{"id":"https://openalex.org/W3106134356","doi":"https://doi.org/10.1109/scam51674.2020.00010","title":"Does code review really remove coding convention violations?","display_name":"Does code review really remove coding convention violations?","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3106134356","doi":"https://doi.org/10.1109/scam51674.2020.00010","mag":"3106134356"},"language":"en","primary_location":{"id":"doi:10.1109/scam51674.2020.00010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/scam51674.2020.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054365831","display_name":"DongGyun Han","orcid":"https://orcid.org/0000-0002-8599-2197"},"institutions":[{"id":"https://openalex.org/I4210089985","display_name":"Amazon (Germany)","ror":"https://ror.org/00b9ktm87","country_code":"DE","type":"company","lineage":["https://openalex.org/I1311688040","https://openalex.org/I4210089985"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"DongGyun Han","raw_affiliation_strings":["Amazon, Germany"],"affiliations":[{"raw_affiliation_string":"Amazon, Germany","institution_ids":["https://openalex.org/I4210089985"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059838021","display_name":"Chaiyong Ragkhitwetsagul","orcid":"https://orcid.org/0000-0002-6502-1107"},"institutions":[{"id":"https://openalex.org/I25399158","display_name":"Mahidol University","ror":"https://ror.org/01znkr924","country_code":"TH","type":"education","lineage":["https://openalex.org/I25399158"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Chaiyong Ragkhitwetsagul","raw_affiliation_strings":["SERU, Faculty of ICT Mahidol University, Thailand"],"affiliations":[{"raw_affiliation_string":"SERU, Faculty of ICT Mahidol University, Thailand","institution_ids":["https://openalex.org/I25399158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056241360","display_name":"Jens Krinke","orcid":"https://orcid.org/0000-0003-1009-2861"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jens Krinke","raw_affiliation_strings":["University College London, UK"],"affiliations":[{"raw_affiliation_string":"University College London, UK","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065650493","display_name":"Matheus Paix\u00e3o","orcid":"https://orcid.org/0000-0002-1775-7259"},"institutions":[{"id":"https://openalex.org/I3125581668","display_name":"Universidade de Fortaleza","ror":"https://ror.org/02ynbzc81","country_code":"BR","type":"education","lineage":["https://openalex.org/I3125581668"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Matheus Paixao","raw_affiliation_strings":["University of Fortaleza, Brazil"],"affiliations":[{"raw_affiliation_string":"University of Fortaleza, Brazil","institution_ids":["https://openalex.org/I3125581668"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101499242","display_name":"Giovanni Rosa","orcid":"https://orcid.org/0000-0002-5241-1608"},"institutions":[{"id":"https://openalex.org/I129627893","display_name":"University of Molise","ror":"https://ror.org/04z08z627","country_code":"IT","type":"education","lineage":["https://openalex.org/I129627893"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giovanni Rosa","raw_affiliation_strings":["University of Molise, Italy"],"affiliations":[{"raw_affiliation_string":"University of Molise, Italy","institution_ids":["https://openalex.org/I129627893"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054365831"],"corresponding_institution_ids":["https://openalex.org/I4210089985"],"apc_list":null,"apc_paid":null,"fwci":2.669,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92219736,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/convention","display_name":"Convention","score":0.8142358064651489},{"id":"https://openalex.org/keywords/technical-debt","display_name":"Technical debt","score":0.6852669715881348},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6100379228591919},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5714113712310791},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.5617513656616211},{"id":"https://openalex.org/keywords/surprise","display_name":"Surprise","score":0.4278911054134369},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4260715842247009},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.39337819814682007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3444199860095978},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3286045789718628},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.30843451619148254},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.255973219871521},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2435062825679779},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.18491151928901672},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14712637662887573},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.12131765484809875},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.08119410276412964}],"concepts":[{"id":"https://openalex.org/C2780608745","wikidata":"https://www.wikidata.org/wiki/Q367293","display_name":"Convention","level":2,"score":0.8142358064651489},{"id":"https://openalex.org/C159198006","wikidata":"https://www.wikidata.org/wiki/Q1532172","display_name":"Technical