{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T15:00:46Z","timestamp":1761490846228,"version":"3.37.3"},"reference-count":130,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s00766-019-00324-x","type":"journal-article","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T19:02:22Z","timestamp":1565636542000},"page":"295-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A socio-technical-based process for questionnaire development in requirements elicitation via interviews"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6894-0192","authenticated-orcid":false,"given":"Abdullah","family":"Wahbeh","sequence":"first","affiliation":[]},{"given":"Surendra","family":"Sarnikar","sequence":"additional","affiliation":[]},{"given":"Omar","family":"El-Gayar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"issue":"4","key":"324_CR1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/07421222.2004.11045786","volume":"20","author":"AM Hickey","year":"2004","unstructured":"Hickey AM, Davis AM (2004) A unified model of requirements elicitation. J Manag Inf Syst 20(4):65\u201384","journal-title":"J Manag Inf Syst"},{"key":"324_CR2","unstructured":"Toro AD, Jim\u00e9nez BB, Cort\u00e9s AR, Bonilla MT (1999) A requirements elicitation approach based in templates and patterns. In: Proceedings 2nd workshop on requirements engineering, Buenos Aires, Argentina, September 9\u201310, pp 17\u201329"},{"key":"324_CR3","doi-asserted-by":"crossref","unstructured":"Raghavan S, Zelesnik G, Ford G (1994) Lecture notes on requirements elicitation. Educational Materials CMU\/SEI\u201394\u2013EM\u201310. Software Engineering Institute, Carnegie Mellon University","DOI":"10.21236\/ADA278536"},{"key":"324_CR4","unstructured":"Hickey AM, Davis AM (2003) Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes. In: Proceedings of the 36th annual hawaii international conference on system sciences, Hawaii 2003. IEEE, p 10"},{"issue":"4","key":"324_CR5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MC.1987.1663532","volume":"20","author":"Brooks","year":"1987","unstructured":"Brooks (1987) No silver bullet essence and accidents of software engineering. Computer 20(4):10\u201319","journal-title":"Computer"},{"key":"324_CR6","doi-asserted-by":"crossref","unstructured":"Zowghi D, Coulin C (2005) Requirements elicitation: a survey of techniques, approaches, and tools. In: Engineering and managing software requirements. Springer, pp 19\u201346","DOI":"10.1007\/3-540-28244-0_2"},{"issue":"1","key":"324_CR7","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1147\/sj.211.0004","volume":"21","author":"GB Davis","year":"1982","unstructured":"Davis GB (1982) Strategies for information requirements determination. IBM Syst J 21(1):4\u201330","journal-title":"IBM Syst J"},{"issue":"1","key":"324_CR8","doi-asserted-by":"crossref","first-page":"117","DOI":"10.2307\/249704","volume":"16","author":"TA Byrd","year":"1992","unstructured":"Byrd TA, Cossick KL, Zmud RW (1992) A synthesis of research on requirements analysis and knowledge acquisition techniques. Manag Inf Syst Q 16(1):117\u2013138","journal-title":"Manag Inf Syst Q"},{"issue":"1","key":"324_CR9","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1111\/j.1365-2575.2006.00240.x","volume":"17","author":"MG Pitts","year":"2007","unstructured":"Pitts MG, Browne GJ (2007) Improving requirements elicitation: an empirical investigation of procedural prompts. Inf Syst J 17(1):89\u2013110","journal-title":"Inf Syst J"},{"issue":"4","key":"324_CR10","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1080\/07421222.2001.11045665","volume":"17","author":"G Browne","year":"2001","unstructured":"Browne G, Rogich M (2001) An empirical investigation of user requirements elicitation: comparing the effectiveness of prompting techniques. J Manag Inf Syst 17(4):223\u2013249","journal-title":"J Manag Inf Syst"},{"issue":"4","key":"324_CR11","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/s00766-016-0245-7","volume":"22","author":"J Klier","year":"2017","unstructured":"Klier J, Klier M, Muschter S (2017) How to manage IS requirements in complex public sector structures: toward an action design research approach. Requir Eng 22(4):419\u2013432","journal-title":"Requir Eng"},{"issue":"2","key":"324_CR12","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/PL00010345","volume":"5","author":"E Mumford","year":"2000","unstructured":"Mumford E (2000) A socio-technical approach to systems design. Requir Eng 5(2):125\u2013133","journal-title":"Requir Eng"},{"key":"324_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-28244-0","volume-title":"Engineering and managing software requirements","author":"A Aurum","year":"2005","unstructured":"Aurum A, Wohlin C (2005) Engineering and managing software requirements, 1st edn. Springer, Berlin","edition":"1"},{"key":"324_CR14","doi-asserted-by":"crossref","unstructured":"Sampaio do Prado Leite J, Gilvaz APP (1996) Requirements elicitation driven by interviews: the use of viewpoints. In: Proceedings of the 8th international workshop on software specification and design. IEEE, pp 85\u201394","DOI":"10.1109\/IWSSD.1996.501150"},{"issue":"1","key":"324_CR15","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.im.2011.12.004","volume":"49","author":"P