{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:00:31Z","timestamp":1773932431228,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100009888","name":"Regione Toscana","doi-asserted-by":"publisher","award":["-"],"award-info":[{"award-number":["-"]}],"id":[{"id":"10.13039\/501100009888","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["823788"],"award-info":[{"award-number":["823788"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Data Semant"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s13740-021-00129-8","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T19:02:27Z","timestamp":1621882947000},"page":"267-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["IQCPSoS: A Model-Based Approach for Modeling and Analyzing Information Quality Requirements for Cyber-Physical System-of-Systems"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2286-2819","authenticated-orcid":false,"given":"Mohamad","family":"Gharib","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Lollini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7366-6530","authenticated-orcid":false,"given":"Andrea","family":"Bondavalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"129_CR1","doi-asserted-by":"publisher","unstructured":"Ali S, Iqbal MZ, Arcuri A, Briand L (2011) A search-based OCL constraint solver for model-based test data generation. In: Proceedings\u2014international conference on quality software, https:\/\/doi.org\/10.1109\/QSIC.2011.17","DOI":"10.1109\/QSIC.2011.17"},{"key":"129_CR2","doi-asserted-by":"publisher","unstructured":"Andrews Z, Fitzgerald J, Payne R, Romanovsky A (2013) Fault modelling for systems of systems. In: 11th International symposium on autonomous decentralized systems, ISADS 2013. IEEE, August, pp 1\u20138. https:\/\/doi.org\/10.1109\/ISADS.2013.6513445","DOI":"10.1109\/ISADS.2013.6513445"},{"issue":"1","key":"129_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11\u201333. https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"129_CR4","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1287\/mnsc.44.4.462","volume":"44","author":"D Ballou","year":"1998","unstructured":"Ballou D, Wang R, Pazer H, Tayi GK (1998) Modeling information manufacturing systems to determine information product quality. Manage Sci 44(4):462\u2013484. https:\/\/doi.org\/10.1287\/mnsc.44.4.462","journal-title":"Manage Sci"},{"key":"129_CR5","first-page":"528","volume-title":"Encyclopedia of software engineering","author":"V Basili","year":"1994","unstructured":"Basili V, Caldiera C, Rombach HD (1994) Goal question metric paradigm. In: Marciniak JJ (ed) Encyclopedia of software engineering, vol 1. Wiley, Hoboken, pp 528\u2013532"},{"key":"129_CR6","doi-asserted-by":"publisher","unstructured":"Bell D, De Cesare S, Iacovelli N, Lycett M, Merico A (2007) A framework for deriving semantic web services. Inf Syst Front 9(1):69\u201384, https:\/\/doi.org\/10.1007\/s10796-006-9018-z, arXiv:1011.1669v3","DOI":"10.1007\/s10796-006-9018-z"},{"issue":"3","key":"129_CR7","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10270-009-0128-1","volume":"10","author":"S Bernardi","year":"2011","unstructured":"Bernardi S, Merseguer J, Petriu DC (2011) A dependability profile within MARTE. Softw Syst Model 10(3):313\u2013336. https:\/\/doi.org\/10.1007\/s10270-009-0128-1","journal-title":"Softw Syst Model"},{"issue":"5","key":"129_CR8","first-page":"265","volume":"16","author":"A Bondavalli","year":"2001","unstructured":"Bondavalli A, Dal Cin M, Latella D, Majzik I, Pataricza A, Savoia G (2001) Dependability analysis in the early phases of UML-based system design. Comput Syst Sci Eng 16(5):265\u2013275","journal-title":"Comput Syst Sci Eng"},{"key":"129_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47590-5","volume-title":"Cyber-physical systems of systems","author":"A Bondavalli","year":"2016","unstructured":"Bondavalli A, Bouchenak S, Kopetz H (2016) Cyber-physical systems of systems, vol 10099. