{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:54:04Z","timestamp":1770069244330,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,7,23]],"date-time":"2014-07-23T00:00:00Z","timestamp":1406073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10009-014-0332-3","type":"journal-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T11:31:43Z","timestamp":1406028703000},"page":"559-568","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["A taxonomy of risk-based testing"],"prefix":"10.1007","volume":"16","author":[{"given":"Michael","family":"Felderer","sequence":"first","affiliation":[]},{"given":"Ina","family":"Schieferdecker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,23]]},"reference":[{"issue":"3","key":"332_CR1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0164-1212(00)00019-4","volume":"53","author":"S Amland","year":"2000","unstructured":"Amland, S.: Risk-based testing: Risk analysis fundamentals and metrics for software testing including a financial application case study. J. Syst. Softw. 53(3), 287\u2013295 (2000)","journal-title":"J. Syst. Softw."},{"key":"332_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809163","volume-title":"Introduction to Software Testing","author":"P Ammann","year":"2008","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing. Cambridge University Press, Cambridge (2008)"},{"key":"332_CR3","first-page":"99","volume":"11","author":"J Bach","year":"1999","unstructured":"Bach, J.: Heuristic risk-based testing. Softw. Test. Qual. Eng. Mag. 11, 99 (1999)","journal-title":"Softw. Test. Qual. Eng. Mag."},{"key":"332_CR4","doi-asserted-by":"crossref","unstructured":"Bai, X., Kenett, R.S.: Risk-based adaptive group testing of semantic web services. In: 33rd Annual IEEE international computer software and applications conference (COMPSAC\u201909). vol. 2, pp. 485\u2013490. IEEE (2009)","DOI":"10.1109\/COMPSAC.2009.180"},{"issue":"05","key":"332_CR5","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1142\/S0218194012500167","volume":"22","author":"X Bai","year":"2012","unstructured":"Bai, X., Kenett, R.S., Yu, W.: Risk assessment and adaptive group testing of semantic web services. Int. J. Softw. Eng. Knowl. Eng. 22(05), 595\u2013620 (2012)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"1","key":"332_CR6","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.infsof.2008.09.010","volume":"51","author":"LC Briand","year":"2009","unstructured":"Briand, L.C., Labiche, Y., He, S.: Automating regression test selection based on UML designs. Inf. Softw. Technol. 51(1), 16\u201330 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"332_CR7","doi-asserted-by":"crossref","unstructured":"Carrozza, G., Pietrantuono, R., Russo, S.: Dynamic test planning: a study into an industrial context. STTT in this volume (2014)","DOI":"10.1007\/s10009-014-0319-0"},{"key":"332_CR8","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: Testing long-lived web services transactions using a risk-based approach. In: 10th international conference on quality software. pp. 337\u2013340. IEEE (2010)","DOI":"10.1109\/QSIC.2010.46"},{"key":"332_CR9","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: proceedings of the 2002 conference of the Centre for Advanced Studies on Collaborative research. p. 1. IBM Press (2002)"},{"key":"332_CR10","doi-asserted-by":"crossref","unstructured":"Erdogan, G., Li, Y., Runde, R.K., Seehusen, F., St\u00f8len, K.: Approaches for the combined use of risk analysis and testing: a systematic literature review. STTT in this volume (2014)","DOI":"10.1007\/s10009-014-0330-5"},{"key":"332_CR11","doi-asserted-by":"crossref","unstructured":"Felderer, M., Beer, A.: Using defect taxonomies to improve the maturity of the system test process: results from an industrial case study. In: software quality. Increasing value in software and systems development, pp. 125\u2013146. Springer (2013)","DOI":"10.1007\/978-3-642-35702-2_9"},{"key":"332_CR12","doi-asserted-by":"crossref","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing, pp. 159\u2013180. Software quality. Process automation in software, development (2012)","DOI":"10.1007\/978-3-642-27213-4_11"},{"key":"332_CR13","doi-asserted-by":"crossref","unstructured":"Felderer, M., Haisjackl, C., Pekar, V., Breu, R.: A risk assessment framework for software testing. In: ISoLA 2014. Springer (2014)","DOI":"10.1007\/978-3-662-45231-8_21"},{"key":"332_CR14","doi-asserted-by":"crossref","unstructured":"Felderer, M., Ramler, R.: Experiences and challenges of introducing risk-based testing in an industrial project. In: Software quality. Increasing value in software and systems development, pp. 10\u201329. Springer (2013)","DOI":"10.1007\/978-3-642-35702-2_3"},{"issue":"3","key":"332_CR15","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1007\/s11219-013-9226-y","volume":"22","author":"M Felderer","year":"2014","unstructured":"Felderer, M., Ramler, R.: Integrating risk-based testing in industrial test processes. Softw. Qual. J. 22(3), 543\u2013575 (2014)","journal-title":"Softw. Qual. J."