Vitharana","year":"2012","unstructured":"Vitharana P, Jain H, Zahedi F (2012) A knowledge based component\/service repository to enhance analysts\u2019 domain knowledge for requirements analysis. Inf Manag 49(1):24\u201335","journal-title":"Inf Manag"},{"key":"324_CR16","doi-asserted-by":"crossref","unstructured":"Baloian N, Zurita G, Santoro FM, Araujo RM, Wolfgan S, Machado D, Pino JA (2011) A collaborative mobile approach for business process elicitation. In: 2011 15th international conference on computer supported cooperative work in design (CSCWD). IEEE, pp 473\u2013480","DOI":"10.1109\/CSCWD.2011.5960115"},{"key":"324_CR17","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/07421222.1990.11517884","volume":"1","author":"R Agarwal","year":"1990","unstructured":"Agarwal R, Tanniru M (1990) Knowledge acquisition using structured interviewing: an empirical investigation. J Manag Inf Syst 1:123\u2013140","journal-title":"J Manag Inf Syst"},{"key":"324_CR18","unstructured":"Vasundran M (2012) Comparison of requirements elicitation techniques. Int J Adv Comput Inf Technol"},{"issue":"3","key":"324_CR19","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/TSE.2011.36","volume":"38","author":"SL Lim","year":"2012","unstructured":"Lim SL, Finkelstein A (2012) StakeRare: using social networks and collaborative filtering for large-scale requirements elicitation. IEEE Trans Softw Eng 38(3):707\u2013735","journal-title":"IEEE Trans Softw Eng"},{"key":"324_CR20","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1080\/07421222.1998.11518197","volume":"15","author":"JW Moody","year":"1998","unstructured":"Moody JW, Blanton JE, Cheney PH (1998) A theoretically grounded approach to assist memory recall during information requirements determination. J Manag Inf Syst 15:79\u201398","journal-title":"J Manag Inf Syst"},{"issue":"3","key":"324_CR21","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s00766-016-0249-3","volume":"21","author":"A Ferrari","year":"2016","unstructured":"Ferrari A, Spoletini P, Gnesi S (2016) Ambiguity and tacit knowledge in requirements elicitation interviews. Requir Eng 21(3):333\u2013355","journal-title":"Requir Eng"},{"key":"324_CR22","doi-asserted-by":"crossref","unstructured":"Davis A, Dieste O, Hickey A, Juristo N, Moreno AM (2006) Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review. In: 14th IEEE international requirements engineering conference St. Paul, Minneapolis. IEEE, pp 179\u2013188","DOI":"10.1109\/RE.2006.17"},{"key":"324_CR23","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/S0003-6870(00)00009-0","volume":"31","author":"C Clegg","year":"2000","unstructured":"Clegg C (2000) Sociotechnical principles for system design. Appl Ergonom 31:463\u2013477. \nhttps:\/\/doi.org\/10.1016\/S0003-6870(00)00009-0","journal-title":"Appl Ergonom"},{"issue":"3","key":"324_CR24","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s00766-009-0087-7","volume":"15","author":"R Fuentes-Fern\u00e1ndez","year":"2010","unstructured":"Fuentes-Fern\u00e1ndez R, G\u00f3mez-Sanz JJ, Pav\u00f3n J (2010) Understanding the human context in requirements elicitation. Requir Eng 15(3):267\u2013283","journal-title":"Requir Eng"},{"issue":"1","key":"324_CR25","first-page":"1","volume":"24","author":"A Kaufmann","year":"2017","unstructured":"Kaufmann A, Riehle D (2017) The QDAcity-RE method for structural domain modeling using qualitative data analysis. Requir Eng 24(1):1\u201318","journal-title":"Requir Eng"},{"issue":"4","key":"324_CR26","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00766-017-0273-y","volume":"23","author":"S Thew","year":"2018","unstructured":"Thew S, Sutcliffe A (2018) Value-based requirements engineering: method and experience. Requir Eng 23(4):443\u2013464","journal-title":"Requir Eng"},{"issue":"1","key":"324_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00766-016-0254-6","volume":"23","author":"M Levy","year":"2018","unstructured":"Levy M, Hadar I, Aviv I (2018) A requirements engineering methodology for knowledge management solutions: integrating technical and social aspects. Requir Eng 23(1):1\u201319","journal-title":"Requir Eng"},{"key":"324_CR28","doi-asserted-by":"crossref","unstructured":"Weinert B, Hahn A, Uslar M (2018) Domain-specific requirements elicitation for socio-technical system-of-systems. In: Paper presented at the 2018 13th annual conference on system of systems engineering (SoSE), Paris, France","DOI":"10.1109\/SYSOSE.2018.8428755"},{"issue":"2","key":"324_CR29","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s00766-017-0285-7","volume":"254","author":"Y Wang","year":"2017","unstructured":"Wang Y, Zhao L (2017) Eliciting user requirements for e-collaboration systems: a proposal for a multi-perspective modeling approach. Requir Eng 254(2):205\u2013229","journal-title":"Requir Eng"},{"issue":"1","key":"324_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00766-018-0305-2","volume":"24","author":"A Shahri","year":"2019","unstructured":"Shahri A, Hosseini M, Taylor J, Stefanidis A, Phalp K, Ali R (2019) Engineering digital motivation in businesses: a modelling and analysis framework. Requir Eng 