Fig. 3From: Towards the application of recommender systems to secure codingMockup of proposed system as incorporated in an IDEBack to article page