{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:02:06Z","timestamp":1762272126202,"version":"3.37.3"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,5,5]],"date-time":"2017-05-05T00:00:00Z","timestamp":1493942400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["01IS12005C"],"award-info":[{"award-number":["01IS12005C"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00766-017-0267-9","type":"journal-article","created":{"date-parts":[[2017,5,5]],"date-time":"2017-05-05T10:57:15Z","timestamp":1493981835000},"page":"291-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Hazard Relation Diagrams: a diagrammatic representation to increase validation objectivity of requirements-based hazard mitigations"],"prefix":"10.1007","volume":"23","author":[{"given":"Bastian","family":"Tenbergen","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Weyer","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Pohl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"267_CR1","volume-title":"Engineering a safer world: systems thinking applied to safety. Engineering systems","author":"NG Leveson","year":"2011","unstructured":"Leveson NG (2011) Engineering a safer world: systems thinking applied to safety. Engineering systems. MIT Presss, Cambridge"},{"key":"267_CR2","volume-title":"Safeware: system safety and computers","author":"NG Leveson","year":"1995","unstructured":"Leveson NG (1995) Safeware: system safety and computers. Addison-Wesley, Reading, Mass"},{"key":"267_CR3","unstructured":"SAE International (1996) ARP4761, Guidelines and methods for conducting the safety assessment process on civil airborne systems and equipment. http:\/\/standards.sae.org\/arp4761\/ . Accessed 7 Jan 2016"},{"key":"267_CR4","unstructured":"International Organization for Standardization (2011) ISO26262, Road vehicles\u2014functional. safety. http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=43464 . Accessed 7 Jan 2016"},{"key":"267_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/0471739421","volume-title":"Hazard analysis techniques for system safety","author":"CA Ericson","year":"2005","unstructured":"Ericson CA (2005) Hazard analysis techniques for system safety. Wiley, Hoboken"},{"key":"267_CR6","unstructured":"Bishop P, Bloomfield R, Guerra S (2004) The future of goal-based assurance cases. In: proceedings of the workshop on assurance cases, pp 390\u2013395"},{"key":"267_CR7","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-1-4471-0921-1_6","volume-title":"Safety and reliability of software based systems","author":"SP Wilson","year":"1997","unstructured":"Wilson SP, Kelly TP, McDermid JA (1997) Safety case development: current practice, future prospects. In: Shaw R (ed) Safety and reliability of software based systems. Springer, London, pp 135\u2013156"},{"key":"267_CR8","unstructured":"IEEE Standards Board (1990) IEEE Std. 610.12: IEEE Standard Glossary of Software Engineering Terminology, 1990"},{"key":"267_CR9","unstructured":"Leveson N (2011) The use of safety cases in certification and regulation. J Syst Saf 47(6). http:\/\/goo.gl\/j9NW5Y . Accessed 13 July 2016"},{"issue":"3","key":"267_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5381\/jot.2004.3.3.c3","volume":"3","author":"D Firesmith","year":"2004","unstructured":"Firesmith D (2004) Engineering safety requirements, safety constraints, and safety-critical requirements. J Object Technol 3(3):27\u201342. doi: 10.5381\/jot.2004.3.3.c3","journal-title":"J Object Technol"},{"key":"267_CR11","doi-asserted-by":"crossref","unstructured":"Hatcliff J, Wassyng A, Kelly T et al. (2014) Certifiably safe software-dependent systems: challenges and directions. In: proceedings of the future software engineering, pp 182\u2013200","DOI":"10.1145\/2593882.2593895"},{"key":"267_CR12","unstructured":"Glinz M (2000) Improving the Quality of Requirements