24(1):1\u201332","journal-title":"Requir Eng"},{"key":"324_CR31","volume-title":"Designing healthcare that works: a sociotechnical approach","author":"M Ackerman","year":"2017","unstructured":"Ackerman M, Prilla M, Stary C, Herrmann T, Goggins S (2017) Designing healthcare that works: a sociotechnical approach, 1st edn. Academic Press, Orlando","edition":"1"},{"issue":"4","key":"324_CR32","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1007\/s10270-016-0560-y","volume":"17","author":"T Li","year":"2018","unstructured":"Li T, Horkoff J, Mylopoulos J (2018) Holistic security requirements analysis for socio-technical systems. Softw Syst Model 17(4):1253\u20131285","journal-title":"Softw Syst Model"},{"key":"324_CR33","first-page":"123","volume-title":"Sense in social science\u2014a collection of essays in Honour of Dr","author":"K Eason","year":"2008","unstructured":"Eason K (2008) Sociotechnical systems theory in the 21st Century: another half-filled glass. In: Desmond M, John K (eds) Sense in social science\u2014a collection of essays in Honour of Dr. Lisl Klein, Desmond Graves, pp 123\u2013134"},{"key":"324_CR34","doi-asserted-by":"crossref","DOI":"10.1201\/b12314","volume-title":"Advances in social and organizational factors","author":"P Vink","year":"2012","unstructured":"Vink P (2012) Advances in social and organizational factors, 1st edn. Taylor & Francis Group, London","edition":"1"},{"issue":"1","key":"324_CR35","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.intcom.2010.07.003","volume":"23","author":"G Baxter","year":"2011","unstructured":"Baxter G, Sommerville I (2011) Socio-technical systems: from design methods to systems engineering. Interact Comput 23(1):4\u201317","journal-title":"Interact Comput"},{"issue":"4","key":"324_CR36","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1111\/j.1365-2575.2006.00221.x","volume":"16","author":"E Mumford","year":"2006","unstructured":"Mumford E (2006) The story of socio-technical design: reflections on its successes, failures and potential. Inf Syst J 16(4):317\u2013342","journal-title":"Inf Syst J"},{"key":"324_CR37","first-page":"38","volume-title":"Management sciences models and techniques","author":"F Emery","year":"1960","unstructured":"Emery F, Trist E (1960) Socio-technical systems. In: West C, Michael V (eds) Management sciences models and techniques, vol 1. Pergamon Press, New York, pp 38\u201358"},{"issue":"1","key":"324_CR38","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s00766-008-0073-5","volume":"14","author":"V Bryl","year":"2009","unstructured":"Bryl V, Giorgini P, Mylopoulos J (2009) Designing socio-technical systems: from stakeholder goals to social networks. Requir Eng 14(1):47\u201370","journal-title":"Requir Eng"},{"issue":"3","key":"324_CR39","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1177\/001872678704000303","volume":"40","author":"A Cherns","year":"1987","unstructured":"Cherns A (1987) Principles of sociotechnical design revisted. Hum Relat 40(3):153\u2013161","journal-title":"Hum Relat"},{"issue":"8","key":"324_CR40","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1177\/001872677602900806","volume":"29","author":"A Cherns","year":"1976","unstructured":"Cherns A (1976) The principles of sociotechnical design. Hum Relat 29(8):783\u2013792","journal-title":"Hum Relat"},{"issue":"2","key":"324_CR41","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/S1386-5056(02)00178-8","volume":"69","author":"M Berg","year":"2003","unstructured":"Berg M, Toussaint P (2003) The mantra of modeling and the forgotten powers of paper: a sociotechnical view on the development of process-oriented ICT in health care. Int J Med Inf 69(2):223\u2013234","journal-title":"Int J Med Inf"},{"issue":"3","key":"324_CR42","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1057\/palgrave.jit.2000101","volume":"22","author":"K Eason","year":"2007","unstructured":"Eason K (2007) Local sociotechnical system development in the NHS National Programme for Information Technology. J Inf Technol 22(3):257\u2013264","journal-title":"J Inf Technol"},{"key":"324_CR43","volume-title":"Requirements management using IBM rational requisitepro","author":"P Zielczynski","year":"2007","unstructured":"Zielczynski P (2007) Requirements management using IBM rational requisitepro. Pearson Education & IBM Press, Indianapolis"},{"key":"324_CR44","volume-title":"Managing software requirements: a unified approach","author":"D Leffingwell","year":"2000","unstructured":"Leffingwell D, Widrig D (2000) Managing software requirements: a unified approach, 1st edn. Addison-Wesley Professional, Indianapolis, IN, USA","edition":"1"},{"issue":"1","key":"324_CR45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0164-1212(99)00062-X","volume":"49","author":"CR Turner","year":"1999","unstructured":"Turner CR, Fuggetta A, Lavazza L, Wolf AL (1999) A conceptual basis for feature engineering. J Syst Softw 49(1):3\u201315","journal-title":"J Syst Softw"},{"key":"324_CR46","unstructured":"Turner CR, Wolf AL, Fuggetta A, Lavazza L (1998) Feature engineering. In: Proceedings of the 9th international workshop on software specification and design, Mie, Japan. IEEE Computer Society, p 162"},{"key":"324_CR47","volume-title":"ERP: