Name
Affiliation
Papers
EMERSON R. MURPHY-HILL
Portland State University
114
Collaborators
Citations 
PageRank 
171
1284
74.35
Referers 
Referees 
References 
2196
1869
1249
Search Limit
1001000
Title
Citations
PageRank
Year
The Pushback Effects of Race, Ethnicity, Gender, and Age in Code Review00.342022
Engineering Impacts of Anonymous Author Code Review: A Field Experiment00.342022
The Diversity Crisis in Software Development40.662021
Data Analysts and Their Software Practices: A Profile of the Sabermetrics Community and Beyond00.342020
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security00.342020
Enabling the Study of Software Development Behavior With Cross-Tool Logs10.362020
Predicting developers' negative feelings about code review50.432020
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool50.522019
Do developers discover new tools on the toilet?00.342019
Investigating the effects of gender bias on GitHub10.352019
Advantages and disadvantages of a monolithic repository: a case study at google.40.432018
Automatic web security unit testing: XSS vulnerability detection.10.352018
When not to comment: questions and tradeoffs with API documentation for C++ projects.10.352018
Does ACM's code of ethics change ethical decision making in software development?50.452018
How should compilers explain problems to developers?70.502018
Discovering API Usability Problems at Scale.10.352018
Just-in-time static analysis.70.472017
Gender differences and bias in open source: pull request acceptance of women versus men.361.272017
Do developers read compiler error messages?160.712017
Design and evaluation of a multi-recommendation system for local code search.20.352017
Refactoring-aware code review.00.342017
Cheetah: just-in-time taint analysis for Android apps.20.362017
Flower: Navigating program flow in the IDE.10.342017
Designing for dystopia: software engineering research for the post-apocalypse.00.342016
A perspective on blending programming environments and games: Beyond points, badges, and leaderboards.30.662016
Software security education at scale.00.342016
Perquimans: A Tool for Visualizing Patterns of Spreadsheet Function Combinations00.342016
Gender bias in open source: Pull request acceptance of women versus men.40.452016
The persuasive phish: examining the social psychological principles hidden in phishing emails.20.442016
From Quick Fixes to Slow Fixes: Reimagining Static Analysis Resolutions to Enable Design Space Exploration40.412016
Veteran developers' contributions and motivations: An open source perspective.10.402016
Questions developers ask while diagnosing potential security vulnerabilities with static analysis210.832015
Quantifying developers' adoption of security tools160.652015
Enron's spreadsheets and related emails: a dataset and analysis210.812015
Exploring expert and novice mental models of phishing10.352015
The human factor: A challenge for network reliability design20.422015
How Do Users Discover New Tools in Software Development and Beyond?60.422015
A study of interactive code annotation for access control vulnerabilities90.562015
Commit Bubbles.20.372015
The Design Space of Bug Fixes and How Developers Navigate It220.732015
Will the "Phisher-Men" Reel You In?: Assessing Individual Differences in a Phishing Detection Task.30.392015
I heart hacker news: expanding qualitative research findings by analyzing social news websites50.442015
Can Social Screencasting Help Developers Learn New Tools?00.342015
Refactoring.00.342015
Bespoke tools: adapted to the concepts developers know50.452015
How programming languages will co-evolve with software engineering: a bright decade ahead.50.432014
How developers use multi-recommendation system in local code search20.352014
Technical and Personal Factors Influencing Developers' Adoption of Security Tools40.492014
The Future of Refactoring (Dagstuhl Seminar 14211).10.362014
SIW 2014: First Workshop on Security Information Workers.00.342014
  • 1
  • 2