{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T10:41:34Z","timestamp":1696502494950},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["1845508"],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s10664-023-10352-5","type":"journal-article","created":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T10:02:10Z","timestamp":1694426530000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["What constitutes debugging? An exploratory study of debugging episodes"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9242-748X","authenticated-orcid":false,"given":"Abdulaziz","family":"Alaboudi","sequence":"first","affiliation":[]},{"given":"Thomas D.","family":"LaToza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,11]]},"reference":[{"key":"10352_CR1","unstructured":"Replication package (2022). URL https:\/\/figshare.com\/s\/0e9eac98b8ddd54c384c"},{"key":"10352_CR2","doi-asserted-by":"crossref","unstructured":"Abad ZSH, Karras O, Schneider K, Barker K, Bauer M (2018) Task interruption in software development projects: What makes some interruptions more disruptive than others? In: International Conference on Evaluation and Assessment in Software Engineering pp. 122\u2013132","DOI":"10.1145\/3210459.3210471"},{"key":"10352_CR3","doi-asserted-by":"crossref","unstructured":"Afzal A, Goues CL (2018) A study on the use of ide features for debugging. In: Proceedings of the 15th International Conference on Mining Software Repositories p. 114\u2013117","DOI":"10.1145\/3196398.3196468"},{"key":"10352_CR4","doi-asserted-by":"crossref","unstructured":"Alaboudi A, LaToza TD (2019a) An exploratory study of live-streamed programming. In: IEEE Symposium on Visual Languages and Human-Centric Computing pp. 5\u201313","DOI":"10.1109\/VLHCC.2019.8818832"},{"key":"10352_CR5","doi-asserted-by":"crossref","unstructured":"Alaboudi A, LaToza TD (2019b) Supporting software engineering research and education by annotating public videos of developers programming. In: International Workshop on Cooperative and Human Aspects of Software Engineering pp. 117\u2013118","DOI":"10.1109\/CHASE.2019.00035"},{"key":"10352_CR6","doi-asserted-by":"crossref","unstructured":"Alaboudi A, LaToza TD (2020) Using hypotheses as a debugging aid. In: 2020 IEEE Symposium on Visual Languages and Human-Centric Computing pp. 1\u20139","DOI":"10.1109\/VL\/HCC50065.2020.9127273"},{"key":"10352_CR7","doi-asserted-by":"crossref","unstructured":"Alaboudi A, LaToza TD (2021) Edit-run behavior in programming and debugging. In: IEEE Symposium on Visual Languages and Human-Centric Computing","DOI":"10.1109\/VL\/HCC51201.2021.9576170"},{"key":"10352_CR8","doi-asserted-by":"crossref","unstructured":"Amann S, Proksch S, Nadi S, Mezini M (2016) A study of visual studio usage in practice. In: IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), pp. 124\u2013134","DOI":"10.1109\/SANER.2016.39"},{"key":"10352_CR9","doi-asserted-by":"crossref","unstructured":"Baltes S, Moseler O, Beck F, Diehl S (2015) Navigate, understand, communicate: How developers locate performance bugs. In: ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement pp. 1\u201310","DOI":"10.1109\/ESEM.2015.7321208"},{"key":"10352_CR10","doi-asserted-by":"crossref","unstructured":"Beller M, Spruit N, Spinellis D, Zaidman A (2018) On the dichotomy of debugging behavior among programmers. In: International Conference on Software Engineering pp. 572\u2013583","DOI":"10.1145\/3180155.3180175"},{"key":"10352_CR11","doi-asserted-by":"crossref","unstructured":"B\u00f6hme M, Soremekun EO, Chattopadhyay S, Ugherughe E, Zeller A (2017) Where is the bug and how is it fixed? an experiment with practitioners. In: The Joint Meeting on Foundations of Software Engineering, pp. 117\u2013128","DOI":"10.1145\/3106237.3106255"},{"key":"10352_CR12","doi-asserted-by":"crossref","unstructured":"Bragdon A, Zeleznik R, Reiss SP, Karumuri S, Cheung W, Kaplan J, Coleman C, Adeputra F, LaViola\u00a0Jr, JJ (2010) Code bubbles: a working set-based interface for code understanding and