with Scenarios. In: proceedings of the 2nd world congress on software quality, pp 55\u201360"},{"issue":"3","key":"267_CR13","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1111\/j.1365-2575.1994.tb00051.x","volume":"4","author":"DJ Flynn","year":"1994","unstructured":"Flynn DJ, Warhurst R (1994) An empirical study of the validation process within requirements determination. Inf Syst J 4(3):185\u2013212. doi: 10.1111\/j.1365-2575.1994.tb00051.x","journal-title":"Inf Syst J"},{"key":"267_CR14","unstructured":"Lisagor O, Sun L, Kelly T (2010) The illusion of method: challenges of model-based safety assessment. In: 28th international system safety conference (ISSC)"},{"key":"267_CR15","unstructured":"Sun L (2012) Establishing confidence in safety assessment evidence. Dissertation, University of York"},{"key":"267_CR16","unstructured":"Gacitua R, Ma L, Nuseibeh B, Piwek P, de Roeck AN, Rouncefield M, Sawyer P, Willia A, Yang H (2009) Making tacit requirements explicit. In: 2nd international workshop on managing requirements knowledge (MARK), pp 40\u201344"},{"issue":"3\u20134","key":"267_CR17","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00450-014-0256-x","volume":"30","author":"M Glinz","year":"2015","unstructured":"Glinz M, Fricker SA (2015) On shared understanding in software engineering: an essay. Comput Sci Res Dev 30(3\u20134):363\u2013376. doi: 10.1007\/s00450-014-0256-x","journal-title":"Comput Sci Res Dev"},{"key":"267_CR18","doi-asserted-by":"crossref","unstructured":"Mao J, Chen L (2012) Runtime monitoring for cyber-physical Systems: a case study of cooperative adaptive cruise control. In: proceedings of the 2nd international conference on intellectual system design and engineering application, pp 509\u2013515","DOI":"10.1109\/ISdea.2012.592"},{"key":"267_CR19","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-642-32548-9_25","volume-title":"Advances in intelligent control systems and computer science","author":"SI Caramihai","year":"2013","unstructured":"Caramihai SI, Dumitrache I (2013) Urban traffic monitoring and control as a cyber-physical system approach. In: Dumitrache L (ed) Advances in intelligent control systems and computer science. Springer, Berlin, pp 355\u2013366"},{"key":"267_CR20","unstructured":"Lempia DL, Miller S (2009) Requirements engineering management findings report. Technical report DOT\/FAA\/AR-08\/34, Federal Aviation Administration"},{"key":"267_CR21","doi-asserted-by":"crossref","unstructured":"Tenbergen B, Weyer T, Pohl K (2015) Supporting the validation of adequacy in requirements-based hazard mitigations. In: Requirements engineering: foundation for software quality. LNCS, vol 9013. Springer, pp 17\u201332","DOI":"10.1007\/978-3-319-16101-3_2"},{"key":"267_CR22","doi-asserted-by":"crossref","unstructured":"Heimdahl MP (2007) Safety and software intensive systems: challenges old and new. In: future of software engineering, pp 137\u2013152","DOI":"10.1109\/FOSE.2007.18"},{"issue":"8","key":"267_CR23","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MC.2006.283","volume":"39","author":"G Stoneburner","year":"2006","unstructured":"Stoneburner G (2006) Toward a unified security-safety model. Computer 39(8):96\u201397. doi: 10.1109\/MC.2006.283","journal-title":"Computer"},{"key":"267_CR24","unstructured":"Kelly T (2007) Reviewing assurance arguments-a step-by-step approach. In: workshop on Assurance Cases for Security-The Metrics Challenge, Dependable Systems and Networks (DSN)"},{"key":"267_CR25","doi-asserted-by":"crossref","unstructured":"Johnson CW, Holloway CM (2006) Questioning the role of requirements engineering in the causes of safety-critical software failures. In: IET international conference on system safety, pp 352\u2013361","DOI":"10.1049\/cp:20060237"},{"key":"267_CR26","unstructured":"Lempia DL, Miller S (2009) Requirements engineering