{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:24:10Z","timestamp":1743089050983,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":16,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461449508"},{"type":"electronic","value":"9781461449515"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-4951-5_25","type":"book-chapter","created":{"date-parts":[[2013,10,25]],"date-time":"2013-10-25T19:26:00Z","timestamp":1382729160000},"page":"305-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["What Users Do: SA&amp;D with the ATSA Method"],"prefix":"10.1007","author":[{"given":"Robert B. K.","family":"Brown","sequence":"first","affiliation":[]},{"given":"Ian C.","family":"Piper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,12]]},"reference":[{"key":"25_CR00251","unstructured":"Brown RBK (2010) The ATSA method for specifying both system and user interface requirements. Ph.D. thesis, University of Wollongong, Australia"},{"key":"25_CR00252","unstructured":"Brown RBK, Hyland P, Piper IC (2006) Specifying system requirements using the 5S method. ACIS 2006 proceedings, Paper 100. http:\/\/aisel.aisnet.org\/acis2006\/100"},{"key":"25_CR00253","volume-title":"Software for use a practical guide to the models and methods of usage-centred design","author":"LL Constantine","year":"1999","unstructured":"Constantine LL, Lockwood LAD (1999) Software for use a practical guide to the models and methods of usage-centred design. Addison-Wesley, Boston"},{"key":"25_CR00254","unstructured":"Crear J (2009) CIO Standish Group. http:\/\/www1.standishgroup.com\/newsroom\/chaos_2009.php. Accessed 24 Mar 2010"},{"key":"25_CR00255","volume-title":"Learning by expanding: an activity-theoretical approach to developmental research","author":"Y Engstr\u00f6m","year":"1987","unstructured":"Engstr\u00f6m Y (1987) Learning by expanding: an activity-theoretical approach to developmental research. Orienta-Konsultit Oy, Helsinki"},{"key":"25_CR00256","first-page":"529","volume-title":"Information systems research: contemporary approaches and emergent traditions","author":"K Kuutti","year":"1991","unstructured":"Kuutti K (1991) Activity theory and its applications to information systems research and development. In: Nissen HE, Klein HK, Hirsheims R (eds) Information systems research: contemporary approaches and emergent traditions. Elsevier Science, Amsterdam, pp 529\u2013549"},{"key":"25_CR00257","volume-title":"Activity, consciousness, and personality","author":"AN Leont\u2019ev","year":"1978","unstructured":"Leont\u2019ev AN (1978) Activity, consciousness, and personality. Prentice Hall, Englewood Cliffs"},{"key":"25_CR00258","unstructured":"Martins LEG, Daltrini BM (1999) An approach to software requirements elicitation using precepts from activity theory. Fourth IEEE international conference on automated software engineering, pp15\u201323"},{"key":"25_CR00259","unstructured":"OASIG (1995) in http:\/\/www.it-cortex.com\/Stat_Failure_Rate.htm#The%20OASIG%20Study%20. Rudin W (1976). Accessed 15 Mar 2007"},{"key":"25_CR002510","unstructured":"Otwell A (2005) Activity theory and user-centered design. Blog: heyblog: a space for half-formed thoughts. (July 29, 2005). http:\/\/www.heyotwell.com\/heyblog\/archives\/2005\/07\/activity_theory.html. Accessed 20 Aug 2008"},{"key":"25_CR002511","doi-asserted-by":"crossref","unstructured":"R\u00e4s\u00e4nen M, Nyce JM (2006) A new role for anthropology? \u2013 Rewriting \u2018Context\u2019 and \u2018Analysis\u2019 in HCI. Nordic conference on human-computer interaction: changing roles (NORDICHI\u201906), Oslo, Norway, Proceedings New York, NY, USA. ACM Press, pp 175\u2013184","DOI":"10.1145\/1182475.1182494"},{"key":"25_CR002512","doi-asserted-by":"crossref","unstructured":"Sommerville I, Sawyer P, Viller S (1998) Viewpoints for requirements elicitation: a practical approach. In: Proceedings of the 3rd IEEE international conference on requirements engineering (ICRE\u201998), Colorado Springs, USA, pp 74\u201381","DOI":"10.1109\/ICRE.1998.667811"},{"key":"25_CR002513","unstructured":"The Standish Group (1995) The CHAOS report (1994). http:\/\/www.standishgroup.com\/sample_research\/chaos_1994_1.php. Accessed 24 Mar 2010"},{"key":"25_CR002514","volume-title":"Information systems and activity theory: tools in context","author":"I Verenikina","year":"1998","unstructured":"Verenikina I, Gould E (1998) Cultural-historical psychology and activity theory. In: Hasan H, Gould E, Hyland P (eds) Information systems and activity theory: tools in context, 1st edn. University of Wollongong Press, Wollongong","edition":"1"},{"key":"25_CR002515","unstructured":"Vrazalic L (2004) Towards holistic human-computer interaction evaluation research and practice: development and validation of the distributed usability evaluation method. Ph.D. thesis, University of Wollongong, Australia"},{"key":"25_CR002516","volume-title":"Mind in society","author":"LS Vygotsky","year":"1978","unstructured":"Vygotsky LS (1978) Mind in society. Harvard University Press, Cambridge, MA"}],"container-title":["Information Systems Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-4951-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T15:39:43Z","timestamp":1681486783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-4951-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9781461449508","9781461449515"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-4951-5_25","relation":{},"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"12 April 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}