{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:30:27Z","timestamp":1737610227275,"version":"3.33.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,11,22]],"date-time":"2007-11-22T00:00:00Z","timestamp":1195689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s00766-007-0060-2","type":"journal-article","created":{"date-parts":[[2007,11,21]],"date-time":"2007-11-21T08:02:29Z","timestamp":1195632149000},"page":"117-146","source":"Crossref","is-referenced-by-count":14,"title":["A case study validation of a knowledge-based approach for the selection of requirements engineering techniques"],"prefix":"10.1007","volume":"13","author":[{"given":"Li","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Armin","family":"Eberlein","sequence":"additional","affiliation":[]},{"given":"Behrouz H.","family":"Far","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,11,22]]},"reference":[{"key":"60_CR1","unstructured":"Kotonya G, Sommerville I (1998) RE, processes and techniques. Wiley, New York"},{"issue":"7","key":"60_CR2","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1109\/TSE.2006.61","volume":"32","author":"D Damian","year":"2006","unstructured":"Damian D, Chisan J (2006) An empirical study of the complex relationships between requirements engineering processes and other processes that lead to payoffs in productivity, quality, and risk management. IEEE Trans Softw Eng 32(7):433\u2013453","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"60_CR3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MC.1987.1663532","volume":"20","author":"F Brooks","year":"1987","unstructured":"Brooks F (1987) No silver bullet: essence and accidents of software engineering. Computer 20(4):10\u201319","journal-title":"Computer"},{"key":"60_CR4","unstructured":"Claus C, Freund M, Kaiser M, Kneuper R (1999) Implementing systematic requirements management in a large software development programme. In: Proceeding of fifth international workshop on requirements engineering foundation of software quality, pp 33\u201342"},{"issue":"6","key":"60_CR5","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/32.852742","volume":"26","author":"KE El-Emam","year":"2000","unstructured":"El-Emam KE, Birk A (2000) Validating the ISO\/IEC 15504 measure of software requirements analysis process capability. IEEE Trans Softw Eng 26(6):541\u2013566","journal-title":"IEEE Trans Softw Eng"},{"key":"60_CR6","unstructured":"Jiang L, Eberlein A, Far BH (2004) Evaluating the requirements engineering process using major concerns. In: Proceeding of IASTED international conference on software engineering, February 17\u201319, Innsbruck, Austria"},{"key":"60_CR7","unstructured":"Nikula U, Sajaniemi J, Kalviainen H (2000) A state-of-the-practice: survey on RE in small- and medium-sized enterprises. Telecom Business Research Center, Lappeenranta Research Report"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Glass RL, Vessey L (1995) Contemporary application-domain taxomonies. IEEE Software 1995, pp 63\u201376","DOI":"10.1109\/52.391837"},{"key":"60_CR9","unstructured":"Nuseibeh B, Easterbrook S (2000), RE: a roadmap. In: Anthony F (ed) The future of software engineering. ACM, New York"},{"key":"60_CR10","unstructured":"Sutcliffe A (1997) A technique combination approach to requirements engineering. In: 3rd IEEE international symposium on requirements engineering (RE\u201997), January 05\u201308, Annapolis"},{"key":"60_CR11","unstructured":"Mannio M, Nikula U (2001), Requirements elicitation using a combination of prototypes and scenarios. Technical Report. Telecom Business Research Center, Lappeenranta University of Technology, P.O. Box 20, FIN-53851 Lappeenranta, Finland, Lappeenranta, 2001, ISBN 951-764-528-7"},{"key":"60_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-1005-7","volume-title":"Requirements engineering, applied computing","author":"LA Macaulay","year":"1996","unstructured":"Macaulay LA (1996) Requirements engineering, applied computing. Springer, Heidelberg"},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"Berry D, Damian D, Finkelstein A, Gause D, Hall R, Wassyng A (2005) To do or not to do: if the requirements engineering payoff is so good, why aren\u2019t more companies doing it?