management handbook. Technical report, DOT\/FAA\/AR-08\/32, Federal Aviation Administration"},{"key":"267_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional requirements in software engineering. International series in software engineering","author":"L Chung","year":"2000","unstructured":"Chung L, Nixon BA, Yu E et al (2000) Non-functional requirements in software engineering. International series in software engineering, vol 5. Springer, Berlin"},{"issue":"6","key":"267_CR28","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/TSE.2009.67","volume":"35","author":"DL Moody","year":"2009","unstructured":"Moody DL (2009) The \u201cphysics\u201d of notation: toward a scientific basis for constructing visual notations in software engineering. IEEE Trans Softw Eng 35(6):756\u2013779","journal-title":"IEEE Trans Softw Eng"},{"key":"267_CR29","unstructured":"St\u00f6rrle H (2004) Semantics of control-flow in UML 2.0 activities. In: IEEE symposium on visual languages and human centric computing, pp 235\u2013242"},{"key":"267_CR30","unstructured":"Object Management Group (2015) OMG Unified Modeling Language, Version 2.5. OMG Document Number formal\/2015-03-01. http:\/\/goo.gl\/7cQyPv . Accessed 13 July 2016"},{"key":"267_CR31","volume-title":"Requirements engineering: from system goals to UML models to software specifications","author":"A Lamsweerde van","year":"2009","unstructured":"van Lamsweerde A (2009) Requirements engineering: from system goals to UML models to software specifications. Wiley, Chichester"},{"key":"267_CR32","doi-asserted-by":"crossref","unstructured":"Yu E (1997) Towards modelling and reasoning support for early-phase requirements engineering. In: international symposium RE, pp 226\u2013235","DOI":"10.1109\/ISRE.1997.566873"},{"issue":"2","key":"267_CR33","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.engappai.2004.11.017","volume":"18","author":"P Giorgini","year":"2005","unstructured":"Giorgini P, Mylopoulos J, Sebastiani R (2005) Goal-oriented requirements analysis and reasoning in the Tropos methodology. Eng Appl Artif Intell 18(2):159\u2013171. doi: 10.1016\/j.engappai.2004.11.017","journal-title":"Eng Appl Artif Intell"},{"key":"267_CR34","unstructured":"Kelly T, Weaver R (2004) The goal structuring notation\u2010a safety argument notation. In: proceedings of the workshop on assurance cases of dependable systems and networks"},{"key":"267_CR35","volume-title":"Semantics in generative grammar","author":"I Heim","year":"1998","unstructured":"Heim I, Kratzer A (1998) Semantics in generative grammar. Wiley, Chichester"},{"issue":"1","key":"267_CR36","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1142\/S0218194092000038","volume":"2","author":"A Finkelstein","year":"1992","unstructured":"Finkelstein A, Kramer J, Nuseibeh B, Finkelstein L, Goedicke M (1992) Viewpoints: a framework for integrating multiple perspectives in system development. Int J Softw Eng Knowl Eng 2(1):31\u201358","journal-title":"Int J Softw Eng Knowl Eng"},{"issue":"4","key":"267_CR37","first-page":"28","volume":"14","author":"M Conway","year":"1968","unstructured":"Conway M (1968) How do committees invent? Datamation 14(4):28\u201331","journal-title":"Datamation"},{"key":"267_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-8348-9717-6","volume-title":"Fahrstabilisierungssysteme und Fahrerassistenzsysteme","author":"K Reif","year":"2010","unstructured":"Reif K (2010) Fahrstabilisierungssysteme und Fahrerassistenzsysteme. Vieweg\u00a0+\u00a0Teubner, Wiesbaden"},{"key":"267_CR39","unstructured":"Object Management Group (2011) QVT: Meta Object Facility (MOF) 2.0 Query\/View\/Transformation, v1.1"},{"key":"267_CR40","unstructured":"QVT Operational Eclipse Plugin, v3.5.0. https:\/\/goo.gl\/SglK1F . Accessed 7 Jan 2016"},{"key":"267_CR41","unstructured":"Eclipse Modeling Tools, Luna Package