maintenance. In: Conference on Human Factors in Computing Systems pp. 2503\u20132512","DOI":"10.1145\/1753326.1753706"},{"key":"10352_CR13","unstructured":"Britton T, Jeng L, Carver G, Cheak P, Katzenellenbogen T (2013) Reversible debugging software. Judge Bus. School, Univ. Cambridge, Cambridge, UK, Tech. Rep 229"},{"key":"10352_CR14","doi-asserted-by":"crossref","unstructured":"Chatterjee P, Damevski K, Pollock L, Augustine V, Kraft NA (2019) Exploratory study of slack q &a chats as a mining source for software engineering tools. In: International Conference on Mining Software Repositories pp. 490\u2013501","DOI":"10.1109\/MSR.2019.00075"},{"key":"10352_CR15","doi-asserted-by":"crossref","unstructured":"Chattopadhyay S, Nelson N, Gonzalez YR, Leon AA, Pandita R, Sarma A (2019) Latent patterns in activities: A field study of how developers manage context. In: International Conference on Software Engineering p. 373\u2013383","DOI":"10.1109\/ICSE.2019.00051"},{"key":"10352_CR16","doi-asserted-by":"crossref","unstructured":"Coker Z, Widder DG, Le Goues C, Bogart C, Sunshine J (2019) A qualitative study on framework debugging. In: International Conference on Software Maintenance and Evolution pp. 568\u2013579","DOI":"10.1109\/ICSME.2019.00091"},{"issue":"4","key":"10352_CR17","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TSE.2016.2592905","volume":"43","author":"K Damevski","year":"2017","unstructured":"Damevski K, Shepherd DC, Schneider J, Pollock L (2017) Mining sequences of developer interactions in visual studio for usage smells. IEEE Transactions on Software Engineering 43(4):359\u2013371","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10352_CR18","unstructured":"Study dataset: Observe.dev (2022). URL https:\/\/bit.ly\/3kkbL2W"},{"key":"10352_CR19","unstructured":"Default dataset: Observe.dev (2022). URL https:\/\/bit.ly\/3qWdMVA"},{"key":"10352_CR20","doi-asserted-by":"crossref","unstructured":"DeMillo RA, Pan H, Spafford EH, DeMillo RA, Pan H, Spafford EH (1996) Critical slicing for software fault localization. In: The International Symposium on Software Testing and Analysis pp. 121\u2013134","DOI":"10.1145\/226295.226310"},{"key":"10352_CR21","unstructured":"Eisenstadt M (1993) Tales of debugging from the front lines. In: Empirical Studies of Programmers: Fifth Workshop pp. 86\u2013112"},{"key":"10352_CR22","doi-asserted-by":"crossref","unstructured":"Faas T, Dombrowski L, Young A, Miller AD (2018) Watch me code: Programming mentorship communities on twitch.tv. Proceedings of the ACM on Human-Computer Interaction 2, 50:1\u201350:18","DOI":"10.1145\/3274319"},{"issue":"2","key":"10352_CR23","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0020-7373(75)80005-8","volume":"7","author":"JD Gould","year":"1975","unstructured":"Gould JD (1975) Some psychological evidence on how people debug computer programs. International Journal of Man-Machine Studies 7(2):151\u2013182","journal-title":"International Journal of Man-Machine Studies"},{"issue":"3","key":"10352_CR24","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1177\/001872087401600308","volume":"16","author":"JD Gould","year":"1974","unstructured":"Gould JD, Drongowski P (1974) An exploratory study of computer program debugging. Human Factors 16(3):258\u2013277","journal-title":"Human Factors"},{"key":"10352_CR25","doi-asserted-by":"crossref","unstructured":"Gugerty L, Olson G (1986) Debugging by skilled and novice programmers. In: Conference on Human Factors in Computing Systems pp. 171\u2013174","DOI":"10.1145\/22339.22367"},{"key":"10352_CR26","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s10664-016-9441-9","volume":"22","author":"S Jiang","year":"2017","unstructured":"Jiang S, McMillan C, Santelices R (2017) Do programmers do change impact analysis in debugging? Empirical Software Engineering 22:631\u2013669","journal-title":"Empirical Software Engineering"},{"issue":"2","key":"10352_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/947902.947908","volume":"17","author":"MS