, Lille, France.","DOI":"10.1109\/WCRE.2009.28"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1188","DOI":"10.1007\/s10664-017-9535-z","article-title":"On the diffuseness and the impact on maintainability of code smells: A large scale empirical investigation","volume":"23","author":"Palomba","year":"2017","journal-title":"Empir. Softw. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2629648","article-title":"Some code smells have a significant but small effect on faults","volume":"23","author":"Hall","year":"2014","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1016\/j.jss.2006.10.018","article-title":"An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution","volume":"80","author":"Li","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2223","DOI":"10.1016\/j.infsof.2013.08.002","article-title":"To what extent can maintenance problems be predicted by code smell detection?\u2014An empirical study","volume":"55","author":"Yamashita","year":"2013","journal-title":"Inf. Softw. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Olbrich, S.M., Cruzes, D.S., and Sj\u00f8berg, D.I. (2010, January 12\u201318). Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems. Proceedings of the 2010 IEEE International Conference on Software Maintenance (ICSM), Timisoara, Romania.","DOI":"10.1109\/ICSM.2010.5609564"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ahmed, I., Brindescu, C., Mannan, U.A., Jensen, C., and Sarma, A. (2017, January 9\u201310). An empirical examination of the relationship between code smells and merge conflicts. Proceedings of the 11th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, Toronto, ON, Canada.","DOI":"10.1109\/ESEM.2017.12"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Nascimento, R., and Sant\u2019Anna, C. (2017, January 18\u201319). Investigating the relationship between bad smells and bugs in software systems. Proceedings of the 11th Brazilian Symposium on Software Components, Architectures, and Reuse, Fortaleza, Cear\u00e1, Brazil.","DOI":"10.1145\/3132498.3132513"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1002\/smr.1737","article-title":"A review of code smell mining techniques","volume":"27","author":"Rasool","year":"2015","journal-title":"J. Softw. Evol. Process"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Oliveira, J., Vale, G., Paiva, T., and Figueiredo, E. (2016, January 1\u20133). A review-based comparative study of bad smell detection tools. Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, Limerick, Ireland.","DOI":"10.1145\/2915970.2915984"},{"key":"ref_16","first-page":"1","article-title":"Automatic detection of bad smells in code: An experimental assessment","volume":"11","author":"Fontana","year":"2012","journal-title":"J. Object Technol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lehman, M.M. (1996). Laws of software evolution revisited. European Workshop on Software Process Technology, Springer.","DOI":"10.1007\/BFb0017737"},{"key":"ref_18","unstructured":"Tufano, M., Palomba, F., Bavota, G., Oliveto, R., Di Penta, M., De Lucia, A., and Poshyvanyk, D. (2017, January 9\u201310). When and why your code starts to smell bad. Proceedings of the 37th International Conference on Software Engineering-Volume 1, Toronto, ON, Canada."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TSE.2014.2372760","article-title":"Mining version histories for detecting code smells","volume":"41","author":"Palomba","year":"2015","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TSE.2009.50","article-title":"Decor: A method for the specification and detection of code and design smells","volume":"36","author":"Moha","year":"2010","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.2009.1","article-title":"Identification of move method refactoring opportunities","volume":"35","author":"Tsantalis","year":"2009","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2675067","article-title":"Code-smell detection as a bilevel problem","volume":"24","author":"Sahin","year":"2014","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Khomh, F., Vaucher, S., Gu\u00e9h\u00e9neuc, Y.G., and Sahraoui, H. (2009, January 24\u201325). A bayesian approach for the detection of code and design smells. Proceedings of the 9th International Conference on Quality Software, Jeju, South Korea.","DOI":"10.1109\/QSIC.2009.47"},{"key":"ref_24","unstructured":"Marinescu, R. (2004, January 11\u201314). Detection strategies: Metrics-based rules for detecting design flaws. Proceedings of the 20th IEEE International Conference on Software Maintenance, Chicago, IL, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/TSE.2014.2331057","article-title":"A cooperative parallel search-based software engineering approach for code-smells detection","volume":"40","author":"Kessentini","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Danphitsanuphan, P., and Suwantada, T. (2012, January 27\u201330). Code smell detecting tool and code smell-structure bug relationship. Proceedings of the 2012 Spring Congress on Engineering and Technology (S-CET), Xi\u2019an, China.","DOI":"10.1109\/SCET.2012.6342082"},{"key":"ref_27","unstructured":"Griswold, W.G. (1992). Program Restructuring as an Aid to Software Maintenance, University of Washington."