Fig. 10From: Towards the application of recommender systems to secure codingSummary of participants’ responses to four main questionsBack to article page