{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:19:32Z","timestamp":1725466772257},"publisher-location":"Berlin\/Heidelberg","reference-count":51,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"1402036744"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-3675-2_2","type":"book-chapter","created":{"date-parts":[[2006,7,7]],"date-time":"2006-07-07T10:41:06Z","timestamp":1152268866000},"page":"9-23","source":"Crossref","is-referenced-by-count":1,"title":["Large Scale Requirements Analysis as Heterogeneous Engineering"],"prefix":"10.1007","author":[{"given":"Kalle","family":"Lyytinen","sequence":"first","affiliation":[]},{"given":"Mark","family":"Bergman","sequence":"additional","affiliation":[]},{"given":"John Leslie","family":"King","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","first-page":"39","volume":"32","author":"T. K. Abdel-Hamid","year":"1990","unstructured":"Abdel-Hamid, T. K. and S. E. Madnick (1990). \u201cThe Elusive Silver Lining: How We Fail to Learn from Software Development Failures.\u201d Sloan Management Review 32(1): 39\u201348.","journal-title":"Sloan Management Review"},{"key":"2_CR2","volume-title":"Power and politics in organizations","author":"S. B. Bacharach","year":"1980","unstructured":"Bacharach, S. B. and E. J. Lawler (1980). Power and politics in organizations. San Francisco, Jossey-Bass."},{"issue":"May","key":"2_CR3","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/0281-7527(86)90016-2","volume":"4","author":"V. Baier","year":"1986","unstructured":"Baier, V. and J. March (1986). \u201cImplementation and Ambiguity.\u201d Scandinavian Journal of Management Studies 4(May): 197\u2013212.","journal-title":"Scandinavian Journal of Management Studies"},{"key":"2_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5426-1","volume-title":"How nature works: the science of self-organized criticality","author":"P. Bak","year":"1996","unstructured":"Bak, P. (1996). How nature works: the science of self-organized criticality. New York, NY, USA, Copernicus."},{"key":"2_CR5","volume-title":"The social construction of reality; a treatise in the sociology of knowledge","author":"P. L. Berger","year":"1966","unstructured":"Berger, P. L. and T. Luckmann (1966). The social construction of reality; a treatise in the sociology of knowledge. Garden City, N.Y., Doubleday."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bergman, M., J. L. King, et al. (2001). Large Scale Requirements Analysis Revisited: The need for Understanding the Political Ecology of Requirements Engineering, submitted for publication.","DOI":"10.1007\/s007660200011"},{"key":"2_CR7","first-page":"159","volume-title":"The Social Construction of Technological Systems","author":"W. Bijker","year":"1987","unstructured":"Bijker, W. (1987). The Social Construction of Bakelite: Toward a Theory of Invention. The Social Construction of Technological Systems. W. Bijker, T. Hughes and T. Pinch. Cambridge, MA, MIT Press: 159\u2013190."},{"key":"2_CR8","unstructured":"Boehm, B. W. (1988). \u201cA spiral model of software development and enhancement.\u201d Computer May: 61\u201372."},{"key":"2_CR9","volume-title":"The mythical man-month: essays on software engineering","author":"F. P. Brooks","year":"1995","unstructured":"Brooks, F. P. (1995). The mythical man-month: essays on software engineering. Reading, Mass., Addison-Wesley Pub. Co."},{"key":"2_CR10","volume-title":"Systems thinking, systems practice","author":"P. Checkland","year":"1981","unstructured":"Checkland, P. (1981). Systems thinking, systems practice. Chichester Sussex; New York, J. Wiley."},{"key":"2_CR11","volume-title":"Soft systems methodology in action","author":"P. Checkland","year":"1990","unstructured":"Checkland, P. and J. Scholes (1990). Soft systems methodology in action. Chichester, West Sussex, England; New York, Wiley."},{"key":"2_CR12","volume-title":"Systems Analysis Techniques","author":"D. Couger","year":"1974","unstructured":"Couger, D. and J. Knapp (1974). Systems Analysis Techniques. London, John-Wiley & Son."