{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:34:38Z","timestamp":1726853678488},"reference-count":71,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2018-04470"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.jss.2023.111935","type":"journal-article","created":{"date-parts":[[2023,12,16]],"date-time":"2023-12-16T11:54:09Z","timestamp":1702727649000},"page":"111935","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Incivility detection in open source code review and issue discussions"],"prefix":"10.1016","volume":"209","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9884-5890","authenticated-orcid":false,"given":"Isabella","family":"Ferreira","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3382-9312","authenticated-orcid":false,"given":"Ahlaam","family":"Rafiq","sequence":"additional","affiliation":[]},{"given":"Jinghui","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2023.111935_b1","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","first-page":"454","article-title":"Analysis and detection of information types of open source software issue discussions","author":"Arya","year":"2019"},{"key":"10.1016\/j.jss.2023.111935_b2","series-title":"Modern Information Retrieval, Vol. 463","author":"Baeza-Yates","year":"1999"},{"issue":"1","key":"10.1016\/j.jss.2023.111935_b3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","article-title":"A study of the behavior of several methods for balancing machine learning training data","volume":"6","author":"Batista","year":"2004","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"10.1016\/j.jss.2023.111935_b4","series-title":"International Conference on Database and Expert Systems Applications","first-page":"138","article-title":"BERT-based sentiment analysis: A software engineering perspective","author":"Batra","year":"2021"},{"key":"10.1016\/j.jss.2023.111935_b5","article-title":"A neural probabilistic language model","volume":"13","author":"Bengio","year":"2000","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2023.111935_b6","series-title":"Advances in Neural Information Processing Systems, Vol. 24","article-title":"Algorithms for hyper-parameter optimization","author":"Bergstra","year":"2011"},{"key":"10.1016\/j.jss.2023.111935_b7","series-title":"2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)","first-page":"162","article-title":"Achieving reliable sentiment analysis in the software engineering domain using bert","author":"Biswas","year":"2020"},{"key":"10.1016\/j.jss.2023.111935_b8","series-title":"Bookcorpus","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b9","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2023.111935_b10","series-title":"\u201cThe dose makes the poison\u201d-Exploring the toxicity phenomenon in online communities","author":"Carillo","year":"2016"},{"key":"10.1016\/j.jss.2023.111935_b11","series-title":"SIGOPEN 2016","article-title":"Towards developing a theory of toxicity in the context of free\/open source software & peer production communities","author":"Carillo","year":"2016"},{"key":"10.1016\/j.jss.2023.111935_b12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J. Artif. Intell. Res."},{"key":"10.1016\/j.jss.2023.111935_b13","series-title":"Evaluation and Assessment in Software Engineering","first-page":"254","article-title":"Towards offensive language detection and reduction in four Software Engineering communities","author":"Cheriyan","year":"2021"},{"issue":"1","key":"10.1016\/j.jss.2023.111935_b14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","article-title":"The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation","volume":"21","author":"Chicco","year":"2020","journal-title":"BMC Genomics"},{"key":"10.1016\/j.jss.2023.111935_b15","doi-asserted-by":"crossref","first-page":"47112","DOI":"10.1109\/ACCESS.2021.3068614","article-title":"The benefits of the Matthews correlation coefficient (MCC) over the diagnostic odds ratio (DOR) in binary classification assessment","volume":"9","author":"Chicco","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jss.2023.111935_b16","series-title":"Predicting code review completion time in modern code review","author":"Chouchen","year":"2021"},{"issue":"4","key":"10.1016\/j.jss.2023.111935_b17","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1111\/jcom.12104","article-title":"Online and uncivil? Patterns and determinants of incivility in newspaper website comments","volume":"64","author":"Coe","year":"2014","journal-title":"J. Commun."},{"key":"10.1016\/j.jss.2023.111935_b18","doi-asserted-by":"crossref","unstructured":"Croft, R., Newlands, D., Chen, Z., Babar, M.A., 2021. An empirical study of rule-based and learning-based approaches for static application security testing. In: Proceedings of the 15th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). pp. 1\u201312.","DOI":"10.1145\/3475716.3475781"},{"key":"10.1016\/j.jss.2023.111935_b19","series-title":"AAAI, Vol. 7","first-page":"540","article-title":"Transferring naive bayes classifiers for text classification","author":"Dai","year":"2007"},{"key":"10.1016\/j.jss.2023.111935_b20","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., Weber, I., 2017. Automated hate speech detection and the problem of offensive language. In: Proceedings of the International AAAI Conference on Web and Social Media, Vol. 11. pp. 512\u2013515.