{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:03:57Z","timestamp":1743033837668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030146863"},{"type":"electronic","value":"9783030146870"}],"license":[{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14687-0_3","type":"book-chapter","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T01:35:21Z","timestamp":1552872921000},"page":"24-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Affordance Theory Applied to Agile Development: A Case Study of LC2EVO"],"prefix":"10.1007","author":[{"given":"Hamna","family":"Aslam","sequence":"first","affiliation":[]},{"given":"Joseph Alexander","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Angelo","family":"Messina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,19]]},"reference":[{"key":"3_CR1","unstructured":"Aslam H, Brown JA, Reading E (2018) Player age and affordance theory in game design. In: King D, (ed.) Proceedings of the 19th international conference on intelligent games and simulations, GAME-ON 2018. Eurosis, pp 27\u201334"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1744-6570.1991.tb00688.x","volume":"44","author":"MR Barrick","year":"1991","unstructured":"Barrick MR, Mount MK (1991) The big five personality dimensions and job performance: a meta-analysis. Pers Psychol 44(1):1\u201326","journal-title":"Pers Psychol"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Benedicenti L, Cotugno F, Ciancarini P, Messina A, Pedrycz W, Sillitti A, Succi G (2016) Applying scrum to the army: a case study. In: Proceedings of the 38th international conference on software engineering companion. ACM, pp 725\u2013727","DOI":"10.1145\/2889160.2892652"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Benedicenti L, Messina A, Sillitti A (2017) iAgile: mission critical military software development. In: 2017 international conference on high performance computing & simulation (HPCS). IEEE, pp 545\u2013552","DOI":"10.1109\/HPCS.2017.87"},{"key":"3_CR5","unstructured":"Bentham J (1995) Panopticon; or the inspection-house: Containing the idea of a new principle of construction applicable to any sort of establishment, in which persons of any description are to be kept under inspection; and in particular to penitentiary-houses, prisons, houses of industry, work-houses, poor-houses, lazarettos, manufactories, hospitals, mad-houses, and schools: With a plan of management adapted to the principle: in a series of letters, written in the year 1787, from Crecheff in white russia to a friend in England. In: Bozovic M (ed) The panopticon writing. Verso, London, pp 29\u201395"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Boschi F, Aslam H, Brown JA (2018) Player perceptions of fairness in oddly shaped dice. In: Proceedings of the 13th international conference on the foundations of digital games, no 58. ACM","DOI":"10.1145\/3235765.3236389"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Colonese E (2016) Agile: the human factors as the weakest link in the chain. In: Proceedings of 4th international conference in software engineering for defence applications. Springer, pp 59\u201373","DOI":"10.1007\/978-3-319-27896-4_6"},{"key":"3_CR8","unstructured":"Cotugno F, Messina A (2014) Implementing scrum in the army general staff environment. In: The 3rd international conference in software engineering for defence applications-SEDA, Roma, Italy, pp 22\u201323"},{"key":"3_CR9","unstructured":"Cotugno FR, Messina A (2014) Adapting scrum to the Italian army: methods and (open) tools. In: IFIP international conference on open source systems. Springer, pp 61\u201369"},{"key":"3_CR10","unstructured":"Fertalj K, Katic M (2008) An overview of modern software development methodologies. In: 19th central european conference on information and intelligent systems"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Gibson JJ (2014) The ecological approach to visual perception: classic edition. Psychology Press, New York\/London","DOI":"10.4324\/9781315740218"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10639-009-9106-z","volume":"15","author":"M Hammond","year":"2010","unstructured":"Hammond M (2010) What is an affordance and can it help us understand the use of ICT in education? Educ Inf Technol 15(3):205\u2013217","journal-title":"Educ Inf Technol"},{"key":"3_CR13","unstructured":"Marr D (1982) Vision: a computational approach"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Messina A, Fiore F (2016) The Italian army C2 evolution: from the current SIACCON2 land command & control system to the LC2EVO using \u201cagile\u201d software development methodology. In: Military communications and information systems (ICMCIS). IEEE, pp 1\u20138","DOI":"10.1109\/ICMCIS.2016.7496585"},{"key":"3_CR15","volume-title":"The design of everyday things: revised and expanded edition","author":"D Norman","year":"2013","unstructured":"Norman D (2013) The design of everyday things: revised and expanded edition. Basic Books (AZ), New York City"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Petersen K, Wohlin C, Baca D (2009) The waterfall model in large-scale development. In: International conference on product-focused software process improvement. Springer, pp 386\u2013400","DOI":"10.1007\/978-3-642-02152-7_29"},{"issue":"1","key":"3_CR17","first-page":"48","volume":"54","author":"DJ Pittenger","year":"1993","unstructured":"Pittenger DJ (1993) Measuring the MBTI $$\\ldots $$ and coming up short. J Career Plan Employ 54(1):48\u201352","journal-title":"J Career Plan Employ"},{"key":"3_CR18","unstructured":"Royce WW (1987) Managing the development of large software systems: concepts and techniques. In: Proceedings of the 9th international conference on software engineering. IEEE Computer Society Press, pp 328\u2013338"},{"issue":"1","key":"3_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/00220410710723911","volume":"63","author":"E Sadler","year":"2007","unstructured":"Sadler E, Given LM (2007) Affordance theory: a framework for graduate students\u2019 information behavior. J Doc 63(1):115\u2013141","journal-title":"J Doc"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 6th International Conference in Software Engineering for Defence Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14687-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T13:38:23Z","timestamp":1574343503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14687-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,19]]},"ISBN":["9783030146863","9783030146870"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14687-0_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,19]]},"assertion":[{"value":"19 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference in Software Engineering for Defence Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"seda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sedaconference.eu\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}