{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:04:25Z","timestamp":1725743065895},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","funder":[{"name":"ROSIN","award":["732287"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3383219.3383242","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:51:02Z","timestamp":1588578662000},"page":"220-229","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["How Do FOSS Communities Decide to Accept Pull Requests?"],"prefix":"10.1145","author":[{"given":"Adam","family":"Alami","sequence":"first","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Marisa Leavitt","family":"Cohn","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Andrzej","family":"W\u0105isowski","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00111"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72486-7_19"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.05.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370720.1370723"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.303623"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.36"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"e_1_3_2_1_8_1","volume-title":"How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust. Ethics and information technology 12, 4","author":"De Laat Paul B","year":"2010","unstructured":"Paul B De Laat . 2010. How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust. Ethics and information technology 12, 4 ( 2010 ), 327--341. Paul B De Laat. 2010. How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust. Ethics and information technology 12, 4 (2010), 327--341."},{"key":"e_1_3_2_1_9_1","volume-title":"Neither market nor hierarchy nor network: The emergence of bazaar governance","author":"Demil Benoit","year":"2006","unstructured":"Benoit Demil and Xavier Lecocq . 2006. Neither market nor hierarchy nor network: The emergence of bazaar governance . Organization studies 27, 10 ( 2006 ), 1447--1466. Benoit Demil and Xavier Lecocq. 2006. Neither market nor hierarchy nor network: The emergence of bazaar governance. Organization studies 27, 10 (2006), 1447--1466."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9000-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786848"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS.2019.00014"},{"key":"e_1_3_2_1_13_1","unstructured":"Linux Foundation. [n. d.]. 2017 Linux Kernel Report Highlights Developers' Roles and Accelerating Pace of Change. https:\/\/www.linuxfoundation.org\/blog\/2017\/10\/2017-linux-kernel-report-highlights-developers-roles-accelerating-pace-change\/ Linux Foundation. [n. d.]. 2017 Linux Kernel Report Highlights Developers' Roles and Accelerating Pace of Change. https:\/\/www.linuxfoundation.org\/blog\/2017\/10\/2017-linux-kernel-report-highlights-developers-roles-accelerating-pace-change\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.4135\/9781849208574","volume-title":"Thematic coding and categorizing. Analyzing qualitative data 703","author":"Gibbs Graham R","year":"2007","unstructured":"Graham R Gibbs . 2007. Thematic coding and categorizing. Analyzing qualitative data 703 ( 2007 ), 38--56. Graham R Gibbs. 2007. Thematic coding and categorizing. Analyzing qualitative data 703 (2007), 38--56."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884826"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818800"},{"key":"e_1_3_2_1_18_1","volume-title":"Beverly Hills, CA: Sage","author":"Guba E. G.","year":"1985","unstructured":"E. G. Guba and Y. S. Lincoln . 1985 . Naturalistic inquiry (Vol . 75). Beverly Hills, CA: Sage (1985). E. G. Guba and Y. S. Lincoln. 1985. Naturalistic inquiry (Vol. 75). Beverly Hills, CA: Sage (1985)."},{"key":"e_1_3_2_1_20_1","volume-title":"Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7","author":"Hertel Guido","year":"2003","unstructured":"Guido Hertel , Sven Niedner , and Stefanie Herrmann . 2003. Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7 ( 2003 ). Guido Hertel, Sven Niedner, and Stefanie Herrmann. 2003. Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy 32, 7 (2003)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.10.006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10997-007-9021-x"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441792"},{"volume-title":"3rd.","author":"Miles Matthew B","key":"e_1_3_2_1_24_1","unstructured":"Matthew B Miles , A Michael Huberman , and Johnny Saldana . 2014. Qualitative data analysis: A methods sourcebook . 3rd. Thousand Oaks, CA : Sage . Matthew B Miles, A Michael Huberman, and Johnny Saldana. 2014. Qualitative data analysis: A methods sourcebook. 3rd. Thousand Oaks, CA: Sage."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10997-007-9024-7"},{"key":"e_1_3_2_1_26_1","volume-title":"Social Norms Marketing to Reduce Gender Based Violence. IRC Policy Briefcase","author":"Paluck Elizabeth Levy","year":"2010","unstructured":"Elizabeth Levy Paluck and Laurie Ball . 2010. Social Norms Marketing to Reduce Gender Based Violence. IRC Policy Briefcase ( 2010 ). Elizabeth Levy Paluck and Laurie Ball. 2010. Social Norms Marketing to Reduce Gender Based Violence. IRC Policy Briefcase (2010)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597121"},{"key":"e_1_3_2_1_28_1","volume-title":"Process governance best practices: Building a BPM center of excellence. Business Process Trends","author":"Richardson Clay","year":"2006","unstructured":"Clay Richardson . 2006. Process governance best practices: Building a BPM center of excellence. Business Process Trends ( 2006 ). Clay Richardson. 2006. Process governance best practices: Building a BPM center of excellence. Business Process Trends (2006)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985867"},{"volume-title":"Real world research","author":"Robson Colin","key":"e_1_3_2_1_30_1","unstructured":"Colin Robson and Kieran McCartan . 2016. Real world research . John Wiley & Sons . Colin Robson and Kieran McCartan. 2016. Real world research. John Wiley & Sons."},{"key":"e_1_3_2_1_31_1","volume-title":"Strategies for ensuring trustworthiness in qualitative research projects. Education for information 22, 2","author":"Shenton Andrew K.","year":"2004","unstructured":"Andrew K. Shenton . 2004. Strategies for ensuring trustworthiness in qualitative research projects. Education for information 22, 2 ( 2004 ). Andrew K. Shenton. 2004. Strategies for ensuring trustworthiness in qualitative research projects. Education for information 22, 2 (2004)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671389"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695856"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.41"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180208"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9659-9"},{"key":"e_1_3_2_1_38_1","volume-title":"Qualitative quality: Eight \"big-tent\" criteria for excellent qualitative research. Qualitative inquiry 16, 10","author":"Tracy Sarah J","year":"2010","unstructured":"Sarah J Tracy . 2010. Qualitative quality: Eight \"big-tent\" criteria for excellent qualitative research. Qualitative inquiry 16, 10 ( 2010 ), 837--851. Sarah J Tracy. 2010. Qualitative quality: Eight \"big-tent\" criteria for excellent qualitative research. Qualitative inquiry 16, 10 (2010), 837--851."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635882"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.42"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2014.57"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.004"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950364"}],"event":{"name":"EASE '20: Evaluation and Assessment in Software Engineering","sponsor":["NTNU Norwegian University of Science and Technology"],"location":"Trondheim Norway","acronym":"EASE '20"},"container-title":["Proceedings of the Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383219.3383242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T18:29:49Z","timestamp":1673548189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383219.3383242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":43,"alternative-id":["10.1145\/3383219.3383242","10.1145\/3383219"],"URL":"https:\/\/doi.org\/10.1145\/3383219.3383242","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}