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-319-47590-5"},{"issue":"1","key":"129_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1002\/int.10074","volume":"18","author":"M Bovee","year":"2001","unstructured":"Bovee M, Srivastava R, Mak B (2001) A conceptual framework and belief-function approach to assessing overall information quality. Int J Intell Syst 18(1):51\u201374","journal-title":"Int J Intell Syst"},{"issue":"3\u20134","key":"129_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ijcip.2012.08.002","volume":"5","author":"M Burmester","year":"2012","unstructured":"Burmester M, Magkos E, Chrissikopoulos V (2012) Modeling security in cyber-physical systems. Int J Crit Infrastruct Prot 5(3\u20134):118\u2013126. https:\/\/doi.org\/10.1016\/j.ijcip.2012.08.002","journal-title":"Int J Crit Infrastruct Prot"},{"key":"129_CR12","unstructured":"Cappiello C, Milano P, Elettronica D, Leonardo P, Caro A, Rodriguez A, Caballero I (2013) An approach to design business processes addressing data quality issues. In: 21st European conference on information systems (ECIS), pp 1\u201312"},{"key":"129_CR13","doi-asserted-by":"publisher","unstructured":"Dal Cin M (2003) Extending UML towards a useful OO-language for modeling dependability features. In: Proceedings\u2014international workshop on object-oriented real-time dependable systems, WORDS, pp 325\u2013330, https:\/\/doi.org\/10.1109\/WORDS.2003.1267547","DOI":"10.1109\/WORDS.2003.1267547"},{"key":"129_CR14","doi-asserted-by":"publisher","unstructured":"Efatmaneshnik M, Ryan M (2014) Failure propagation in SoS: Why SoS should be loosely coupled. In: Proceedings of the 9th international conference on system of systems engineering: the socio-technical perspective, SoSE 2014. IEEE, pp 49\u201354, https:\/\/doi.org\/10.1109\/SYSOSE.2014.6892462","DOI":"10.1109\/SYSOSE.2014.6892462"},{"key":"129_CR15","doi-asserted-by":"publisher","unstructured":"Egyed A (2004) Consistent adaptation and evolution of class diagrams during refinement. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 2984. Springer, pp 37\u201353, https:\/\/doi.org\/10.1007\/978-3-540-24721-0_3","DOI":"10.1007\/978-3-540-24721-0_3"},{"issue":"2","key":"129_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0378-7206(01)00083-0","volume":"39","author":"CW Fisher","year":"2001","unstructured":"Fisher CW, Kingma BR (2001) Criticality of data quality as exemplifed in two disasters. Inf Manage 39(2):109\u2013116. https:\/\/doi.org\/10.1016\/S0378-7206(01)00083-0","journal-title":"Inf Manage"},{"issue":"1","key":"129_CR17","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.19153\/cleiej.18.1.4","volume":"18","author":"BBN de Fran\u00e7a","year":"2016","unstructured":"de Fran\u00e7a BBN, Travassos GH (2016) Simulation based studies in software engineering: a matter of validity. CLEI Electron J 18(1):4:1\u20134:18. https:\/\/doi.org\/10.19153\/cleiej.18.1.4","journal-title":"CLEI Electron J"},{"issue":"4","key":"129_CR18","first-page":"1","volume":"2","author":"U Gasser","year":"2004","unstructured":"Gasser U, Eppler M, Helfert M (2004) Information quality: organizational, technological, and legal perspectives. Stud Commun Sci 2(4):1\u201316","journal-title":"Stud Commun Sci"},{"key":"129_CR19","first-page":"85","volume":"978","author":"M Gharib","year":"2013","unstructured":"Gharib M, Giorgini P (2013) Analysing information integrity requirements in safety critical systems. CEUR Worksh Proc 978:85\u201390","journal-title":"CEUR Worksh Proc"},{"key":"129_CR20","doi-asserted-by":"publisher","unstructured":"Gharib M, Giorgini P (2015) Analyzing trust requirements in socio-technical systems: a belief-based