{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:12:57Z","timestamp":1748664777983,"version":"3.41.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255781"},{"type":"electronic","value":"9783319255798"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25579-8_17","type":"book-chapter","created":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T00:49:03Z","timestamp":1445215743000},"page":"291-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Problem-, Quality-, and Aspect-Oriented Requirements Engineering Method"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Fa\u00dfbender","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Meis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2001.936219","volume":"18","author":"H Hofmann","year":"2001","unstructured":"Hofmann, H., Lehner, F.: Requirements engineering as a success factor in software projects. IEEE Softw. 18, 58\u201366 (2001)","journal-title":"IEEE Softw."},{"key":"17_CR2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1080\/10864415.2004.11044320","volume":"9","author":"H Cavusoglu","year":"2004","unstructured":"Cavusoglu, H., Mishra, B., Raghunathan, S.: The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. Int. J. Electron. Commer. 9, 70\u2013104 (2004)","journal-title":"Int. J. Electron. Commer."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.cose.2012.06.007","volume":"31","author":"L Khansa","year":"2012","unstructured":"Khansa, L., Cook, D.F., James, T., Bruyaka, O.: Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Comput. Secur. 31, 750\u2013770 (2012)","journal-title":"Comput. Secur."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1109\/32.6191","volume":"14","author":"BW Boehm","year":"1988","unstructured":"Boehm, B.W., Papaccio, P.N.: Understanding and controlling software costs. IEEE Trans. Softw. Eng. 14, 1462\u20131477 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"unstructured":"Willis, R.: Hughes aircraft\u2019s widespread deployment of a continuously improving software process. AD-a358 993. Carnegie-Mellon University (1998)","key":"17_CR5"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.5381\/jot.2003.2.4.c7","volume":"2","author":"D Firesmith","year":"2003","unstructured":"Firesmith, D.: Specifying good requirements. J. Object Technol. 2, 77\u201387 (2003). http:\/\/www.jot.fm\/issues\/issue_2003_07\/column7","journal-title":"J. Object Technol."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"DL Parnas","year":"1972","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules. Commun. ACM 15, 1053\u20131058 (1972)","journal-title":"Commun. ACM"},{"key":"17_CR8","volume-title":"Problem Frames. Analyzing and structuring software development problems","author":"M Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley, New York (2001)"},{"unstructured":"Kreutzmann, H., Vollmer, S., Tekampe, N., Abromeit, A.: Protection profile for the gateway of a smart metering system. Technical report, BSI (2011)","key":"17_CR9"},{"unstructured":"OPEN meter project: requirements of AMI. Technical report, OPEN meter project (2009)","key":"17_CR10"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-15651-9_24","volume-title":"Computer Safety, Reliability, and Security","author":"D Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 317\u2013331. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"C\u00f4t\u00e9, I., Hatebur, D., Heisel, M., Schmidt, H.: UML4PF - a tool for problem-oriented requirements analysis. In: Proceedings of the 19th IEEE International Requirements Engineering Conference, pp. 349\u2013350. IEEE Computer Society (2011)","key":"17_CR12","DOI":"10.1109\/RE.2011.6051670"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-21640-4_3","volume-title":"Advanced Information Systems Engineering","author":"T Moser","year":"2011","unstructured":"Moser, T., Winkler, D., Heindl, M., Biffl, S.: Requirements management with semantic technology: an empirical study on automated requirements categorization and conflict analysis. In: Mouratidis, H., Rolland, C. (eds.) CAiSE 2011. LNCS, vol. 6741, pp. 3\u201317. Springer, Heidelberg (2011)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-540-75162-5_2","volume-title":"Transactions on Aspect-Oriented Software Development III","author":"A Sampaio","year":"2007","unstructured":"Sampaio, A., Rashid, A., Chitchyan, R., Rayson, P.: EA-Miner: towards automation in aspect-oriented requirements