{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:13:16Z","timestamp":1725455596689},"publisher-location":"Berlin\/Heidelberg","reference-count":7,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3540545026"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/bfb0024300","type":"book-chapter","created":{"date-parts":[[2005,11,19]],"date-time":"2005-11-19T05:42:30Z","timestamp":1132378950000},"page":"283-296","source":"Crossref","is-referenced-by-count":3,"title":["Knowledge elicitation for software engineering expertise"],"prefix":"10.1007","author":[{"given":"Julian S.","family":"Weitzenfeld","sequence":"first","affiliation":[]},{"given":"Thomas R.","family":"Riedl","sequence":"additional","affiliation":[]},{"given":"Jared T.","family":"Freeman","sequence":"additional","affiliation":[]},{"given":"Gary A.","family":"Klein","sequence":"additional","affiliation":[]},{"given":"John","family":"Musa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1037\/\/0033-295X.87.3.215","volume":"87","author":"K. A. Ericsson","year":"1980","unstructured":"Ericsson, K. A., & Simon, H. A.. 1980. Verbal reports as data. Psychological Review. 87.3:215\u2013251.","journal-title":"Psychological Review"},{"issue":"4","key":"20_CR2","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1037\/h0061470","volume":"51","author":"J. C. Flanagan","year":"1954","unstructured":"Flanagan. J. C. 1954. The critical incident technique. Psychological Bulletin. 51.4:327\u2013358.","journal-title":"Psychological Bulletin"},{"unstructured":"Freeman, J. T., Riedl, T. R., Weitzenfeld, J. S. & Musa, J. 1991. Instruction for Software Engineering Expertise.","key":"20_CR3"},{"key":"20_CR4","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/21.31053","volume":"19","author":"G. A. Klein","year":"1989","unstructured":"Klein, G. A., Calderwood, R., & MacGregor, D. 1989. Critical Decision Method for eliciting knowledge. IEEE Transactions on systems, man, and cybernetics. 19:462\u2013472.","journal-title":"IEEE Transactions on systems, man, and cybernetics"},{"key":"20_CR5","volume-title":"Knowledge Acquisition: Principles and Guidelines","author":"K. L. McGraw","year":"1989","unstructured":"McGraw, K. L. & Harbison-Briggs, K. 1989. Knowledge Acquisition: Principles and Guidelines. Englewood Cliffs, N.J: Prentice-Hall."},{"key":"20_CR6","volume-title":"Imagination and thinking","author":"P. McKellar","year":"1957","unstructured":"McKellar, P. 1957. Imagination and thinking. London: Cohen & West."},{"key":"20_CR7","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/S1042-8143(89)80010-X","volume":"1","author":"M. L. G. Shaw","year":"1989","unstructured":"Shaw, M. L. G., & Gaines, B. R.. 1989. Comparing conceptual structures: consensus, conflict, correspondence and contrast. Knowledge Acquisition. 1:341\u2013363.","journal-title":"Knowledge Acquisition"}],"container-title":["Lecture Notes in Computer Science","Software Engineering Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0024300.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T21:52:25Z","timestamp":1607550745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0024300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540545026"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/bfb0024300","relation":{},"subject":[]}}