approach. In: Lecture Notes in Business Information Processing, vol 235. Springer, pp 254\u2013270. https:\/\/doi.org\/10.1007\/978-3-319-25897-3_17","DOI":"10.1007\/978-3-319-25897-3_17"},{"key":"129_CR21","doi-asserted-by":"publisher","unstructured":"Gharib M, Giorgini P (2015) Dealing with information quality requirements. In: Lecture notes in business information processing, vol 214. Springer, pp 379\u2013394. https:\/\/doi.org\/10.1007\/978-3-319-19237-6_24","DOI":"10.1007\/978-3-319-19237-6_24"},{"key":"129_CR22","doi-asserted-by":"publisher","unstructured":"Gharib M, Giorgini P (2015) Modeling and reasoning about information quality requirements. In: Requirements engineering: foundation for software quality, vol 9013. Springer, pp 49\u201364. https:\/\/doi.org\/10.1007\/978-3-319-19237-6_15","DOI":"10.1007\/978-3-319-19237-6_15"},{"key":"129_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.infsof.2018.11.002","volume":"107","author":"M Gharib","year":"2019","unstructured":"Gharib M, Giorgini P (2019) Information quality requirements engineering with STS-IQ. Inf Softw Technol 107:83\u2013100. https:\/\/doi.org\/10.1016\/j.infsof.2018.11.002","journal-title":"Inf Softw Technol"},{"key":"129_CR24","doi-asserted-by":"publisher","unstructured":"Gharib M, Lollini P, Bondavalli A (2017) A conceptual model for analyzing information quality in system-of-systems. In: 12th System of systems engineering conference, SoSE17, IEEE, pp 1\u20136, https:\/\/doi.org\/10.1109\/SYSOSE.2017.7994946","DOI":"10.1109\/SYSOSE.2017.7994946"},{"issue":"2","key":"129_CR25","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00766-016-0264-4","volume":"23","author":"M Gharib","year":"2018","unstructured":"Gharib M, Giorgini P, Mylopoulos J (2018) Analysis of information quality requirements in business processes, revisited. Requir Eng 23(2):227\u2013249. https:\/\/doi.org\/10.1007\/s00766-016-0264-4","journal-title":"Requir Eng"},{"issue":"2","key":"129_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5381\/jot.2019.18.2.e1","volume":"18","author":"M Gogolla","year":"2019","unstructured":"Gogolla M, Vallecillo-Moreno A (2019) On softening OCL invariants. J Obj Technol 18(2):1\u201322","journal-title":"J Obj Technol"},{"issue":"1","key":"129_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"March Hevner","year":"2017","unstructured":"Hevner March, Park Ram (2017) Design science in information systems research. MIS Q 28(1):75. https:\/\/doi.org\/10.2307\/25148625","journal-title":"MIS Q"},{"issue":"6","key":"129_CR28","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed A, Lin J, Li F, Journal BLIIOT (2017) U (2017) Cyber-physical systems security-a survey. IEEE Internet Things J 4(6):1802\u20131831","journal-title":"IEEE Internet Things J"},{"key":"129_CR29","unstructured":"International Organization for Standardization\/International Electrotechnical Commission (1991) Software product evaluation: quality characteristics and guidelines for their use. ISO\/IEC 9126, ISO\/IEC"},{"key":"129_CR30","unstructured":"International Organization for Standardization\/International Electrotechnical Commission (2009) ISO\/IEC 25012: software engineering-software product quality requirements and evaluation (SQuaRE)-data quality model"},{"key":"129_CR31","unstructured":"International Organization for Standardization\/International Electrotechnical Commission and others (2011) ISO\/IEC 25010 systems and software engineering system and software product quality requirements and evaluation (SQuaRE)"},{"issue":"5","key":"129_CR32","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MAES.2008.4523909","volume":"23","author":"M Jamshidi","year":"2008","unstructured":"Jamshidi M (2008) System of systems engineering: new challenges for the 21st century. IEEE Aerosp Electron Syst Mag 