},{"key":"2_CR13","volume-title":"Software requirements: objects, functions, and states","author":"A. M. Davis","year":"1993","unstructured":"Davis, A. M. (1993). Software requirements: objects, functions, and states. Englewood Cliffs, N.J., PTR Prentice Hall."},{"key":"2_CR14","unstructured":"DeTombe, D. J. (1994). Defining complex interdisciplinary societal problems: a theoretical study for constructing a co-operative problem analyzing method: the method COMPRAM. Amsterdam, Thesis Publishers."},{"key":"2_CR15","volume-title":"Introduction to Montague semantics","author":"D. R. Dowty","year":"1981","unstructured":"Dowty, D. R., R. E. Wall, et al. (1981). Introduction to Montague semantics. Boston, MA, Kluwer Boston Inc."},{"key":"2_CR16","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1177\/026839629601100408","volume":"11","author":"H. Drummond","year":"1996","unstructured":"Drummond, H. (1996). \u201cThe Politics of Risk: Trials and Tribulations of the Taurus Project.\u201d Journal of Information Technology 11: 347\u2013357.","journal-title":"Journal of Information Technology"},{"key":"2_CR17","volume-title":"Organizational power politics: tactics in organizational leadership","author":"G. W. Fairholm","year":"1993","unstructured":"Fairholm, G. W. (1993). Organizational power politics: tactics in organizational leadership. Westport, Conn., Praeger."},{"key":"2_CR18","volume-title":"Power knowledge: selected interviews and other writings, 1972\u20131977","author":"M. Foucault","year":"1980","unstructured":"Foucault, M. and C. Gordon (1980). Power knowledge: selected interviews and other writings, 1972\u20131977. New York, Pantheon Books."},{"key":"2_CR19","volume-title":"Exploring requirements: quality before design","author":"D. C. Gause","year":"1989","unstructured":"Gause, D. C. and G. M. Weinberg (1989). Exploring requirements: quality before design. New York, NY, Dorset House Pub."},{"key":"2_CR20","volume-title":"Requirements engineering and rapid development: an object-oriented approach","author":"I. Graham","year":"1998","unstructured":"Graham, I. (1998). Requirements engineering and rapid development: an object-oriented approach. Harlow, England; Reading, MA, Addison Wesley."},{"key":"2_CR21","volume-title":"Bridging the Gap Between Past and Future RE: A Scenario-Based Approach","author":"P. Haumer","year":"1999","unstructured":"Haumer, P., P. Heymans, et al. (1999). Bridging the Gap Between Past and Future RE: A Scenario-Based Approach. RE\u201999, Limerick, Ireland, IEEE Computer Society."},{"issue":"4","key":"2_CR22","doi-asserted-by":"crossref","first-page":"697","DOI":"10.2307\/3103636","volume":"20","author":"T. Hughes","year":"1979","unstructured":"Hughes, T. (1979a). \u201cEmerging Themes in the History of Technology.\u201d Technology and Culture 20(4): 697\u2013711.","journal-title":"Technology and Culture"},{"issue":"1","key":"2_CR23","doi-asserted-by":"crossref","first-page":"124","DOI":"10.2307\/3103115","volume":"20","author":"T. Hughes","year":"1979","unstructured":"Hughes, T. (1979b). \u201cThe Electrification of America: The system builders.\u201d Technology and Culture 20(1): 124\u2013161.","journal-title":"Technology and Culture"},{"key":"2_CR24","first-page":"51","volume-title":"The Social Construction of Technological Systems","author":"T. Hughes","year":"1987","unstructured":"Hughes, T. (1987). The Evolution of Large Technological Systems. The Social Construction of Technological Systems. W. Bijker, T. Hughes and T. Pinch. Cambridge, MA, MIT Press: 51\u201382."},{"issue":"6","key":"2_CR25","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/0950-5849(90)90125-B","volume":"32","author":"J. Iivari","year":"1990","unstructured":"Iivari, J. (1990a). \u201cHierarchical spiral model for information system and software development. Part 1: theoretical background.\u201d Information and Software Technology 32(6): 386\u2013399.","journal-title":"Information and Software Technology"},{"issue":"7","key":"2_CR26","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/0950-5849(90)90160-S","volume":"32","author":"J. Iivari","year":"1990","unstructured":"Iivari, J. (1990b). \u201cHierarchical spiral model for information system and software development, Part 2: design process.