{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T13:10:25Z","timestamp":1713100225268},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s00766-011-0139-7","type":"journal-article","created":{"date-parts":[[2011,11,5]],"date-time":"2011-11-05T03:57:20Z","timestamp":1320465440000},"page":"43-66","source":"Crossref","is-referenced-by-count":7,"title":["Requirements engineering within a large-scale security-oriented research project: lessons learned"],"prefix":"10.1007","volume":"18","author":[{"given":"Seda","family":"G\u00fcrses","sequence":"first","affiliation":[]},{"given":"Magali","family":"Seguran","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,6]]},"reference":[{"key":"139_CR1","doi-asserted-by":"crossref","unstructured":"Alves C, Finkelstein A (2002) Challenges in cots decision-making: a goal-driven requirements engineering perspective. In: Proceedings of 14th international conference on Software Engineering and Knowledge Engineering. ACM, New York, pp 789\u2013794","DOI":"10.1145\/568760.568894"},{"key":"139_CR2","volume-title":"Storyboard prototyping: a new approach to user requirements analysis","author":"SJ Andriole","year":"1989","unstructured":"Andriole SJ (1989) Storyboard prototyping: a new approach to user requirements analysis. QED Information Sciences Inc., Wellesley"},{"key":"139_CR3","doi-asserted-by":"crossref","unstructured":"Asnar Y, Moretti R, Sebastianis M, Zannone N (2008) Risk as dependability metrics for the evaluation of business solutions: a model-driven approach. In: Proceedings of the 3rd international conference on availability, reliability and security. IEEE Computer Society, Washington, pp 1240\u20131248","DOI":"10.1109\/ARES.2008.17"},{"issue":"3","key":"139_CR4","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/s007660200011","volume":"7","author":"M Bergman","year":"2002","unstructured":"Bergman M, King JL, Lyytinen K (2002) Large-scale requirements analysis revisited: the need for understanding the political ecology of requirements engineering. Requir Eng 7(3):152\u2013171","journal-title":"Requir Eng"},{"key":"139_CR5","unstructured":"Blomberg J, Giacomi J, Mosher A, Swenton-Wall P (1993) Ethnographic field methods and their relation to design. In: Participatory design: principles and practices. Erlbaum, London, pp 123\u2013155"},{"issue":"1","key":"139_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"TD Breaux","year":"2008","unstructured":"Breaux TD, Ant\u00f3n AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5\u201320","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"139_CR7","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A (2004) TROPOS: an agent-oriented software development methodology. Auton Agents Multi-Agent Syst 8(3):203\u2013236","journal-title":"Auton Agents Multi-Agent Syst"},{"issue":"5","key":"139_CR8","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1080\/00140139008927160","volume":"33","author":"S Caplan","year":"1990","unstructured":"Caplan S (1990) Using focus group methodology for ergonomic design. Ergonomics 33(5):527\u2013533","journal-title":"Ergonomics"},{"key":"139_CR9","doi-asserted-by":"crossref","unstructured":"Carlshamre P, Sandahl K, Lindvall M, Regnell B, Dag JN (2001) An industrial survey of requirements interdependencies in software product release planning. In: Proceedings of the 5th IEEE international symposium on requirements engineering. IEEE Computer Society, Washington, pp 84\u201393","DOI":"10.1109\/ISRE.2001.948547"},{"key":"139_CR10","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.arcontrol.2003.09.001","volume":"27","author":"D Chen","year":"2003","unstructured":"Chen D, Doumeingts G (2003) European initiatives to develop interoperability of enterprise european initiatives to develop interoperability of enterprise applications-basic concepts, framework and roadmap. Annu Rev Control 27:153\u2013162","journal-title":"Annu Rev Control"},{"issue":"8","key":"139_CR11","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/S0950-5849(03)00032-6","volume":"45","author":"J Coughlan","year":"2003","unstructured":"Coughlan J, Lycett M, Macredie RD (2003) Communication issues in requirements elicitation: a content analysis of stakeholder experiences. Inf Softw Technol 