},{"key":"332_CR16","doi-asserted-by":"crossref","unstructured":"Felderer, M., Ramler, R.: A multiple case study on risk-based testing in industry. STTT in this volume (2014)","DOI":"10.1007\/s10009-014-0328-z"},{"key":"332_CR17","doi-asserted-by":"crossref","unstructured":"Fredriksen, R., Kristiansen, M., Gran, B.A., St\u00f8len, K., Opperud, T.A., Dimitrakos, T.: The coras framework for a model-based risk management process. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP. Lecture Notes in Computer Science, vol. 2434, pp. 94\u2013105. Springer (2002)","DOI":"10.1007\/3-540-45732-1_11"},{"key":"332_CR18","unstructured":"Gerrard, P., Thompson, N.: Risk-based e-business testing. Artech House Publishers, (2002)"},{"key":"332_CR19","doi-asserted-by":"crossref","unstructured":"Goel, A.L.: Software reliability models: assumptions, limitations, and applicability. IEEE Trans. Softw. Eng. 11(12), 1411\u20131423 (Dec 1985)","DOI":"10.1109\/TSE.1985.232177"},{"key":"332_CR20","unstructured":"Graham, D., Fewster, M.: Experiences of test automation: case studies of software test automation. Addison-Wesley Professional, (2012)"},{"key":"332_CR21","doi-asserted-by":"crossref","unstructured":"Hosseingholizadeh, A.: A source-based risk analysis approach for software test optimization. In: Computer Engineering and Technology (ICCET), 2010 2nd international conference on. vol. 2, pp. V2601\u2013V2604. IEEE (2010)","DOI":"10.1109\/ICCET.2010.5485639"},{"key":"332_CR22","doi-asserted-by":"crossref","unstructured":"Huizinga, D., Kolawa, A.: Automated defect prevention: best practices in software management. Wiley (2007)","DOI":"10.1002\/9780470165171"},{"key":"332_CR23","unstructured":"IEEE: IEEE Standard for Software and System Test Documentation. IEEE Std 829\u20132008 (2008)"},{"key":"332_CR24","unstructured":"ISO: ISO 14971: medical devices\u2014application of risk management to medical devices. ISO (2000)"},{"key":"332_CR25","unstructured":"ISO: ISO\/IEC\/IEEE 29119 Software Testing. http:\/\/www.softwaretestingstandard.org\/ (2013). Accessed 6 May 2014"},{"key":"332_CR26","unstructured":"ISTQB: Standard glossary of terms used in software testing. version 2.2. Tech. rep., ISTQB (2012)"},{"issue":"2","key":"332_CR27","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MS.2009.47","volume":"26","author":"M Jorgensen","year":"2009","unstructured":"Jorgensen, M., Boehm, B., Rifkin, S.: Software development effort estimation: formal models or expert judgment? IEEE Softw. 26(2), 14\u201319 (2009)","journal-title":"IEEE Softw."},{"key":"332_CR28","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. Tech. rep., Technical report, EBSE Technical Report EBSE-2007-01 (2007)"},{"key":"332_CR29","doi-asserted-by":"crossref","unstructured":"Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safety-critical embedded systems driven by fault tree analysis. In: ICSTW 2011. pp. 26\u201333. IEEE (2011)","DOI":"10.1109\/ICSTW.2011.90"},{"key":"332_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, N., Sosale, D., Konuganti, S.N., Rathi, A.: Enabling the adoption of aspects-testing aspects: a risk model, fault model and patterns. In: proceedings of the 8th ACM international conference on Aspect-oriented software development. pp. 197\u2013206. ACM (2009)","DOI":"10.1145\/1509239.1509266"},{"key":"332_CR31","doi-asserted-by":"crossref","unstructured":"Murthy, K.K., Thakkar, K.R., Laxminarayan, S.: Leveraging risk based testing in enterprise systems security validation. In: first international conference on emerging network intelligence. pp. 111\u2013116. IEEE (2009)","DOI":"10.1109\/EMERGING.2009.28"},{"key":"332_CR32","doi-asserted-by":"crossref","unstructured":"Neubauer, J., Windm\u00fcller, S., Steffen, B.: Risk-based testing via active continuous quality control. STTT in this volume (2014)","DOI":"10.1007\/s10009-014-0321-6"},{"key":"332_CR33","first-page":"121990","volume":"610121990","author":"J Radatz","year":"1990","unstructured":"Radatz, J., Geraci, A., Katki, F.: IEEE standard glossary of software engineering terminology. IEEE Std. 610121990, 121990 (1990)","journal-title":"IEEE Std."},{"issue":"1","key":"332_CR34","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1049\/iet-sen.2011.0081","volume":"7","author":"M Ray","year":"2013","unstructured":"Ray, M., Mohapatra, D.P.: Risk analysis: a guiding force in the improvement of testing. IET Softw. 7(1), 29\u201346 (2013)","journal-title":"IET Softw."},{"issue":"1","key":"332_CR35","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.288","volume":"14","author":"F Redmill","year":"2004","unstructured":"Redmill, F.: Exploring risk-based testing and its implications. Softw. Test. Verif. Reliab. 