\u201d Information and Software Technology 32(7): 450\u2013458.","journal-title":"Information and Software Technology"},{"issue":"4","key":"2_CR27","doi-asserted-by":"publisher","first-page":"421","DOI":"10.2307\/249627","volume":"19","author":"M. Keil","year":"1995","unstructured":"Keil, M. (1995). \u201cPulling the Plug: Software Project Management and the Problem of Project Escalation.\u201d MIS Quarterly 19(4): 421\u2013447.","journal-title":"MIS Quarterly"},{"issue":"3","key":"2_CR28","first-page":"55","volume":"41","author":"M. Keil","year":"2000","unstructured":"Keil, M. and R. Montealegre (2000). \u201cCutting your losses: Extricating Your Organization When a Big Project Goes Awry.\u201d Sloan Management Review 41(3): 55\u201368.","journal-title":"Sloan Management Review"},{"key":"2_CR29","volume-title":"Requirements engineering: processes and techniques","author":"G. Kotonya","year":"1998","unstructured":"Kotonya, G. and I. Sommerville (1998). Requirements engineering: processes and techniques. Chichester; New York, J. Wiley."},{"key":"2_CR30","volume-title":"Theoretical Analysis of Information Systems","author":"B. Langefors","year":"1966","unstructured":"Langefors, B. (1966). Theoretical Analysis of Information Systems. Lund, Sweden, Studentlitteratur."},{"key":"2_CR31","volume-title":"A Sociology of Monsters: Essays on Power, Technology and Domination","author":"B. Latour","year":"1991","unstructured":"Latour, B. (1991). Technology is society made durable. A Sociology of Monsters: Essays on Power, Technology and Domination. J. Law. London, Routledge."},{"key":"2_CR32","first-page":"111","volume-title":"The Social Construction of Technological Systems","author":"J. Law","year":"1987","unstructured":"Law, J. (1987). Technology and Heterogeneous Engineering: The Case of Portuguese Expansion. The Social Construction of Technological Systems. W. Bijker, T. Hughes and T. Pinch. Cambridge, MA, MIT Press: 111\u2013134."},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"517","DOI":"10.2307\/976178","volume":"39","author":"C. E. Lindblom","year":"1979","unstructured":"Lindblom, C. E. (1979). \u201cStill Muddling Through.\u201d Public Administrative Review 39: 517\u2013526.","journal-title":"Public Administrative Review"},{"key":"2_CR34","volume-title":"System Requirements Engineering","author":"P. Loucopoulos","year":"1995","unstructured":"Loucopoulos, P. and V. Karakostas (1995). System Requirements Engineering. London, UK, McGraw-Hill Book Co."},{"issue":"3","key":"2_CR35","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1287\/isre.9.3.233","volume":"9","author":"K. Lyytinen","year":"1998","unstructured":"Lyytinen, K., L. Mathiassen, et al. (1998b). \u201cAttention Shaping and Software Risk-A Categorical Analysis of Four Classical Approaches.\u201d Information Systems Research 9(3): 233\u2013255.","journal-title":"Information Systems Research"},{"issue":"3","key":"2_CR36","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1046\/j.1365-2575.1998.00037.x","volume":"8","author":"K. Lyytinen","year":"1998","unstructured":"Lyytinen, K., G. Rose, et al. (1998a). \u201cThe Brave New World of Development in the internet work computer architecture (InterNCA): or how distributed computing platforms will change systems development.\u201d Information Systems Journal 8(3): 241\u2013253.","journal-title":"Information Systems Journal"},{"key":"2_CR37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-1005-7","volume-title":"Requirements engineering","author":"L. Macaulay","year":"1996","unstructured":"Macaulay, L. (1996). Requirements engineering. London; New York, Springer."},{"key":"2_CR38","volume-title":"Ambiguity and choice in organizations","author":"J. G. March","year":"1976","unstructured":"March, J. G. and J. P. Olsen (1976). Ambiguity and choice in organizations. Bergen, Universitetsforlaget."