45(8):525\u2013537","journal-title":"Inf Softw Technol"},{"key":"139_CR12","doi-asserted-by":"crossref","unstructured":"Dahlstedt \u00c5, Persson A (2005) Requirements interdependencies: state of the art and future challenges. In: Engineering and managing software requirements. Springer, New York, pp 95\u2013116","DOI":"10.1007\/3-540-28244-0_5"},{"issue":"2","key":"139_CR13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MS.2007.55","volume":"24","author":"DE Damian","year":"2007","unstructured":"Damian DE (2007) Stakeholders in global requirements engineering: lessons learned from practice. IEEE Softw 24(2):21\u201327","journal-title":"IEEE Softw"},{"issue":"3","key":"139_CR14","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00766-003-0173-1","volume":"8","author":"DE Damian","year":"2003","unstructured":"Damian DE, Zowghi D (2003) Requirements engineering challenges in multi-software development organizations. Requir Eng 8(3):149\u2013160","journal-title":"Requir Eng"},{"key":"139_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0167-6423(93)90021-G","volume":"20","author":"A Dardenne","year":"1993","unstructured":"Dardenne A, van Lamsweerde A, Fickas S (1993) Goal-directed requirements acquisition. Sci Comput Program 20:3\u201350","journal-title":"Sci Comput Program"},{"key":"139_CR16","doi-asserted-by":"crossref","unstructured":"Davis A, Dieste O, Hickey A, Juristo N, Moreno AM (2006) Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review. In: Proceedings of the 14th IEEE international requirements engineering conference. IEEE Computer Society, Washington, pp 176\u2013185","DOI":"10.1109\/RE.2006.17"},{"issue":"2","key":"139_CR17","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MS.2007.60","volume":"24","author":"B Decker","year":"2007","unstructured":"Decker B, Ras E, Rech J, Jaubert P, Rieth M (2007) Wiki-based stakeholder participation in requirements engineering. IEEE Softw 24(2):28\u201335","journal-title":"IEEE Softw"},{"issue":"1","key":"139_CR18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s00766-009-0090-z","volume":"15","author":"G Elahi","year":"2010","unstructured":"Elahi G, Yu E, Zannone N (2010) A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requir Eng 15(1):41\u201362","journal-title":"Requir Eng"},{"issue":"1","key":"139_CR19","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"B Fabian","year":"2010","unstructured":"Fabian B, G\u00fcrses SF, Heisel M, Santen T, Schmidt H (2010) A comparison of security requirements engineering methods. Requir Eng 15(1):7\u201340","journal-title":"Requir Eng"},{"key":"139_CR20","volume-title":"Performance indicators","author":"CT Fitz-Gibbon","year":"1990","unstructured":"Fitz-Gibbon CT (1990) Performance indicators. Multilingual Matters, Clevedon"},{"key":"139_CR21","doi-asserted-by":"crossref","unstructured":"Fowler FJ, Mangione TW (1990) Standardized survey interviewing: minimizing interviewer-related error. Applied social research vol 18. Sage, Newbury Park","DOI":"10.4135\/9781412985925"},{"key":"139_CR22","unstructured":"Garlan D, Schmerl B (2006) Architecture-driven modelling and analysis. In: Proceedings of the 11th Australian workshop on safety critical systems and software. Australian Computer Society Inc, Darlinghurst, pp 3\u201317"},{"key":"139_CR23","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1002\/spe.430","volume":"32","author":"V Gervasi","year":"2002","unstructured":"Gervasi V, Nuseibeh B (2002) Lightweight validation of natural language requirements. Softw Pract Exp 32:113\u2013133","journal-title":"Softw Pract Exp"},{"issue":"4","key":"139_CR24","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P Giorgini","year":"2006","unstructured":"Giorgini P, Massacci F, Mylopoulos J, Zannone N (2006) Requirements engineering for trust management: model, methodology, and reasoning. Int J Inf Secur 5(4):257\u2013274","journal-title":"Int J Inf Secur"},{"key":"139_CR25","unstructured":"Goguen JA, Linde C (1993) Techniques for requirements elicitation. In: Proceedings of IEEE international symposium on requirements engineering. IEEE Computer Society, New York, pp 152\u2013164"},{"issue":"4","key":"139_CR26","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/67243.67246","volume":"20","author":"M