{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:48:47Z","timestamp":1760586527160},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540214212"},{"type":"electronic","value":"9783540246596"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24659-6_27","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:21:35Z","timestamp":1280762495000},"page":"378-392","source":"Crossref","is-referenced-by-count":13,"title":["Achieving CMMI Level 2 with Enhanced Extreme Programming Approach"],"prefix":"10.1007","author":[{"given":"Tuomo","family":"K\u00e4hk\u00f6nen","sequence":"first","affiliation":[]},{"given":"Pekka","family":"Abrahamsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Capability Maturity Model\u00ae Integration (CMMI), Version 1.1: Carnegie Mellon University (2001)"},{"key":"27_CR2","volume-title":"Extreme Programming Explained: Embrace Change","author":"K. Beck","year":"2000","unstructured":"Beck, K.: Extreme Programming Explained: Embrace Change. Addison-Wesley, Upper Saddle River (2000)"},{"key":"27_CR3","unstructured":"Paulk, M.: Agile Methodologies and Process Discipline. CrossTalk The Journal of Defense Software Engineering, 15\u201318 (2002)"},{"key":"27_CR4","first-page":"3","volume-title":"Extreme Programming Examined","author":"M. Fowler","year":"2001","unstructured":"Fowler, M.: Is Design Dead. In: Succi, G., Marchesi, M. (eds.) Extreme Programming Examined, pp. 3\u201318. Addison-Wessley, Reading (2001)"},{"key":"27_CR5","first-page":"25","volume":"15","author":"B. Henderson-Sellers","year":"2002","unstructured":"Henderson-Sellers, B.: Agile or Rigorous OO Methodologies: Getting the Best of Both Worlds. Cutter IT Journal\u00a015, 25\u201333 (2002)","journal-title":"Cutter IT Journal"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Boehm, B.: Get Ready for Agile Methods, with Care. IEEE Computer, 64\u201369 (2002)","DOI":"10.1109\/2.976920"},{"key":"27_CR7","volume-title":"Balancing Agility and Discipline","author":"B. Boehm","year":"2003","unstructured":"Boehm, B., Turner, R.: Balancing Agility and Discipline. Addison-Wesley, Boston (2003)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Turner, R., Jain, A.: Agile Meets CMMI: Culture Clash or Common Cause? Presented at 2nd XP and 1st Agile Universe Conference, Chigago, IL (2002)","DOI":"10.1007\/3-540-45672-4_15"},{"key":"27_CR9","unstructured":"Highsmith, J.: What Is Agile Software Development? CrossTalk The Journal of Defense Software Engineering, 4\u20139 (2002)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Reifer, D.: XP and the CMM. IEEE Software, 14\u201315 (2003)","DOI":"10.1109\/MS.2003.1196314"},{"key":"27_CR11","first-page":"12","volume":"14","author":"R. Glass","year":"2001","unstructured":"Glass, R.: Agile Versus Traditional: Make Love, Not War! Cutter IT Journal\u00a014, 12\u201318 (2001)","journal-title":"Cutter IT Journal"},{"key":"27_CR12","unstructured":"Glazer, H.: Dispelling the Process Myth: Having a Process Does Not Mean Sacrificing Agility or Creativity. CrossTalk The Journal of Defense Software Engineering, 27\u201330 (2001)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Martinsson, J.: Maturing XP Through the CMM. Presented at XP2003, Genova, Italy (2003)","DOI":"10.1007\/3-540-44870-5_11"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Vriens, C.: Certifying for CMM Level 2 and ISO9001 with XP@Scrum. Presented at Agile Development Conference, Salt Lake City, Utah (2003)","DOI":"10.1109\/ADC.2003.1231461"},{"key":"27_CR15","first-page":"34","volume":"14","author":"L. Wagner","year":"2001","unstructured":"Wagner, L.: Extreme Requirements Engineering. Cutter IT Journal\u00a014, 34\u201338 (2001)","journal-title":"Cutter IT Journal"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Paulk, M.: Extreme Programming from a CMM Perspective. IEEE Software, 19\u201326 (2001)","DOI":"10.1109\/52.965798"},{"key":"27_CR17","first-page":"1","volume":"XI","author":"P. Allen","year":"2001","unstructured":"Allen, P.: Light Methodologies and CBD. Component Development Strategies\u00a0XI, 1\u201316 (2001)","journal-title":"Component Development Strategies"},{"key":"27_CR18","unstructured":"Nawroski, J., Jainski, M., Walter, B.: Extreme Programming Modified: Embrace Requirements Engineering Practices. Presented at IEEE Joint International Conference on Requirements Engineering, RE 2002 (2002)"},{"key":"27_CR19","unstructured":"Humphrey, W.S.: Comments on eXtreme Programming (2000), http:\/\/computer.org\/SEweb\/dynabook\/HumphreyCom.htm"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Nawrocki, J.R., Walter, B., Wojciechowski, A.: Comparison of CMM level 2 and eXtreme programming. In: Presented at 7th European Conference on Software Quality, Helsinki, Finland (2002)","DOI":"10.1007\/3-540-47984-8_32"},{"key":"27_CR21","unstructured":"Jeffries, R.: Extreme Programming and Capability Maturity Model (2000), http:\/\/www.xprogramming.com\/xpmag\/xp_and_cmm.htm"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Martinsson, J.: Maturing Extreme Programming Through the CMM. Department of Computer Science. Lund University, Lund (2002)","DOI":"10.1007\/3-540-44870-5_11"},{"key":"27_CR23","volume-title":"CMMI Guidelines for Process Integration and Product Improvement","author":"M.B. Chrissis","year":"2003","unstructured":"Chrissis, M.B., Konrad, M., Shrun, S.: CMMI Guidelines for Process Integration and Product Improvement. Addison-Wesley, Boston (2003)"},{"key":"27_CR24","unstructured":"Royce, W.: CMM vs. CMMI: From conventional to Modern Software Management,Rational Edge (2002)"},{"key":"27_CR25","volume-title":"Quality is Free","author":"P. Crosby","year":"1979","unstructured":"Crosby, P.: Quality is Free. McGraw-Hill, New York (1979)"},{"key":"27_CR26","volume-title":"Out of the Crisis","author":"W. Deming","year":"1986","unstructured":"Deming, W.: Out of the Crisis. MIT Center for Advanced Engineering, Cambridge (1986)"},{"key":"27_CR27","volume-title":"Juran on Planning Quality","author":"J.M. Juran","year":"1988","unstructured":"Juran, J.M.: Juran on Planning Quality. MacMillan, New York (1988)"},{"key":"27_CR28","volume-title":"Managing the Software Process","author":"W.S. Humphrey","year":"1989","unstructured":"Humphrey, W.S.: Managing the Software Process. Addison-Wesley, Reading (1989)"},{"key":"27_CR29","unstructured":"Paulk, M.: Using the Software CMM in Small Organizations. Presented at The Joint 1998 Proceedings of the Pacific Northwest Software Quality Conference and the Eighth International Conference on Software Quality, Portland, Oregon (1998)"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Abrahamsson, P.: Extreme Programming: First Results from a Controlled Case Study. Presented at 29th Euromicro Conference, Belek, Antalaya, Turkey (2003)","DOI":"10.1109\/EURMIC.2003.1231599"},{"key":"27_CR31","unstructured":"Standard CMMI Appraisal Method for Process Improvement (SCAMPI), Version 1.1: Method Definition Document. Carnegie Mellon University, Pittsburg (2001)"},{"key":"27_CR32","unstructured":"Appraisal Requirements for CMMI (ARC) V1.1. Carnegie Mellon University, Pittsburg (2001)"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Lippert, M., Becker-Pechau, P., Breitling, H., Koch, J., Kornst\u00e4dt, A., Roock, S., Schmolitzky, A., Wolf, H., Z\u00fcllighoven, H.: Developing Complex Projects Using XP with Extensions. IEEE Computer, 67\u201373 (2003)","DOI":"10.1109\/MC.2003.1204377"},{"key":"27_CR34","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/2.796139","volume":"32","author":"K. Beck","year":"1999","unstructured":"Beck, K.: Embracing Change With Extreme Programming. IEEE Computer\u00a032, 70\u201377 (1999)","journal-title":"IEEE Computer"},{"key":"27_CR35","volume-title":"Extreme Programming Installed","author":"R. Jeffries","year":"2001","unstructured":"Jeffries, R., Anderson, A., Hendrickson, C.: Extreme Programming Installed. Addison-Wesley, Upper Saddle River (2001)"},{"key":"27_CR36","volume-title":"A discipline for software engineering","author":"W.S. Humphrey","year":"1995","unstructured":"Humphrey, W.S.: A discipline for software engineering. Addison Wesley, Reading (1995)"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Dings\u00f8yr, T., Hanssen, G.K.: Extending Agile Methods: Postmortem Reviews as Extended Feedback. Presented at 4th International Workshop on Learning Software Organizations, Chicago, Illinois, USA (2002)","DOI":"10.1007\/978-3-540-40052-3_2"},{"key":"27_CR38","volume-title":"Knowledge in organizations","author":"L. Prusak","year":"1997","unstructured":"Prusak, L.: Knowledge in organizations. Butterworth-Heinemann, Oxford (1997)"},{"key":"27_CR39","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1108\/09593840110411149","volume":"14","author":"M. Robertson","year":"2001","unstructured":"Robertson, M., S\u00f8rensen, C., Swan, J.: Survival of the leanest: Intensive knowledge work and groupware adaptation. Information Technology & People\u00a014, 334\u2013352 (2001)","journal-title":"Information Technology & People"},{"key":"27_CR40","doi-asserted-by":"crossref","unstructured":"K\u00e4hk\u00f6nen, T., Abrahamsson, P.: Digging into the Fundamentals of Extreme Programming - Building the Theoretical Base for Agile Methods. Presented at Euromicro 2003, Belek, Antalaya, Turkey (2003)","DOI":"10.1109\/EURMIC.2003.1231601"},{"key":"27_CR41","first-page":"6","volume":"15","author":"A. Cockburn","year":"2002","unstructured":"Cockburn, A.: Agile Software Development Joins the \u201cWould-Be\u201d Crowd. Cutter IT Journal\u00a015, 6\u201312 (2002)","journal-title":"Cutter IT Journal"},{"key":"27_CR42","volume-title":"The Tacit Dimension","author":"M. Polyani","year":"1967","unstructured":"Polyani, M.: The Tacit Dimension. Anchor, New York (1967)"},{"key":"27_CR43","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","volume-title":"The Kowledge Creating Company: How Japanese Companies Create the Dynamics of Innovation","author":"I. Nonaka","year":"1995","unstructured":"Nonaka, I., Takeuchi, H.: The Kowledge Creating Company: How Japanese Companies Create the Dynamics of Innovation. Oxford University Press, Inc., New York (1995)"},{"key":"27_CR44","volume-title":"Corporate Knowledge: Theory and Practice of Intelligent Organizations","author":"I. Tuomi","year":"1999","unstructured":"Tuomi, I.: Corporate Knowledge: Theory and Practice of Intelligent Organizations. Metaxis, Helsinki (1999)"}],"container-title":["Lecture Notes in Computer Science","Product Focused Software Process Improvement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24659-6_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T23:27:05Z","timestamp":1711668425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24659-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540214212","9783540246596"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24659-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}