{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T21:48:53Z","timestamp":1759614533886,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811077951"},{"type":"electronic","value":"9789811077968"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7796-8_4","type":"book-chapter","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T06:14:01Z","timestamp":1515046441000},"page":"41-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Eliciting Requirements for Improving Users\u2019 Behavior Using Transparency"],"prefix":"10.1007","author":[{"given":"Haruhiko","family":"Kaiya","sequence":"first","affiliation":[]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[]},{"given":"Hironori","family":"Washizaki","sequence":"additional","affiliation":[]},{"given":"Takao","family":"Okubo","sequence":"additional","affiliation":[]},{"given":"Atsuo","family":"Hazeyama","sequence":"additional","affiliation":[]},{"given":"Shinpei","family":"Ogata","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MS.2008.46","volume":"25","author":"JD Blaine","year":"2008","unstructured":"Blaine, J.D., Cleland-Huang, J.: Software quality requirements: how to balance competing priorities. IEEE Softw. 25(2), 22\u201324 (2008)","journal-title":"IEEE Softw."},{"key":"4_CR2","unstructured":"Imperial chemical industries: A guide to hazard and operability studies. Chemical Industry Safety and Health Council of the Chemical Industries Association (1977)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-02161-9_1","volume-title":"Software Engineering for Self-Adaptive Systems","author":"BHC Cheng","year":"2009","unstructured":"Cheng, B.H.C., et al.: Software engineering for self-adaptive systems: a research roadmap. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol. 5525, pp. 1\u201326. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02161-9_1"},{"key":"4_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional Requirements in Software Engineering","author":"L Chung","year":"2012","unstructured":"Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-functional Requirements in Software Engineering. Springer Science & Business Media, Boston (2012). https:\/\/doi.org\/10.1007\/978-1-4615-5269-7"},{"key":"4_CR5","unstructured":"Dekker, S.: The Field Guide to Understanding Human Error. Ashgate Publishing, Ltd. (2014)"},{"issue":"3","key":"4_CR6","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s12599-010-0102-z","volume":"2","author":"JCS do Prado Leite","year":"2010","unstructured":"do Prado Leite, J.C.S., Cappelli, C.: Software transparency. Bus. Inform. Syst. Eng. 2(3), 127\u2013139 (2010)","journal-title":"Bus. Inform. Syst. Eng."},{"issue":"2","key":"4_CR7","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/32.345830","volume":"21","author":"RG Dromey","year":"1995","unstructured":"Dromey, R.G.: A model for software product quality. IEEE Trans. Software Eng. 21(2), 146\u2013162 (1995)","journal-title":"IEEE Trans. Software Eng."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Burkart, H., Holzner, L.: Transparency in Global Change: The Vanguard of the Open Society Burkart Holzner and Leslie Holzner. University of Pittsburgh Press Pittsburgh, PA (2006)","DOI":"10.2307\/jj.11374757"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Towards engineering transparency as a requirement in socio-technical systems. In: 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, 24\u201328 August 2015, pp. 268\u2013273 (2015)","DOI":"10.1109\/RE.2015.7320435"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Foundations for transparency requirements engineering. In: Requirements Engineering: Foundation for Software Quality - 22nd International Working Conference, Proceedings, REFSQ 2016, Gothenburg, Sweden, 14\u201317 March 2016, pp. 225\u2013231 (2016)","DOI":"10.1007\/978-3-319-30282-9_15"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-39696-5_15","volume-title":"Advanced Information Systems Engineering","author":"M Hosseini","year":"2016","unstructured":"Hosseini, M., Shahri, A., Phalp, K., Ali, R.: A modelling language for transparency requirements in business information systems. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 239\u2013254. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39696-5_15"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Four reference models for transparency requirements in information systems. Requirements Engineering, March 2017. https:\/\/doi.org\/10.1007\/s00766-017-0265-y","DOI":"10.1007\/s00766-017-0265-y"},{"key":"4_CR13","volume-title":"Problem Frames: Analysing and Structuring Software Development Problems","author":"M Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames: Analysing and Structuring Software Development Problems. Addison-Wesley, New York (2001)"},{"key":"4_CR14","unstructured":"Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: Information flow diagram and analysis method for unexpected obstacle specification of embedded software. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28\u201331 August 2006, Tallinn, Estonia, pp. 115\u2013124 (2006)"},{"key":"4_CR15","unstructured":"Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M.A., Ubayashi, N., Katamine, K., Nakatani, T.: A conceptual model for analysis method of extracting unexpected obstacles of embedded systems. In Knowledge-Based Software Engineering, Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2008, 25\u201328 August 2008, University of Piraeus, Piraeus, Greece, pp. 22\u201331 (2008)"},{"key":"4_CR16","unstructured":"Kemball-Cook, A.: Winning the trust of millennials. Global Coaching, p. 30 (2015)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"McDermott, J.P., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6\u201310 December 1999, Scottsdale, AZ, USA, pp. 55\u201364 (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"key":"4_CR18","unstructured":"Mise, T., Shinyashiki, Y., Nakatani, T., Ubayashi, N., Katamine, K., Hashimoto, M.: A method for extracting unexpected scenarios of embedded systems. In: Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, JCKBSE 2006, 28\u201331 August 2006, Tallinn, Estonia, pp. 41\u201350 (2006)"},{"issue":"3","key":"4_CR19","first-page":"536","volume":"22","author":"T Okubo","year":"2014","unstructured":"Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: MASG: advanced misuse case analysis model with assets and security goals. JIP 22(3), 536\u2013546 (2014)","journal-title":"JIP"},{"issue":"3","key":"4_CR20","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TR.1979.5220578","volume":"28","author":"DJ Reifer","year":"1979","unstructured":"Reifer, D.J.: Software failure modes and effects analysis. IEEE Trans. Reliab. 28(3), 247\u2013249 (1979)","journal-title":"IEEE Trans. Reliab."},{"issue":"2","key":"4_CR21","first-page":"14","volume":"4","author":"M Salehie","year":"2009","unstructured":"Salehie, M., Tahvildari, L.: Self-adaptive software: Landscape and research challenges. ACM Trans. Auton. Adapt. Systems (TAAS) 4(2), 14 (2009)","journal-title":"ACM Trans. Auton. Adapt. Systems (TAAS)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Shinyashiki, Y., Mise, T., Hashimoto, M., Katamine, K., Ubayashi, N., Nakatani, T.: Enhancing the ESIM (embedded systems improving method) by combining information flow diagram with analysis matrix for efficient analysis of unexpected obstacles in embedded software. In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5\u20137 December 2007, Nagoya, Japan, pp. 326\u2013333 (2007)","DOI":"10.1109\/ASPEC.2007.81"},{"issue":"1","key":"4_CR23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34\u201344 (2005)","journal-title":"Requir. Eng."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Tanabe, D., Uno, K., Akemine, K., Yoshikawa, T., Kaiya, H., Saeki, M.: Supporting requirements change management in goal oriented analysis. In: 16th IEEE International Requirements Engineering Conference, RE 2008, 8\u201312 September 2008, Barcelona, Catalunya, Spain, pp. 3\u201312 (2008)","DOI":"10.1109\/RE.2008.18"},{"key":"4_CR25","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"A Lamsweerde van","year":"2009","unstructured":"van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)"},{"issue":"10","key":"4_CR26","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A Lamsweerde van","year":"2000","unstructured":"van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Software Eng. 26(10), 978\u20131005 (2000)","journal-title":"IEEE Trans. Software Eng."},{"key":"4_CR27","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7549.001.0001","volume-title":"Social Modeling for Requirements Engineering","author":"E Yu","year":"2010","unstructured":"Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. The MIT Press, Cambridge (2010)"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering for Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7796-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T08:00:40Z","timestamp":1719734440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7796-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811077951","9789811077968"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7796-8_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}