Distribution. https:\/\/goo.gl\/qo9Sf5 . Accessed 7 Jan 2016"},{"key":"267_CR42","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-1-84800-044-5_8","volume-title":"Guide to advanced empirical software engineering","author":"A Jedlitschka","year":"2008","unstructured":"Jedlitschka A, Ciolkowski M, Pfahl D (2008) Reporting experiments in software engineering. In: Shull F, Singer J, Sj\u00f8berg DIK (eds) Guide to advanced empirical software engineering. Springer, London, pp 201\u2013228"},{"key":"267_CR43","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M et al (2012) Experimentation in software engineering. Springer, Berlin"},{"key":"267_CR44","volume-title":"Using multivariate statistics","author":"BG Tabachnick","year":"2010","unstructured":"Tabachnick BG, Fidell LS (2010) Using multivariate statistics, 5th edn. Pearson\/Allyn and Bacon, Boston","edition":"5"},{"key":"267_CR45","unstructured":"SoSci Survey. https:\/\/www.soscisurvey.de . Accessed 7 January 2016"},{"issue":"2","key":"267_CR46","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh V, Bala H (2008) Technology acceptance model 3 and a research agenda on interventions. Decis Sci 39(2):273\u2013315. doi: 10.1111\/j.1540-5915.2008.00192.x","journal-title":"Decis Sci"},{"issue":"1","key":"267_CR47","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1111\/j.1540-5915.1998.tb01346.x","volume":"29","author":"DL Goodhue","year":"1998","unstructured":"Goodhue DL (1998) Development and measurement validity of a task-technology fit instrument for user evaluations of information System. Decis Sci 29(1):105\u2013138. doi: 10.1111\/j.1540-5915.1998.tb01346.x","journal-title":"Decis Sci"},{"key":"267_CR48","volume-title":"The goal\/question\/metric method: a practical guide for quality improvement of software development","author":"R Solingen van","year":"1999","unstructured":"van Solingen R, Berghout E (1999) The goal\/question\/metric method: a practical guide for quality improvement of software development. The McGraw-Hill Companies, London"},{"key":"267_CR49","volume-title":"The measurement of meaning","author":"CE Osgood","year":"1957","unstructured":"Osgood CE, Suci G, Tannenbaum P (1957) The measurement of meaning. University of Illinois Press, Urbana"},{"key":"267_CR50","doi-asserted-by":"crossref","unstructured":"Verhagen T., Hooff B. van den Meents S. (2015) Toward a better use of the semantic differential in IS research: an integrative framework of suggested action. J Assoc Inf Syst 16(2):108\u2013143","DOI":"10.17705\/1jais.00388"},{"key":"267_CR51","doi-asserted-by":"crossref","DOI":"10.4135\/9781452230153","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"JM Corbin","year":"2008","unstructured":"Corbin JM, Strauss AL (2008) Basics of qualitative research: Techniques and procedures for developing grounded theory, 3rd edn. Sage Publ, Los Angeles","edition":"3"},{"issue":"3","key":"267_CR52","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF02310555","volume":"16","author":"LJ Cronbach","year":"1951","unstructured":"Cronbach LJ (1951) Coefficient alpha and the internal structure of tests. Psychometrika 16(3):297\u2013334. doi: 10.1007\/BF02310555","journal-title":"Psychometrika"},{"issue":"1","key":"267_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2331554","volume":"6","author":"Student","year":"1908","unstructured":"Student (1908) The probable error of a mean. Biometrika 6(1):1\u201325. doi: 10.2307\/2331554","journal-title":"Biometrika"},{"issue":"1","key":"267_CR54","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1037\/0033-2909.112.1.155","volume":"112","author":"J Cohen","year":"1992","unstructured":"Cohen J (1992) A power primer. Psychol Bull 112(1):155\u2013159. doi: 10.1037\/0033-2909.112.1.155","journal-title":"Psychol Bull"},{"issue":"1","key":"267_CR55","doi-asserted-by":"publisher","first-page":"9","DOI":"10.2307\/2684684.JSTOR2684684","volume":"51","author":"HA