a route toward successful implementation","author":"SMM-L Tsung","year":"2004","unstructured":"Tsung SMM-L (2004) ERP: a route toward successful implementation. University of Leeds, University of Leeds Press, Leeds"},{"issue":"1","key":"324_CR48","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s007660170013","volume":"6","author":"D Gross","year":"2001","unstructured":"Gross D, Yu E (2001) From non-functional requirements to design through patterns. Requir Eng 6(1):18\u201336","journal-title":"Requir Eng"},{"key":"324_CR49","unstructured":"Lee Y, Zhao W (2006) Domain requirements elicitation and analysis-an ontology-based approach. In: Paper presented at the international conference on computational science, Berlin, Heidelberg"},{"key":"324_CR50","doi-asserted-by":"crossref","unstructured":"Nuseibeh B, Easterbrook S (2000) Requirements engineering: a roadmap. In: Proceedings of the conference on the future of software engineering, Limerick, Ireland. ACM, pp 35\u201346","DOI":"10.1145\/336512.336523"},{"key":"324_CR51","doi-asserted-by":"crossref","unstructured":"Liu L, Lin L (2008) ARED-CK: an automated requirements elicitation approach based on decision-making with complete knowledge. In: First international workshop on managing requirements knowledge, Barcelona, Spain. IEEE, pp 47\u201352","DOI":"10.1109\/MARK.2008.2"},{"key":"324_CR52","unstructured":"Kenzi K, Soffer P, Hadar I (2010) The role of domain knowledge in requirements elicitation: an exploratory study. In: Mediterranean conference on information systems Netherlands, vol 2. Association for Information Systems, p 48"},{"issue":"4","key":"324_CR53","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2001.936219","volume":"18","author":"HF Hofmann","year":"2001","unstructured":"Hofmann HF, Lehner F (2001) Requirements engineering as a success factor in software projects. IEEE Softw 18(4):58\u201366","journal-title":"IEEE Softw"},{"issue":"2","key":"324_CR54","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s00766-012-0163-2","volume":"19","author":"I Hadar","year":"2014","unstructured":"Hadar I, Soffer P, Kenzi K (2014) The role of domain knowledge in requirements elicitation via interviews: an exploratory study. Requir Eng 19(2):143\u2013159","journal-title":"Requir Eng"},{"key":"324_CR55","doi-asserted-by":"crossref","unstructured":"Sabahat N, Iqbal F, Azam F, Javed MY (2010) An iterative approach for global requirements elicitation: a case study analysis. In: International conference on electronics and information engineering, 2010. IEEE, pp V1-361\u2013V361-366","DOI":"10.1109\/ICEIE.2010.5559859"},{"key":"324_CR56","doi-asserted-by":"crossref","unstructured":"Sutcliffe A, Sawyer P (2013) Requirements elicitation: Towards the unknown unknowns. In: Paper presented at the 21st IEEE international requirements engineering conference, Rio de Janeiro, Brazil","DOI":"10.1109\/RE.2013.6636709"},{"key":"324_CR57","doi-asserted-by":"crossref","unstructured":"Chua BB, Bernardo DV, Verner J (2010) Understanding the use of elicitation approaches for effective requirements gathering. In: 2010 Fifth international conference on software engineering advances (ICSEA). IEEE, pp 325\u2013330","DOI":"10.1109\/ICSEA.2010.89"},{"key":"324_CR58","unstructured":"Alistair S, Shailey M (1999) Analysing socio-technical system requirements. In: 4th International symposium on requirements engineering, Limerick, Ireland"},{"key":"324_CR59","doi-asserted-by":"crossref","unstructured":"Mavin A, Maiden N (2003) Determining socio-technical systems requirements: experiences with generating and walking through scenarios. In: Proceedings of the 11th IEEE international conference on requirements engineering, Monterey Bay, CA. IEEE, pp 213\u2013222","DOI":"10.1109\/ICRE.2003.1232752"},{"key":"324_CR60","volume-title":"Requirements engineering: a good practice guide","author":"I Sommerville","year":"1997","unstructured":"Sommerville I, Sawyer P (1997) Requirements engineering: a good practice guide, 1st edn. Wiley, New York","edition":"1"},{"issue":"1","key":"324_CR61","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/382294.382725","volume":"15","author":"H Holbrook III","year":"1990","unstructured":"Holbrook H III (1990) A scenario-based methodology for conducting requirements elicitation. ACM Sigsoft Softw Eng Notes 15(1):95\u2013104","journal-title":"ACM Sigsoft Softw Eng Notes"},{"issue":"2","key":"324_CR62","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s00766-015-0242-2","volume":"22","author":"F Asteasuain","year":"2017","unstructured":"Asteasuain F, Braberman V (2017) Declaratively building behavior by means of scenario clauses. Requir Eng 22(2):239\u2013274","journal-title":"Requir Eng"},{"issue":"3","key":"324_CR63","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00766-011-0131-2","volume":"17","author":"G Atladottir","year":"2012","unstructured":"Atladottir G, Hvannberg ET, Gunnarsdottir S (2012) Comparing task practicing and prototype fidelities when applying scenario acting to elicit requirements. Requir Eng 17(3):157\u2013170","journal-title":"Requir Eng"},{"key":"324_CR64","unstructured":"Sutcliffe, Ryan (1998) Experience with SCRAM, a scenario requirements analysis method. In: