{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T13:40:52Z","timestamp":1682775652089},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T00:00:00Z","timestamp":1097107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2005,1]]},"DOI":"10.1007\/s00766-004-0200-x","type":"journal-article","created":{"date-parts":[[2004,10,6]],"date-time":"2004-10-06T10:08:58Z","timestamp":1097057338000},"page":"63-80","source":"Crossref","is-referenced-by-count":1,"title":["The system reliability analyser tool"],"prefix":"10.1007","volume":"10","author":[{"given":"Andreas","family":"Gregoriades","sequence":"first","affiliation":[]},{"given":"Alistair","family":"Sutcliffe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,10,7]]},"reference":[{"key":"CR1","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible information","author":"J Pearl","year":"1988","unstructured":"Pearl J (1988) Probabilistic reasoning in intelligent systems: networks of plausible information. Morgan Kaufmann, San Francisco"},{"key":"CR2","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J Mylopoulos","year":"1992","unstructured":"Mylopoulos J, Chung L, Nixon B (1992) Representing and using non-functional requirements: a process-oriented approach. IEEE Trans Software Eng 18:483?497","journal-title":"IEEE Trans Software Eng"},{"key":"CR3","doi-asserted-by":"crossref","unstructured":"Heitmeyer C, Kirby J, Labaw B (1998) Applying the SCR requirements method to a weapons control panel: an experience report. In: Proceedings of the 2nd workshop on formal methods in software practice (FMSP?98), Clearwater Beach, Florida, March 1998","DOI":"10.1145\/298595.298863"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s007660050005","volume":"3","author":"P Heymans","year":"1998","unstructured":"Heymans P, Dubois E (1998) Scenario based techniques for supporting the elaboration and the validation of formal requirements. Requirements Eng 3:202?218","journal-title":"Requirements Eng"},{"key":"CR5","doi-asserted-by":"crossref","unstructured":"Sutcliffe AG (1997) A technique combination approach to requirements engineering. In: Proceedings of the 3rd IEEE international symposium on requirements engineering (RE?97), Annapolis, Maryland, January 1997. IEEE Computer Society Press, Washington, District of Columbia, pp 65?74","DOI":"10.1109\/ISRE.1997.566843"},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"Atwood M, Burns B, Girgensohn A, Lee A, Turner T, Zimmermann B (1995) Prototyping considered dangerous. In: Proceedings of the 5th IFIP international conference on human?computer interaction (Interact ?95), Lillehammer, Norway, June 27?29, pp 179?184","DOI":"10.1007\/978-1-5041-2896-4_30"},{"key":"CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0217-5","volume-title":"User-centred requirements engineering","author":"A Sutcliffe","year":"2002","unstructured":"Sutcliffe A (2002) User-centred requirements engineering. Springer, Berlin Heidelberg New York"},{"issue":"10","key":"CR8","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/32.163603","volume":"18","author":"LW Johnson","year":"1992","unstructured":"Johnson LW, Feather M, Harris D (1992) Representation and presentation of requirements knowledge. IEEE Trans Software Eng 18(10):853?869","journal-title":"IEEE Trans Software Eng"},{"key":"CR9","unstructured":"Dubois P, Dubois E, Zeippen J (1997) On the use of a formal representation. In: Proceedings of the 3rd IEEE international symposium on requirements engineering (RE?97), Annapolis, Maryland, January 1997. IEEE Computer Society Press, Washington, District of Columbia, pp 128?137"},{"key":"CR10","doi-asserted-by":"crossref","unstructured":"Potts C, Takahashi K, Smith J, Ota K (1995) An evaluation of inquiry-based requirements analysis for an Internet service. In: Proceedings of the 2nd IEEE international symposium on requirements engineering (RE?95), York, England, March 1995. IEEE Computer Society Press, Washington, District of Columbia, pp 27?42","DOI":"10.1109\/ISRE.1995.512559"},{"key":"CR11","unstructured":"Yu E, Mylopoulos J (1994) Towards modelling strategic actor relationships for information systems development?with examples from business process reengineering. In: Proceedings of the 4th workshop on information technologies and systems (WITS?94), Vancouver, British Columbia, Canada, December 1994, pp 21?28"},{"key":"CR12","doi-asserted-by":"crossref","unstructured":"Maiden NAM, Sutcliffe AG (1994) Requirements critiquing using domain abstractions. In: Proceedings of the 1st international conference on requirements engineering (RE?94), Colorado Springs, Colorado, April 1994. IEEE Computer Society Press, Washington, District of Columbia, ref. HCID94\/03, pp 184?194","DOI":"10.1109\/ICRE.1994.292386"},{"key":"CR13","doi-asserted-by":"crossref","unstructured":"Gregoriades