{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:14Z","timestamp":1776782834959,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540878742","type":"print"},{"value":"9783540878759","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87875-9_50","type":"book-chapter","created":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T01:46:10Z","timestamp":1222047970000},"page":"721-735","source":"Crossref","is-referenced-by-count":16,"title":["Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams"],"prefix":"10.1007","author":[{"given":"Tor","family":"St\u00e5lhane","sequence":"first","affiliation":[]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","first-page":"27","volume":"3","author":"D.G. Firesmith","year":"2004","unstructured":"Firesmith, D.G.: Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. Journal of Object Technology,\u00a03, 27\u201342 (2004)","journal-title":"Journal of Object Technology,"},{"key":"50_CR2","volume-title":"15th Annual Computer Security Applications Conference (ACSAC 1999)","author":"J. McDermott","year":"1999","unstructured":"McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999). IEEE Computer Soceity Press, Los Alamitos (1999)"},{"key":"50_CR3","volume-title":"Safeware: System Safety and Computers","author":"N.G. Leveson","year":"1995","unstructured":"Leveson, N.G.: Safeware: System Safety and Computers. Addison-Wesley, Boston (1995)"},{"key":"50_CR4","first-page":"213","volume-title":"The Future of Software Engineering","author":"R.R. Lutz","year":"2000","unstructured":"Lutz, R.R.: Software Engineering for Safety: A Roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 213\u2013226. ACM Press, New York (2000)"},{"key":"50_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering\u00a010, 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"50_CR6","volume-title":"10th Anniversary IEEE Joint International Requirements Engineering Conference (RE 2002)","author":"I.F. Alexander","year":"2002","unstructured":"Alexander, I.F.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. In: Pohl, K. (ed.) 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE 2002), Essen, Germany, 9-13 September. IEEE, Los Alamitos (2002)"},{"key":"50_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I.F. Alexander","year":"2003","unstructured":"Alexander, I.F.: Misuse Cases, Use Cases with Hostile Intent. IEEE Software\u00a020, 58\u201366 (2003)","journal-title":"IEEE Software"},{"key":"50_CR8","series-title":"IFIP","volume-title":"ME 2007","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: A look at misuse cases for safety concerns. In: ME 2007, Geneva, Switzerland. IFIP. Springer, Heidelberg (2007)"},{"key":"50_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"ER 2007","author":"T. St\u00e5lhane","year":"2007","unstructured":"St\u00e5lhane, T., Sindre, G.: A comparison of two approaches to safety analysis based on use cases. In: ER 2007, Auckland, New Zealand. LNCS. Springer, Heidelberg (2007)"},{"key":"50_CR10","volume-title":"Failure Mode and Effect Analysis: FMEA from theory to execution","author":"D.H. Stamatis","year":"1995","unstructured":"Stamatis, D.H.: Failure Mode and Effect Analysis: FMEA from theory to execution. American Society fbor Quality (ASQ), Milwaukee, Wisconsin (1995)"},{"key":"50_CR11","first-page":"36","volume-title":"4th International Symposium on Requirements Engineering (RE 1999)","author":"C.B. Achour-Salinesi","year":"1999","unstructured":"Achour-Salinesi, C.B., Rolland, C., Maiden, N.A.M., Souveyet, C.: Guiding Use Case Authoring: Results from an Empirical Study. In: 4th International Symposium on Requirements Engineering (RE 1999), 7-11 June, pp. 36\u201343. IEEE, Los Alamitos (1999)"},{"key":"50_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1023\/A:1026542700033","volume":"5","author":"K. Cox","year":"2000","unstructured":"Cox, K., Phalp, K.: Replicating the CREWS Use Case Authoring Guidelines Experiment. Empirical Software Engineering\u00a05, 245\u2013267 (2000)","journal-title":"Empirical Software Engineering"},{"key":"50_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45337-7_21","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"B. Anda","year":"2001","unstructured":"Anda, B., Sj\u00f8berg, D.I.K., J\u00f8rgensen, M.: Quality and Understandability of Use Case Models. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 402\u2013428. Springer, Heidelberg (2001)"},{"key":"50_CR14","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10664-005-1289-3","volume":"10","author":"B. Anda","year":"2005","unstructured":"Anda, B., Sj\u00f8berg, D.I.K.: Investigating the Role of Use Cases in the Construction of Class Diagrams. Empirical Software Engineering\u00a010, 285\u2013309 (2005)","journal-title":"Empirical Software Engineering"},{"key":"50_CR15","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1016\/S0950-5849(01)00201-4","volume":"43","author":"T. Thelin","year":"2001","unstructured":"Thelin, T., Runeson, P., Regnell, B.: Usage-based reading: an experiment to guide reviewers with use cases. Information & Software Technology\u00a043, 925\u2013938 (2001)","journal-title":"Information & Software Technology"},{"key":"50_CR16","first-page":"211","volume":"36","author":"K. Cox","year":"2004","unstructured":"Cox, K., Aurum, A., Jeffery, D.R.: An Experiment in Inspecting the Quality of Use Case Descriptions. Journal of Research and Practice in Information Technology\u00a036, 211\u2013229 (2004)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"50_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/METRIC.2004.1357908","volume-title":"10th