engineering. In: Rashid, A., Ak\u015fit, M. (eds.) Transactions on AOSD III. LNCS, vol. 4620, pp. 4\u201339. Springer, Heidelberg (2007)"},{"unstructured":"Baniassad, E., Clarke, S.: Finding aspects in requirements with Theme\/Doc. In: Early Aspects: Aspect-Oriented Requirements Engineering and Architecture Design, pp. 15\u201322 (2004). http:\/\/trese.cs.utwente.nl\/workshops\/early-aspects-2004\/workshop_papers.htm","key":"17_CR15"},{"doi-asserted-by":"crossref","unstructured":"Jackson, M., Zave, P.: Deriving specifications from requirements: an example. In: ICSE, pp. 15\u201324. ACM Press, USA (1995)","key":"17_CR16","DOI":"10.1145\/225014.225016"},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00766-011-0142-z","volume":"18","author":"A Rago","year":"2013","unstructured":"Rago, A., Marcos, C., Diaz-Pace, J.A.: Uncovering quality-attribute concerns in use case specifications via early aspect mining. Requirements Eng. 18, 67\u201384 (2013)","journal-title":"Requirements Eng."},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54069-1_1","volume-title":"Privacy Technologies and Policy","author":"K Beckers","year":"2014","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Meis, R.: A problem-based approach for computer-aided privacy threat identification. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 1\u201316. Springer, Heidelberg (2014)"},{"doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M.: From problems to laws in requirements engineering using model-transformation. In: ICSOFT 2013, pp. 447\u2013458. SciTePress (2013)","key":"17_CR19","DOI":"10.5220\/0004490804470458"},{"doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M., Meis, R.: Functional requirements under security PresSuRE. In: ICSOFT-PT 2014 - Proceedings of the 9th International Conference on Software Paradigm Trends, pp. 5\u201316. SciTePress (2014)","key":"17_CR20","DOI":"10.5220\/0005098600050016"},{"doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M., Meis, R.: Aspect-oriented requirements engineering with problem frames. In: ICSOFT-PT 2014 - Proceedings of the 9th International Conference on Software Paradigm Trends, pp. 145\u2013156. SciTePress (2014)","key":"17_CR21","DOI":"10.5220\/0005001801450156"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-05843-6_15","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"A Alebrahim","year":"2014","unstructured":"Alebrahim, A., Fa\u00dfbender, S., Heisel, M., Meis, R.: Problem-based requirements interaction analysis. In: Salinesi, C., van de Weerd, I. (eds.) REFSQ 2014. LNCS, vol. 8396, pp. 200\u2013215. Springer, Heidelberg (2014)"},{"key":"17_CR23","volume-title":"System Quality and Software Architecture","author":"A Alebrahim","year":"2014","unstructured":"Alebrahim, A., Choppy, C., Fa\u00dfbender, S., Heisel, M.: Optimizing functional and quality requirements according to stakeholders\u2019 goals. In: Mistrik, I. (ed.) System Quality and Software Architecture. Elsevier, Amsterdam (2014)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16086-8_1","volume-title":"Transactions on Aspect-Oriented Software Development VII","author":"J Kienzle","year":"2010","unstructured":"Kienzle, J., Guelfi, N., Mustafiz, S.: Crisis management systems: a case study for aspect-oriented modeling. In: Katz, S., Mezini, M., Kienzle, J. (eds.) Transactions on Aspect-Oriented Software Development VII. LNCS, vol. 6210, pp. 1\u201322. Springer, Heidelberg (2010)"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-642-16086-8_10","volume-title":"Transactions on Aspect-Oriented Software Development VII","author":"D Landuyt Van","year":"2010","unstructured":"Van Landuyt, D., Truyen, E., Joosen, W.: Discovery of stable abstractions for aspect-oriented composition in the car crash management domain. In: Katz, S., Mezini, M., Kienzle, J. (eds.) Transactions on Aspect-Oriented Software Development VII. LNCS, vol. 6210, pp. 375\u2013422. Springer, Heidelberg (2010)"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-16086-8_2","volume-title":"Transactions on Aspect-Oriented Software Development VII","author":"G Mussbacher","year":"2010","unstructured":"Mussbacher, G., Amyot, D., Ara\u00fajo, J., Moreira, A.: Requirements modeling with the aspect-oriented user requirements notation (AoURN): a case study. In: Katz, S., Mezini, M., Kienzle, J. (eds.) Transactions on Aspect-Oriented Software Development VII. LNCS, vol. 6210, pp. 23\u201368. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Rashid, A.: Aspect-oriented requirements engineering: an introduction. In: Proceedings of the 16th IEEE International Requirements Engineering Conference, pp. 306\u2013309. IEEE Computer Society (2008)","key":"17_CR27","DOI":"10.1109\/RE.2008.58"},{"unstructured":"Yu, Y., Cesar, J., Leite, S.P., Mylopoulos, J.: From goals to aspects: discovering aspects from requirements goal models. In: Proceedings of the 12th IEEE International Requirements Engineering Conference, pp. 38\u201347. IEEE Computer Society (2004)","key":"17_CR28"},{"key":"17_CR29","volume-title":"Aspect-Oriented Software Development with Use Cases","author":"I Jacobson","year":"2004","unstructured":"Jacobson, I., Ng, P.W.: Aspect-Oriented Software Development with Use Cases. Addison-Wesley Professional, Englewood Cliffs (2004)"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1049\/ip-sen:20040921","volume":"151","author":"J Whittle","year":"2004","unstructured":"Whittle, J., Araujo, J.: Scenario modelling with aspects. IEE Proc. Softw. 151, 157\u2013171 (2004)","journal-title":"IEE Proc. Softw."},{"doi-asserted-by":"crossref","unstructured":"Sutton, Jr., S.M., Rouvellou, I.: Modeling of software concerns in cosmos. In: Proceedings of the 1st International Conference on Aspect-oriented Software Development, AOSD 2002, pp. 127\u2013133. ACM, New York (2002)","key":"17_CR31","DOI":"10.1145\/508397.508402"},{"key":"17_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11431855_21","volume-title":"Advanced Information Systems Engineering","author":"A Moreira","year":"2005","unstructured":"Moreira, A., Ara\u00fajo, J., Rashid, A.: A concern-oriented requirements engineering model. In: Pastor, \u00d3., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Grundy, J.C.: Aspect-oriented requirements engineering for component-based software systems. In: Proceedings of the IEEE International Symposium on Requirements Engineering, pp. 84\u201391. IEEE Computer Society, Washington (1999)","key":"17_CR33","DOI":"10.1109\/ISRE.1999.777988"},{"doi-asserted-by":"crossref","unstructured":"Alrajeh, D., Kramer, J., Russo, A., Uchitel, S.: Learning operational requirements from goal models. In: IEEE 31st International Conference on Software Engineering, pp. 265\u2013275. IEEE Computer Society (2009)","key":"17_CR34","DOI":"10.1109\/ICSE.2009.5070527"},{"key":"17_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-40511-2_19","volume-title":"Availability, Reliability, and Security in Information Systems and HCI","author":"NG Mohammadi","year":"2013","unstructured":"Mohammadi, N.G., Alebrahim, A., Weyer, T., Heisel, M., Pohl, K.: A framework for combining problem frames and goal models to support context analysis during requirements engineering. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8127, pp. 272\u2013288. Springer, Heidelberg (2013)"},{"key":"17_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-40511-2_13","volume-title":"Availability, Reliability, and Security in Information Systems and HCI","author":"K Beckers","year":"2013","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Paci, F.: Combining goal-oriented and problem-oriented requirements engineering methods. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8127, pp. 178\u2013194. Springer, Heidelberg (2013)"},{"key":"17_CR37","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.scico.2010.04.013","volume":"75","author":"JM Conejero","year":"2010","unstructured":"Conejero, J.M., Hernandez, J., Jurado, E., van den Berg, K.: Mining early aspects based on syntactical and dependency analyses. Sci. Comput. Program. 75, 1113\u20131141 (2010)","journal-title":"Sci. Comput. Program."},{"doi-asserted-by":"crossref","unstructured":"Lencastre, M., Moreira, A., Ara\u00fajo, J., Castro, J.: Aspects composition in problem frames. In: Proceedings of the 16th IEEE International Requirements Engineering Conference, pp. 343\u2013344. IEEE Computer Society (2008)","key":"17_CR38","DOI":"10.1109\/RE.2008.20"}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25579-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T02:13:01Z","timestamp":1748657581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25579-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255781","9783319255798"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25579-8_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}