Good","year":"1989","unstructured":"Good M (1989) Seven experiences with contextual field research. SIGCHI Bull 20(4):25\u201332","journal-title":"SIGCHI Bull"},{"issue":"2","key":"139_CR27","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.infsof.2008.04.004","volume":"51","author":"P Guarda","year":"2009","unstructured":"Guarda P, Zannone N (2009) Towards the development of privacy-aware systems. Inf Softw Technol 51(2):337\u2013350","journal-title":"Inf Softw Technol"},{"key":"139_CR28","unstructured":"G\u00fcrses S, Jahnke JH, Obry C, Onabajo A, Santen T, Price M (2005) Eliciting confidentiality requirements in practice. In: Proceedings of the 2005 conference of the centre for advanced studies on collaborative research. IBM Press, Canada, pp 101\u2013116"},{"key":"139_CR29","unstructured":"G\u00fcrses S, Zannone N (2009) Requirements assessment report. Research report D1.2, TAS3 consortium"},{"issue":"4","key":"139_CR30","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2001.936219","volume":"18","author":"HF Hofmann","year":"2001","unstructured":"Hofmann HF, Lehner F (2001) Requirements engineering as a success factor in software projects. IEEE Softw 18(4):58\u201366","journal-title":"IEEE Softw"},{"key":"139_CR31","volume-title":"Requirements engineering, 2nd edn","author":"E Hull","year":"2005","unstructured":"Hull E, Jackson K, Dick J (2005) Requirements engineering, 2nd edn. Springer, New York"},{"key":"139_CR32","volume-title":"Art of rapid prototyping: user interface design for windows and OS\/2","author":"S Isensee","year":"1995","unstructured":"Isensee S, Rudd JR, Heck M (1995) Art of rapid prototyping: user interface design for windows and OS\/2. International Thomson Computer Press, New York"},{"key":"139_CR33","unstructured":"ISO (2008) Gap analysis tool. ISO 9001:2008"},{"key":"139_CR34","volume-title":"Problem frames: analysing and structuring software development problems","author":"M Jackson","year":"2001","unstructured":"Jackson M (2001) Problem frames: analysing and structuring software development problems. Addison Wesley, New York"},{"issue":"3\u20134","key":"139_CR35","doi-asserted-by":"crossref","first-page":"169","DOI":"10.3233\/AO-2009-0069","volume":"4","author":"IJ Jureta","year":"2009","unstructured":"Jureta IJ, Mylopoulos J, Faulkner S (2009) A core ontology for requirements. Appl Ontol 4(3\u20134):169\u2013244","journal-title":"Appl Ontol"},{"key":"139_CR36","volume-title":"Secure systems development with UML","author":"J J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens J (2004) Secure systems development with UML. Springer, New York"},{"issue":"2","key":"139_CR37","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10515-008-0028-6","volume":"15","author":"N Kiyavitskaya","year":"2008","unstructured":"Kiyavitskaya N, Zannone N (2008) Requirements model generation to support requirements elicitation: the secure tropos experience. Autom Softw Eng 15(2):149\u2013173","journal-title":"Autom Softw Eng"},{"key":"139_CR38","doi-asserted-by":"crossref","unstructured":"Konrad S, Gall M (2008) Requirements engineering in the development of large-scale systems. In: Proceedings of the 16th IEEE international requirements engineering conference. IEEE Computer Society, New York, pp 217\u2013222","DOI":"10.1109\/RE.2008.31"},{"key":"139_CR39","unstructured":"Kontio J, Chen SF, Limperos K, Tesoriero R, Caldiera G, Deutsch M (1995) A cots selection method and experiences of its use. In: Proceedings of 20th annual software engineering workshop"},{"key":"139_CR40","doi-asserted-by":"crossref","unstructured":"van Lamsweerde A (2004) Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th international conference on software engineering. IEEE Computer Society, New York, pp 148\u2013157","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"139_CR41","doi-asserted-by":"crossref","unstructured":"Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proceedings of the 11th IEEE international conference on requirements engineering. IEEE Computer Society, New York, pp 151\u2013161","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"139_CR42","volume-title":"Model-driven risk analysis: the CORAS approach","author":"MS Lund","year":"2010","unstructured":"Lund MS, Solhaug