David","year":"1997","unstructured":"David HA, Gunnink JL (1997) The paired t test under artificial pairing. Am Stat 51(1):9\u201312. doi: 10.2307\/2684684.JSTOR2684684","journal-title":"Am Stat"},{"key":"267_CR56","doi-asserted-by":"crossref","unstructured":"Carver J, Jaccheri L, Morasca S, Shull F (2003) Issues in using students in empirical studies in software engineering education. In: proceedings 9th international software metrics symposium, pp\u00a0239\u2013249","DOI":"10.1109\/METRIC.2003.1232471"},{"issue":"7","key":"267_CR57","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1002\/1098-2736(200009)37:7<655:AID-TEA3>3.0.CO;2-E","volume":"37","author":"C Hart","year":"2000","unstructured":"Hart C, Mulhall P, Berry A, Loughran J, Gunstone R (2000) What is the purpose of this experiment? Or can students learn something from doing experiments? J Res Sci Teach 37(7):655\u2013675. doi: 10.1002\/1098-2736(200009)37:7<655:AID-TEA3>3.0.CO;2-E","journal-title":"J Res Sci Teach"},{"issue":"6","key":"267_CR58","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/TSE.2008.49","volume":"34","author":"JC Carver","year":"2008","unstructured":"Carver JC, Nagappan N, Page A (2008) The impact of educational background on the effectiveness of requirements inspections: an empirical study. IEEE Trans Softw Eng 34(6):800\u2013812. doi: 10.1109\/TSE.2008.49","journal-title":"IEEE Trans Softw Eng"},{"key":"267_CR59","doi-asserted-by":"crossref","unstructured":"Navarro E, Sanchez P, Letelier P, Pastor JA, Ramos I (2006) A goal-oriented approach for safety requirements specification. In: 13th annual IEEE international symposium and workshop on engineering computer based system, pp 319-326","DOI":"10.1109\/ECBS.2006.7"},{"key":"267_CR60","unstructured":"Allenby K, Kelly T (2001) Deriving safety requirements using scenarios. In: 5th IEEE international symposium RE, pp 228\u2013235"},{"key":"267_CR61","doi-asserted-by":"crossref","unstructured":"Chen D, Johansson R, L\u00f6nn H, Papadopoulos Y, Sandberg, A, T\u00f6rner F, T\u00f6rngren M (2008) Modelling support for design of safety-critical automotive embedded systems. In: proceedings of the 27th international conference computer safety, reliability and security, pp 72\u201385","DOI":"10.1007\/978-3-540-87698-4_9"},{"key":"267_CR62","doi-asserted-by":"crossref","unstructured":"Guillerm R, Demmou H, Sadou N (2011) Combining FMECA and fault trees for declining safety requirements of complex systems. In: Soares CG (ed) Advances in safety, reliability and risk management. CRC Press, pp 1287\u20131293","DOI":"10.1201\/b11433-182"},{"issue":"7","key":"267_CR63","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/32.708570","volume":"24","author":"KM Hansen","year":"1998","unstructured":"Hansen KM, Ravn AP, Stavridou V (1998) From safety analysis to software requirements. IIEEE Trans Softw Eng 24(7):573\u2013584. doi: 10.1109\/32.708570","journal-title":"IIEEE Trans Softw Eng"},{"key":"267_CR64","doi-asserted-by":"crossref","unstructured":"Tsuchiya T, Terada H, Kusumoto S, Kikuno T Eun Mi Kim (1997) Derivation of safety requirements for safety analysis of object-oriented design documents. In: proceedings of the 21st annual international computer software and applications conference, pp 252\u2013255","DOI":"10.1109\/CMPSAC.1997.624809"},{"key":"267_CR65","doi-asserted-by":"crossref","unstructured":"Troubitsyna E (2008) Elicitation and specification of safety requirements. In: proceedings of the 3rd international conference on systems, pp 202\u2013207","DOI":"10.1109\/ICONS.2008.56"},{"key":"267_CR66","doi-asserted-by":"crossref","unstructured":"Xu X, Bao X, Lu M, Chang W (2011) A study and application on airborne software safety requirements elicitation. In: proceedings of the 9th international conference on