Paper presented at the proceedings of the third international conference on requirements engineering, Colorado Springs, CO"},{"key":"324_CR65","doi-asserted-by":"crossref","unstructured":"Sommerville I, Sawyer P, Viller S (1998) Viewpoints for requirements elicitation: a practical approach. In: Proceedings of the third international conference on requirements engineering, Colorado Springs, CO. IEEE, pp 74\u201381","DOI":"10.1109\/ICRE.1998.667811"},{"key":"324_CR66","unstructured":"Fuller RM, Davis CJ (2008) The Overreliance on analyst experience in the selection of requirements elicitation techniques. In: Paper presented at the proceedings of the 14th Americas conference on information systems (AMCIS 2008). Toronto, Ontario, Canada"},{"issue":"1","key":"324_CR67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00766-011-0132-1","volume":"18","author":"F Dalpiaz","year":"2013","unstructured":"Dalpiaz F, Giorgini P, Mylopoulos J (2013) Adaptive socio-technical systems: a requirements-based approach. Requir Eng 18(1):1\u201324","journal-title":"Requir Eng"},{"key":"324_CR68","doi-asserted-by":"crossref","first-page":"336","DOI":"10.4018\/978-1-60566-264-0.ch023","volume-title":"Handbook of research on socio-technical design and social networking systems","author":"T Herrmann","year":"2009","unstructured":"Herrmann T (2009) Systems design with the socio-technical walkthrough. In: Whitworth B, de Moor A (eds) Handbook of research on socio-technical design and social networking systems. IGI Global, Pennsylvania, pp 336\u2013351"},{"key":"324_CR69","doi-asserted-by":"crossref","first-page":"245","DOI":"10.4018\/978-1-59140-506-1.ch015","volume-title":"Requirements engineering for socio-technical systems","author":"S Jones","year":"2005","unstructured":"Jones S, Maiden NA (2005) RESCUE: An integrated method for specifying requirements for complex socio-technical systems. In: Jose LM, Andres S (eds) Requirements engineering for socio-technical systems. IGI Global, Pennsylvania, pp 245\u2013265"},{"issue":"1","key":"324_CR70","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00766-012-0157-0","volume":"19","author":"PF Katina","year":"2014","unstructured":"Katina PF, Keating CB, Raed MJ (2014) System requirements engineering in complex situations. Requir Eng 19(1):45\u201362","journal-title":"Requir Eng"},{"key":"324_CR71","doi-asserted-by":"crossref","unstructured":"Hubbard R, Schroeder CN, Mead NR (2000) An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method. In: Proceedings of the 4th international conference on requirements engineering, Schaumburg, IL. IEEE, pp 178\u2013186","DOI":"10.1109\/ICRE.2000.855608"},{"issue":"5","key":"324_CR72","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/S0003-6870(00)00009-0","volume":"31","author":"C Clegg","year":"2000","unstructured":"Clegg C (2000) Sociotechnical principles for system design. Appl Ergonom 31(5):463\u2013477","journal-title":"Appl Ergonom"},{"issue":"6","key":"324_CR73","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1057\/ejis.2008.50","volume":"17","author":"K Lyytinen","year":"2008","unstructured":"Lyytinen K, Newman M (2008) Explaining information systems change: a punctuated socio-technical change model. Eur J Inf Syst 17(6):589\u2013613","journal-title":"Eur J Inf Syst"},{"issue":"2","key":"324_CR74","first-page":"1","volume":"24","author":"J Horkoff","year":"2017","unstructured":"Horkoff J, Aydemir FB, Cardoso E, Li T, Mat\u00e9 A, Paja E, Salnitri M, Piras L, Mylopoulos J, Giorgini P (2017) Goal-oriented requirements engineering: an extended systematic mapping study. Requir Eng 24(2):1\u201328","journal-title":"Requir Eng"},{"issue":"1","key":"324_CR75","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"March Hevner","year":"2004","unstructured":"Hevner March, Park Ram (2004) Design science in information systems research. Manag Inf Syst Q 28(1):75\u2013105","journal-title":"Manag Inf Syst Q"},{"issue":"3","key":"324_CR76","first-page":"1","volume":"53","author":"J vom Brocke","year":"2013","unstructured":"vom Brocke J, Riedl R, L\u00e9ger P-M (2013) Application strategies for neuroscience in information systems design science research. J Comput Inf Syst 53(3):1\u201313","journal-title":"J Comput Inf Syst"},{"issue":"3","key":"324_CR77","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S (2007) A design science research methodology for information systems research. J Manag Inf Syst 24(3):45\u201377","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"324_CR78","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1037\/0021-9010.69.1.167","volume":"69","author":"J Hogan","year":"1984","unstructured":"Hogan J, Hogan R, Busch CM (1984) How to measure service orientation. J Appl Psychol 69(1):167","journal-title":"J Appl Psychol"},{"key":"324_CR79","unstructured":"Gebauer J, Shaw MJ, Gribbins ML (2005) Towards a specific theory of task-technology fit for mobile information systems. University of Illinois at Urbana-Champaign, College of Business Working Paper"},{"key":"324_CR80","doi-asserted-by":"crossref","DOI":"10.4324\/9781315125930","volume-title":"Organizations in action: social science bases of administrative theory","author":"J Thompson","year":"2017","unstructured":"Thompson