{"id":"https://openalex.org/W7155089257","doi":"https://doi.org/10.48550/arxiv.2604.16404","title":"On the Use of Commit Messages for Corrective Software Maintenance: A Systematic Mapping Study","display_name":"On the Use of Commit Messages for Corrective Software Maintenance: A Systematic Mapping Study","publication_year":2026,"publication_date":"2026-03-31","ids":{"openalex":"https://openalex.org/W7155089257","doi":"https://doi.org/10.48550/arxiv.2604.16404"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.16404","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.16404","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.16404","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030736466","display_name":"Syful Islam","orcid":"https://orcid.org/0000-0002-7441-6987"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Islam, Syful","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5134164787","display_name":"Stefano Zacchiroli","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zacchiroli, Stefano","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030736466"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.8434000015258789,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.8434000015258789,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.05290000140666962,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.04490000009536743,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.9822999835014343},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.47600001096725464},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47589999437332153},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.436599999666214},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4307999908924103},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42399999499320984},{"id":"https://openalex.org/keywords/compensating-transaction","display_name":"Compensating transaction","score":0.42289999127388},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.40529999136924744}],"concepts":[{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.9822999835014343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6850000023841858},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.47600001096725464},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47589999437332153},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.436599999666214},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4307999908924103},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42399999499320984},{"id":"https://openalex.org/C155951066","wikidata":"https://www.wikidata.org/wiki/Q5156254","display_name":"Compensating transaction","level":5,"score":0.42289999127388},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.40529999136924744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39100000262260437},{"id":"https://openalex.org/C129529059","wikidata":"https://www.wikidata.org/wiki/Q2291518","display_name":"Corrective maintenance","level":3,"score":0.375900000333786},{"id":"https://openalex.org/C21491501","wikidata":"https://www.wikidata.org/wiki/Q430253","display_name":"Backporting","level":5,"score":0.37119999527931213},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36649999022483826},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.32580000162124634},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.32019999623298645},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.29010000824928284},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2865000069141388},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27000001072883606}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.16404","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.16404","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.16404","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.16404","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Corrective":[0],"maintenance":[1,115,197],"is":[2],"crucial":[3,221],"to":[4,26,35,112,215,226,249,256],"ensure":[5],"the":[6,43,76,91,107,145,174,190,216,230,234,251],"quality":[7],"of":[8,46,63,80,109,177,253],"software,":[9],"thereby":[10],"improving":[11],"reliability":[12],"and":[13,30,70,90,122,158,168,228,245],"user":[14],"experience.":[15],"In":[16],"a":[17,59,103],"version":[18],"control":[19],"system":[20],"(VCS),":[21],"developers":[22,188],"write":[23],"commit":[24,48,86,110,153,156,205,240],"messages":[25,49,111,154,206,241],"document":[27],"their":[28,95,208],"changes":[29,255],"support":[31],"later":[32],"maintenance.":[33,56,99],"Still,":[34],"this":[36,180],"day,":[37],"no":[38],"secondary":[39],"study":[40,62],"has":[41],"mapped":[42],"research":[44],"landscape":[45],"how":[47],"have":[50],"been":[51],"used":[52,149],"in":[53,106,117,150,179,185,194,201,211],"corrective":[54,98,114,196,212],"software":[55,146,235],"We":[57,142],"present":[58],"systematic":[60],"mapping":[61],"97":[64],"primary":[65],"sources":[66],"published":[67],"between":[68],"2004":[69],"May":[71],"2025,":[72],"where":[73],"we":[74],"examine":[75],"goals,":[77],"potential":[78],"utilization":[79],"source":[81],"code":[82,231,254],"artifacts":[83,147],"along":[84],"with":[85,152,163],"messages,":[87],"methodologies,":[88],"stakeholders,":[89],"key":[92],"findings":[93,200],"about":[94,204],"influence":[96],"on":[97],"Our":[100],"analysis":[101,121],"reveals":[102],"growing":[104],"interest":[105],"usage":[108],"perform":[113],"tasks,":[116],"particular":[118],"for":[119,224],"bug":[120,123],"fix":[124],"identification":[125],"goals.":[126],"Surprisingly":[127],"few":[128],"studies":[129,178,203],"address":[130],"other":[131],"themes":[132],"such":[133],"as":[134],"automated":[135],"program":[136],"repair,":[137],"security":[138],"development":[139],"practices,":[140],"etc.":[141],"find":[143],"that":[144,159,218],"most":[148,191],"combination":[151],"are":[155,173,246],"\"diffs\"":[157],"repository":[160],"mining,":[161],"together":[162],"natural":[164],"language":[165],"processing":[166],"(NLP)":[167],"artificial":[169],"intelligence/machine":[170],"learning":[171],"(AI/ML)":[172],"methodological":[175],"foundations":[176],"field.":[181],"Among":[182],"stakeholders":[183,225],"considered":[184],"previous":[186,202],"studies,":[187],"play":[189],"important":[192,243],"role":[193,210],"shaping":[195],"practices.":[198],"Key":[199],"establish":[207],"significant":[209],"maintenance,":[213],"due":[214],"fact":[217],"they":[219],"carry":[220],"information":[222,244],"helpful":[223],"understand":[227],"improve":[229],"base":[232],"through":[233],"evolution":[236],"process.":[237],"Often,":[238],"though,":[239],"lack":[242],"not":[247],"enough":[248],"convey":[250],"intent":[252],"future":[257],"readers.":[258]},"counts_by_year":[],"updated_date":"2026-04-22T06:07:44.442478","created_date":"2026-04-22T00:00:00"}