\u201d Proceeding of Requirements Engineering 2005.","DOI":"10.1109\/RE.2005.74"},{"issue":"1\u20132","key":"60_CR14","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:EMSE.0000013514.19567.ad","volume":"9","author":"D Damian","year":"2004","unstructured":"Damian D, Zowghi D, Vaidyanathasamy L, Pal Y (2004) An industrial case study of immediate benefits of requirements engineering process improvement at the Australian Center for Unisys Software. Int J Empir Softw Eng 9(1\u20132):45\u201375","journal-title":"Int J Empir Softw Eng"},{"key":"60_CR15","doi-asserted-by":"crossref","unstructured":"Hall T, Beecham S, Raner A (2002) Requirements problems in twelve software companies: an empirical analysis. IEE Proc Softw 149(5)","DOI":"10.1049\/ip-sen:20020694"},{"issue":"4","key":"60_CR16","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/52.300031","volume":"8","author":"W Humphrey","year":"1991","unstructured":"Humphrey W, Snyder T, Willis R (1991) Software process improvement at Hughes aircraft. IEEE Softw 8(4):11\u201323","journal-title":"IEEE Softw"},{"key":"60_CR17","volume-title":"Software requirements, objects, functions and states","author":"AM Davis","year":"1993","unstructured":"Davis AM (1993) Software requirements, objects, functions and states. Prentice-Hall, Englewood Cliffs"},{"key":"60_CR18","unstructured":"Jiang L (2005) A framework for requirements engineering process development. University of Calgary, PhD Thesis, Sept. 2005"},{"key":"60_CR19","unstructured":"Extreme Chaos (2001) The Standish Group International"},{"key":"60_CR20","unstructured":"Jiang L, Eberlein A, Far BH (2004) A methodology for RE process development. In: ECBS 11th IEEE international conference and workshop on the engineering of computer-based systems, Brno, May 2004"},{"issue":"3","key":"60_CR21","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1049\/sej.1996.0024","volume":"11","author":"N Maiden","year":"1996","unstructured":"Maiden N, Rugg G (1996) ACRE: selecting methods for requirements acquisition. Softw Eng J 11(3):183\u2013192","journal-title":"Softw Eng J"},{"key":"60_CR22","doi-asserted-by":"crossref","unstructured":"Hickey AM, Davis AM (2003) Elicitation technique selection: how do experts do it? In: Proceedings of the 11th IEEE international requirements engineering conference, pp 169\u2013178","DOI":"10.1109\/ICRE.2003.1232748"},{"issue":"6","key":"60_CR23","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MS.2003.1241362","volume":"20","author":"C Jones","year":"2003","unstructured":"Jones C (2003) Variations in software development practices. IEEE Softw 20(6):22\u201327","journal-title":"IEEE Softw"},{"key":"60_CR24","doi-asserted-by":"crossref","unstructured":"Macaulay L (1996), Requirements for requirements engineering techniques. In: IEEE second international conference on requirements engineering","DOI":"10.1109\/ICRE.1996.491440"},{"key":"60_CR25","doi-asserted-by":"crossref","unstructured":"Hickey AM, Davis AM (2003) Requirements elicitation and elicitation technique selection: a model for two knowledge-intensive software development processes. In: Proceedings of the 36th annual Hawaii international conference on system sciences, 6\u20139 January 2003, pp 96\u2013105","DOI":"10.1109\/HICSS.2003.1174229"},{"key":"60_CR26","unstructured":"Tsumaki T, Tamai T (2005) A framework for matching RE techniques to project characteristics and situation changes. In: First international workshop on situational requirements engineering processes, in conjunction with 13th IEEE international requirements engineering conference, August 29th\u2013September 2nd 2005, Paris"},{"key":"60_CR27","unstructured":"Bickerton JM, Siddiqi J (1993) The classification of Requirements engineering methods. In: Proceedings of IEEE international symposium on requirements engineering, 4\u20136 Jan 1993, San Diego"},{"issue":"1","key":"60_CR28","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1147\/sj.211.0004","volume":"21","author":"GB Davis","year":"1982","unstructured":"Davis GB (1982) Strategies for information requirements determination. IBM Syst J 21(1):4\u201331","journal-title":"IBM Syst J"},{"key":"60_CR29","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/S0378-7206(02)00014-9","volume":"39","author":"GJ Browne","year":"2002","unstructured":"Browne GJ, Ramesh V (2002) Improving information requirements determination: a cognitive perspective. Inform Manage 39:625\u2013645","journal-title":"Inform Manage"},{"key":"60_CR30","volume-title":"Software requirements: styles and techniques","author":"S Lauesen","year":"2002","unstructured":"Lauesen S (2002) Software requirements: styles and techniques. Addison-Wesley, Reading"},{"key":"60_CR31","unstructured":"Kumar K, Welke RJ (1992) In: Cotterman W, Senn J (eds) Methodology engineering: a proposal for situation specific methodology construction, challenges and strategies for research in systems development. Wiley, Chichester, pp 257\u2013266"},{"key":"60_CR32","unstructured":"Brinkkemper S (1995) Method engineering: engineering the information systems development methods and tools. Inform Softw