J (2017) Organizations in action: social science bases of administrative theory. Routledge, New York"},{"issue":"2","key":"324_CR81","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1177\/1054773810365994","volume":"19","author":"S Fredericks","year":"2010","unstructured":"Fredericks S, Guruge S, Sidani S, Wan T (2010) Postoperative patient education: a systematic review. Clin Nurs Res 19(2):144\u2013164","journal-title":"Clin Nurs Res"},{"key":"324_CR82","volume-title":"Social learning theory","author":"A Bandura","year":"1977","unstructured":"Bandura A, McClelland DC (1977) Social learning theory. General Learning Press, New York"},{"key":"324_CR83","volume-title":"Encyclopedia of psychology","author":"A Bandura","year":"1994","unstructured":"Bandura A (1994) Self-efficacy. In: Corsini R (ed) Encyclopedia of psychology, vol 3, 2nd edn. Wiley, New York","edition":"2"},{"key":"324_CR84","volume-title":"Social learning theory","author":"A Bandura","year":"1977","unstructured":"Bandura A (1977) Social learning theory, 1st edn. Prentice Hall, Englewood Cliffs","edition":"1"},{"issue":"1","key":"324_CR85","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/249610","volume":"18","author":"H Barki","year":"1994","unstructured":"Barki H, Hartwick J (1994) Measuring user participation, user involvement, and user attitude. Manag Inf Syst Q 18(1):59\u201382","journal-title":"Manag Inf Syst Q"},{"issue":"2","key":"324_CR86","first-page":"130","volume":"10","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Belief, attitude, intention and behavior: An introduction to theory and research. Philos Rhetor 10(2):130\u2013132","journal-title":"Philos Rhetor"},{"issue":"3","key":"324_CR87","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. Manag Inf Syst Q 27(3):425\u2013478","journal-title":"Manag Inf Syst Q"},{"issue":"3","key":"324_CR88","doi-asserted-by":"crossref","first-page":"212","DOI":"10.2307\/2136517","volume":"22","author":"MR Haug","year":"1981","unstructured":"Haug MR, Lavin B (1981) Practitioner or patient-Who\u2019s in charge? J Health Soc Behav 22(3):212\u2013229","journal-title":"J Health Soc Behav"},{"issue":"01n02","key":"324_CR89","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1142\/S0218843000000077","volume":"9","author":"SW Sadiq","year":"2000","unstructured":"Sadiq SW, Marjanovic O, Orlowska ME (2000) Managing change and time in dynamic workflow processes. Int J Coop Inf Syst 9(01n02):93\u2013116","journal-title":"Int J Coop Inf Syst"},{"key":"324_CR90","unstructured":"Galloway LJ (2006) A scheme of technology acceptance for mobile computing. In: Proceedings of the 2006 information resources management association international conference, Washington, DC. IGI Global, pp 21\u201324"},{"issue":"3","key":"324_CR91","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F Davis","year":"1989","unstructured":"Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. Manag Inf Syst Q 13(3):319\u2013340","journal-title":"Manag Inf Syst Q"},{"issue":"9","key":"324_CR92","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.2337\/diacare.23.9.1301","volume":"23","author":"Wysocki Harris","year":"2000","unstructured":"Harris Wysocki, Sadler Wilkinson, Harvey Buckloh, Mauras White (2000) Validation of a structured interview for the assessment of diabetes self-management. Diabetes Care 23(9):1301\u20131304","journal-title":"Diabetes Care"},{"issue":"4","key":"324_CR93","doi-asserted-by":"crossref","first-page":"511","DOI":"10.2307\/3350391","volume":"74","author":"EH Wagner","year":"1996","unstructured":"Wagner EH, Austin BT, Von Korff M (1996) Organizing care for patients with chronic illness. Milbank Q 74(4):511\u2013544","journal-title":"Milbank Q"},{"issue":"2","key":"324_CR94","doi-asserted-by":"crossref","first-page":"119","DOI":"10.2337\/diacare.19.2.119","volume":"19","author":"T Wysocki","year":"1996","unstructured":"Wysocki T, Taylor A, Hough BS, Linscheid TR, Yeates KO, Naglieri JA (1996) Deviation from developmentally appropriate self-care autonomy: association with diabetes outcomes. Diabetes Care 19(2):119\u2013125","journal-title":"Diabetes Care"},{"issue":"1","key":"324_CR95","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.diabres.2011.02.002","volume":"93","author":"S Nam","year":"2011","unstructured":"Nam S, Chesla C, Stotts NA, Kroon L, Janson SL (2011) Barriers to diabetes management: patient and provider factors. Diabetes Res Clin Pract 93(1):1\u20139","journal-title":"Diabetes Res Clin Pract"},{"issue":"5","key":"324_CR96","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1093\/her\/17.5.574","volume":"17","author":"DJ Toobert","year":"2002","unstructured":"Toobert DJ, Strycker LA, Glasgow RE, Barrera M, Bagdade JD (2002) Enhancing support for health behavior change among women at risk for heart disease: the Mediterranean Lifestyle Trial. Health Educ Res 17(5):574\u2013585","journal-title":"Health Educ Res"},{"issue":"1","key":"324_CR97","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1370\/afm.4","volume":"1","author":"EA Bayliss","year":"2003","unstructured":"Bayliss EA, Steiner JF, Fernald DH, Crane LA, Main DS (2003) Descriptions of barriers to self-care by persons with comorbid