{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T18:10:27Z","timestamp":1712427027053},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T00:00:00Z","timestamp":1305244800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11219-011-9141-z","type":"journal-article","created":{"date-parts":[[2011,5,12]],"date-time":"2011-05-12T08:32:52Z","timestamp":1305189172000},"page":"369-394","source":"Crossref","is-referenced-by-count":22,"title":["Availability of enterprise IT systems: an expert-based Bayesian framework"],"prefix":"10.1007","volume":"20","author":[{"given":"Ulrik","family":"Franke","sequence":"first","affiliation":[]},{"given":"Pontus","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Johan","family":"K\u00f6nig","sequence":"additional","affiliation":[]},{"given":"Liv","family":"Marcks von W\u00fcrtemberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,13]]},"reference":[{"issue":"2","key":"9141_CR1","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1109\/24.295021","volume":"43","author":"N. Ashrafi","year":"2002","unstructured":"Ashrafi, N., Berman, O., & Cutler, M. (2002). Optimal design of large software-systems using N-version programming. IEEE Transactions on Reliability, 43(2), 344\u2013350.","journal-title":"IEEE Transactions on Reliability"},{"key":"9141_CR2","unstructured":"Ask\u00e5ker, J., & Kulle, M. (2008, June 4). Miljardaff\u00e4rer gick f\u00f6rlorade. Dagens Industri, pp. 6\u20137 (in Swedish)."},{"key":"9141_CR3","unstructured":"Baecher, G. (1988). Judgemental probability in geotechnical risk assessment. Technical report, The Office of the Chief, US Army Corps of Engineers."},{"key":"9141_CR4","volume-title":"How to research","author":"L. Blaxter","year":"2006","unstructured":"Blaxter, L., Hughes, C., & Tight, M. (2006). How to research. Buckingham: Open University Press."},{"issue":"3","key":"9141_CR5","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3233\/JCS-2003-11308","volume":"11","author":"K. Campbell","year":"2003","unstructured":"Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11(3), 431\u2013448.","journal-title":"Journal of Computer Security"},{"key":"9141_CR6","unstructured":"Chen, L., & Avizienis A. (1978). N-version programming: A fault-tolerance approach to reliability of software operation. In Proceedings of the 8th IEEE international symposium on fault-tolerant computing (FTCS-8), pp. 3\u20139."},{"key":"9141_CR7","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195064650.001.0001","volume-title":"Experts in uncertainty. Opinion and subjective probability in science","author":"R. M. Cooke","year":"1991","unstructured":"Cooke, R. M. (1991). Experts in uncertainty. Opinion and subjective probability in science. Oxford: Oxford University Press."},{"key":"9141_CR8","doi-asserted-by":"crossref","DOI":"10.4135\/9781412983877","volume-title":"Designing surveys","author":"R. Czaja","year":"2005","unstructured":"Czaja, R., & Blair, J. (2005). Designing surveys. Beverly Hills: Sage Publications Inc."},{"key":"9141_CR9","unstructured":"Druzdzel, M. J. (1999). Genie: A development environment for graphical decision-analytic models. In Proceedings of the 1999 annual symposium of the American medical informatics association (AMIA-1999), p. 1206, more information available on http:\/\/genie.sis.pitt.edu\/about.htm ."},{"key":"9141_CR10","volume-title":"Software metrics","author":"N. E. Fenton","year":"1997","unstructured":"Fenton, N. E., Pfleeger, S. L. (1997). Software Metrics (2nd ed.). Boston, MA: PWS Publishing Company.","edition":"2"},{"key":"9141_CR11","volume-title":"Survey research methods","author":"F. J. J. Fowler","year":"2002","unstructured":"Fowler, F. J. J. (2002). Survey research methods. Beverly Hills: Sage Publications Inc."},{"key":"9141_CR12","unstructured":"Franke, U., Johnson, P., K\u00f6nig, J., & von W\u00fcrtemberg, L. M. (2010a). Availability of enterprise IT systems\u2014an expert-based Bayesian model. In Proceedings of the fourth international workshop on software quality and maintainability (SQM 2010), Madrid."