Johnson","year":"1982","unstructured":"Johnson MS (1982) A software debugging glossary. ACM Sigplan Notices 17(2):53\u201370","journal-title":"ACM Sigplan Notices"},{"key":"10352_CR28","doi-asserted-by":"crossref","unstructured":"Jones JA, Harrold MJ, Stasko J (2002) Visualization of test information to assist fault localization. In: Proceedings of the International Conference on Software Engineering pp. 467\u2013477","DOI":"10.1145\/581396.581397"},{"issue":"4","key":"10352_CR29","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1207\/s15327051hci0304_2","volume":"3","author":"IR Katz","year":"1987","unstructured":"Katz IR, Anderson JR (1987) Debugging: An analysis of bug-location strategies. Human-Computer Interaction 3(4):351\u2013399","journal-title":"Human-Computer Interaction"},{"issue":"3","key":"10352_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1922649.1922658","volume":"43","author":"AJ Ko","year":"2011","unstructured":"Ko AJ, Abraham R, Beckwith L, Blackwell A, Burnett M, Erwig M, Scaffidi C, Lawrance J, Lieberman H, Myers B et al (2011) The state of the art in end-user software engineering. ACM Computing Surveys (CSUR) 43(3):1\u201344","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10352_CR31","doi-asserted-by":"crossref","unstructured":"Ko AJ, DeLine R, Venolia G (2007) Information needs in collocated software development teams. In: The International Conference on Software Engineering pp. 344\u2013353","DOI":"10.1109\/ICSE.2007.45"},{"issue":"12","key":"10352_CR32","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TSE.2006.116","volume":"32","author":"AJ Ko","year":"2006","unstructured":"Ko AJ, Myers BA, Coblenz MJ, Aung HH (2006) An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks. IEEE Transactions on Software Engineering 32(12):971\u2013987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10352_CR33","doi-asserted-by":"crossref","unstructured":"Lakhani KR, Von\u00a0Hippel E (2004) How open source software works: \u201cfree\u201d user-to-user assistance. In: Produktentwicklung mit virtuellen Communities, pp. 303\u2013339. Springer","DOI":"10.1007\/978-3-322-84540-5_13"},{"key":"10352_CR34","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33:159\u2013174","journal-title":"Biometrics"},{"key":"10352_CR35","doi-asserted-by":"crossref","unstructured":"LaToza TD, Myers BA (2010a) Developers ask reachability questions. In: The International Conference on Software Engineering, pp. 185\u2013194","DOI":"10.1145\/1806799.1806829"},{"key":"10352_CR36","doi-asserted-by":"crossref","unstructured":"LaToza TD, Myers BA (2010b) Hard-to-answer questions about code. In: PLATEAU Workshop on Evaluation and Usability of Programming Languages and Tools, pp. 1\u20136","DOI":"10.1145\/1937117.1937125"},{"key":"10352_CR37","doi-asserted-by":"crossref","unstructured":"LaToza TD, Venolia G, DeLine R (2006) Maintaining mental models: A study of developer work habits. In: The International Conference on Software Engineering pp. 492\u2013501","DOI":"10.1145\/1134285.1134355"},{"issue":"2","key":"10352_CR38","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/TSE.2010.111","volume":"39","author":"J Lawrance","year":"2013","unstructured":"Lawrance J, Bogart C, Burnett M, Bellamy R, Rector K, Fleming SD (2013) How programmers debug, revisited: An information foraging theory perspective. IEEE Transactions on Software Engineering 39(2):197\u2013215","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10352_CR39","doi-asserted-by":"crossref","unstructured":"Layman L, Diep M, Nagappan M, DeLine RA (2013) Debugging revisited, toward understanding the debugging needs of contemporary software developers. In: Empirical Software Engineering and Measurement","DOI":"10.1109\/ESEM.2013.43"},{"issue":"2","key":"10352_CR40","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/S0020-7373(80)80017-4","volume":"12","author":"F Lukey","year":"1980","unstructured":"Lukey F (1980) Understanding and debugging programs. International Journal of Man-Machine Studies 