chronic diseases. Ann Family Med 1(1):15\u201321","journal-title":"Ann Family Med"},{"key":"324_CR98","unstructured":"Tobin S et al (2012) Lesson learned: effective training strategies for electronic data capturing. Society for Clinical Trials, Miami Annual Meeting"},{"issue":"4","key":"324_CR99","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1177\/193229680900300418","volume":"3","author":"AG Ershow","year":"2009","unstructured":"Ershow AG (2009) Environmental influences on development of type 2 diabetes and obesity: challenges in personalizing prevention and management. J Diabetes Sci Technol 3(4):727\u2013734","journal-title":"J Diabetes Sci Technol"},{"issue":"2","key":"324_CR100","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/BF02879897","volume":"33","author":"R Schwarzer","year":"2007","unstructured":"Schwarzer R, Sch\u00fcz B, Ziegelmann JP, Lippke S, Luszczynska A, Scholz U (2007) Adoption and maintenance of four health behaviors: Theory-guided longitudinal studies on dental flossing, seat belt use, dietary behavior, and physical activity. Ann Behav Med 33(2):156\u2013166","journal-title":"Ann Behav Med"},{"issue":"5","key":"324_CR101","first-page":"480","volume":"76","author":"J Anderson","year":"2007","unstructured":"Anderson J (2007) Social, ethical and legal barriers to e-health. Int J Med Inf 76(5):480\u2013483","journal-title":"Int J Med Inf"},{"issue":"2","key":"324_CR102","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/S1098-3597(09)60006-5","volume":"8","author":"DG Marrero","year":"2007","unstructured":"Marrero DG (2007) Overcoming patient barriers to initiating insulin therapy in type 2 diabetes mellitus. Clin Cornerstone 8(2):33\u201343","journal-title":"Clin Cornerstone"},{"issue":"3","key":"324_CR103","first-page":"255","volume":"43","author":"AA Richard","year":"2011","unstructured":"Richard AA, Shea K (2011) Delineation of self-care and associated concepts. J Nurs Scholarsh 43(3):255\u2013264","journal-title":"J Nurs Scholarsh"},{"issue":"1","key":"324_CR104","doi-asserted-by":"crossref","first-page":"51","DOI":"10.17925\/USE.2007.00.2.51","volume":"2","author":"WA Fisher","year":"2007","unstructured":"Fisher WA (2007) Barriers and behaviours in blood glucose monitoring. US Endocrine Dis 2(1):51\u201353","journal-title":"US Endocrine Dis"},{"issue":"4","key":"324_CR105","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1093\/jpepsy\/25.4.257","volume":"25","author":"TC Skinner","year":"2000","unstructured":"Skinner TC, John M, Hampson SE (2000) Social support and personal models of diabetes as predictors of self-care and well-being: a longitudinal study of adolescents with diabetes. J Pediatr Psychol 25(4):257\u2013267","journal-title":"J Pediatr Psychol"},{"issue":"1","key":"324_CR106","first-page":"35","volume":"12","author":"DE Morisky","year":"1985","unstructured":"Morisky DE, DeMuth NM, Field-Fass M, Green LW, Levine DM (1985) Evaluation of family health education to build social support for long-term control of high blood pressure. Health Educ Behav 12(1):35\u201350","journal-title":"Health Educ Behav"},{"key":"324_CR107","unstructured":"IEEE (1984) ANSI\/IEEE Standard 830-1984: IEEE guide for software requirements specifications. IEEE STD, pp 1\u201326"},{"issue":"2","key":"324_CR108","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/sej.1994.0008","volume":"9","author":"BA Kitchenham","year":"1994","unstructured":"Kitchenham BA, Linkman SG, Law D (1994) Critical review of quantitative assessment. Softw Eng J 9(2):43\u201354","journal-title":"Softw Eng J"},{"key":"324_CR109","doi-asserted-by":"crossref","DOI":"10.1142\/4930","volume-title":"Lecture notes on empirical software engineering","author":"N Juristo","year":"2003","unstructured":"Juristo N, Moreno AM (2003) Lecture notes on empirical software engineering, vol 12, 1st edn. World Scientific, River Edge","edition":"1"},{"key":"324_CR110","unstructured":"Gaska MT, Gause DC (1998) An approach for cross-discipline requirements engineering process patterns. In: Proceedings of IEEE international symposium on requirements engineering, Colorado Springs, CO. IEEE, pp 182\u2013189"},{"issue":"3","key":"324_CR111","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1525\/aa.1964.66.3.02a00880","volume":"66","author":"CE Osgood","year":"1964","unstructured":"Osgood CE (1964) Semantic differential technique in the comparative study of Cultures1. Am Anthropol 66(3):171\u2013200","journal-title":"Am Anthropol"},{"key":"324_CR112","doi-asserted-by":"crossref","unstructured":"D\u2019Aubeterre F, Iyer LS, Singh R (2009) An empirical evaluation of information security awareness levels in designing secure business processes. In: Proceedings of the 4th international conference on design science research in information systems and technology, Philadelphia, Pennsylvania. ACM, p 16","DOI":"10.1145\/1555619.1555641"},{"issue":"1","key":"324_CR113","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.3.1.36","volume":"3","author":"JG Walls","year":"1992","unstructured":"Walls JG, Widmeyer GR, El Sawy OA (1992) Building an information system design theory for vigilant EIS. Inf Syst Res 3(1):36\u201359","journal-title":"Inf Syst