B, St\u00f8len K (2010) Model-driven risk analysis: the CORAS approach. Springer, New York"},{"key":"139_CR43","doi-asserted-by":"crossref","unstructured":"Marczak S, Damian D, Stege U, Schr\u00f6ter A (2008) Information brokers in requirement-dependency social networks. In: Proceedings of the 16th IEEE international requirements engineering conference. IEEE Computer Society, New York, pp 53\u201362","DOI":"10.1109\/RE.2008.26"},{"key":"139_CR44","doi-asserted-by":"crossref","unstructured":"Massacci F, Mylopoulos J, Zannone N (2010) Security requirements engineering: the SI* modeling language and the secure tropos methodology. In: Advances in intelligent information systems. Springer, New York, pp 147\u2013174","DOI":"10.1007\/978-3-642-05183-8_6"},{"issue":"5","key":"139_CR45","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.csi.2005.01.003","volume":"27","author":"F Massacci","year":"2005","unstructured":"Massacci F, Prest M, Zannone N (2005) Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput Stand Interfaces 27(5):445\u2013455","journal-title":"Comput Stand Interfaces"},{"key":"139_CR46","doi-asserted-by":"crossref","unstructured":"Massacci F, Zannone N (2011) Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the Allied Irish Bank. In: Social modeling for requirements engineering. MIT Press, Cambridge","DOI":"10.7551\/mitpress\/7549.003.0014"},{"key":"139_CR47","doi-asserted-by":"crossref","unstructured":"Maulsby D, Greenberg S, Mander R (1993) Prototyping an intelligent agent through Wizard of Oz. In: Proceedings of the IFIP TC13 international conference on human-computer interaction. ACM, Switzerland, pp 277\u2013284","DOI":"10.1145\/169059.169215"},{"key":"139_CR48","unstructured":"Montagnon G (2009) Design requirements. Research report D1.4, TAS3 consortium"},{"key":"139_CR49","volume-title":"Usability inspection methods","year":"1994","unstructured":"Nielsen, J, Mack, RL (eds) (1994) Usability inspection methods. Wiley, New York"},{"key":"139_CR50","doi-asserted-by":"crossref","unstructured":"Nuseibeh B, Easterbrook S (2000) Requirements engineering: a roadmap. In: Proceedings of the conference on the future of software engineering. ACM, New York, pp 35\u201346","DOI":"10.1145\/336512.336523"},{"issue":"10","key":"139_CR51","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/32.328995","volume":"20","author":"B Nuseibeh","year":"1994","unstructured":"Nuseibeh B, Kramer J, Finkelstein A (1994) A framework for expressing the relationships between multiple views in requirements specification. IEEE Trans Softw Eng 20(10):760\u2013773","journal-title":"IEEE Trans Softw Eng"},{"key":"139_CR52","unstructured":"Object Management Group (2009) Unified modeling language (UML). http:\/\/www.omg.org\/spec\/UML\/2.2\/"},{"key":"139_CR53","volume-title":"Key performance indicators (KPI): developing, implementing, and using winning KPIs, 2nd edn","author":"D Parmenter","year":"2010","unstructured":"Parmenter D (2010) Key performance indicators (KPI): developing, implementing, and using winning KPIs, 2nd edn. Wiley, New York"},{"key":"139_CR54","doi-asserted-by":"crossref","unstructured":"Petersen K, Wohlin C, Baca D (2009) The waterfall model in large-scale development. In: Proceedings of the 10th international conference on product-focused software process improvement, lecture notes in business information processing, vol 32. Springer, New York, pp 386\u2013400","DOI":"10.1007\/978-3-642-02152-7_29"},{"issue":"2","key":"139_CR55","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/52.268952","volume":"11","author":"C Potts","year":"1994","unstructured":"Potts C, Takahashi K, Ant\u00f3n AI (1994) Inquiry-based requirements analysis. IEEE Softw 11(2):21\u201332","journal-title":"IEEE Softw"},{"key":"139_CR56","unstructured":"Przybilski M (2006) Requirements elicitation in international research projects. In: Proceedings of the 12th Americas conference on information systems"},{"key":"139_CR57","unstructured":"Regnell B, Svensson RB, Wnuk K (2008) Can we beat the complexity of very large-scale requirements engineering? In: Proceedings of the 14th international conference on requirements engineering: foundation for software quality, LNCS 5025. Springer, New York, pp 123\u2013128"},{"key":"139_CR58","doi-asserted-by":"crossref","unstructured":"Reinhard T, Meier S, Stoiber R, Cramer C, Glinz M (2008) Tool support for the navigation in graphical models. In: Proceedings of the 30th international conference on software engineering. ACM, New York, pp 823\u2013826","DOI":"10.1145\/1368088.1368211"},{"issue":"4","key":"139_CR59","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/175276.175288","volume":"37","author":"M Rettig","year":"1994","unstructured":"Rettig M (1994) Prototyping for tiny fingers. Commun ACM 37(4):21\u201327","journal-title":"Commun ACM"},{"key":"139_CR60","volume-title":"Mastering the requirements process. 