{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T21:49:32Z","timestamp":1759614572034,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319976785"},{"type":"electronic","value":"9783319976792"}],"license":[{"start":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T00:00:00Z","timestamp":1533340800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-97679-2_3","type":"book-chapter","created":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T04:24:21Z","timestamp":1533270261000},"page":"22-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Deriving Successful Factors for Practical AI System Development Projects Using Assurance Case"],"prefix":"10.1007","author":[{"given":"Hironori","family":"Takeuchi","sequence":"first","affiliation":[]},{"given":"Shiki","family":"Akihara","sequence":"additional","affiliation":[]},{"given":"Shuichiro","family":"Yamamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,4]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Berntsson-Svensson, R., Aurum, A.: Successful software project and products: an empirical investigation. In: Proceedings of the 26th ACM\/IEEE International Symposium on Empirical Software Engineering, pp. 144\u2013153 (2006)","DOI":"10.1145\/1159733.1159757"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Quichiz, L.P., Or\u00e9, S.B.: It demand management in organizations: a review. In: Proceedings of the 18th International Conference on Computer Modeling and Simulation, pp. 95\u201399 (2017)","DOI":"10.1145\/3036331.3050423"},{"issue":"2","key":"3_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MS.2016.36","volume":"33","author":"HM Chen","year":"2016","unstructured":"Chen, H.M., Kazman, R., Haziyev, S.: Strategic prototyping for developing big data systems. IEEE Softw. 33(2), 36\u201343 (2016)","journal-title":"IEEE Softw."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Kim, M., Zimmermann, T., DeLine, R., Begel, A.: The emerging role of data scientists on software development teams. In: Proceedings of the 38th International Conference on Software Engineering, pp. 96\u2013107 (2016)","DOI":"10.1145\/2884781.2884783"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1111\/exsy.12130","volume":"33","author":"IY Song","year":"2016","unstructured":"Song, I.Y., Zhu, Y.: Big data and data science: what should we teach? Expert Syst. 33(4), 364\u2013373 (2016)","journal-title":"Expert Syst."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., Mylopoulos, J., Guizzardi, G.: How software changes the world: the role of assumptions. In: Proceedings of the 10th IEEE International Conference on Research Challenges in Information Science, pp. 1\u201312 (2016)","DOI":"10.1109\/RCIS.2016.7549327"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Kelly, T., McDermid, J.A.: Safety case construction and reuse using patterns. In: Proceedings of the 16th International Conference on Computer Safety, Reliability and Security, pp. 55\u201369 (1997)","DOI":"10.1007\/978-1-4471-0997-6_5"},{"key":"3_CR8","unstructured":"Kelly, T., Weaver, R.: The goal structuring notation \u2013 a safety argument notation. In: Proceedings of Dependable Systems and Networks Workshop on Assurance Cases (2004)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Yamamoto, S., Matsuno, Y.: An evaluation of argument patterns to reduce pitfalls of applying assurance case. In: Proceedings of the 1st International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE), pp. 12\u201317 (2013)","DOI":"10.1109\/ASSURE.2013.6614265"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Doss, O., Kelly, T.: Addressing the 4+1 software safety assurance principles within scrum. In: Proceedings of the Scientific Workshop Proceedings of XP2016, pp. 17:1\u201317:5 (2016)","DOI":"10.1145\/2962695.2962712"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Bishop, P., Butler, E., Netkachova, K.: Using an assurance case framework to develop security strategy and policies. In: Proceedings of the International Conference on Computer Safety, Reliability, and Security, pp. 27\u201338 (2017)","DOI":"10.1007\/978-3-319-66284-8_3"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Sklyar, V., Kharchenko, V.: Challenges in assurance case application for industrial IoT. In: Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, pp. 736\u2013739 (2017)","DOI":"10.1109\/IDAACS.2017.8095187"},{"issue":"10","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1016\/j.infsof.2011.05.003","volume":"53","author":"K Boness","year":"2011","unstructured":"Boness, K., Finkelstein, A., Harrison, R.: A method for assessing confidence in requirements analysis. Inf. Softw. Technol. 53(10), 1084\u20131096 (2011)","journal-title":"Inf. Softw. Technol."},{"key":"3_CR14","unstructured":"Kaneko, T., Yamamoto, S., Tanaka, H.: CC-case based on system development life-cycle process. In: Proceedings of the International Conference on Computer Security and Digital Investigation (COMSEC), pp. 29\u201335 (2014)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Varkoi, T., Nevalainen, R., M\u00e4kinen, T.: Process assessment in a safety domain. In: Proceedings of the 10th International Conference on the Quality of Information and Communications Technolgy, pp. 52\u201358 (2016)","DOI":"10.1109\/QUATIC.2016.017"},{"key":"3_CR16","unstructured":"Sternberg, R.J.: Successful Intelligence: How Practical and Creative Intelligence Determines Success in Life. Simon & Schuster (1996)"},{"key":"3_CR17","unstructured":"ISO\/IEC TR 9126: Software engineering - product quality (2000)"},{"issue":"5","key":"3_CR18","first-page":"370","volume":"6","author":"R Djouab","year":"2016","unstructured":"Djouab, R., Bari, M.: An ISO 9126 based quality model for the e-learning systems. Int. J. Inf. Educ. Technol. 6(5), 370\u2013375 (2016)","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Yamamoto, S.: A continuous approach to improve it management. In: Proceedings of the International Conference on Enterprise Information Systems (CENTERIS), pp. 27\u201335 (2017)","DOI":"10.1016\/j.procs.2017.11.005"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Yamamoto, S.: Assuring security through attribute GSN. In: Proceedings of the 5th International Conference on IT Convergence and Security (CIITCS), pp. 1\u20135 (2015)","DOI":"10.1109\/ICITCS.2015.7292954"}],"container-title":["Smart Innovation, Systems and Technologies","Knowledge-Based Software Engineering: 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97679-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T05:38:57Z","timestamp":1751780337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97679-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,4]]},"ISBN":["9783319976785","9783319976792"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97679-2_3","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2018,8,4]]}}}