Technol 37(11)"},{"key":"60_CR33","volume-title":"Method engineering, principles of method construction and tool support","author":"S Brinkkemper","year":"1996","unstructured":"Brinkkemper S, Lyytinen K, Welke R (1996) Method engineering, principles of method construction and tool support. Chapman & Hall, London"},{"issue":"6","key":"60_CR34","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MS.2003.1241370","volume":"20","author":"DJ Reifer","year":"2003","unstructured":"Reifer DJ (2003) Is the software engineering state of the practice getting closer to the of the art? IEEE Softw 20(6):78\u201383","journal-title":"IEEE Softw"},{"key":"60_CR35","volume-title":"Decision support systems and intelligent system","author":"E Turban","year":"2001","unstructured":"Turban E, Aronson JE (2001) Decision support systems and intelligent system, 6th edn. Prentice-Hall, Upper Saddle River","edition":"6"},{"key":"60_CR36","unstructured":"Holsapple CW, Whinston AB (2000) Decision support systems: a knowledge-based approach. West Publishing Company, Minneapolis\/St Paul, ISBN 0-314-06510-5"},{"key":"60_CR37","unstructured":"Jiang L, Eberlein A, Far BH, Majid M (2004) An innovative requirement engineering technique selection model. Technical Reports, April 31st, 2004, Department of Electrical and Computer Engineering, University of Calgary, http:\/\/www2.enel.ucalgary.ca\/\u223cljiang\/research\/indexOfResearch.htm"},{"key":"60_CR38","volume-title":"Requirements engineering: social and technical issues","author":"M Jirotka","year":"1959","unstructured":"Jirotka M, Goguen JA (1959) Requirements engineering: social and technical issues. Academic, London"},{"issue":"1","key":"60_CR39","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1287\/mnsc.6.1.25","volume":"6","author":"O Helmer","year":"1959","unstructured":"Helmer O, Rescher N (1959) On the epistemology of the inexact science. Manage Sci 6(1):25\u201328","journal-title":"Manage Sci"},{"key":"60_CR40","unstructured":"Aamodt A, Plaza E (1994) Case-based reasoning: foundational issues, methodological variations, and system approaches, artificial intelligence communications, vol 7:1. IOS Press, pp 39\u201359"},{"key":"60_CR41","volume-title":"Artificial intelligence; a modern approach","author":"S Russell","year":"1995","unstructured":"Russell S, Norvig P (1995) Artificial intelligence; a modern approach. Prentice-Hall, Englewood Cliffs"},{"issue":"9","key":"60_CR42","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1145\/4284.4285","volume":"28","author":"R Fikes","year":"1985","unstructured":"Fikes R, Kehler T (1985) The role of frame-based representation. Reason Commun ACM 28(9):904\u2013920","journal-title":"Reason Commun ACM"},{"key":"60_CR43","unstructured":"Jiang L, Eberlein A (2006) Clustering requirements engineering techniques. In: IASTED international conference on software engineering and applications (SEA 2006), November 13\u201315, Dallas"},{"key":"60_CR44","doi-asserted-by":"crossref","unstructured":"Kitchenham B, Pickard L, Pfleeger SL (1995) Case studies for method and tool evaluation. IEEE Softw, pp 52\u201362","DOI":"10.1109\/52.391832"},{"key":"60_CR45","unstructured":"Fitzgerald B (1996) An investigation of the use of system development methodologies in practice. In: Fourth European conference on information systems, pp 143\u2013161"},{"key":"60_CR46","unstructured":"Jiang L, Eberlein A, Far BH (2005) Combining requirements engineering techniques\u2014theory and case study. In: ECBS 12th IEEE international conference on the engineering of computer-based systems, Greenbelt, April 2005"},{"key":"60_CR47","unstructured":"Chaos (1999) A recipe for success. The Standish Group International"},{"issue":"4","key":"60_CR48","first-page":"23","volume":"9","author":"J Broadman","year":"1996","unstructured":"Broadman J, Johnson D (1996) Return on investment from software process improvement as measured by U.S. industry. Crosstalk 9(4):23\u201329","journal-title":"Crosstalk"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-007-0060-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-007-0060-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-007-0060-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T19:17:23Z","timestamp":1737573443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-007-0060-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,22]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["60"],"URL":"https:\/\/doi.org\/10.1007\/s00766-007-0060-2","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"type":"print","value":"0947-3602"},{"type":"electronic","value":"1432-010X"}],"subject":[],"published":{"date-parts":[[2007,11,22]]}}}