International Symposium on Software Metrics (METRICS 2004)","author":"B. Bernardez","year":"2004","unstructured":"Bernardez, B., Genero, M., Duran, A., Toro, M.: A Controlled Experiment for Evaluating a Metric-Based Reading Technique for Requirements Inspection. In: 10th International Symposium on Software Metrics (METRICS 2004), 11-17 September, pp. 257\u2013268. IEEE, Los Alamitos (2004)"},{"key":"50_CR18","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1145\/75577.75579","volume":"33","author":"D. Batra","year":"1990","unstructured":"Batra, D., Hoffer, J.A., Bostrom, R.P.: Comparing Representations with Relational and EER Models. Communications of the ACM\u00a033, 126\u2013139 (1990)","journal-title":"Communications of the ACM"},{"key":"50_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-540-25931-2_25","volume-title":"Diagrammatic Representation and Inference","author":"P.C.-H. Cheng","year":"2004","unstructured":"Cheng, P.C.-H.: Why Diagrams Are (Sometimes) Six Times Easier than Words: Benefits beyond Locational Indexing. In: Blackwell, A.F., Marriott, K., Shimojima, A. (eds.) Diagrams 2004. LNCS (LNAI), vol.\u00a02980, pp. 242\u2013254. Springer, Heidelberg (2004)"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Larkin, J.H., Simon, H.A.: Why a Diagram is (Sometimes) Worth Ten Thousand Words. Cognitive Science\u00a011 (1987)","DOI":"10.1111\/j.1551-6708.1987.tb00863.x"},{"key":"50_CR21","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/47.735365","volume":"41","author":"A. Boekelder","year":"1998","unstructured":"Boekelder, A., Steehouder, M.: Selecting and Switching: Some Advantages of Diagrams over Tables and Lists for Presenting Instructions. IEEE Transactions on Professional Communication\u00a041, 229\u2013241 (1998)","journal-title":"IEEE Transactions on Professional Communication"},{"key":"50_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/192433.192442","volume":"18","author":"L. Allmendinger","year":"1994","unstructured":"Allmendinger, L.: Diagrams and Design Tools in Context. ACM SIGDOC Asterisk Journal of Computer Documentation\u00a018, 25\u201341 (1994)","journal-title":"ACM SIGDOC Asterisk Journal of Computer Documentation"},{"key":"50_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/175276.175283","volume":"37","author":"R.A. Coll","year":"1994","unstructured":"Coll, R.A., Coll, J.H., Thakur, G.: Graphs and tables: a four factor experiment. Communications of the ACM\u00a037, 77\u201384 (1994)","journal-title":"Communications of the ACM"},{"key":"50_CR24","volume-title":"Object-Oriented Software Engineering: A Use Case Driven Approach","author":"I. Jacobson","year":"1992","unstructured":"Jacobson, I., Christerson, M., Jonsson, P., Overgaard, G.: Object-Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley, Boston (1992)"},{"key":"50_CR25","volume-title":"Writing Effective Use Cases","author":"A. Cockburn","year":"2001","unstructured":"Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Boston (2001)"},{"key":"50_CR26","unstructured":"Wirfs-Brock, R.: Designing Scenarios: Making the Case for a Use Case Framework. The Smalltalk Report, vol.\u00a03 (1993)"},{"key":"50_CR27","volume-title":"Semiology of Graphics: Diagrams, Networks, Maps","author":"J. Bertin","year":"1983","unstructured":"Bertin, J.: Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press, Madison (1983)"},{"key":"50_CR28","first-page":"205","volume-title":"The Creative Cognition Approach","author":"P.C.-H. Cheng","year":"1995","unstructured":"Cheng, P.C.-H., Simon, H.A.: Scientific Discovery and Creative Reasoning with Diagrams. In: Smith, S., et al. (eds.) The Creative Cognition Approach, pp. 205\u2013228. MIT Press, Cambridge (1995)"},{"key":"50_CR29","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science\u00a035, 982\u20131003 (1989)","journal-title":"Management Science"},{"key":"50_CR30","unstructured":"Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative\u2019s man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, CA, vol.\u00a0III, pp. 187\u2013389 (1986)"},{"key":"50_CR31","unstructured":"Heldal, R.: Use cases are more than System Operations. In: 2nd International Workshop on Use Case Modelling (WUsCaM-2005), Montego Bay, Jamaica, October 2-7 (2005)"},{"key":"50_CR32","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering: An Introduction","author":"C. Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell (2000)"},{"key":"50_CR33","unstructured":"Runeson, P.: Using Students as Experiment Subjects \u2013 An Analysis on Graduate and Freshmen Student Data. In: Linkman, S. (ed.) 7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE 2003), Keele University, Staffordshire, UK, 8-10 April, pp. 95\u2013102 (2003)"},{"key":"50_CR34","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TSE.2004.43","volume":"30","author":"E. Arisholm","year":"2004","unstructured":"Arisholm, E., Sj\u00f8berg, D.I.K.: Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-oriented Software. IEEE Transactions on Software Engineering\u00a030, 521\u2013534 (2004)","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Model Driven Engineering Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87875-9_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:51:06Z","timestamp":1619524266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87875-9_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540878742","9783540878759"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87875-9_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}