A, Sutclife A, Shin JE (2002) Assessing the reliability of socio-technical systems. In: Proceedings of the 12th annual INCOSE (international council on systems engineering) conference, Las Vegas, July\/August 2002","DOI":"10.1002\/j.2334-5837.2002.tb02552.x"},{"key":"CR14","doi-asserted-by":"crossref","unstructured":"Jeffords R, Heitmeyer C (2003) A strategy for efficiently verifying requirements specifications using composition and invariants. In: Proceedings of the European software engineering conference\/ACM GIGSOFT symposium on the foundations of software engineering (ESEC\/FSE 2003), Helsinki, Finland, September 2003","DOI":"10.21236\/ADA464275"},{"key":"CR15","unstructured":"Casey K, Exton C (2003) A Java 3D implementation of a Geon based visualization tool for UML. In: Proceedings of the 2nd international ACM conference on the principles and practice of programming in Java (PPPJ 2003), Kilkenny City, Ireland, June 2003"},{"key":"CR16","doi-asserted-by":"crossref","unstructured":"Gemino A (2003) Empirical comparisons of animation and narration in requirements validation. Require Eng (accepted)","DOI":"10.1007\/s00766-003-0182-0"},{"key":"CR17","doi-asserted-by":"crossref","unstructured":"Lalioti V (1997) Animation for validation of business system specifications. In: Proceedings of the 30th annual Hawaii international conference on system sciences (HICSS-30), the dynamics of business systems engineering, Maui, Hawaii, January 1997, pp 7?10","DOI":"10.1109\/HICSS.1997.665501"},{"key":"CR18","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/0306-4379(94)90047-7","volume":"19","author":"V Lalioti","year":"1994","unstructured":"Lalioti V, Loucopoulos P(1994) Visualisation of conceptual specifications. Inf Syst 19:291?309","journal-title":"Inf Syst"},{"key":"CR19","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S0164-1212(01)00108-X","volume":"61","author":"D Chen","year":"2002","unstructured":"Chen D, Chen W, Kavi K (2002) Visual requirement representation. J Syst Software 61:129?143","journal-title":"J Syst Software"},{"key":"CR20","doi-asserted-by":"crossref","unstructured":"Grau A, Kowsari M (1997) A validation system for object-oriented specifications of information systems. In: Manthey R, Wolfengagen V (eds) In: Proceedings of the 1st East-European symposium on advances in databases and information systems (ADBIS?97), St. Petersburg, Russia, September 1997","DOI":"10.14236\/ewic\/ADBIS1997.21"},{"key":"CR21","doi-asserted-by":"crossref","unstructured":"Shneiderman B (1996) The eyes have it: a task by data type taxonomy for information visualisations. In: Proceedings of the IEEE symposium on visual languages (VL?96), Boulder, Colorado, September 1996, pp 336?343","DOI":"10.1109\/VL.1996.545307"},{"key":"CR22","volume-title":"Scenario-based design: envisioning work and technology in system development","author":"J Carroll","year":"1995","unstructured":"Carroll J (1995) Scenario-based design: envisioning work and technology in system development. Wiley, New York"},{"key":"CR23","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139062367","volume-title":"Human error","author":"J Reason","year":"1990","unstructured":"Reason J (1990) Human error. Cambridge University Press, Cambridge, UK"},{"key":"CR24","volume-title":"CommonKADS library for expertise modeling","author":"J Breuker","year":"1994","unstructured":"Breuker J, Van Der Velde W (1994) CommonKADS library for expertise modeling. IOS Press, Amsterdam, The Netherlands"},{"key":"CR25","doi-asserted-by":"crossref","DOI":"10.1201\/b12455","volume-title":"The domain theory: patterns for knowledge and software reuse","author":"G Sutcliffe","year":"2002","unstructured":"Sutcliffe G (2002) The domain theory: patterns for knowledge and software reuse. Lawrence Erlbaum Associates, Mahwah, New Jersey"},{"key":"CR26","doi-asserted-by":"crossref","DOI":"10.21236\/ADA421917","volume-title":"Command, control, and the common defence","author":"K Allard","year":"1996","unstructured":"Allard K (1996) Command, control, and the common defence (revised edition). National Defence University Press, Washington, District of Columbia"},{"key":"CR27","volume-title":"Human reliability analysis: context and control","author":"E Hollnagel","year":"1993","unstructured":"Hollnagel E (1993) Human reliability analysis: context and control. Academic Press, New York"},{"key":"CR28","doi-asserted-by":"crossref","unstructured":"Swain D, Guttmann H (1983) Handbook of human reliability analysis with emphasis on nuclear power plant applications. United States National Regulatory Commission report NUREG\/CR-1278, Sandia National Laboratories, Albuquerque, New