2nd edn","author":"S Robertson","year":"2006","unstructured":"Robertson S, Robertson J (2006) Mastering the requirements process. 2nd edn. Addison-Wesley Professional, New York"},{"issue":"2","key":"139_CR61","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1145\/857076.857079","volume":"35","author":"WN Robinson","year":"2003","unstructured":"Robinson WN, Pawlowski SD, Volkov V (2003) Requirements interaction management. ACM Comput Surv 35(2):132\u2013190","journal-title":"ACM Comput Surv"},{"issue":"1","key":"139_CR62","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/PL00010342","volume":"5","author":"JC Sampaio do Prado Leite","year":"2000","unstructured":"Sampaio do Prado Leite JC, Hadad GDS, Doorn JH, Kaplan GN (2000) A scenario construction process. Requir Eng 5(1):38\u201361","journal-title":"Requir Eng"},{"issue":"1","key":"139_CR63","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng 10(1):34\u201344","journal-title":"Requir Eng"},{"key":"139_CR64","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1023\/A:1018946223345","volume":"3","author":"I Sommerville","year":"1997","unstructured":"Sommerville I, Sawyer P (1997) Viewpoints: principles, problems and a practical approach to requirements engineering. Ann Softw Eng 3:101\u2013130","journal-title":"Ann Softw Eng"},{"key":"139_CR65","unstructured":"Toro AD, Jim\u00e9nez BB, Cort\u00e9s AR, Bonilla MT (1999) A requirements elicitation approach based in templates and patterns. In: Proceedings of workshop em engenharia de requisitos, pp 17\u201329"},{"key":"139_CR66","volume-title":"More about software requirements: thorny issues and practical advice, 2nd edn","author":"KE Wiegers","year":"2006","unstructured":"Wiegers KE (2006) More about software requirements: thorny issues and practical advice, 2nd edn. Microsoft Press, Redmond"},{"key":"139_CR67","doi-asserted-by":"crossref","unstructured":"Wnuk K, Regnell B, Karlsson L (2009) What happened to our features? Visualization and understanding of scope change dynamics in a large-scale industrial setting. In: Proceedings of the 17th IEEE international requirements engineering. IEEE Computer Society, New York, pp 89\u201398","DOI":"10.1109\/RE.2009.32"},{"key":"139_CR68","doi-asserted-by":"crossref","unstructured":"Wnuk K, Regnell B, Schrewelius C (2009) Architecting and coordinating thousands of requirements\u2014an industrial case study. In: Proceedings of the 15th international working conference on requirements engineering: foundation for software quality, LNCS 5512. Springer, New York, pp 118\u2013123","DOI":"10.1007\/978-3-642-02050-6_10"},{"issue":"4","key":"139_CR69","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/267580.267581","volume":"29","author":"P Zave","year":"1997","unstructured":"Zave P (1997) Classification of research efforts in requirements engineering. ACM Comput Surv 29(4):315\u2013321","journal-title":"ACM Comput Surv"},{"issue":"1","key":"139_CR70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/237432.237434","volume":"6","author":"P Zave","year":"1997","unstructured":"Zave P, Jackson M (1997) Four dark corners of requirements engineering. ACM Trans Softw Eng Methodol 6(1):1\u201330","journal-title":"ACM Trans Softw Eng Methodol"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-011-0139-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T12:32:50Z","timestamp":1713097970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-011-0139-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,6]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s00766-011-0139-7","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,6]]}}}