},{"issue":"4","key":"2_CR39","first-page":"22","volume":"35","author":"M. L. Markus","year":"1994","unstructured":"Markus, M. L. and M. Keil (1994). \u201cIf We Build It, They Will Come: Designing Information Systems that Users Want to Use.\u201d Sloan Management Review 35(4): 22.","journal-title":"Sloan Management Review"},{"issue":"4","key":"2_CR40","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1108\/09593849610153403","volume":"9","author":"N. N. Mitev","year":"1996","unstructured":"Mitev, N. N. (1996). \u201cMore than a Failure? The Computerized Reservation Systems at French Railways.\u201d Information Technology & People 9(4): 8\u201319.","journal-title":"Information Technology & People"},{"issue":"4","key":"2_CR41","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/0959-8022(94)90022-1","volume":"4","author":"M. D. Myers","year":"1994","unstructured":"Myers, M. D. (1994). \u201cA Disaster for Everyone to See: An Interpretive Analysis of a Failed IS Project.\u201d Accounting, Management and Information Technologies 4(4): 185\u2013201.","journal-title":"Accounting, Management and Information Technologies"},{"key":"2_CR42","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0537-4","volume-title":"User-centered design of systems","author":"J. M. Noyes","year":"1999","unstructured":"Noyes, J. M. and C. Baber (1999). User-centered design of systems. London; New York, Springer."},{"key":"2_CR43","volume-title":"Power in organizations","author":"J. Pfeffer","year":"1981","unstructured":"Pfeffer, J. (1981). Power in organizations. Marshfield, Mass., Pitman Pub."},{"key":"2_CR44","volume-title":"Process-centered requirements engineering","author":"K. Pohl","year":"1996","unstructured":"Pohl, K. (1996). Process-centered requirements engineering. New York, NY, Wiley."},{"key":"2_CR45","unstructured":"Robinson, W. N., S. D. Pawlowski, et al. (1999). Requirements Interaction Management, Unpublished Working Paper, Department of Computer Information Systems, Georgia State University."},{"issue":"4","key":"2_CR46","first-page":"26","volume":"24","author":"M. Rosenwein","year":"1997","unstructured":"Rosenwein, M. (1997). \u201cThe Optimization Engine That Couldn\u2019t.\u201d OR\/MS Today 24(4): 26\u201329.","journal-title":"OR\/MS Today"},{"issue":"1","key":"2_CR47","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TSE.1977.229900","volume":"3","author":"D. Ross","year":"1977","unstructured":"Ross, D. (1977). \u201cStructured Analysis (SA): A Language for Communicating Ideas.\u201d IEEE Transactions on Software Engineering 3(1): 16\u201334.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR48","volume-title":"The sciences of the artificial","author":"H. A. Simon","year":"1996","unstructured":"Simon, H. A. (1996). The sciences of the artificial. Cambridge, Mass., MIT Press."},{"key":"2_CR49","volume-title":"Requirements engineering: a good practice guide","author":"I. Sommerville","year":"1997","unstructured":"Sommerville, I. and P. Sawyer (1997). Requirements engineering: a good practice guide. Chichester, England; New York, John Wiley & Sons."},{"key":"2_CR50","volume-title":"Plans and situated actions: the problem of human-machine communication","author":"L. A. Suchman","year":"1987","unstructured":"Suchman, L. A. (1987). Plans and situated actions: the problem of human-machine communication. Cambridge Cambridgeshire; New York, Cambridge University Press."},{"key":"2_CR51","volume-title":"Requirements engineering: frameworks for understanding","author":"R. Wieringa","year":"1996","unstructured":"Wieringa, R. (1996). Requirements engineering: frameworks for understanding. New York, NY, Wiley."}],"container-title":["Enterprise Information Systems VI"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-3675-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T19:51:50Z","timestamp":1619553110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-3675-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402036744"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/1-4020-3675-2_2","relation":{},"subject":[]}}