23(5):4\u201319. https:\/\/doi.org\/10.1109\/MAES.2008.4523909","journal-title":"IEEE Aerosp Electron Syst Mag"},{"key":"129_CR33","unstructured":"J\u00e4rvinen P (2007) On reviewing of results in design research. In: Proceedings of the 15th European conference on information systems, ECIS 2007, pp 1388\u20131397"},{"key":"129_CR34","doi-asserted-by":"publisher","unstructured":"Jedlitschka A, Pfahl D (2005) Reporting guidelines for controlled experiments in software engineering. In: 2005 International symposium on empirical software engineering, ISESE 2005, pp 95\u2013104, https:\/\/doi.org\/10.1109\/ISESE.2005.1541818","DOI":"10.1109\/ISESE.2005.1541818"},{"issue":"4","key":"129_CR35","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/s12652-017-0498-0","volume":"9","author":"A Karkouch","year":"2018","unstructured":"Karkouch A, Mousannif H, Al Moatassime H, Noel T (2018) A model-driven framework for data quality management in the Internet of Things. J Ambient Intell Human Comput 9(4):977\u2013998. https:\/\/doi.org\/10.1007\/s12652-017-0498-0","journal-title":"J Ambient Intell Human Comput"},{"key":"129_CR36","doi-asserted-by":"publisher","unstructured":"Kirchen I, Schutz D, Folmer J, Vogel-Heuser B (2017) Metrics for the evaluation of data quality of signal data in industrial processes. In: Proceedings\u20142017 IEEE 15th international conference on industrial informatics, INDIN 2017, pp 819\u2013826. https:\/\/doi.org\/10.1109\/INDIN.2017.8104878","DOI":"10.1109\/INDIN.2017.8104878"},{"issue":"1","key":"129_CR37","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10664-007-9053-5","volume":"13","author":"B Kitchenham","year":"2008","unstructured":"Kitchenham B, Al-Khilidar H, Babar MA, Berry M, Cox K, Keung J, Kurniawati F, Staples M, Zhang H, Zhu L (2008) Evaluating guidelines for reporting empirical software engineering studies. Empir Softw Eng 13(1):97\u2013121. https:\/\/doi.org\/10.1007\/s10664-007-9053-5","journal-title":"Empir Softw Eng"},{"key":"129_CR38","doi-asserted-by":"publisher","unstructured":"Kohn A, Kasmeyer M, Schneider R, Roger A, Stellwag C, Herkersdorf A (2015) Fail-operational in safety-related automotive multi-core systems. In: 2015 10th IEEE international symposium on industrial embedded systems, SIES 2015\u2014Proceedings, pp 144\u2013147, https:\/\/doi.org\/10.1109\/SIES.2015.7185051","DOI":"10.1109\/SIES.2015.7185051"},{"key":"129_CR39","doi-asserted-by":"publisher","unstructured":"Kopetz H (2014) A conceptual model for the information transfer in systems-of-systems. In: Proceedings\u2014IEEE 17th international symposium on object\/component\/service-oriented real-time distributed computing, ISORC 2014, IEEE, June, pp 17\u201324, https:\/\/doi.org\/10.1109\/ISORC.2014.19","DOI":"10.1109\/ISORC.2014.19"},{"key":"129_CR40","doi-asserted-by":"crossref","unstructured":"Kopetz H, Fr\u00f6mel B, H\u00f6ftberger O (2015) Direct versus stigmergic information flow in systems-of-systems. In: System of systems engineering conference (SoSE), 2015 10th, IEEE, pp 36\u201341","DOI":"10.1109\/SYSOSE.2015.7151963"},{"key":"129_CR41","doi-asserted-by":"publisher","unstructured":"Kuhlmann M, Gogolla M (2012) From UML and OCL to relational logic and back. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 7590 LNCS, pp 415\u2013431, https:\/\/doi.org\/10.1007\/978-3-642-33666-9_27","DOI":"10.1007\/978-3-642-33666-9_27"},{"key":"129_CR42","doi-asserted-by":"publisher","unstructured":"Kuhlmann M, Hamann L, Gogolla M (2011) Extensive validation of OCL models by integrating SAT solving into USE. