Fig. 4From: Towards the application of recommender systems to secure codingParticipants’ familiarity with IDEsBack to article page