{"id":"https://openalex.org/W2050610336","doi":"https://doi.org/10.1145/1882291.1882294","title":"Avoiding the classic catastrophic computer science failure mode","display_name":"Avoiding the classic catastrophic computer science failure mode","publication_year":2010,"publication_date":"2010-11-07","ids":{"openalex":"https://openalex.org/W2050610336","doi":"https://doi.org/10.1145/1882291.1882294","mag":"2050610336"},"language":"en","primary_location":{"id":"doi:10.1145/1882291.1882294","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1882291.1882294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105988194","display_name":"Ralph E. Johnson","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ralph E. Johnson","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, IL, USA","University of Illinois at Urbana/Champaign, Urbana, IL, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana/Champaign, Urbana, IL, USA#TAB#","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5105988194"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":0.69644262,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82310191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"5","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9286999702453613,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9139000177383423,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nobody","display_name":"nobody","score":0.9317827224731445},{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.6882941126823425},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5863359570503235},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5722594261169434},{"id":"https://openalex.org/keywords/warning-signs","display_name":"Warning signs","score":0.5241879820823669},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44051697850227356},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3316640853881836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27651554346084595},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21457183361053467},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.18288809061050415},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.13326048851013184}],"concepts":[{"id":"https://openalex.org/C36914074","wikidata":"https://www.wikidata.org/wiki/Q1940501","display_name":"nobody","level":2,"score":0.9317827224731445},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.6882941126823425},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5863359570503235},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5722594261169434},{"id":"https://openalex.org/C2994071780","wikidata":"https://www.wikidata.org/wiki/Q2019180","display_name":"Warning signs","level":2,"score":0.5241879820823669},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44051697850227356},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3316640853881836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27651554346084595},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21457183361053467},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.18288809061050415},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.13326048851013184},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C22212356","wikidata":"https://www.wikidata.org/wiki/Q775325","display_name":"Transport engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1882291.1882294","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1882291.1882294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.46000000834465027,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1543072206","https://openalex.org/W2065156438","https://openalex.org/W2502265256","https://openalex.org/W2173947718","https://openalex.org/W4388363270","https://openalex.org/W2898696350","https://openalex.org/W2772791208","https://openalex.org/W4381511496","https://openalex.org/W2784053798","https://openalex.org/W2481533019"],"abstract_inverted_index":{"Many":[0],"computer":[1,80,255],"science":[2,81,256],"research":[3,12],"efforts":[4],"fail.":[5],"Some":[6],"of":[7,19,22,30,97,130,146,154,159,218,251],"this":[8,44,89,122],"is":[9,13,27,36,45,57,63,67,127,141,152],"inevitable,":[10],"since":[11],"risky.":[14],"But":[15],"sometimes":[16],"the":[17,31,77,111,143,164,180,192,252],"agenda":[18],"a":[20,28,128,237],"group":[21],"researchers":[23],"fails":[24],"because":[25,46,232],"there":[26,47,62,126],"part":[29,153],"problem":[32],"that":[33,39],"everyone":[34],"agrees":[35],"crucial,":[37],"but":[38,239],"nobody":[40,240],"works":[41],"on.":[42],"Often":[43],"are":[48,184],"not":[49,161,214,223],"enough":[50],"rewards":[51],"for":[52,114,133,207],"working":[53],"on":[54,190,242],"it;":[55],"it":[56,76,140,200,206,212],"hard":[58],"to":[59,104,162,169,171,261],"publish":[60],"and/or":[61],"no":[64],"funding.":[65],"This":[66,245],"more":[68],"common":[69],"than":[70],"you":[71],"might":[72],"think;":[73],"I":[74,116],"call":[75],"classic":[78,253],"catastrophic":[79,254],"failure":[82,257],"mode.Design":[83],"Patterns":[151],"could":[85],"have":[86,120,215,222],"fallen":[87],"into":[88],"trap.":[90],"Our":[91],"hypothesis":[92,123],"was":[93,201],"A":[135],"standard":[95,144],"description":[96,145],"design":[98,112,147],"techniques":[99],"will":[100,109,247],"enable":[101],"new":[102],"designers":[103],"become":[105],"expert":[106],"faster":[107],"and":[108,149,194,259],"improve":[110],"process":[113],"experts.":[115],"don't":[117],"believe":[118],"we":[119,168,176,178,188],"proven":[121],"yet,":[124],"though":[125],"lot":[129],"anecdotal":[131],"evidence":[132],"it.":[134,244,263],"key":[136],"step":[137],"in":[138],"proving":[139],"developing":[142,243],"techniques,":[148],"Design":[150],"that.":[155],"There":[156],"were":[157,167],"lots":[158],"reasons":[160],"write":[163],"book.":[165],"Who":[166],"try":[170],"standardize":[172],"design?":[173],"How":[174],"did":[175],"know":[177],"had":[179],"right":[181],"patterns?":[182],"These":[183],"unanswerable":[185],"questions,":[186],"so":[187,225],"focused":[189],"writing":[191],"catalog":[193],"let":[195],"other":[196],"people":[197,204],"decide":[198],"whether":[199],"worthwhile.":[202],"Other":[203],"publicized":[205],"us.":[208],"Without":[209],"those":[210],"people,":[211],"would":[213],"made":[216],"much":[217],"an":[219],"impact.Other":[220],"projects":[221,230],"been":[224],"fortunate.":[226],"I've":[227],"seen":[228],"several":[229],"fail":[231],"they":[233],"needed":[234],"something":[235],"like":[236],"catalog,":[238],"worked":[241],"talk":[246],"describe":[248],"warning":[249],"signs":[250],"mode":[258],"how":[260],"avoid":[262]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