14(1), 3\u201315 (2004)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"1","key":"332_CR36","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.310","volume":"15","author":"F Redmill","year":"2005","unstructured":"Redmill, F.: Theory and practice of risk-based testing. Softw. Test. Verif. Reliab. 15(1), 3\u201320 (2005)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"332_CR37","unstructured":"Rosenberg, L., Stapko, R., Gallo, A.: Risk-based object oriented testing. Proceedings of 13th international software\/internet quality week-QW 2 (2000)"},{"key":"332_CR38","doi-asserted-by":"crossref","unstructured":"Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. Proceedings 7th workshop on model-based testing (2012)","DOI":"10.4204\/EPTCS.80.1"},{"key":"332_CR39","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusmao, C., Alves, K., Venancio, J., Melo, R.: Measurement and control for risk-based test cases and activities. In: 10th Latin American test workshop. pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/LATW.2009.4813802"},{"key":"332_CR40","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Ven\u00e2ncio, J.: Risk-based testing: A case study. In: information technology: new generations (ITNG), 2010 seventh international conference on. pp. 1032\u20131037. IEEE (2010)","DOI":"10.1109\/ITNG.2010.203"},{"key":"332_CR41","unstructured":"Stallbaum, H., Metzger, A.: Employing requirements metrics for automating early risk assessment. Proceedings of MeReP07, Palma de Mallorca, Spain. pp. 1\u201312 (2007)"},{"key":"332_CR42","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proceedings of the 3rd international workshop on Automation of software test. pp. 67\u201370. ACM (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"332_CR43","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: proceedings of the 3rd international workshop on automation of software test. pp. 67\u201370. AST \u201908, ACM, New York, NY, USA (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"332_CR44","unstructured":"Standards Australia\/New Zealand: risk management AS\/NZS 4360:2004 (2004)"},{"key":"332_CR45","unstructured":"Tran, V., Liu, D.B.: A risk-mitigating model for the development of reliable and maintainable large-scale commercial-off-the-shelf integrated software systems. In: reliability and maintainability symposium. 1997 proceedings, annual. pp. 361\u2013367 (1997)"},{"key":"332_CR46","unstructured":"van Veenendaal, E.: Practical risk-based testing\u2014The PRISMA Approach. UTN Publishers (2012)"},{"key":"332_CR47","first-page":"636","volume":"2012","author":"MF Wendland","year":"2012","unstructured":"Wendland, M.F., Kranz, M., Schieferdecker, I.: A systematic approach to risk-based testing using risk-annotated requirements models. ICSEA 2012, 636\u2013642 (2012)","journal-title":"ICSEA"},{"key":"332_CR48","doi-asserted-by":"crossref","unstructured":"Windm\u00fcller, S., Neubauer, J., Steffen, B., Howar, F., Bauer, O.: Active continuous quality control. In: proceedings of the 16th international ACM sigsoft symposium on component-based software engineering. pp. 111\u2013120. ACM (2013)","DOI":"10.1145\/2465449.2465469"},{"key":"332_CR49","doi-asserted-by":"crossref","unstructured":"Yoo, S., Harman, M.: Regression testing minimization, selection and prioritization: a survey. Softw. Test. Verif. Reliab. 22(2), 67\u2013120 (Mar 2012)","DOI":"10.1002\/stv.430"},{"issue":"02","key":"332_CR50","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1142\/S0218194011005220","volume":"21","author":"H Yoon","year":"2011","unstructured":"Yoon, H., Choi, B.: A test case prioritization based on degree of risk exposure and its empirical study. Int. J. Softw. Eng. Know. Eng. 21(02), 191\u2013209 (2011)","journal-title":"Int. J. Softw. Eng. Know. Eng."},{"key":"332_CR51","doi-asserted-by":"crossref","unstructured":"Zech, P.: Risk-based security testing in cloud computing environments. In: ICST 2011. pp. 411\u2013414. IEEE (2011)","DOI":"10.1109\/ICST.2011.23"},{"key":"332_CR52","doi-asserted-by":"crossref","unstructured":"Zech, P., Felderer, M., Breu, R.: Towards risk-driven security testing of service centric systems. In: QSIC. pp. 140\u2013143 (2012)","DOI":"10.1109\/QSIC.2012.31"},{"key":"332_CR53","unstructured":"Zimmermann, F., Eschbach, R., Kloos, J., Bauer, T., et al.: Risk-based statistical testing: A refinement-based approach to the reliability analysis of safety-critical systems. In: EWDC 2009 (2009)"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0332-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-014-0332-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0332-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T02:25:24Z","timestamp":1565663124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-014-0332-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,23]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["332"],"URL":"https:\/\/doi.org\/10.1007\/s10009-014-0332-3","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,23]]}}}