{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:32:54Z","timestamp":1742963574178,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811556784"},{"type":"electronic","value":"9789811556791"}],"license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5679-1_22","type":"book-chapter","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:05:18Z","timestamp":1598688318000},"page":"229-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Variance Model for Risk Assessment During Software Maintenance"],"prefix":"10.1007","author":[{"given":"V. Lakshmi","family":"Narasimhan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,30]]},"reference":[{"key":"22_CR1","unstructured":"Braude, E.J.: Software Engineering: An Object-Oriented Perspective. Wiley 2001"},{"issue":"9","key":"22_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSPEC.2005.1502528","volume":"42","author":"RN Charette","year":"2005","unstructured":"Charette, R.N.: Why software fails. IEEE Spectr. 42(9), 36\u201343 (2005)","journal-title":"IEEE Spectr."},{"key":"22_CR3","unstructured":"Whittaker, J. Jorgensen, A.: Why software fails. Available at: http:\/\/www.aet-usa.com\/people\/aaj\/WhySoftwareFails.htm"},{"key":"22_CR4","unstructured":"Stoneburner, G., Goguen A., Feringa, A.: Risk management guide for information technology systems. NIST special publication no. 800\u2013830, US Department of Commerce"},{"key":"22_CR5","unstructured":"EDS seminar notes, EDS IT technical manager, Adelaide. Seminar held at Newcastle in April, 2005"},{"issue":"9","key":"22_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSPEC.2005.1502526","volume":"42","author":"H Goldstein","year":"2005","unstructured":"Goldstein, H.: Who killed the virtual case file? IEEE Spectr. 42(9), 18\u201329 (2005)","journal-title":"IEEE Spectr."},{"issue":"9","key":"22_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1081992.1082007","volume":"48","author":"PG Armour","year":"2005","unstructured":"Armour, P.G.: To pan, two plans: a planning approach to managing risk. Comm. ACM 48(9), 15\u201319 (2005)","journal-title":"Comm. ACM"},{"key":"22_CR8","unstructured":"\u201cInside Risks\u201d, regular column. Comm. ACM (particularly 2004\u201305 issues are very relevant)"},{"key":"22_CR9","unstructured":"Nigle, C.: Test automation frameworks. Available at: http:\/\/safsdev.sourceforge.net\/FRAMESDataDrivenTestAutomationFrameworks.htm"},{"key":"22_CR10","unstructured":"Bach, J.: Risk-based testing. Available at: http:\/\/www.stickyminds.com\/sitewide.asp?ObjectId=1800&ObjectType=ART&Function=edetail"},{"key":"22_CR11","unstructured":"McMahon, K.: Risk-based testing. Available at: http:\/\/www.data-dimensions.com\/testersnet\/docs\/riskbase.htm"},{"key":"22_CR12","unstructured":"Shafer, J.: Improving software testability. Available at: http:\/\/www.data-dimensions.com\/testersnet\/docs\/testability.htm"},{"key":"22_CR13","unstructured":"Kaner, Falk, Nguyen.: Testing computer software, 2nd edn. John wiley (1999)"},{"key":"22_CR14","unstructured":"Kaner, C.: Quality cost analysis: benefits and risks. Available at: http:\/\/www.kaner.com\/qualcost.htm"},{"key":"22_CR15","unstructured":"Fewster, M., Graham, D.: Choosing a test tool. Available at: http:\/\/www.grove.co.uk\/Tool_Information\/Choosing_Tools.html"},{"key":"22_CR16","unstructured":"Pettichord, B.: Seven steps to test automation success. Available at: http:\/\/www.io.com\/~wazmo\/papers\/seven_steps.html"},{"key":"22_CR17","unstructured":"Marick, B.: Classic testing mistakes. Available at: http:\/\/www.testing.com\/writings\/classic\/mistakes.html"},{"key":"22_CR18","unstructured":"Chillarege, R.: Software testing best practices. Available at: Software Testing Best Practices, by Ram Chillarege"},{"key":"22_CR19","unstructured":"DeLano D., Rising, L.: System test pattern language. Available at: http:\/\/www.agcs.com\/supportv2\/techpapers\/patterns\/papers\/systestp.htm"},{"key":"22_CR20","unstructured":"Bach, J.: Test automation snake oil. Available at: http:\/\/www.satisfice.com\/articles\/test_automation_snake_oil.pdf"},{"key":"22_CR21","unstructured":"Gits, C.W.: On the maintenance concept for a technical system: II. Literature review. Maintenance Manage. Int. 6, 181\u2013196 (1986)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Duthie, J.C., Robertson M.I., Clayton A.M., Lidbury D.P.G.: Risk-based approaches to ageing and maintenance management. Nucl Eng. Design. 