},{"key":"9141_CR13","doi-asserted-by":"crossref","unstructured":"Franke, U., Lagerstr\u00f6m, R., Ekstedt, M., Saat, J., & Winter, R. (2010b). Trends in enterprise architecture practice\u2014A survey. In Proceedings of the 5th trends in enterprise architecture research (TEAR2010) workshop.","DOI":"10.1007\/978-3-642-16819-2_2"},{"key":"9141_CR14","first-page":"421","volume-title":"Graphical models","author":"N. Friedman","year":"1999","unstructured":"Friedman, N., & Goldszmidt, M. (1999). Learning Bayesian networks with local structure. In M. I. Jordan (Eds.), Graphical models (pp. 421\u2013459). Cambridge, MA: MIT Press."},{"key":"9141_CR15","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1089\/106652700750050961","volume":"7","author":"N. Friedman","year":"2000","unstructured":"Friedman, N., Linial, M., & Nachman, I. (2000). Using bayesian networks to analyze expression data. Journal of Computational Biology, 7, 601\u2013620.","journal-title":"Journal of Computational Biology"},{"key":"9141_CR16","unstructured":"Garthwaite, P. H., Kadane, J. B., & O\u2019Hagan, A. (2005). Statistical methods for eliciting probability distributions. Journal of the American Statistical Association 100, 680\u2013701. http:\/\/ideas.repec.org\/a\/bes\/jnlasa\/v100y2005p680-701.htm ."},{"key":"9141_CR17","unstructured":"Henrion, M. (1989). Some practical issues in constructing belief networks. In L. Kanal, T. Levitt, & J. Lemmer (Eds.), Uncertainty in artificial intelligence 3 (pp. 161\u2013173). North Holland: Elsevier Science Publishers B.V."},{"key":"9141_CR18","unstructured":"IBM Global Services. (1998). Improving systems availability. Technical report, IBM Global Services."},{"key":"9141_CR19","unstructured":"International Organization for Standardization. (2003). Software engineering\u2014Product quality\u2014Part 2: External metrics. International standard ISO\/IEC TR 9126-2:2003(E), International Organization for Standardization."},{"key":"9141_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3502-4","volume-title":"Bayesian networks and decision graphs","author":"F. V. Jensen","year":"2001","unstructured":"Jensen, F. V. (2001). Bayesian networks and decision graphs. Secaucus, NJ: Springer."},{"key":"9141_CR21","doi-asserted-by":"crossref","unstructured":"Johansson, F., & Falkman, G. (2006). Implementation and integration of a bayesian network for prediction of tactical intention into a ground target simulator. In 2006 9th international conference on information fusion, pp. 1\u20137. doi: 10.1109\/ICIF.2006.301605 .","DOI":"10.1109\/ICIF.2006.301605"},{"key":"9141_CR22","first-page":"89","volume":"VI","author":"R. Lagerstr\u00f6m","year":"2009","unstructured":"Lagerstr\u00f6m, R., Franke, U., Johnson, P., & Ullberg, J. (2009a). A method for creating enterprise architecture metamodels\u2014Applied to systems modifiability analysis. International Journal of Computer Science & Applications, VI, 89\u2013120.","journal-title":"International Journal of Computer Science Applications"},{"key":"9141_CR23","unstructured":"Lagerstr\u00f6m, R., Johnson, P., H\u00f6\u00f6k, D., & K\u00f6nig, J. (2009b). Software change project cost estimation\u2014A Bayesian network and a method for expert elicitation. In Third international workshop on software quality and maintainability (SQM 2009)."},{"key":"9141_CR24","doi-asserted-by":"crossref","unstructured":"Laird, L., & Brennan C. (2006). Software measurement and estimation: A practical approach. New York: IEEE Computer Society\/Wiley.","DOI":"10.1002\/0471792535"},{"key":"9141_CR25","doi-asserted-by":"crossref","unstructured":"Malek, M., Milic, B., & Milanovic, N. (2008). Analytical availability assessment of it services. In ISAS, pp. 207\u2013224.","DOI":"10.1007\/978-3-540-68129-8_16"},{"key":"9141_CR26","unstructured":"Malik, B. (2009). Q&A: How much soes an hour of downtime cost?. Technical report, Gartner, Inc."},{"key":"9141_CR27","doi-asserted-by":"crossref","DOI":"10.4135\/9781412984881","volume-title":"Mail surveys improving the quality","author":"T. W. Mangione","year":"1995","unstructured":"Mangione, T. W. (1995). Mail surveys improving the quality. Beverley Hills: Sage Publications Inc."},{"key":"9141_CR28","volume-title":"Blueprints for high availability, 2nd ed.","author":"E. Marcus","year":"2003","unstructured":"Marcus, E., & Stern, H. (2003). Blueprints for high availability (2nd ed). Indianapolis, IN: Wiley."