debt","level":4,"score":0.6852669715881348},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6100379228591919},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5714113712310791},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.5617513656616211},{"id":"https://openalex.org/C2780343955","wikidata":"https://www.wikidata.org/wiki/Q333173","display_name":"Surprise","level":2,"score":0.4278911054134369},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4260715842247009},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.39337819814682007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3444199860095978},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3286045789718628},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.30843451619148254},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.255973219871521},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2435062825679779},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.18491151928901672},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14712637662887573},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.12131765484809875},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.08119410276412964},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/scam51674.2020.00010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/scam51674.2020.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W814172419","https://openalex.org/W1970589113","https://openalex.org/W1972091638","https://openalex.org/W1992706013","https://openalex.org/W2064296229","https://openalex.org/W2069798959","https://openalex.org/W2091990486","https://openalex.org/W2093094052","https://openalex.org/W2098044686","https://openalex.org/W2107564263","https://openalex.org/W2108769867","https://openalex.org/W2125343911","https://openalex.org/W2140466350","https://openalex.org/W2142245496","https://openalex.org/W2149598089","https://openalex.org/W2151979607","https://openalex.org/W2326342526","https://openalex.org/W2402601480","https://openalex.org/W2408052243","https://openalex.org/W2590170992","https://openalex.org/W2646484260","https://openalex.org/W2727928347","https://openalex.org/W2769453414","https://openalex.org/W2795566764","https://openalex.org/W2796311201","https://openalex.org/W2884659160","https://openalex.org/W2884952956","https://openalex.org/W2978738432","https://openalex.org/W2990685757","https://openalex.org/W2994851798","https://openalex.org/W4232918024","https://openalex.org/W4235786747","https://openalex.org/W4236370370","https://openalex.org/W4246032972","https://openalex.org/W4254666025","https://openalex.org/W6733753525","https://openalex.org/W6770287319"],"related_works":["https://openalex.org/W2967990473","https://openalex.org/W2019257047","https://openalex.org/W3115515323","https://openalex.org/W4387011641","https://openalex.org/W2795746234","https://openalex.org/W2729258247","https://openalex.org/W2097099770","https://openalex.org/W4380568682","https://openalex.org/W4387411615","https://openalex.org/W2785752813"],"abstract_inverted_index":{"Many":[0],"software":[1],"developers":[2],"perceive":[3,15],"technical":[4,35,80],"debt":[5],"as":[6,18,54,127],"the":[7,19,71,78,111,115,180],"biggest":[8],"problems":[9],"in":[10,143,166],"their":[11],"projects.":[12],"They":[13],"also":[14,136,173],"code":[16,25,51,67,94,104,128,140,181,188],"reviews":[17,68],"most":[20,55],"important":[21],"process":[22,183],"to":[23,47],"increase":[24],"quality.":[26],"As":[27],"inconsistent":[28],"coding":[29,42,74,85],"style":[30],"is":[31,38,63],"one":[32,176],"source":[33],"of":[34,73,110,117,154],"debt,":[36],"it":[37,62],"no":[39],"surprise":[40],"that":[41,123,150,175],"convention":[43,75,86,118,124,145,161,189],"violations":[44,76,87,125,146],"can":[45,177],"lead":[46],"patch":[48],"rejection":[49],"during":[50,93],"review.":[52],"However,":[53],"research":[56],"has":[57,163],"focused":[58],"on":[59],"developer's":[60],"perception,":[61],"not":[64],"clear":[65],"whether":[66],"actually":[69],"prevent":[70],"introduction":[72,116],"and":[77,91,148],"corresponding":[79],"debt.Therefore,":[81],"we":[82,101],"investigated":[83,138],"how":[84],"are":[88],"introduced,":[89],"addressed,":[90],"removed":[92,158],"review":[95,105,141,168,182],"by":[96,184],"developers.":[97],"To":[98],"do":[99],"this,":[100],"analysed":[102],"16,442":[103],"requests":[106,142],"from":[107],"four":[108],"projects":[109],"Eclipse":[112],"community":[113],"for":[114,187],"violations.":[119],"Our":[120],"result":[121],"shows":[122],"accumulate":[126],"size":[129],"increases":[130],"despite":[131],"changes":[132],"being":[133],"reviewed.":[134],"We":[135],"manually":[137],"1,268":[139],"which":[144],"disappear":[147],"observed":[149],"only":[151],"a":[152,160,167],"minority":[153],"them":[155],"have":[156],"been":[157,164],"because":[159],"violation":[162,190],"flagged":[165],"comment.":[169],"The":[170],"investigation":[171],"results":[172],"highlight":[174],"speed":[178],"up":[179],"adopting":[185],"tools":[186],"detection.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
