2011 27th IEEE International Conference on Software Maintenance (ICSM) 2011
DOI: 10.1109/icsm.2011.6080824
|View full text |Cite
|
Sign up to set email alerts
|

Tracking technical debt — An exploratory case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(47 citation statements)
references
References 3 publications
0
45
0
2
Order By: Relevance
“…Curtís et al [22] detect code and architectural violations and use information obtained from several projects to estímate the effort needed to solve these kinds of violations, considering the programming language. The second strategy consists of detecting technical debt items and utilizing the typical effort estimation that the organization uses [36] 3) Interest Estimation: For the interest estimation, some studies use an estimated maintenance effort based on information collected from other projects using the same technology [20] [35]. Others use defect likelihood and change likelihood to estímate the technical debt items' impact on system quality; in their case, they focus on classes with the God class code smell [14] [29].…”
Section: ) Identify Technical Debt íTemsmentioning
confidence: 99%
“…Curtís et al [22] detect code and architectural violations and use information obtained from several projects to estímate the effort needed to solve these kinds of violations, considering the programming language. The second strategy consists of detecting technical debt items and utilizing the typical effort estimation that the organization uses [36] 3) Interest Estimation: For the interest estimation, some studies use an estimated maintenance effort based on information collected from other projects using the same technology [20] [35]. Others use defect likelihood and change likelihood to estímate the technical debt items' impact on system quality; in their case, they focus on classes with the God class code smell [14] [29].…”
Section: ) Identify Technical Debt íTemsmentioning
confidence: 99%
“…These types summarize all defined types proposed by [31]. Each type of technical debt represents a different activity since the process or tool used in identification of this activity can be different.…”
Section: The Proposed Approachmentioning
confidence: 99%
“…The structure for cataloging technical debt in the proposed approach is based on the documentation structure introduced as part of the Technical Debt Management Framework (TDMF) [4,31] by Seaman et al This structure is extended in order to decompose entries into reusable components as well as to properly present technical debt in different software development activities.…”
Section: Cataloging Technical Debtmentioning
confidence: 99%
See 1 more Smart Citation
“…It is vital that people and organizations recognize and learn from near-miss events. Another example is captured in the phrase 'technical debt' (Brown et al 2010, Guo et al 2011, Klinger et al 2011, which refers to short cuts and other expedient actions taken by IT system designers prior to a release. These may not 'cost' them anything in the very short-run, but sooner or later the 'debt' must be paid off eventually, either through patching or through the cost of security breaches.…”
Section: Why Breach Impact Estimation Is Hardmentioning
confidence: 99%