{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:48Z","timestamp":1725889908470},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540695646"},{"type":"electronic","value":"9783540695660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69566-0_32","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T02:39:05Z","timestamp":1217471945000},"page":"400-414","source":"Crossref","is-referenced-by-count":5,"title":["Identifying and Understanding Architectural Risks in Software Evolution: An Empirical Study"],"prefix":"10.1007","author":[{"given":"Odd Petter Nord","family":"Slyngstad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jingyue","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reidar","family":"Conradi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. Ali","family":"Babar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"32_CR1","volume-title":"Software Architecture in Practice","author":"L. Bass","year":"2004","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison-Wesley, Reading (2004)","edition":"2"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Bass, L., Buhman, C., Comella-Dorda, S., Long, F., Robert, J., Seacord, R., Wallnau, K.: Volume I: Market Assessment of Component-based Software Engineering in SEI Technical Report number CMU\/SEI-2001-TN-007 (2001)","DOI":"10.21236\/ADA388847"},{"issue":"1","key":"32_CR3","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1147\/sj.153.0225","volume":"15","author":"L.A. Belady","year":"1976","unstructured":"Belady, L.A., Lehman, M.M.: A model of a Large Program Development. IBM Systems Journal\u00a015(1), 225\u2013252 (1976)","journal-title":"IBM Systems Journal"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Bennett, K.H., Rajlich, V.: Software Maintenance and Evolution: A Roadmap. In: ICSE 2000 \u2013 Future of Software Engineering, Limerick, Ireland, pp. 73\u201387 (2000)","DOI":"10.1145\/336512.336534"},{"key":"32_CR5","first-page":"728","volume-title":"Software Engineering","author":"I. Sommerville","year":"2001","unstructured":"Sommerville, I.: Software Engineering, 6th edn., p. 728. Addison-Wesley, Reading (2001)","edition":"6"},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/32.841112","volume":"26","author":"J. Ropponen","year":"2000","unstructured":"Ropponen, J., Lyytinen, K.: Components of Software Development Risk: How to Address Them? A Project Manager Survey. IEEE Transactions on Software Engineering\u00a026(2), 98\u2013112 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Ali Babar, M., Bass, L., Gorton, I.: Factors Influencing Industrial Practices of Software Architecture Evaluation: An Empirical Investigation. In: QoSA 2007, Medford, Massachusetts, USA, July 12-13 (2007)","DOI":"10.1007\/978-3-540-77619-2_6"},{"issue":"1","key":"32_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/52.62930","volume":"8","author":"B.W. Boehm","year":"1991","unstructured":"Boehm, B.W.: Software Risk management: Principles and Practices. IEEE Software\u00a08(1), 32\u201341 (1991)","journal-title":"IEEE Software"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Carr, M., Kondra, S., Monarch, I., Ulrich, F., Walker, C.: Taxonomy-Based Risk Identification, Technical Report SEI-93-TR-006, SEI, Pittsburgh, USA (1993)","DOI":"10.21236\/ADA266992"},{"issue":"11","key":"32_CR10","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/287831.287843","volume":"4","author":"M. Keil","year":"1998","unstructured":"Keil, M., Kule, P.E., Lyytinen, K., Schmidt, R.C.: A Framework for Identifying Softare Project Risks. Communications of the ACM\u00a04(11), 76\u201383 (1998)","journal-title":"Communications of the ACM"},{"issue":"5","key":"32_CR11","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.59","volume":"21","author":"B.W. Boehm","year":"1988","unstructured":"Boehm, B.W.: A Spiral Model of Software Development and Enhancement. IEEE Computer\u00a021(5), 61\u201372 (1988)","journal-title":"IEEE Computer"},{"issue":"5","key":"32_CR12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/2.589908","volume":"30","author":"A. Gemmer","year":"1997","unstructured":"Gemmer, A.: Risk Management: Moving Beyond Process. IEEE Computer\u00a030(5), 33\u201341 (1997)","journal-title":"IEEE Computer"},{"key":"32_CR13","unstructured":"Hecht, H.: Systems Reliability and Failure Prevention. Artech House Publishers (2004)"},{"key":"32_CR14","unstructured":"Clerc, V., Lago, P., van Vliet, H.: The Architect\u2019s Mindset. In: QoSA 2007, Medford, Massachusetts, USA, July 12-13 (2007)"},{"key":"32_CR15","volume-title":"Experimentation in Software Engineering \u2013 An Introduction","author":"C. Wohlin","year":"2002","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering \u2013 An Introduction. Kluwer Academic Publishers, Dordrecht (2002)"},{"issue":"4","key":"32_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"C.B. Seaman","year":"1999","unstructured":"Seaman, C.B.: Qualitative Methods in Empirical Studies of Software Engineering. IEEE Transactions on Software Engineering\u00a025(4), 557\u2013572 (1999)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"32_CR17","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10664-005-1290-x","volume":"10","author":"T.C. Lethbridge","year":"2005","unstructured":"Lethbridge, T.C., Sim, S.E., Singer, J.: Studying Software Engineers: Data Collection Techniques for Software Field Studies. Empirical Software Engineering\u00a010(3), 311\u2013341 (2005)","journal-title":"Empirical Software Engineering"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Kitchenham, B., Pfleeger, S.L.: Principles of Survey Research, Parts 1 to 6. ACM Software Engineering Notes (2001 \u2013 2002)","DOI":"10.1145\/505532.505535"},{"issue":"3","key":"32_CR19","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MS.2004.1293074","volume":"21","author":"D.G. Messerschmitt","year":"2004","unstructured":"Messerschmitt, D.G., Szyperski, C.: Marketplace Issues in Software Planning and Design. IEEE Software\u00a021(3), 62\u201370 (2004)","journal-title":"IEEE Software"},{"issue":"2","key":"32_CR20","first-page":"22","volume":"1","author":"R.E. Johnson","year":"1988","unstructured":"Johnson, R.E., Foote, B.: Designing Reusable Classes. Journal of Object-Oriented Programming\u00a01(2), 22\u201335 (1988)","journal-title":"Journal of Object-Oriented Programming"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Bass, L., Nord, R., Wood, W., Zubrow, D.: Risk Themes Discovered Through Architecture Evaluations. In: Proc. WICSA 2007 (2007)","DOI":"10.1109\/WICSA.2007.37"},{"key":"32_CR22","unstructured":"O\u2019Connell, D.: Boeing\u2019s Experiences using the SEI ATAM\u00ae and QAW Processes (April 2006), http:\/\/www.sei.cmu.edu\/architecture\/saturn\/2006\/OConnell.pdf"},{"issue":"9","key":"32_CR23","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSPEC.2005.1502528","volume":"42","author":"R.N. Charette","year":"2005","unstructured":"Charette, R.N.: Why software fails. Spectrum\u00a042(9), 42\u201349 (2005)","journal-title":"Spectrum"}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69566-0_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:43:51Z","timestamp":1620002631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69566-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540695646","9783540695660"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69566-0_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}