{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T15:40:07Z","timestamp":1751730007760,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951706"},{"type":"electronic","value":"9783319951713"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95171-3_37","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T19:49:47Z","timestamp":1530647387000},"page":"474-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Methodology for Effective Requirements Elicitation and Modeling"],"prefix":"10.1007","author":[{"given":"Rajat","family":"Goel","sequence":"first","affiliation":[]},{"given":"Mahesh Chandra","family":"Govil","sequence":"additional","affiliation":[]},{"given":"Girdhari","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Neetu Kumari, S., Pillai, A.S.: A survey on global requirements elicitation issues and proposed research framework. In: Proceedings of IEEE International Conference on Software Engineering Service Science, ICSESS, pp. 554\u2013557 (2013)","DOI":"10.1109\/ICSESS.2013.6615370"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Kamata, M.I., Tamai, T.: How does requirements quality relate to project success or failure. In: Requirements Engineering Conference, pp. 69\u201378 (2007)","DOI":"10.1109\/RE.2007.31"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez, U.I., Rodr\u00edguez, F.J.\u00c1., Martin, M.V.: Use processes - modeling requirements based on elements of BPMN and UML use case diagrams. In: 2010 2nd International Conference on Software Technology and Engineering (ICSTE), vol. 2, pp. 36\u201340 (2010)","DOI":"10.1109\/ICSTE.2010.5608758"},{"key":"37_CR4","unstructured":"Shreyas, D.: Software engineering for security - towards architecting secure software. In: ICS, vol. 221, pp. 1\u201312 (2001)"},{"key":"37_CR5","unstructured":"Futcher, L., von Solms, R.: SecSDM: a usable tool to support IT undergraduate students in secure software development. In: Human Aspects of Information Security and Assurance, Crete, Greece, pp. 86\u201396 (2012)"},{"key":"37_CR6","unstructured":"Breu, R., Burger, K., Hafner, M., Jurjens, J., Popp, G., Wimmel, G., Lotz, V.: Key issues of a formally based process model for security engineering. In: 16th International Conference on Software and Systems Engineering and their Applications, Paris, pp. 1\u201315 (2003)"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Sabahat, N., Iqbal, F., Azam, F., Javed, M.Y.: An iterative approach for global requirements elicitation: a case study analysis. In: International Conference on Electronics and Information Engineering, Kyoto, Japan, pp. 361\u2013366 (2010)","DOI":"10.1109\/ICEIE.2010.5559859"},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-540-27777-4_12","volume-title":"Extreme Programming and Agile Methods - XP\/Agile Universe 2004","author":"J W\u00e4yrynen","year":"2004","unstructured":"W\u00e4yrynen, J., Bod\u00e9n, M., Bostr\u00f6m, G.: Security engineering and extreme programming: an impossible marriage? In: Zannier, C., Erdogmus, H., Lindstrom, L. (eds.) XP\/Agile Universe 2004. LNCS, vol. 3134, pp. 117\u2013128. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27777-4_12"},{"key":"37_CR9","unstructured":"Keith, E.R.: Agile Software Development Processes: A Different Approach to Software Design, pp. 1\u201325 (2003)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Chua, B.B., Bernardo, D.V., Verner, J.: Understanding the use of elicitation approaches for effective requirements gathering. In: Proceedings of 5th International Conference Software Engineering Advances, ICSEA 2010, pp. 325\u2013330 (2010)","DOI":"10.1109\/ICSEA.2010.89"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TSE.2012.27","volume":"39","author":"S Abrah\u00e3o","year":"2013","unstructured":"Abrah\u00e3o, S., Gravino, C., Insfran, E., Scanniello, G., Tortora, G.: Assessing the effectiveness of dynamic modeling in the comprehension of software requirements: results from a family of five experiments. IEEE Trans. Softw. Eng. 39, 327\u2013342 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"37_CR12","volume-title":"Unified Software Development Process","author":"G Booch","year":"1999","unstructured":"Booch, G., Jacobson, I., Rumbaugh, J.: Unified Software Development Process. Reading, Massachusetts (1999)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Choppy, C., Reggio, G.: Requirements capture and specification for enterprise applications: a UML based attempt. In: Proceedings of Software Engineering Conference, ASWEC 2006, pp. 19\u201328 (2006)","DOI":"10.1109\/ASWEC.2006.43"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MS.2014.139","volume":"31","author":"E Woods","year":"2014","unstructured":"Woods, E.: Harnessing UML for architectural description - the context view. IEEE Softw. 31, 30\u201333 (2014)","journal-title":"IEEE Softw."},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Konrad, S., Goldsby, H., Lopez, K., Cheng, B.H.C.: Visualizing requirements in UML models. In: First International Workshop on Requirements Engineering Visualization, REV (2007)","DOI":"10.1109\/REV.2006.11"},{"key":"37_CR16","unstructured":"Federal Information Processing Standards: Standards for Security Categorization of Federal Information and Information Systems. Federal Information Processing Standards Publication. FIPS PUB 1 (2004)"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Glinz, M.: Problems and deficiencies of UML as a requirements specification language. In: Tenth International Workshop on Software Specification and Design, pp. 11\u201322. IEEE, Irvine (2000)","DOI":"10.1109\/IWSSD.2000.891122"},{"key":"37_CR18","unstructured":"Sindre, G., Opdahl, A.: Capturing security requirements through misuse cases. Nor. Inform. (2001)"},{"key":"37_CR19","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-fuqaha","year":"2015","unstructured":"Al-fuqaha, A., Guizani, M., Mohammadi, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17, 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"37_CR20","first-page":"13","volume":"15","author":"RJ Robles","year":"2010","unstructured":"Robles, R.J., Kim, T.: A review on security in smart home development. Int. J. Adv. Sci. Technol. 15, 13\u201322 (2010)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"37_CR21","volume-title":"Software Engineering A Practitioner\u2019s Approach","author":"RS Pressman","year":"2001","unstructured":"Pressman, R.S.: Software Engineering A Practitioner\u2019s Approach. Mc Graw Hill, New York (2001)"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Kasirun, Z.M., Salim, S.S.: Focus group discussion model for requirements elicitation activity. In: International Conference on Computer and Electrical Engineering, pp. 101\u2013105 (2008)","DOI":"10.1109\/ICCEE.2008.65"},{"key":"37_CR23","unstructured":"Basri, S., O\u2019Connor, R. V.: The impact of software development team dynamics on the Knowledge Management Process. In: Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering, pp. 339\u2013342 (2011)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95171-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T15:00:43Z","timestamp":1751727643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95171-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951706","9783319951713"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95171-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}