Mexico","DOI":"10.2172\/5752058"},{"issue":"3","key":"CR29","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TSMC.1983.6313160","volume":"13","author":"J Rasmussen","year":"1983","unstructured":"Rasmussen J (1983) Skills, rules, knowledge: signals, signs, and symbols and other distinctions in human performance models. IEEE Trans Syst Man Cybern 13(3)257?266","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"1241","key":"CR30","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1098\/rstb.1990.0088","volume":"327","author":"J Rasmussen","year":"1990","unstructured":"Rasmussen J (1990) Human error and the problem of causality in analysis of accidents. Philos Trans R Soc Lond B Biol Sci 327(1241):449?462","journal-title":"Philos Trans R Soc Lond B Biol Sci"},{"key":"CR31","volume-title":"The psychology of everyday things","author":"D Norman","year":"1988","unstructured":"Norman D (1988) The psychology of everyday things. MIT Press, Cambridge, Massachusetts"},{"key":"CR32","volume-title":"The invisible computer","author":"D Norman","year":"1999","unstructured":"Norman D (1999) The invisible computer. MIT Press, Cambridge, Massachusetts"},{"key":"CR33","volume-title":"Software metrics: a rigorous approach","author":"N Fenton","year":"1997","unstructured":"Fenton N, Pfleeger SL (1997) Software metrics: a rigorous approach, 2nd edn. International Thomson Computer Press, Boston, Massachusetts"},{"issue":"3","key":"CR34","first-page":"10","volume":"8","author":"N. Fenton","year":"1999","unstructured":"Fenton N (1999) Applying Bayesian belief networks to critical systems assessment. Crit Syst Club Newslett 8(3):10?13","journal-title":"Crit Syst Club Newslett"},{"key":"CR35","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/S0950-7051(00)00071-X","volume":"14","author":"N. Fenton","year":"2001","unstructured":"Fenton N, Neil M (2001) Making decisions: using Bayesian nets and MCDA. Knowl-Based Syst 14:307?325","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"CR36","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1207\/s15327590ijhc1004_5","volume":"10","author":"AG Sutcliffe","year":"1998","unstructured":"Sutcliffe AG, Rugg G (1998) A taxonomy of error types for failure analysis and risk assessment. Int J Hum Comput Interact 10(4)381?406","journal-title":"Int J Hum Comput Interact"},{"key":"CR37","volume-title":"Safeware: system safety and computers","author":"N Leveson","year":"1995","unstructured":"Leveson N (1995) Safeware: system safety and computers. Addison Wesley, Reading, Massachusetts"},{"key":"CR38","volume-title":"Managing the risks of organizational accidents","author":"J Reason","year":"2000","unstructured":"Reason J (2000) Managing the risks of organizational accidents. Ashgate, Aldershot, UK"},{"key":"CR39","doi-asserted-by":"crossref","unstructured":"Sutcliffe AG, Galliers J, Minocha S (1999) Human errors and system requirements. In: Proceedings of the 4th IEEE international symposium on requirements engineering (RE?99), Limerick, Ireland, June 1999, pp 23?30","DOI":"10.1109\/ISRE.1999.777982"},{"key":"CR40","doi-asserted-by":"crossref","unstructured":"Gregoriades A, Sutclife A (2003) Diagnosing reliability problems in socio-technical systems: a visualisation approach. In: Proceedings of the 13th annual INCOSE (international council on systems engineering) symposium, Crystal City, Virginia, June 2003","DOI":"10.1002\/j.2334-5837.2003.tb02613.x"},{"key":"CR41","unstructured":"Neil M, Fenton N (1996) Predicting software quality using Bayesian belief networks. In: Proceedings of the 21st annual software engineering workshop (SEW21), NASA\/Goddard Space Flight Centre, Greenbelt, Maryland, December 1996"},{"issue":"12","key":"CR42","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.1109\/32.738340","volume":"24","author":"A Sutcliffe","year":"1998","unstructured":"Sutcliffe A, Maiden N, Minocha S, Darrel M (1998) Supporting scenario-based requirements engineering. IEEE Trans Software Eng 24(12)1072?1088","journal-title":"IEEE Trans Software Eng"},{"key":"CR43","unstructured":"Luxhoj JT (2002) Risk analysis of human performance in aviation maintenance. In: Proceedings of the 16th human factors in aviation maintenance symposium (HFIAM 2002), San Francisco, California, April 2002"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-004-0200-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-004-0200-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-004-0200-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T13:09:52Z","timestamp":1682773792000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-004-0200-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,7]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["200"],"URL":"https:\/\/doi.org\/10.1007\/s00766-004-0200-x","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,10,7]]}}}