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 6705 LNCS, pp 290\u2013306, https:\/\/doi.org\/10.1007\/978-3-642-21952-8_21","DOI":"10.1007\/978-3-642-21952-8_21"},{"key":"129_CR43","doi-asserted-by":"publisher","unstructured":"Lagarde F, Espinoza H, Terrier F, G\u00e9rard S (2007) Improving uml profile design practices by leveraging conceptual domain models. In: Proceedings of the twenty-second IEEE\/ACM international conference on automated software engineering. ACM Press, New York, p 445, https:\/\/doi.org\/10.1145\/1321631.1321705","DOI":"10.1145\/1321631.1321705"},{"key":"129_CR44","first-page":"1","volume":"2009","author":"A Lehner","year":"2009","unstructured":"Lehner A, M\u00fcller FDP, Strang T, Garc\u00eda CR (2009) Reliable vehicle-autarkic collision detection for rail-bound transportation. ITS World Congr 2009:1\u20138","journal-title":"ITS World Congr"},{"key":"129_CR45","unstructured":"Liu L, Chi L (2002) Evolutional data quality: a theory-specific view. In: 7th International conference on information quality ICIQ, pp 292\u2013304"},{"issue":"3","key":"129_CR46","doi-asserted-by":"publisher","first-page":"25","DOI":"10.14257\/ijsia.2015.9.3.04","volume":"9","author":"T Lu","year":"2015","unstructured":"Lu T, Zhao J, Zhao L, Li Y, Zhang X (2015) Towards a framework for assuring cyber physical system security. Int J Sec Appl 9(3):25\u201340. https:\/\/doi.org\/10.14257\/ijsia.2015.9.3.04","journal-title":"Int J Sec Appl"},{"issue":"4","key":"129_CR47","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1002\/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-D","volume":"1","author":"MW Maier","year":"1998","unstructured":"Maier MW (1998) Architecting principles for systems-of-systems. Syst Eng 1(4):267\u2013284","journal-title":"Syst Eng"},{"issue":"5","key":"129_CR48","doi-asserted-by":"publisher","first-page":"815","DOI":"10.7763\/ijcte.2010.v2.246","volume":"2","author":"G Mamatha","year":"2013","unstructured":"Mamatha G, Sharma SC (2013) A highly secured approach against attacks in MANETS. Int J Comput Theory Eng 2(5):815\u2013819. https:\/\/doi.org\/10.7763\/ijcte.2010.v2.246","journal-title":"Int J Comput Theory Eng"},{"issue":"4\u20135","key":"129_CR49","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/s0920-5489(98)00057-9","volume":"20","author":"WA Melendez","year":"1999","unstructured":"Melendez WA (1999) The upper layers of the ISO\/OSI reference model (Part II). Comput Stand Interfaces 20(4\u20135):185\u2013199. https:\/\/doi.org\/10.1016\/s0920-5489(98)00057-9","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"129_CR50","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/0920-5489(86)90067-X","volume":"5","author":"Wilfred A Melendez","year":"1986","unstructured":"Melendez Wilfred A, Petersen EL (1986) The upper layers of the ISO\/OSI reference model (part I). Comput Stand Interfaces 5(1):13\u201346","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"129_CR51","doi-asserted-by":"publisher","first-page":"223","DOI":"10.17705\/1cais.03410","volume":"34","author":"T Mettler","year":"2014","unstructured":"Mettler T, Eurich M, Winter R (2014) On the use of experiments in design science research: a proposition of an evaluation framework. Commun Assoc Inf Syst 34(1):223\u2013240. https:\/\/doi.org\/10.17705\/1cais.03410","journal-title":"Commun Assoc Inf Syst"},{"issue":"6","key":"129_CR52","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1016\/j.ress.2007.03.031","volume":"93","author":"N M\u00f6ller","year":"2008","unstructured":"M\u00f6ller N, Hansson SO (2008) Principles of engineering safety: risk and uncertainty reduction. Reliab Eng Syst Saf 93(6):798\u2013805. https:\/\/doi.org\/10.1016\/j.ress.2007.03.031","journal-title":"Reliab Eng Syst Saf"},{"key":"129_CR53","doi-asserted-by":"publisher","unstructured":"Montecchi L, Lollini P, Bondavalli A (2011) Dependability concerns in model-driven engineering. In: Proceedings\u20142011 14th IEEE international symposium on object\/component\/service-oriented real-time distributed computing workshops, ISORCW 2011. IEEE, pp 