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/152388.152389","article-title":"Automated assistance for program restructuring","volume":"2","author":"Griswold","year":"1993","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"ref_29","unstructured":"Opdyke, W.F. (2018, November 06). Refactoring: An Aid in Designing Application Frameworks and Evolving Object-Oriented Systems. Available online: https:\/\/refactory.com\/papers\/doc_details\/29-refactoring-an-aid-in-designing-application-frameworks-and-evolving-object-oriented-systems."},{"key":"ref_30","unstructured":"Opdyke, W.F. (1992). Refactoring Object-Oriented Frameworks, University of Illinois at Urbana-Champaign."},{"key":"ref_31","unstructured":"Ambler, S., Nalbone, J., and Vizdos, M. (2005). Enterprise Unified Process, The: Extending the Rational Unified Process, Prentice Hall Press."},{"key":"ref_32","unstructured":"Van Emden, E., and Moonen, L. (November, January 29). Java quality assurance by detecting code smells. Proceedings of the 2002 Ninth Working Conference on Reverse Engineering, Richmond, VA, USA."},{"key":"ref_33","unstructured":"Marinescu, R. (August, January 29). Detecting design flaws via metrics in object-oriented systems. Proceedings of the 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, Santa Barbara, CA, USA."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Marinescu, R. (2005, January 26\u201329). Measurement and quality in object-oriented design. Proceedings of the 21st IEEE International Conference on Software Maintenance, Budapest, Hungary.","DOI":"10.1109\/ICSM.2005.63"},{"key":"ref_35","unstructured":"Lanza, M., and Marinescu, R. (2007). Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems, Springer Science & Business Media."},{"key":"ref_36","unstructured":"Mantyla, M., Vanhanen, J., and Lassenius, C. (2003, January 22\u201326). A taxonomy and an initial empirical study of bad smells in code. Proceedings of the 2003 International Conference on Software Maintenance, Amsterdam, The Netherlands."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","article-title":"An exploratory study of the impact of antipatterns on class change-and fault-proneness","volume":"17","author":"Khomh","year":"2012","journal-title":"Empir. Softw. Eng."},{"key":"ref_38","unstructured":"Visser, J., Rigal, S., Wijnholds, G., van Eck, P., and van der Leek, R. (2016). Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code, O\u2019Reilly Media, Inc."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Saboury, A., Musavi, P., Khomh, F., and Antoniol, G. (2017, January 21\u201324). An empirical study of code smells in javascript projects. Proceedings of the 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), Klagenfurt, Austria.","DOI":"10.1109\/SANER.2017.7884630"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Yamashita, A., and Moonen, L. (2013, January 14\u201317). Do developers care about code smells? An exploratory survey. Proceedings of the 20th Working Conference on Reverse Engineering (WCRE), Koblenz, Germany.","DOI":"10.1109\/WCRE.2013.6671299"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Olbrich, S., Cruzes, D.S., Basili, V., and Zazworka, N. (2009, January 15\u201316). The evolution and impact of code smells: A case study of two open source systems. Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement, Lake Buena Vista, FL, USA.","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Palomba, F., Bavota, G., Di Penta, M., Oliveto, R., De Lucia, A., and Poshyvanyk, D. (2013, January 11\u201315). Detecting bad smells in source code using change history information. Proceedings of the 28th IEEE\/ACM International Conference on Automated Software Engineering, Silicon Valley, CA, USA.","DOI":"10.1109\/ASE.2013.6693086"},{"key":"ref_43","unstructured":"Kitchenham, B., and Charters, S. (2007). Guidelines for performing Systematic Literature Reviews in Software Engineering, EBSE."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/j.infsof.2010.12.010","article-title":"Identifying relevant studies in software engineering","volume":"53","author":"Zhang","year":"2011","journal-title":"Inf. Softw. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.infsof.2008.01.006","article-title":"Empirical studies of agile software development: A systematic review","volume":"50","year":"2008","journal-title":"Inf. Softw. Technol."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Skoglund, M., and Runeson, P. (2009, January 20\u201321). Reference-based search strategies in systematic reviews. Proceedings of the 13th international conference on Evaluation and Assessment in Software Engineering, Swindon, UK.","DOI":"10.14236\/ewic\/EASE2009.4"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., and Wessl\u00e9n, A. (2012). Experimentation in Software Engineering, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.jss.2015.11.021","article-title":"How do bugs surface? A comprehensive study on the characteristics of software bugs manifestation","volume":"113","author":"Cotroneo","year":"2016","journal-title":"J. Syst. Softw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Qin, F., Zheng, Z., Li, X., Qiao, Y., and Trivedi, K.S. (2017, January 22\u201325). An empirical investigation of fault triggers in android operating system. Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), Christchurch, New Zealand.","DOI":"10.1109\/PRDC.2017.27"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s10664-011-9181-9","article-title":"On the reproducibility of empirical software engineering studies based on data retrieved from development repositories","volume":"17","author":"Robles","year":"2012","journal-title":"Empir. Softw. Eng."