reliability, maintainability and safety, pp 710\u2013716","DOI":"10.1109\/ICRMS.2011.5979357"},{"key":"267_CR67","doi-asserted-by":"crossref","unstructured":"van Lamsweerde A (2009) Reasoning about alternative requirements options. In: Borgida AT, Chaudhri VK, Giorgini P, Yu ES (eds) Conceptual modeling: Foundations and Applications. Springer, Heidelberg, pp 380\u2013397","DOI":"10.1007\/978-3-642-02463-4_20"},{"key":"267_CR68","doi-asserted-by":"crossref","unstructured":"Sindre G (2007) A look at misuse cases for safety concerns. In: proceedings of the IFIP WG 8.1 conference, pp 252\u2013266","DOI":"10.1007\/978-0-387-73947-2_20"},{"issue":"4","key":"267_CR69","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1016\/j.jss.2012.12.002","volume":"86","author":"C Raspotnig","year":"2013","unstructured":"Raspotnig C, Opdahl A (2013) Comparing risk identification techniques for safety and security requirements. J Syst Softw 86(4):1124\u20131151. doi: 10.1016\/j.jss.2012.12.002","journal-title":"J Syst Softw"},{"issue":"1","key":"267_CR70","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TDSC.2004.1","volume":"1","author":"NG Leveson","year":"2004","unstructured":"Leveson NG (2004) A systems-theoretic approach to safety in software-intensive systems. IEEE Trans Depend Secur Comput 1(1):66\u201386. doi: 10.1109\/TDSC.2004.1","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"267_CR71","doi-asserted-by":"crossref","unstructured":"Shull F, Basili V, Boehm B, Winsor Brown A, Costa P, Lindvall M, Port D, Rus I, Tesoriero R, Zelkowitz M (2002) What we have learned about fighting defects. In: proceedings of the 8th international symposium on software metrics, pp 249\u2013258","DOI":"10.1109\/METRIC.2002.1011343"},{"issue":"1","key":"267_CR72","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/2.962984","volume":"34","author":"B Boehm","year":"2001","unstructured":"Boehm B, Basili VR (2001) Software defect reduction top 10 list. Computer 34(1):135\u2013137. doi: 10.1109\/2.962984","journal-title":"Computer"},{"issue":"2","key":"267_CR73","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF00368702","volume":"1","author":"VR Basili","year":"1996","unstructured":"Basili VR, Green S, Laitenberger O, Lanubile F, Shull F, Sorumgard S, Zelkowitz M (1996) The empirical investigation of perspective-based reading. Empir Softw Eng 1(2):133\u2013164. doi: 10.1007\/BF00368702","journal-title":"Empir Softw Eng"},{"issue":"7","key":"267_CR74","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/2.869376","volume":"33","author":"F Shull","year":"2000","unstructured":"Shull F, Rus I, Basili V (2000) How perspective-based reading can improve requirements inspections. Computer 33(7):73\u201379. doi: 10.1109\/2.869376","journal-title":"Computer"},{"key":"267_CR75","doi-asserted-by":"crossref","unstructured":"Li Q, Boehm B, Yang Y, Wang Q (2011) A value-based review process for prioritizing artifacts. In: proceedings of the international conference on software system process, pp 13\u201323","DOI":"10.1145\/1987875.1987881"},{"issue":"3","key":"267_CR76","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1002\/stvr.243","volume":"12","author":"A Aurum","year":"2002","unstructured":"Aurum A, Petersson H, Wohlin C (2002) State-of-the-art: software inspections after 25 years. Softw Test Verif Reliab 12(3):133\u2013154. doi: 10.1002\/stvr.243","journal-title":"Softw Test Verif Reliab"},{"issue":"6","key":"267_CR77","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/32.391380","volume":"21","author":"AA Porter","year":"1995","unstructured":"Porter AA, Votta LG, Basili VR (1995) Comparing detection methods for software requirements inspections: a replicated experiment. IEEE Trans Softw Eng 21(6):563\u2013575. doi: 10.1109\/32.391380","journal-title":"IEEE Trans Softw Eng"},{"key":"267_CR78","unstructured":"Lee K, Boehm B (2005) Empirical results from an experiment on value-based review (VBR) processes. In: proceedings of the international symposium empirical software engineering, pp 3\u201312"},{"key":"267_CR79","unstructured":"Cruickshank KJ, Michael JB, Man-Tak Shing (2009) A validation metrics framework for safety-critical software-intensive systems. In: IEEE international conference system of systems engineering, pp 1\u20138"},{"issue":"2","key":"267_CR80","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/JSYST.2010.2050159","volume":"4","author":"JB Michael","year":"2010","unstructured":"Michael JB, Shing MT, Cruickshank KJ, Redmond PJ (2010) Hazard analysis and validation metrics framework for system of systems software safety. IEEE Syst J 4(2):186\u2013197. doi: 10.1109\/JSYST.2010.2050159","journal-title":"IEEE Syst J"},{"key":"267_CR81","doi-asserted-by":"crossref","unstructured":"Driskell SB, Murphy J, Michael JB, Man-Tak Shing (2010) Independent validation of software safety requirements for systems of systems. In: proceedings of the 5th international conference on system of systems engineering, pp 1\u20136","DOI":"10.1109\/SYSOSE.2010.5544100"},{"key":"267_CR82","doi-asserted-by":"crossref","unstructured":"Belli F, Hollmann A, Nissanke N (2007) Modeling, analysis and testing of safety issues\u2014an event-based approach and case study. In: proceedings of the 26th international conference on computer safety, reliability and security, pp 276\u2013282","DOI":"10.1007\/978-3-540-75101-4_27"},{"key":"267_CR83","doi-asserted-by":"crossref","unstructured":"Bitsch F (2001) Safety patterns\u2014the key to formal specification of safety requirements. In: proceedings of the 20th international conference on computer safety, reliability and security, pp 176\u2013189","DOI":"10.1007\/3-540-45416-0_18"},{"issue":"1","key":"267_CR84","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1008697817793","volume":"6","author":"R Bharadwaj","year":"1999","unstructured":"Bharadwaj R, Heitmeyer CL (1999) Model checking complete requirements specifications using abstraction. Autom Softw Eng 6(1):37\u201368. doi: 10.1023\/A:1008697817793","journal-title":"Autom Softw Eng"},{"issue":"11","key":"267_CR85","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1109\/32.730543","volume":"24","author":"C Heitmeyer","year":"1998","unstructured":"Heitmeyer C, Kirby J, Labaw B et al (1998) Using abstraction and model checking to detect safety violations in requirements specifications. IEEE Trans Softw Eng 24(11):927\u2013948. doi: 10.1109\/32.730543","journal-title":"IEEE Trans Softw Eng"},{"key":"267_CR86","doi-asserted-by":"crossref","unstructured":"Zafar S, Dromey RG (2005) Integrating safety and security requirements into design of an embedded system. In: proceedings of the 12th Asia-Pacific software engineering conference, pp 629\u2013636","DOI":"10.1109\/APSEC.2005.75"},{"key":"267_CR87","volume-title":"Mastering the requirements process: getting requirements right","author":"S Robertson","year":"2013","unstructured":"Robertson S, Robertson J (2013) Mastering the requirements process: getting requirements right, 3rd edn. Addison-Wesley, Upper Saddle River","edition":"3"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-017-0267-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-017-0267-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-017-0267-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T09:06:06Z","timestamp":1569229566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-017-0267-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,5]]},"references-count":87,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s00766-017-0267-9","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"type":"print","value":"0947-3602"},{"type":"electronic","value":"1432-010X"}],"subject":[],"published":{"date-parts":[[2017,5,5]]}}}