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"10.1016\/j.jss.2023.111935_b21","series-title":"2018 IEEE 14th International Conference on E-Science (E-Science)","first-page":"318","article-title":"Automatically detecting incivility in online discussions of news media","author":"Daxenberger","year":"2018"},{"key":"10.1016\/j.jss.2023.111935_b22","series-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"10.1016\/j.jss.2023.111935_b23","series-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","first-page":"174","article-title":"Predicting developers\u2019 negative feelings about code review","author":"Egelman","year":"2020"},{"key":"10.1016\/j.jss.2023.111935_b24","series-title":"English wikipedia","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b25","series-title":"Codebert: A pre-trained model for programming and natural languages","author":"Feng","year":"2020"},{"key":"10.1016\/j.jss.2023.111935_b26","doi-asserted-by":"crossref","unstructured":"Ferreira, I., Adams, B., Cheng, J., 2022. How heated is it? Understanding GitHub locked issues. In: Proceedings of the 19th International Conference on Mining Software Repositories.","DOI":"10.1145\/3524842.3527957"},{"issue":"CSCW2","key":"10.1016\/j.jss.2023.111935_b27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3479497","article-title":"The \u201cshut the f** k up\u201d phenomenon: Characterizing incivility in open source code review discussions","volume":"5","author":"Ferreira","year":"2021","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"10.1016\/j.jss.2023.111935_b28","series-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering: New Ideas and Emerging Technologies Results Track (ICSE-NIER)","first-page":"11","article-title":"Anger and its direction in collaborative software development","author":"Gachechiladze","year":"2017"},{"key":"10.1016\/j.jss.2023.111935_b29","series-title":"Comparing BERT against traditional machine learning text classification","author":"Gonz\u00e1lez-Carvajal","year":"2020"},{"issue":"3","key":"10.1016\/j.jss.2023.111935_b30","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/s11633-015-0912-z","article-title":"A novel active learning method using SVM for text classification","volume":"15","author":"Goudjil","year":"2018","journal-title":"Int. J. Autom. Comput."},{"key":"10.1016\/j.jss.2023.111935_b31","series-title":"Imbalanced Learning Foundations, Algorithms, and Applications","author":"He","year":"2013"},{"key":"10.1016\/j.jss.2023.111935_b32","series-title":"Heat detector","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b33","series-title":"Auto classes: Auto model for sequence classification","author":"Hugging Face","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b34","series-title":"Bert-base-uncased model","author":"Hugging Face","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b35","series-title":"Hyperparameter search","author":"Hugging Face","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b36","series-title":"Trainer class","author":"Hugging Face","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b37","series-title":"Deep contextualized word representations for detecting sarcasm and irony","author":"Ili\u0107","year":"2018"},{"issue":"5","key":"10.1016\/j.jss.2023.111935_b38","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","article-title":"The class imbalance problem: A systematic study","volume":"6","author":"Japkowicz","year":"2002","journal-title":"Intell. Data Anal."},{"key":"10.1016\/j.jss.2023.111935_b39","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1162\/tacl_a_00300","article-title":"Spanbert: Improving pre-training by representing and predicting spans","volume":"8","author":"Joshi","year":"2020","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"10.1016\/j.jss.2023.111935_b40","series-title":"Albert: A lite bert for self-supervised learning of language representations","author":"Lan","year":"2019"},{"key":"10.1016\/j.jss.2023.111935_b41","series-title":"Annual Meeting of the Society for Academic Emergency Medicine in San Francisco, California, Vol. 14","article-title":"An introduction to classification and regression tree (CART) analysis","author":"Lewis","year":"2000"},{"key":"10.1016\/j.jss.2023.111935_b42","series-title":"Linux kernel\u2019s list of maintainers","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b43","series-title":"Roberta: A robustly optimized bert pretraining approach","author":"Liu","year":"2019"},{"key":"10.1016\/j.jss.2023.111935_b44","series-title":"Locking conversations","year":"2022"},{"issue":"CSCW","key":"10.1016\/j.jss.2023.111935_b45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3274386","article-title":"Opinion conflicts: An effective route to detect incivility in Twitter","volume":"2","author":"Maity","year":"2018","journal-title":"Proc. ACM Huma.-Comput. Interact."},{"issue":"2","key":"10.1016\/j.jss.2023.111935_b46","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","article-title":"Comparison of the predicted and observed secondary structure of T4 phage lysozyme","volume":"405","author":"Matthews","year":"1975","journal-title":"Biochim. Biophys. Acta (BBA)-Protein Struct."},{"key":"10.1016\/j.jss.2023.111935_b47","series-title":"Advances in Neural Information Processing Systems, Vol. 26","article-title":"Distributed representations of words and phrases and their compositionality","author":"Mikolov","year":"2013"},{"key":"10.1016\/j.jss.2023.111935_b48","series-title":"\u201cDid you miss my comment or what?