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Panjer, L.D. (2007, January 20\u201326). Predicting eclipse bug lifetimes. Proceedings of the Fourth International Workshop on Mining Software Repositories, Minneapolis, MN, USA.","DOI":"10.1109\/MSR.2007.25"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Das, T., Di Penta, M., and Malavolta, I. (2016, January 2\u20137). A Quantitative and Qualitative Investigation of Performance-Related Commits in Android Apps. Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), Raleigh, NC, USA.","DOI":"10.1109\/ICSME.2016.49"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"B\u00e1n, D., and Ferenc, R. (2014). Recognizing antipatterns and analyzing their effects on software maintainability. Computational Science and Its Applications\u2014ICCSA 2014, Springer.","DOI":"10.1007\/978-3-319-09156-3_25"},{"key":"ref_54","first-page":"1","article-title":"When do changes induce fixes?","volume":"Volume 30","author":"Zimmermann","year":"2005","journal-title":"Proceedings of the 2005 International Workshop on Mining Software Repositories"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Sheskin, D.J. (2003). Handbook of Parametric and Nonparametric Statistical Procedures, CRC Press.","DOI":"10.1201\/9781420036268"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Hosmer, D., and Lemeshow, S. (2000). Applied Logistic Regression, John Wiley & Sons. [2nd ed.].","DOI":"10.1002\/0471722146"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/TSE.2004.99","article-title":"Defect frequency and design patterns: An empirical study of industrial code","volume":"30","author":"Vokac","year":"2004","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., and Glondu, S. (2007, January 20\u201326). Deckard: Scalable and accurate tree-based detection of code clones. Proceedings of the 29th international conference on Software Engineering, Minneapolis, MN, USA.","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref_59","unstructured":"Demeyer, S., Tichelaar, S., and Ducasse, S. (2001). FAMIX 2.1\u2014The FAMOOS Information Exchange Model, University of Bern. Technical Report."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1095430.1081707","article-title":"The story of Moose: An agile reengineering environment","volume":"30","author":"Nierstrasz","year":"2005","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"ref_61","unstructured":"Fischer, M., Pinzger, M., and Gall, H. (2003, January 22\u201326). Populating a release history database from version control and bug tracking systems. Proceedings of the International Conference on Software Maintenance, Amsterdam, The Netherlands."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"\u010cubrani\u0107, D., and Murphy, G.C. (2003, January 3\u201310). Hipikat: Recommending pertinent software development artifacts. Proceedings of the 25th international Conference on Software Engineering, Portland, OR, USA.","DOI":"10.1109\/ICSE.2003.1201219"},{"key":"ref_63","first-page":"612","article-title":"Quantitative analysis of relationships among comment description, comment out and fault-proneness in open source software","volume":"53","author":"Aman","year":"2012","journal-title":"IPSJ J."},{"key":"ref_64","unstructured":"Fox, J., and Weisberg, S. (2010). An R Companion to Applied Regression, Sage Publications."},{"key":"ref_65","unstructured":"Spencer, D. (2009). Card Sorting: Designing Usable Categories, Rosenfeld Media."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Bakota, T., Hegedus, P., K\u00f6rtv\u00e9lyesi, P., Ferenc, R., and Gyim\u00f3thy, T. (2011, January 25\u201330). A probabilistic software quality model. Proceedings of the 27th IEEE International Conference on Software Maintenance (ICSM), Williamsburg, VI, USA.","DOI":"10.1109\/ICSM.2011.6080791"},{"key":"ref_67","unstructured":"Ferenc, R., Besz\u00e9des, \u00c1., Tarkiainen, M., and Gyim\u00f3thy, T. (2002, January 3\u20136). Columbus-reverse engineering tool and schema for C++. Proceedings of the International Conference on Software Maintenance, Washington, DC, USA."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Mockus, A., and Votta, L.G. (2000). Identifying Reasons for Software Changes Using Historic Databases, ICSM.","DOI":"10.1109\/ICSM.2000.883028"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1016\/j.jss.2008.12.036","article-title":"An empirical analysis of the impact of software development problem factors on software maintainability","volume":"82","author":"Chen","year":"2009","journal-title":"J. Syst. Softw."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"2218","DOI":"10.1587\/transinf.2015EDP7107","article-title":"Lines of comments as a noteworthy metric for analyzing fault-proneness in methods","volume":"98","author":"Aman","year":"2015","journal-title":"IEICE Trans. Inf. Syst."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/9\/11\/273\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:28:14Z","timestamp":1760196494000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/9\/11\/273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,6]]},"references-count":70,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["info9110273"],"URL":"https:\/\/doi.org\/10.3390\/info9110273","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints201810.0059.v1","asserted-by":"object"}]},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,6]]}}}