{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:42:11Z","timestamp":1725864131523},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319454795"},{"type":"electronic","value":"9783319454801"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45480-1_28","type":"book-chapter","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T15:08:20Z","timestamp":1472828900000},"page":"346-358","source":"Crossref","is-referenced-by-count":12,"title":["Practitioners\u2019 Perspectives on Change Impact Analysis for Safety-Critical Software \u2013 A Preliminary Analysis"],"prefix":"10.1007","author":[{"given":"Markus","family":"Borg","sequence":"first","affiliation":[]},{"given":"Jose Luis","family":"de la Vara","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Wnuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"issue":"6","key":"28_CR1","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1007\/s10664-013-9263-y","volume":"19","author":"E Bjarnason","year":"2014","unstructured":"Bjarnason, E., et al.: Challenges and practices in aligning requirements with verification and validation: a case study of six companies. Empir. Softw. Eng. 19(6), 1809\u20131855 (2014)","journal-title":"Empir. Softw. Eng."},{"key":"28_CR2","volume-title":"Software Change Impact Analysis","author":"S Bohner","year":"1996","unstructured":"Bohner, S., Arnold, R.: Software Change Impact Analysis. IEEE Press, Washington (1996)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Borg, M., Gotel, O., Wnuk, K.: Enabling traceability reuse for impact analyses: a feasibility study in a safety context. In: Proceedings of 7th International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 72\u201379 (2013)","DOI":"10.1109\/TEFSE.2013.6620158"},{"key":"28_CR4","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/978-3-642-45135-5_18","volume-title":"Recommendation Systems in Software Engineering","author":"M Borg","year":"2014","unstructured":"Borg, M., Runeson, P.: Changes, evolution, and bugs - recommendation systems for issue management. In: Robillard, M.P., et al. (eds.) Recommendation Systems in Software Engineering, pp. 477\u2013509. Springer, Berlin (2014)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Borg, M., et al.: A replicated study on duplicate detection: using apache lucene to search among android defects. In: Proceedings of 8th International Symposium on Empirical Software Engineering and Measurement (2014)","DOI":"10.1145\/2652524.2652556"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Cicchetti, A., et al.: Towards software assets origin selection supported by a knowledge repository. In: Proceedings of 1st International Workshop on Decision Making in Software Architecture (2016)","DOI":"10.1109\/MARCH.2016.11"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"de la Vara, JL., et al.: An industrial survey of safety evidence change impact analysis practice. Trans. Softw. Eng. (2016, to appear)","DOI":"10.1109\/TSE.2016.2553032"},{"key":"28_CR8","unstructured":"Klevin, A.: People, process and tools: a study of impact analysis in a change process. Master thesis, Lund University (2012). http:\/\/sam.cs.lth.se\/ExjobGetFile?id=434"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Lehnert, S.: A review of software change impact analysis. Technical report, Ilmenau University of Technology (2011)","DOI":"10.1145\/2024445.2024454"},{"key":"28_CR10","volume-title":"Engineering a Safer World","author":"N Leveson","year":"2011","unstructured":"Leveson, N.: Engineering a Safer World. The MIT Press, Cambridge (2011)"},{"issue":"8","key":"28_CR11","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1002\/stvr.1475","volume":"23","author":"B Li","year":"2013","unstructured":"Li, B., et al.: A survey of code-based change impact analysis techniques. Softw. Test. Verif. Reliab. 23(8), 613\u2013646 (2013)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"28_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2014.12.002","volume":"60","author":"S Nair","year":"2015","unstructured":"Nair, S., et al.: Evidence management for compliance of critical systems with safety standards: a survey on the state of practice. Inf. Softw. Technol. 60, 1\u201315 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Regan, G., et al.: Investigation of traceability within a medical device organization. In: Proceedings of 13th International Conference on Process Improvement and Capability Determination, pp. 211\u2013222 (2013)","DOI":"10.1007\/978-3-642-38833-0_19"},{"issue":"4","key":"28_CR14","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TSE.2008.32","volume":"34","author":"P Roveg\u00e5rd","year":"2008","unstructured":"Roveg\u00e5rd, P., Angelis, L., Wohlin, C.: An empirical study on views of importance of change impact analysis issues. IEEE Trans. Softw. Eng. 34(4), 516\u2013530 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"28_CR15","doi-asserted-by":"crossref","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering","author":"P Runeson","year":"2012","unstructured":"Runeson, P., et al.: Case Study Research in Software Engineering. Wiley, New York (2012)"},{"key":"28_CR16","volume-title":"Basics of Qualitative Research Techniques and Procedures for Developing Grounded Theory","author":"A Strauss","year":"1998","unstructured":"Strauss, A., Corbin, J.: Basics of Qualitative Research Techniques and Procedures for Developing Grounded Theory, 2nd edn. Sage Publications, Thousand Oaks (1998)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45480-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T04:47:15Z","timestamp":1568350035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45480-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319454795","9783319454801"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45480-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}