{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:38:33Z","timestamp":1743071913901,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319161006"},{"type":"electronic","value":"9783319161013"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16101-3_1","type":"book-chapter","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T06:52:36Z","timestamp":1426229556000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Experimental Validation of a Risk Assessment Method"],"prefix":"10.1007","author":[{"given":"Eelco","family":"Vriezekolk","sequence":"first","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Wieringa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Bartha, P.: By Parallel Reasoning. Oxford University Press (2010)","DOI":"10.1093\/acprof:oso\/9780195325539.001.0001"},{"issue":"4","key":"1_CR2","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/s00766-002-0160-y","volume":"8","author":"MS Feather","year":"2003","unstructured":"Feather, M.S., Cornford, S.L.: Quantitative risk-based requirements reasoning. Requirements Engineering 8(4), 248\u2013265 (2003)","journal-title":"Requirements Engineering"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Franqueira, V.N., Tun, T.T., Yu, Y., Wieringa, R., Nuseibeh, B.: Risk and argument: a risk-based argumentation method for practical security. In: 2011 19th IEEE International Requirements Engineering Conference (RE), pp. 239\u2013248. IEEE (2011)","DOI":"10.1109\/RE.2011.6051659"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ghaisas, S., Rose, P., Daneva, M., Sikkel, K.: Generalizing by similarity: Lessons learnt from industrial case studies. In: 1st International Workshop on Conducting Empirical Studies in Industry (CESI), pp. 37\u201342 (2013)","DOI":"10.1109\/CESI.2013.6618468"},{"issue":"6","key":"1_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MS.2006.147","volume":"23","author":"T Gorschek","year":"2006","unstructured":"Gorschek, T., Garre, P., Larsson, S., Wohlin, C.: A model for technology transfer in practice. IEEE Software 23(6), 88\u201395 (2006)","journal-title":"IEEE Software"},{"issue":"1","key":"1_CR6","doi-asserted-by":"crossref","first-page":"23","DOI":"10.20982\/tqmp.08.1.p023","volume":"8","author":"KA Hallgren","year":"2012","unstructured":"Hallgren, K.A.: Computing inter-rater reliability for observational data: An overview and tutorial. Tutorials in Quantitative Methods for Psychology 8(1), 23 (2012)","journal-title":"Tutorials in Quantitative Methods for Psychology"},{"key":"1_CR7","unstructured":"Herrmann, A.: Information need of IT risk estimation - qualitative results from experiments. In: Proceedings of the REFSQ 2011 RePriCo Workshop, pp. 72\u201384 (2011)"},{"key":"1_CR8","unstructured":"Herrmann, A.: REFSQ 2011 live experiment about risk-based requirements prioritization: The influence of wording and metrics. In: Proceedings of REFSQ 2011, pp. 176\u2013194 (2011)"},{"issue":"6","key":"1_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1007\/s10664-009-9105-0","volume":"14","author":"A Herrmann","year":"2009","unstructured":"Herrmann, A., Paech, B.: Practical challenges of requirements prioritization based on risk estimation. Empirical Software Engineering 14(6), 644\u2013684 (2009)","journal-title":"Empirical Software Engineering"},{"issue":"3","key":"1_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1023\/A:1026586415054","volume":"5","author":"M H\u00f6st","year":"2000","unstructured":"H\u00f6st, M., Regnell, B., Wohlin, C.: Using students as subjects\u2013a comparative study of students and professionals in lead-time impact assessment. Empirical Software Engineering 5(3), 201\u2013214 (2000)","journal-title":"Empirical Software Engineering"},{"key":"1_CR11","unstructured":"IEC: Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA). International Standard 60812:2006 (2006)"},{"key":"1_CR12","unstructured":"ISO: Risk management - principles and guidelines. International Standard 31000 (2009)"},{"key":"1_CR13","unstructured":"Kerckhoffs Institute: The Kerckhoffs masters programme. http:\/\/www.kerchoffs-institute.org\/ Last accessed 2014\u201307-10"},{"key":"1_CR14","unstructured":"Krippendorff, K.: Calculation of alpha over partitions (Private communication)"},{"key":"1_CR15","unstructured":"Krippendorff, K.: Content analysis: an introduction to its methodology. 2nd edn. Sage Publications (2004)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-319-05843-6_12","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"B Ojameruaye","year":"2014","unstructured":"Ojameruaye, B., Bahsoon, R.: Systematic elaboration of compliance requirements using compliance debt and portfolio theory. In: Salinesi, C., van de Weerd, I. (eds.) REFSQ 2014. LNCS, vol. 8396, pp. 152\u2013167. Springer, Heidelberg (2014)"},{"key":"1_CR17","unstructured":"Runeson, P.: Using students as experiment subjects-an analysis on graduate and freshmen student data. In: Proceedings of the 7th International Conference on Empirical Assessment in Software Engineering.-Keele University, UK, pp. 95\u2013102. Citeseer (2003)"},{"key":"1_CR18","unstructured":"Shadish, W., Cook, T., Campbell, D.: Experimental and Quasi-Experimental Designs for Generalized Causal Inference. Houghton Mifflin Company (2002)"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"741","DOI":"10.2307\/1341662","volume":"106","author":"C Sunstein","year":"1993","unstructured":"Sunstein, C.: On analogical reasoning. Harvard Law Review 106, 741\u2013790 (1993)","journal-title":"Harvard Law Review"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Svahnberg, M., Aurum, A., Wohlin, C.: Using students as subjects-an empirical evaluation. In: Proceedings of the Second ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 288\u2013290. ACM (2008)","DOI":"10.1145\/1414004.1414055"},{"key":"1_CR21","unstructured":"Vriezekolk, E.: Testing reliability of Raster - report of experiment with Kerckhoffs students. Technical report, University of Twente (2014)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Vriezekolk, E., Wieringa, R., Etalle, S.: A new method to assess telecom service availability risks. In: Mendonca, D., Dugdale, J. (eds.) Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management ISCRAM2011 (2011)","DOI":"10.1201\/b11433-377"},{"key":"1_CR23","unstructured":"Vriezekolk, E., Wieringa, R., Etalle, S.: Design and initial validation of the Raster method for telecom service availability risk assessment. In: Rothkrantz, L., Ristvej, J., Franco, Z. (eds.) Proceedings of the 9th International Conference on Information Systems for Crisis Response and Management ISCRAM2012 (2012)"},{"key":"1_CR24","unstructured":"Vriezekolk, E.: Raster documentation website http:\/\/wwwhome.ewi.utwente.nl\/~vriezekolk\/Raster\/"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Wieringa, R.: Design Science Methodology for Information Systems and Software Engineering. Springer (2014)","DOI":"10.1007\/978-3-662-43839-8"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Willner, P.: Methods for assessing the validity of animal models of human psychopathology. In: Boulton, A., Baker, G., Martin-Iverson, M. (eds.) Animal Models in Psychiatry, I, Neuromethods vol. 18, pp. 1\u201323. Humana Press (1991)","DOI":"10.1385\/0-89603-198-5:1"},{"key":"1_CR27","unstructured":"Yin, R.K.: Case study research: design and methods - fourth edition. Sage Publications (2009)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16101-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T22:48:41Z","timestamp":1676933321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16101-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161006","9783319161013"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16101-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}