Res"},{"key":"324_CR114","volume-title":"Multivariate data analysis","author":"H Joseph","year":"2010","unstructured":"Joseph H, William B, Barry B, Rolph A (2010) Multivariate data analysis, 7th edn. Pearson, Upper Saddle River","edition":"7"},{"issue":"4","key":"324_CR115","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1080\/07421222.2001.11045661","volume":"17","author":"J Karimi","year":"2001","unstructured":"Karimi J, Somers TM, Gupta YP (2001) Impact of information technology management practices on customer service. J Manag Inf Syst 17(4):125\u2013158","journal-title":"J Manag Inf Syst"},{"key":"324_CR116","unstructured":"Faul F, Erdfelder E, Buchner A, Lang A (2013) G*Power Version 3.1.7 [computer software]"},{"key":"324_CR117","unstructured":"Statistics_Solutions (2013) Sample Size Write-up Statistics Solutions. \nhttp:\/\/www.statisticssolutions.com\/resources\/sample-size-calculator\/manova-groups\/manova-2-levels-and-2-dependent-variables"},{"issue":"2","key":"324_CR118","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1037\/0033-2909.95.2.334","volume":"95","author":"JP Stevens","year":"1984","unstructured":"Stevens JP (1984) Outliers and influential data points in regression analysis. Psychol Bull 95(2):334","journal-title":"Psychol Bull"},{"key":"324_CR119","volume-title":"SPSS survival manual: a step-by-step guide to data analysis using SPSS","author":"J Pallant","year":"2013","unstructured":"Pallant J (2013) SPSS survival manual: a step-by-step guide to data analysis using SPSS, 5th edn. Open University Press, Philadelphia","edition":"5"},{"key":"324_CR120","volume-title":"Biometrika tables for statisticians","author":"ES Pearson","year":"1954","unstructured":"Pearson ES, Pearson K (1954) Biometrika tables for statisticians, vol 2, 2nd edn. Cambridge University Press, Cambridge","edition":"2"},{"key":"324_CR121","volume-title":"Education in a research University","author":"A Kenneth","year":"1996","unstructured":"Kenneth A, Richard C, Ingram BEO (1996) Education in a research University, 1st edn. Stanford University Press, Palo Alto","edition":"1"},{"issue":"4","key":"324_CR122","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1038\/sj.hdy.6800139","volume":"89","author":"W Arthur","year":"2002","unstructured":"Arthur W (2002) The interaction between developmental bias and natural selection: from centipede segments to a general hypothesis. Heredity 89(4):239\u2013246","journal-title":"Heredity"},{"issue":"1","key":"324_CR123","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1111\/1368-423X.11009","volume":"1","author":"JM Dufour","year":"1998","unstructured":"Dufour JM, Farhat A, Gardiol L, Khalaf L (1998) Simulation-based finite sample normality tests in linear regressions. Econom J 1(1):154\u2013173","journal-title":"Econom J"},{"issue":"2","key":"324_CR124","doi-asserted-by":"crossref","first-page":"135","DOI":"10.3923\/itj.2003.135.139","volume":"2","author":"M Mendes","year":"2003","unstructured":"Mendes M, Pala A (2003) Type I error rate and power of three normality tests. Pak J Inf Technol 2(2):135\u2013139","journal-title":"Pak J Inf Technol"},{"key":"324_CR125","unstructured":"Trochim WM, Donnelly JP (2006) Research methods knowledge base, 3rd edn. Atomic Dog Publishing"},{"key":"324_CR126","volume-title":"The Cambridge dictionary of statistics","author":"BS Everitt","year":"2002","unstructured":"Everitt BS (2002) The Cambridge dictionary of statistics. Cambridge University Press, Cambridge"},{"key":"324_CR127","volume-title":"Design and analysis of experiments","author":"DC Montgomery","year":"2012","unstructured":"Montgomery DC (2012) Design and analysis of experiments. Wiley, Hoboken"},{"key":"324_CR128","volume-title":"100 questions (and answers) about research methods","author":"S Neil","year":"2012","unstructured":"Neil S (2012) 100 questions (and answers) about research methods. SAGE Publications, Washington, DC"},{"key":"324_CR129","volume-title":"Experimental and quasi-experimental designs for research","author":"DT Campbell","year":"2015","unstructured":"Campbell DT, Stanley JC (2015) Experimental and quasi-experimental designs for research. Ravenio Books, New York Online (e-textbook)"},{"key":"324_CR130","volume-title":"Quasi-experimentation: design and analysis issues for field settings","author":"C Thomas","year":"1976","unstructured":"Thomas C (1976) Quasi-experimentation: design and analysis issues for field settings, 1st edn. Houghton Mifflin, Chicago","edition":"1"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-019-00324-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-019-00324-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-019-00324-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T23:37:32Z","timestamp":1597102652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-019-00324-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":130,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["324"],"URL":"https:\/\/doi.org\/10.1007\/s00766-019-00324-x","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"type":"print","value":"0947-3602"},{"type":"electronic","value":"1432-010X"}],"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"20 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}