{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:37:46Z","timestamp":1747802266697,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319161006"},{"type":"electronic","value":"9783319161013"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16101-3_2","type":"book-chapter","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T06:52:36Z","timestamp":1426229556000},"page":"17-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Supporting the Validation of Adequacy in Requirements-Based Hazard Mitigations"],"prefix":"10.1007","author":[{"given":"Bastian","family":"Tenbergen","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Weyer","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Pohl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"2_CR1","volume-title":"Safeware: System Safety and Computers","author":"L Leveson","year":"1995","unstructured":"Leveson, L.: Safeware: System Safety and Computers. Addison-Wesley, Boston (1995)"},{"key":"2_CR2","first-page":"27","volume":"3","author":"D Firesmith","year":"2004","unstructured":"Firesmith, D.: Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. J. Obj. Tech. 3, 27\u201342 (2004)","journal-title":"J. Obj. Tech."},{"key":"2_CR3","volume-title":"Engineering a Safer World","author":"L Leveson","year":"2011","unstructured":"Leveson, L.: Engineering a Safer World. MIT Press, Boston (2011)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Allenby, K., Kelly, T.: Deriving safety requirements using scenarios. In: Proc. 5th Int. Symp. Requirements Eng., pp. 228\u2013235 (2001)","DOI":"10.1109\/ISRE.2001.948563"},{"key":"2_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/0471739421","volume-title":"Hazard Analysis Techniques for System Safety","author":"C Ericson II","year":"2005","unstructured":"Ericson II, C.: Hazard Analysis Techniques for System Safety. Wiley, New York (2005)"},{"key":"2_CR6","unstructured":"ARP4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment. SAE International (1996)"},{"key":"2_CR7","unstructured":"ISO26262: Road Vehicles - Functional Safety. International Organization for Standardization (2011)"},{"key":"2_CR8","unstructured":"Bishop, P., Bloomfield, R., Guerra, S: The future of goal-based assurance cases. In: Proc. Workshop on Assurance Cases, pp. 390\u2013395 (2004)"},{"key":"2_CR9","unstructured":"Whyte,D.: Moving the goalposts: the deregulation of safety in the post-piper alpha offshore oil industry. In: Proc. 47th Ann. Conf. Political Studies Assoc. of the UK (1997)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., Wayssyng, A., Kelly, T., Comar, C., Jones, P.: Certifiably safe software-dependent systems: challenges and directions. In: Proc. Future Softw. Eng., pp. 182\u2013200 (2014)","DOI":"10.1145\/2593882.2593895"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MS.1984.233702","volume":"1","author":"B Boehm","year":"1984","unstructured":"Boehm, B.: Verifying and Validating Software Requirements and Design Specifications. IEEE Softw. 1, 75\u201388 (1984)","journal-title":"IEEE Softw."},{"key":"2_CR12","unstructured":"Glinz, M.: Improving the quality of requirements with scenarios. In: Proc 2nd World Cong. Softw. Qual., pp. 55\u201360 (2000)"},{"key":"2_CR13","unstructured":"ISO\/IEC 25010: Systems and software Quality Requirements and Evaluation (SQuaRE) \u2013 System and software quality models. International Organization for Standardization (2011)"},{"key":"2_CR14","volume-title":"Software Engineering Economics","author":"B Boehm","year":"1981","unstructured":"Boehm, B.: Software Engineering Economics. Prentice Hall, Englewood Cliffs (1981)"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Glinz, M., Fricker, S.: On Shared Understanding in Software Enigneering. Computer Sci. Res. Dev. doi:10.1007\/s00450-014-0256-x","DOI":"10.1007\/s00450-014-0256-x"},{"key":"2_CR16","unstructured":"Gacitua, R., Ma, L., Nuseibeh, B., Piwek, P., de Roeck, A., Rouncefield, M., Sawyer, P., Willis, A., Yang, H.: Making tacit requirements explicit. In: Proc. 2nd Int. Workshop on Manag. Req. Knowl., pp. 85\u201388 (2009)"},{"key":"2_CR17","unstructured":"Lisagor, I., Sun, L., Kelly, T.: The illusion of method: challenges of model-based safety assessment. In: Proc. 28th Int. Syst. Safety Conf. (2010)"},{"key":"2_CR18","unstructured":"Sun, K.: Establishing Confidence in Safety Assessment Evidence. Dissertation, Univ. of York (2012)"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1111\/j.1365-2575.1994.tb00051.x","volume":"4","author":"D Flynn","year":"1994","unstructured":"Flynn, D., Warhurst, R.: An Empirical Study of the Validation Process within Requirements Determination. Inf. Syst. J. 4, 185\u2013212 (1994)","journal-title":"Inf. Syst. J."},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.datak.2005.07.007","volume":"58","author":"I Davies","year":"2006","unstructured":"Davies, I., Green, P., Rosemann, M., Idulska, M., Gallo, S.: How do Practitioners use Conceptual Modeling in Practice? Data & Knowl. Eng. 58, 358\u2013380 (2006)","journal-title":"Data & Knowl. Eng."},{"key":"2_CR21","unstructured":"US FAA: Introduction to TCAS II, Version 7.1. (2011). http:\/\/goo.gl\/EPCYzI"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Glinz, M.: On non-functional requirements. In: Proc. IEEE Int. Requirements Eng. Conf., pp. 21\u201326 (2007)","DOI":"10.1109\/RE.2007.45"},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional Requirements in Software Engineering","author":"L Chung","year":"2000","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-functional Requirements in Software Engineering. Kluwer, Boston (2000)"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00766-011-0144-x","volume":"17","author":"E Sikora","year":"2012","unstructured":"Sikora, E., Tenbergen, B., Pohl, K.: Industry Needs and Research Directions in Requirements Engineering for Embedded Systems. Requirements Eng. 17, 57\u201378 (2012)","journal-title":"Requirements Eng."