{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T10:40:27Z","timestamp":1774435227913,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T00:00:00Z","timestamp":1403568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10009-014-0328-z","type":"journal-article","created":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T10:29:15Z","timestamp":1403519355000},"page":"609-625","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A multiple case study on risk-based testing in industry"],"prefix":"10.1007","volume":"16","author":[{"given":"Michael","family":"Felderer","sequence":"first","affiliation":[]},{"given":"Rudolf","family":"Ramler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,24]]},"reference":[{"key":"328_CR1","unstructured":"Wendland, M.F., Kranz, M., Schieferdecker, I.: A systematic approach to risk-based testing using risk-annotated requirements models. In: ICSEA 2012. The Seventh International Conference on Software Engineering Advances, pp. 636\u2013642 (2012)"},{"issue":"2","key":"328_CR2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131\u2013164 (2009)","journal-title":"Empir. Softw. Eng."},{"key":"328_CR3","unstructured":"Yin, R.K.: Case study research: design and methods, vol. 5. Sage (2009)"},{"key":"328_CR4","first-page":"99","volume":"11","author":"J Bach","year":"1999","unstructured":"Bach, J.: Heuristic risk-based testing. Softw. Test. Qual. Eng. Mag. 11, 99 (1999)","journal-title":"Softw. Test. Qual. Eng. Mag."},{"issue":"3","key":"328_CR5","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0164-1212(00)00019-4","volume":"53","author":"S Amland","year":"2000","unstructured":"Amland, S.: Risk-based testing: risk analysis fundamentals and metrics for software testing including a financial application case study. J. Syst. Softw. 53(3), 287\u2013295 (2000)","journal-title":"J. Syst. Softw."},{"key":"328_CR6","unstructured":"Redmill, F.: Theory and practice of risk-based testing. Softw. Test. Verif. Reliab. 15(1), 3\u201320 (2005)"},{"key":"328_CR7","volume-title":"Practical risk-based testing: the PRISMA approach","author":"E Veenendaal van","year":"2012","unstructured":"van Veenendaal, E.: Practical risk-based testing: the PRISMA approach. UTN, Cambridge (2012)"},{"key":"328_CR8","doi-asserted-by":"crossref","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. Software Quality. Process Automation in Software Development, pp. 159\u2013180 (2012)","DOI":"10.1007\/978-3-642-27213-4_11"},{"key":"328_CR9","unstructured":"ISO: ISO\/IEC\/IEEE 29119 Software Testing (2013). Available at http:\/\/www.softwaretestingstandard.org\/ . Accessed May 6 2014"},{"key":"328_CR10","unstructured":"van Veenendaal, E. (ed.): Standard glossary of terms used in software testing, version 2.2. Technical report, International Software Testing Qualifications Board, Glossary Working Party (2012)"},{"key":"328_CR11","unstructured":"ISO: ISO\/IEC\/IEEE 24765:2010 System and software engineering\u2014Vocabulary (2010)"},{"key":"328_CR12","doi-asserted-by":"crossref","unstructured":"Cavano, J., McCall, J.: A framework for the measurement of software quality. ACM SIGMETRICS Perform. Eval. Rev. 7(3\u20134), 133\u2013139 (1978)","DOI":"10.1145\/1007775.811113"},{"key":"328_CR13","unstructured":"Redmill, F.: Exploring risk-based testing and its implications. Softw. Test. Verif. Reliab. 14(1), 3\u201315 (2004)"},{"key":"328_CR14","unstructured":"Standards Australia\/New Zealand: Risk Management AS\/NZS 4360, 2004 (2004)"},{"key":"328_CR15","unstructured":"Karolak, D., Karolak, N.: Software Engineering Risk Management: A Just-in-Time Approach. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"328_CR16","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceedings of the 2002 Conference of the Centre for Advanced Studies on Collaborative Research. IBM Press (2002)"},{"key":"328_CR17","unstructured":"Stallbaum, H., Metzger, A.: Employing requirements metrics for automating early risk assessment. In: Proceedings of MeReP07, Palma de Mallorca, Spain, pp. 1\u201312 (2007)"},{"key":"328_CR18","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proceedings of the 3rd International Workshop on Automation of Software Test, pp. 67\u201370. ACM Press, New York (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"328_CR19","doi-asserted-by":"crossref","unstructured":"Felderer, M., Ramler, R.: Experiences and challenges of introducing risk-based testing in an industrial project. In: Software Quality. Increasing Value in Software and Systems Development, pp. 10\u201329. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-35702-2_3"},{"issue":"02","key":"328_CR20","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1142\/S0218194011005220","volume":"21","author":"H Yoon","year":"2011","unstructured":"Yoon, H., Choi, B.: A test case prioritization based on degree of risk exposure and its empirical study. Int. J. Softw. Eng. Knowl. Eng. 21(02), 191\u2013209 (2011)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"328_CR21","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Ven\u00e2ncio, J.: Risk-based testing: a case study. In: IEEE 2010 Seventh International Conference on Information Technology: New Generations (ITNG), pp. 1032\u20131037 (2010)","DOI":"10.1109\/ITNG.2010.203"},{"key":"328_CR22","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusmao, C., Alves, K., Venancio, J., Melo, R.: Measurement and control for risk-based test cases and activities. In: 10th Latin American Test Workshop, pp. 1\u20136. IEEE Press, New York (2009)","DOI":"10.1109\/LATW.2009.4813802"},{"key":"328_CR23","unstructured":"Borland: SilkCentral (2013). Available at http:\/\/www.borland.com\/products\/silkcentral\/ . Accessed November 30 2013"},{"key":"328_CR24","unstructured":"Microtool: in-Step (2013). Available at http:\/\/www.microtool.de\/inStep . Accessed November 30 2013"},{"key":"328_CR25","doi-asserted-by":"crossref","unstructured":"McCabe, T.: A complexity measure. IEEE Trans. Softw. Eng. 308\u2013320 (1976)","DOI":"10.1109\/TSE.1976.233837"},{"key":"328_CR26","unstructured":"SonarSource: Sonar (2013). Available at http:\/\/www.sonarsource.org\/ . Accessed November 30 2013"},{"key":"328_CR27","doi-asserted-by":"crossref","unstructured":"Felderer, M., Beer, A.: Using defect taxonomies to improve the maturity of the system test process: results from an industrial case study. In: Software Quality. Increasing Value in Software and Systems Development, LNBIP 133, pp. 125\u2013146. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-35702-2_9"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0328-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-014-0328-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0328-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T16:48:38Z","timestamp":1565542118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-014-0328-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,24]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["328"],"URL":"https:\/\/doi.org\/10.1007\/s10009-014-0328-z","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,24]]}}}