},{"key":"9141_CR29","unstructured":"Milanovic, N., Milic, B., & Malek, M. (2008). Modeling business process availability. In SERVICES \u201908: Proceedings of the 2008 IEEE congress on services\u2014Part I (pp. 315\u2013321). Washington, DC: IEEE Computer Society. doi: 10.1109\/SERVICES-1.2008 ."},{"key":"9141_CR30","volume-title":"Software reliability engineering: More reliable software, faster development and testing","author":"J. Musa","year":"1999","unstructured":"Musa, J. (1999). Software reliability engineering: More reliable software, faster development and testing. New York: McGraw-Hill."},{"key":"9141_CR31","volume-title":"Learning Bayesian networks","author":"R. E. Neapolitan","year":"2003","unstructured":"Neapolitan, R. E. (2003). Learning Bayesian networks. Upper Saddle River, NJ: Prentice-Hall Inc."},{"issue":"2","key":"9141_CR32","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/S0888-613X(01)00039-1","volume":"27","author":"A. Onisko","year":"2001","unstructured":"Onisko, A., Druzdzel, M. J., & Wasyluk, H. (2001). Learning Bayesian network parameters from small data sets: Application of noisy-or gates. International Journal of Approximate Reasoning, 27(2), 165\u2013182. doi: 10.1016\/S0888-613X(01)00039-1 .","journal-title":"International Journal of Approximate Reasoning"},{"key":"9141_CR33","volume-title":"Probabilistic reasoning in intelligent systems: Networks of plausible inference","author":"J. Pearl","year":"1988","unstructured":"Pearl, J. (1988). Probabilistic reasoning in intelligent systems: Networks of plausible inference. San Francisco, CA: Morgan Kaufmann Publishers Inc."},{"key":"9141_CR34","volume-title":"Software reliability","author":"H. Pham","year":"2000","unstructured":"Pham, H. (2000). Software reliability. Singapore: Springer."},{"key":"9141_CR35","unstructured":"Rausand, M., & H\u00f8yland, A. (2004). System reliability theory: Models, statistical methods, and applications (2nd ed.). Hoboken, NJ: Wiley. http:\/\/www.ntnu.no\/ross\/srt ."},{"key":"9141_CR36","unstructured":"Renooij, S. (2001). Qualitative approaches to quantifying probabilistic networks. PhD thesis, Utrecht University, Utrecht, The Netherlands."},{"key":"9141_CR37","unstructured":"Sallak, M., Simon, C., & Aubry J. F. (2006). Optimal design of safety instrumented systems. In Workshop on advanced control and diagnosis, ACD, Nancy."},{"key":"9141_CR38","unstructured":"Scott, D. (2009). How to assess your IT service availability levels. Technical report, Gartner, Inc."},{"issue":"4","key":"9141_CR39","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1287\/opre.36.4.589","volume":"36","author":"R. D. Shachter","year":"1988","unstructured":"Shachter, R. D. (1988). Probabilistic inference and influence diagrams. Operations Research, 36(4), 589\u2013604.","journal-title":"Operations Research"},{"key":"9141_CR40","unstructured":"Woodberry, O., Nicholson, A. E., Korb, K. B., & Pollino, C. (2005). Parameterising bayesian networks. In AI 2004: Advances in artificial intelligence (pp. 1101\u20141107). Berlin: Springer."},{"key":"9141_CR41","unstructured":"Zhang, R., Cope, E., Heusler, L., & Cheng, F. (2009). A Bayesian network approach to modeling IT service availability using system logs. In Workshop on the analysis of system logs."},{"key":"9141_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, X., & Pham, H. (2000) An analysis of factors affecting software reliability. Journal of Systems and Software 50(1), 43\u201356. 10.1016\/S0164-1212(99)00075-8 .","DOI":"10.1016\/S0164-1212(99)00075-8"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-011-9141-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-011-9141-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-011-9141-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T17:48:46Z","timestamp":1712425726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-011-9141-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,13]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["9141"],"URL":"https:\/\/doi.org\/10.1007\/s11219-011-9141-z","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,13]]}}}