Fig. 6From: Towards the application of recommender systems to secure codingSituations under which programmers would use the proposed pluginBack to article page