{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:53:25Z","timestamp":1772121205467,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540852780","type":"print"},{"value":"9783540852797","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85279-7_3","type":"book-chapter","created":{"date-parts":[[2008,7,30]],"date-time":"2008-07-30T08:06:17Z","timestamp":1217405177000},"page":"26-39","source":"Crossref","is-referenced-by-count":4,"title":["Extending GQM by Argument Structures"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Cyra","sequence":"first","affiliation":[]},{"given":"Janusz","family":"G\u00f3rski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Briand, L.C., Differing, C., Rombach, H.D.: Practical Guidelines for Measurement-Based Process Improvement, Software Process. Improvement and Practice, No. 4 (1996)","DOI":"10.1002\/(SICI)1099-1670(199612)2:4<253::AID-SPIP53>3.0.CO;2-G"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Cyra, \u0141., G\u00f3rski, J.: Supporting compliance with safety standards by trust case templates. In: Proceedings of ESREL 2007 (2007)","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"key":"3_CR3","first-page":"33","volume-title":"Trust case: justifying trust in IT solution, Reliability Engineering and System Safety","author":"J. G\u00f3rski","year":"2005","unstructured":"G\u00f3rski, J., et al.: Trust case: justifying trust in IT solution, Reliability Engineering and System Safety, vol.\u00a089, pp. 33\u201347. Elsevier, Amsterdam (2005)"},{"key":"3_CR4","series-title":"NATO ARW Series","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/1-4020-3381-8_7","volume-title":"Cyberspace Security and Defense: Research Issues","author":"J. G\u00f3rski","year":"2005","unstructured":"G\u00f3rski, J.: Trust Case \u2013 a case for trustworthiness of IT infrastructures. In: Kowalik, J., Gorski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues. NATO ARW Series, pp. 125\u2013142. Springer, Heidelberg (2005)"},{"key":"3_CR5","unstructured":"G\u00f3rski, J.: Collaborative approach to trustworthiness of infrastructures. In: Proceedings of IEEE International Conference of Technologies for Homeland Security and Safety, TEHOSS 2005, pp. 137\u2013142 (2005)"},{"key":"3_CR6","unstructured":"G\u00f3rski, J.: Trust-IT \u2013 a framework for trust cases, Workshop on Assurance Cases for Security - The Metrics Challenge. In: DSN 2007 The 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, Edinburgh, UK, June 25 - June 28 (2007)"},{"key":"3_CR7","unstructured":"IAG, Information Assurance Group Homepage, \n                    \n                      http:\/\/iag.pg.gda.pl\/iag\/"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/52.896250","volume":"17","author":"L. Lavazza","year":"2000","unstructured":"Lavazza, L.: Providing Automated Support for the GQM Measurement Process. IEEE Software\u00a017(3), 56\u201362 (2000)","journal-title":"IEEE Software"},{"key":"3_CR9","volume-title":"The Goal\/Question\/Metric Method: a Practical Guide for Quality Improvement of Software Development","author":"R. Solingen van","year":"1999","unstructured":"van Solingen, R., Berghout, E.: The Goal\/Question\/Metric Method: a Practical Guide for Quality Improvement of Software Development. Cambridge University Press, Cambridge (1999)"},{"key":"3_CR10","unstructured":"TCT User Manual, Information Assurance Group, Gdansk University of Technology (2006)"}],"container-title":["Lecture Notes in Computer Science","Balancing Agility and Formalism in Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85279-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:27:12Z","timestamp":1558265232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85279-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540852780","9783540852797"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85279-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}