184(1), 27\u201338(12), 1 August (1998)","DOI":"10.1016\/S0029-5493(97)00366-X"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Edwards, L.: Practical risk management in the construction industry. ISBN: 0727720643, Thomas Telford (1995)","DOI":"10.1680\/prmitci.20641"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Cusumano, M.A., MacCormack, A., Kemerer, C., Crandall, B.: Software development worldwide: the state of the practice. IEEE Soft. 20(6), 28\u201334 (2003)","DOI":"10.1109\/MS.2003.1241363"},{"key":"22_CR25","unstructured":"Knuth, D.E.: Literate programming in CSLI lecture notes, no.27.In: Centre for the Study of Language and Information. Stanford, CA (1992)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Bond G.W.: Software as art. Comms. ACM. 48(8) 118\u2013124 (2005)","DOI":"10.1145\/1076211.1076215"},{"issue":"9","key":"22_CR27","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1081992.1082011","volume":"48","author":"MA Cusumano","year":"2005","unstructured":"Cusumano, M.A.: The puzzle of Japanese software. Comm. ACM 48(9), 25\u201327 (2005)","journal-title":"Comm. ACM"},{"key":"22_CR28","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195062168.001.0001","volume-title":"Japan\u2019s Software Factories","author":"MA Cusumano","year":"1991","unstructured":"Cusumano, M.A.: Japan\u2019s Software Factories. Oxford University Press, NY (1991)"},{"key":"22_CR29","unstructured":"Bach, J.: The challenge of \u201cGood Enough\u201d Software. Available at: http:\/\/www.data-dimensions.com\/testersnet\/docs\/good.htm"},{"key":"22_CR30","unstructured":"Deklava: Delphi study of software maintenance problems. In: Proceedings of International Conference on Software Maintenance, pp. 10\u201317 (1992)"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Armour, P.G.: Project portfolios: organizational management of risk. Comms. ACM. 48(3),17\u201320 (2005)","DOI":"10.1145\/1047671.1047690"},{"key":"22_CR32","unstructured":"Oman, P., Hagemeister, J.: Metrics for assessing software system maintainability. In: Proceedings Conference on Software Maintenance, pp. 337\u2013344. IEEE CS Press, Los Alamitos Califormnia. Order No. 2980\u201302T (1992)"},{"key":"22_CR33","unstructured":"Model (MIT90) for assessing and achieving chang. Available at. http:\/\/www.adventengineering.com\/why\/mit_90\/mit_90.htm"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Lakshmi Narasimhan, V.: A risk management toolkit for integrated engineering asset maintenance. Aust. J. Mech. Eng. (AJME) (2008)","DOI":"10.1080\/14484846.2008.11464539"},{"key":"22_CR35","unstructured":"Pooch, P.: Application performance \u2013 a risk-based approach. In: Second test automation workshop, 1-2 Sept. Bond University, Gold Coast, Australia (2005)"},{"key":"22_CR36","unstructured":"Humphry, M.: Capability maturity model integration. http:\/\/www.sei.cmu.edu\/cmm\/"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5679-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T20:28:10Z","timestamp":1723494490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5679-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,30]]},"ISBN":["9789811556784","9789811556791"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5679-1_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,30]]},"assertion":[{"value":"30 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}