12(2):189\u2013202","journal-title":"International Journal of Man-Machine Studies"},{"key":"10352_CR41","doi-asserted-by":"crossref","unstructured":"MacLeod L, Storey MA, Bergen A (2015) Code, camera, action: How software developers document and share program knowledge using youtube. In: The International Conference on Program Comprehension pp. 104\u2013114","DOI":"10.1109\/ICPC.2015.19"},{"key":"10352_CR42","doi-asserted-by":"crossref","unstructured":"Mamykina L, Manoim B, Mittal M, Hripcsak G, Hartmann B (2011) Design lessons from the fastest q &a site in the west. In: CHI Conference on Human Factors in Computing Systems pp. 2857\u20132866","DOI":"10.1145\/1978942.1979366"},{"issue":"2","key":"10352_CR43","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TSE.2014.2362924","volume":"41","author":"N Mangano","year":"2014","unstructured":"Mangano N, LaToza TD, Petre M, van der Hoek A (2014) How software designers interact with sketches at the whiteboard. IEEE Transactions on Software Engineering 41(2):135\u2013156","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10352_CR44","doi-asserted-by":"crossref","unstructured":"Weiser W (1984) Program slicing. In: The International Conference on Software Engineering pp. 439\u2013449","DOI":"10.1109\/TSE.1984.5010248"},{"key":"10352_CR45","doi-asserted-by":"crossref","unstructured":"Meyer AN, Fritz T, Murphy GC, Zimmermann T (2014) Software developers\u2019 perceptions of productivity. In: Proceedings of the International Symposium on Foundations of Software Engineering pp. 19\u201329","DOI":"10.1145\/2635868.2635892"},{"key":"10352_CR46","doi-asserted-by":"crossref","unstructured":"Minelli R, Mocci A, Robbes R, Lanza M (2016) Taming the ide with fine-grained interaction data. In: International Conference on Program Comprehension pp. 1\u201310","DOI":"10.1109\/ICPC.2016.7503714"},{"key":"10352_CR47","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MS.2006.105","volume":"23","author":"GC Murphy","year":"2006","unstructured":"Murphy GC, Kersten M, Findlater L (2006) How are java software developers using the eclipse ide? IEEE Softw 23:76\u201383","journal-title":"IEEE Softw"},{"key":"10352_CR48","doi-asserted-by":"crossref","unstructured":"Parnin C, Orso A (2011) Are automated debugging techniques actually helping programmers? In: The International Symposium on Software Testing and Analysis, pp. 199\u2013209","DOI":"10.1145\/2001420.2001445"},{"issue":"1","key":"10352_CR49","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s11219-015-9294-2","volume":"25","author":"M Perscheid","year":"2017","unstructured":"Perscheid M, Siegmund B, Taeumel M, Hirschfeld R (2017) Studying the advancement in debugging practice of professional software developers. Software Quality Journal 25(1):83\u2013110","journal-title":"Software Quality Journal"},{"key":"10352_CR50","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jss.2019.04.028","volume":"153","author":"F Petrillo","year":"2019","unstructured":"Petrillo F, Gu\u00e9h\u00e9neuc YG, Pimenta M, Freitas CDS, Khomh F (2019) Swarm debugging: The collective intelligence on interactive debugging. Journal of Systems and Software 153:152\u2013174","journal-title":"Journal of Systems and Software"},{"key":"10352_CR51","doi-asserted-by":"crossref","unstructured":"Piorkowski D, Fleming SD, Scaffidi C, Burnett M, Kwan I, Henley AZ, Macbeth J, Hill C, Horvath A (2015) To fix or to learn? how production bias affects developers\u2019 information foraging during debugging. In: 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME) pp. 11\u201320","DOI":"10.1109\/ICSM.2015.7332447"},{"key":"10352_CR52","doi-asserted-by":"crossref","unstructured":"Piorkowski DJ, Fleming SD, Kwan I, Burnett MM, Scaffidi C, Bellamy RK, Jordahl J (2013) The whats and hows of programmers\u2019 foraging diets. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems pp. 3063\u20133072","DOI":"10.1145\/2470654.2466418"},{"issue":"12","key":"10352_CR53","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ijhcs.2007.07.005","volume":"65","author":"P Romero","year":"2007","unstructured":"Romero P, Du Boulay B, Cox R, Lutz R, Bryant S (2007) Debugging strategies and tactics in a multi-representation software environment. International Journal of Human-Computer Studies 65(12):992\u20131009","journal-title":"International Journal of Human-Computer Studies"},{"issue":"4","key":"10352_CR54","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TSE.2008.26","volume":"34","author":"J Sillito","year":"2008","unstructured":"Sillito J, Murphy GC, Volder KD (2008) Asking and Answering Questions during a Programming Change Task. IEEE Transactions on Software Engineering 34(4):434\u2013451","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10352_CR55","doi-asserted-by":"crossref","unstructured":"Singer L, Figueira\u00a0Filho F, Storey MA (2014) Software engineering at the speed of light: how developers stay current using twitter. In: The International Conference on Software Engineering pp. 211\u2013221","DOI":"10.1145\/2568225.2568305"},{"key":"10352_CR56","unstructured":"de\u00a0Souza HA, Chaim ML, Kon F (2016) Spectrum-based software fault localization: A survey of techniques, advances, and challenges. arXiv preprint arXiv:1607.04347"},{"issue":"1","key":"10352_CR57","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1006\/ijhc.1999.0268","volume":"51","author":"AM Vans","year":"1999","unstructured":"Vans AM, von Mayrhauser A, Somlo G (1999) Program understanding behavior during corrective maintenance of large-scale software. International Journal of Human-Computer Studies 51(1):31\u201370","journal-title":"International Journal of Human-Computer Studies"},{"key":"10352_CR58","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/S0020-7373(85)80054-7","volume":"23","author":"I Vessey","year":"1985","unstructured":"Vessey I (1985) Expertise in debugging computer programs: A process analysis. International Journal of Man-Machine Studies 23:459\u2013494","journal-title":"International Journal of Man-Machine Studies"},{"key":"10352_CR59","doi-asserted-by":"crossref","unstructured":"Wang Q, Parnin C, Orso A (2015) Evaluating the usefulness of IR-based fault localization techniques. In: The International Symposium on Software Testing and Analysis pp. 1\u201311","DOI":"10.1145\/2771783.2771797"},{"issue":"8","key":"10352_CR60","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"WE Wong","year":"2016","unstructured":"Wong WE, Gao R, Li Y, Abreu R, Wotawa F (2016) A survey on software fault localization. IEEE Transactions on Software Engineering 42(8):707\u2013740","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10352_CR61","doi-asserted-by":"crossref","unstructured":"Xia X, Bao L, Lo D, Li S (2016) \u201cautomated debugging considered harmful\u201d considered harmful: A user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems. In: ICSM IEEE International Conference on Software Maintenance, pp. 267\u2013278","DOI":"10.1109\/ICSME.2016.67"},{"key":"10352_CR62","unstructured":"Zhang X, Gupta R, Zhang Y (2003) Precise dynamic slicing algorithms. In: The International Conference on Software Engineering pp. 319\u2013329"},{"key":"10352_CR63","doi-asserted-by":"crossref","unstructured":"Zhang X, Gupta N, Gupta R (2006) Pruning dynamic slices with confidence. In: PLDI Conference on Programming Language Design and Implementation 6, pp. 169\u2013180","DOI":"10.1145\/1133255.1134002"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10352-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10352-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10352-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T12:20:12Z","timestamp":1696422012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10352-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":63,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10352"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10352-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"30 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest\/Competing Interests"}}],"article-number":"117"}}