\u201d Understanding toxicity in open source discussions","author":"Miller","year":"2022"},{"issue":"3","key":"10.1016\/j.jss.2023.111935_b49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439726","article-title":"Deep learning\u2013based text classification: a comprehensive review","volume":"54","author":"Minaee","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jss.2023.111935_b50","doi-asserted-by":"crossref","unstructured":"Murgia, A., Tourani, P., Adams, B., Ortu, M., 2014. Do developers feel emotions? an exploratory analysis of emotions in software artifacts. In: Proceedings of the 11th Working Conference on Mining Software Repositories. pp. 262\u2013271.","DOI":"10.1145\/2597073.2597086"},{"key":"10.1016\/j.jss.2023.111935_b51","series-title":"NLTK: Natural language toolkit","author":"NLTK","year":"2021"},{"key":"10.1016\/j.jss.2023.111935_b52","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1016\/j.procs.2019.09.229","article-title":"Dealing with data imbalance in text classification","volume":"159","author":"Padurariu","year":"2019","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"10.1016\/j.jss.2023.111935_b53","doi-asserted-by":"crossref","first-page":"221","DOI":"10.22364\/bjmc.2017.5.2.05","article-title":"Comparison of naive bayes, random forest, decision tree, support vector machines, and logistic regression classifiers for text reviews classification","volume":"5","author":"Pranckevi\u010dius","year":"2017","journal-title":"Baltic J. Modern Comput."},{"key":"10.1016\/j.jss.2023.111935_b54","series-title":"Detecting interpersonal conflict in issues and code review: Cross pollinating open-and closed-source approaches","author":"Qiu","year":"2022"},{"key":"10.1016\/j.jss.2023.111935_b55","series-title":"Improving language understanding by generative pre-training","author":"Radford","year":"2018"},{"key":"10.1016\/j.jss.2023.111935_b56","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.infsof.2019.04.013","article-title":"Source code properties of defective infrastructure as code scripts","volume":"112","author":"Rahman","year":"2019","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2023.111935_b57","series-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results","first-page":"57","article-title":"Stress and burnout in open source: Toward finding, understanding, and mitigating unhealthy interactions","author":"Raman","year":"2020"},{"key":"10.1016\/j.jss.2023.111935_b58","unstructured":"Rennie, J.D., Shih, L., Teevan, J., Karger, D.R., 2003. Tackling the poor assumptions of naive bayes text classifiers. In: Proceedings of the 20th International Conference on Machine Learning (ICML-03). pp. 616\u2013623."},{"key":"10.1016\/j.jss.2023.111935_b59","doi-asserted-by":"crossref","unstructured":"Sadeque, F., Rains, S., Shmargad, Y., Kenski, K., Coe, K., Bethard, S., 2019. Incivility detection in online comments. In: Proceedings of the Eighth Joint Conference on Lexical and Computational Semantics (* SEM 2019). pp. 283\u2013291.","DOI":"10.18653\/v1\/S19-1031"},{"key":"10.1016\/j.jss.2023.111935_b60","series-title":"DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter","author":"Sanh","year":"2019"},{"key":"10.1016\/j.jss.2023.111935_b61","series-title":"2020 27th Asia-Pacific Software Engineering Conference (APSEC)","first-page":"218","article-title":"A benchmark study of the contemporary toxicity detectors on software engineering interactions","author":"Sarker","year":"2020"},{"key":"10.1016\/j.jss.2023.111935_b62","doi-asserted-by":"crossref","DOI":"10.1145\/3583562","article-title":"Automated identification of toxic code reviews using ToxiCR","author":"Sarker","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.jss.2023.111935_b63","doi-asserted-by":"crossref","unstructured":"Schneider, D., Spurlock, S., Squire, M., 2016. Differentiating communication styles of leaders on the linux kernel mailing list. In: Proceedings of the 12th International Symposium on Open Collaboration. pp. 1\u201310.","DOI":"10.1145\/2957792.2957801"},{"issue":"1","key":"10.1016\/j.jss.2023.111935_b64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41133-020-00032-0","article-title":"A comparative analysis of logistic regression, random forest and KNN models for the text classification","volume":"5","author":"Shah","year":"2020","journal-title":"Augment. Hum. Res."},{"key":"10.1016\/j.jss.2023.111935_b65","series-title":"Advances in Neural Information Processing Systems, Vol. 25","article-title":"Practical bayesian optimization of machine learning algorithms","author":"Snoek","year":"2012"},{"key":"10.1016\/j.jss.2023.111935_b66","series-title":"Well-read students learn better: On the importance of pre-training compact models","author":"Turc","year":"2019"},{"key":"10.1016\/j.jss.2023.111935_b67","series-title":"2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR)","first-page":"471","article-title":"Predicting design impactful changes in modern code review: A large-scale empirical study","author":"Uch\u00f4a","year":"2021"},{"key":"10.1016\/j.jss.2023.111935_b68","series-title":"Advances in Neural Information Processing Systems, Vol. 30","article-title":"Attention is all you need","author":"Vaswani","year":"2017"},{"key":"10.1016\/j.jss.2023.111935_b69","series-title":"Eda: Easy data augmentation techniques for boosting performance on text classification tasks","author":"Wei","year":"2019"},{"key":"10.1016\/j.jss.2023.111935_b70","series-title":"Experimentation in Software Engineering","author":"Wohlin","year":"2012"},{"key":"10.1016\/j.jss.2023.111935_b71","series-title":"2021 International Conference on Service Science (ICSS)","first-page":"115","article-title":"BERT for sentiment classification in software engineering","author":"Wu","year":"2021"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121223003308?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121223003308?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T09:08:42Z","timestamp":1712048922000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121223003308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":71,"alternative-id":["S0164121223003308"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2023.111935","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Incivility detection in open source code review and issue discussions","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2023.111935","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"111935"}}