},{"key":"2_CR25","unstructured":"St\u00f6rrle, H.: Semantics of UML 2.0 activities. In: Proc. IEEE Symp. Visual Lang. and Human-Centric Computing, pp.235\u2013242 (2004)"},{"key":"2_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering \u2013 An Introduction","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6chst, M., Ohlson, M., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering \u2013 An Introduction. Springer, Heidelberg (2012)"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sci. 39, 273\u2013315 (2008)","journal-title":"Decision Sci."},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1111\/j.1540-5915.1998.tb01346.x","volume":"29","author":"D Goodhue","year":"1998","unstructured":"Goodhue, D.: Development and Measurement Validity of a Task-Technology Fit Instrument for User Evaluations or Information Systems. Decision Sci. 29, 105\u2013138 (1998)","journal-title":"Decision Sci."},{"key":"2_CR29","unstructured":"Denger, C.: SafeSpection \u2014 A Framework for Systematization and Customization of Software Hazard Identification by Applying Inspection Concepts. Dissertation, TU Kaiserslautern (2009)"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1147\/sj.153.0182","volume":"3","author":"M Fagan","year":"1976","unstructured":"Fagan, M.: Design and Code Inspections to Reduce Errors in Program Development. IBM Syst. J. 3, 182\u2013211 (1976)","journal-title":"IBM Syst. J."},{"key":"2_CR31","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/2.869376","volume":"33","author":"F Shull","year":"2000","unstructured":"Shull, F., Rus, I., Basili, V.: How Perspective-Based Reading Can Improve Requirements Inspections. IEEE Computer 33, 73\u201379 (2000)","journal-title":"IEEE Computer"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Li Q, Boehm B, Yang Y, Wang Q: A value-based review process for prioritizing artifacts. In: Proc. Int. Conf. Softw. Syst. Process, pp. 13\u201323 (2011)","DOI":"10.1145\/1987875.1987881"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-45416-0_18","volume-title":"Computer Safety, Reliability and Security","author":"F Bitsch","year":"2001","unstructured":"Bitsch, F.: Safety patterns - the key to formal specification of safety requirements. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol. 2187, pp. 176\u2013189. Springer, Heidelberg (2001)"},{"key":"2_CR34","first-page":"927","volume":"24","author":"C Heitmeyer","year":"1998","unstructured":"Heitmeyer, C., Kirby Jr., J., Labaw, B., Archer, M., Bharadwaj, R.: Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. IEEE TSE 24, 927\u2013948 (1998)","journal-title":"IEEE TSE"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Zafar, S., Dromey, R.: Integrating safety and security requirements into design of an embedded system. In: Proc. 12th Asia-Pacific Soft. Eng. Conf., pp. 1530\u20131362 (2005)","DOI":"10.1109\/APSEC.2005.75"},{"key":"2_CR36","series-title":"The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-0-387-73947-2_20","volume-title":"Situational Method Engineering: Fundamentals and Experiences","author":"G Sindre","year":"2007","unstructured":"Sindre, G.: A look at misuse cases for safety concerns. In: Ralyt\u00e9, J., Brinkkemper, J., Henderson-Sellers, B. (eds.) Situational Method Engineering: Fundamentals and Experiences. IFIP, vol. 244, pp. 252\u2013266. Springer, Heidelberg (2007)"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Katta, V., Raspotnig, C., Karpati, P., St\u00e5lhane, T.: Requirements management in a combined process for safety and security assessments. In: Proc. Intl. Conf. on Availability, Rel., and Security, pp. 780\u2013786 (2013)","DOI":"10.1109\/ARES.2013.104"},{"key":"2_CR38","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1016\/j.jss.2012.12.002","volume":"86","author":"C Raspotnig","year":"2013","unstructured":"Raspotnig, C., Opdahl, A.: Comparing Risk Identification Techniques for Safety and Security Requirements. J. Sys. Softw. 86, 1124\u20131151 (2013)","journal-title":"J. Sys. Softw."},{"key":"2_CR39","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"A van Lamsweerde","year":"2009","unstructured":"van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, New York (2009)"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Letier, E., van Lamsweerde,A.: Deriving operational software specifications from system goals. In: Proc. Future of Softw. Eng., pp. 119\u2013128 (2002)","DOI":"10.1145\/605466.605485"},{"key":"2_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-75101-4_27","volume-title":"Computer Safety, Reliability, and Security","author":"F Belli","year":"2007","unstructured":"Belli, F., Hollmann, A., Nissanke, N.: Modeling, analysis and testing of safety issues - an event-based approach and case study. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 276\u2013282. Springer, Heidelberg (2007)"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Chen, Z., Motet, G: Formalizing safety requirements using controlling automata. In: Proc. 2nd Int. Conf. Depend., pp. 81\u201386 (2009)","DOI":"10.1109\/DEPEND.2009.18"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Guillerm, R., Sadou, N., Demmou,H.: Combining FMECA and fault trees for declining safety requirements of complex systems. In: Proc. Ann. Europ. Safety and Rel. Conf., pp. 1287\u20131293 (2011)","DOI":"10.1201\/b11433-182"},{"key":"2_CR44","first-page":"573","volume":"24","author":"K Hansen","year":"1998","unstructured":"Hansen, K., Ravn, A., Stavridou, V.: From Safety Analysis to Software Requirements. IEEE TSE 24, 573\u2013584 (1998)","journal-title":"IEEE TSE"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16101-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T23:19:34Z","timestamp":1747783174000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16101-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161006","9783319161013"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16101-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}