254\u2013263, https:\/\/doi.org\/10.1109\/ISORCW.2011.32","DOI":"10.1109\/ISORCW.2011.32"},{"key":"129_CR54","unstructured":"Montrieux L (2013) Model-based analysis of role-based access control. PhD thesis, The Open University, http:\/\/oro.open.ac.uk\/38672\/"},{"key":"129_CR55","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1878","author":"M Mori","year":"2018","unstructured":"Mori M, Ceccarelli A, Lollini P, Fr\u00f6mel B, Brancati F, Bondavalli A (2018) Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile. J Softw Evol Process. https:\/\/doi.org\/10.1002\/smr.1878","journal-title":"J Softw Evol Process"},{"key":"129_CR56","unstructured":"Natale D, Scannapieco M, Angeletti P, Catarci T, Raiss G (2001) Qualit\u00e0 dei dati e standard ISO\/IEC 9126: Analisi critica ed esperienze nella Pubblica Amministrazione Italiana. In: Proceedings of the national workshop on Sistemi in Rete nella Pubblica Amministrazione (in Italian), Roma, Italy"},{"key":"129_CR57","doi-asserted-by":"publisher","unstructured":"OMG-OCL (2014) Object constraint language. Rep May Tech https:\/\/doi.org\/10.1167\/7.9.852","DOI":"10.1167\/7.9.852"},{"issue":"4","key":"129_CR58","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/505248.506010","volume":"45","author":"LL Pipino","year":"2002","unstructured":"Pipino LL, Lee YW, Wang RY (2002) Data quality assessment. Commun ACM 45(4):211\u2013218","journal-title":"Commun ACM"},{"key":"129_CR59","doi-asserted-by":"publisher","unstructured":"Rajkumar R, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution. In: Proceedings\u2014design automation conference, pp 731\u2013736, https:\/\/doi.org\/10.1145\/1837274.1837461","DOI":"10.1145\/1837274.1837461"},{"key":"129_CR60","unstructured":"Redman TC, Blanton A (1997) Data quality for the information age. Artech House Inc"},{"key":"129_CR61","doi-asserted-by":"publisher","unstructured":"Richters M, Gogolla M (2002) OCL: syntax, semantics, and tools. pp 42\u201368, https:\/\/doi.org\/10.1007\/3-540-45669-4_4","DOI":"10.1007\/3-540-45669-4_4"},{"key":"129_CR62","unstructured":"Scannapieco M, Pernici B, Pierce E (2002) IP-UML: Towards a methodology for quality improvement based on the IP-Map framework. In: Proceedings of the 7th international conference on information quality (ICIQ-02), pp 279\u2013291"},{"key":"129_CR63","doi-asserted-by":"publisher","unstructured":"Selic B (2007) A systematic approach to domain-specific language design using UML. In: 10th IEEE international symposium on object and component-oriented real-time distributed computing, ISORC 2007. IEEE, pp 2\u20139, https:\/\/doi.org\/10.1109\/ISORC.2007.10","DOI":"10.1109\/ISORC.2007.10"},{"key":"129_CR64","doi-asserted-by":"publisher","DOI":"10.1145\/2740965","author":"K Sha","year":"2015","unstructured":"Sha K, Zeadally S (2015) Data quality challenges in cyber-physical systems. J Data Inf Qual. https:\/\/doi.org\/10.1145\/2740965","journal-title":"J Data Inf Qual"},{"key":"129_CR65","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1016\/j.compeleceng.2016.08.010","volume":"64","author":"Z Song","year":"2017","unstructured":"Song Z, Sun Y, Wan J, Liang P (2017) Data quality management for service-oriented manufacturing cyber-physical systems. Comput Electr Eng 64:1339\u20131351. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.08.010","journal-title":"Comput Electr Eng"},{"key":"129_CR66","doi-asserted-by":"crossref","unstructured":"Venable J, Pries-Heje J, Baskerville R (2012) A comprehensive framework for evaluation in design science research. In: International conference on design science research in information systems. Springer, pp 423\u2013438","DOI":"10.1007\/978-3-642-29863-9_31"},{"issue":"2","key":"129_CR67","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/269012.269022","volume":"41","author":"RY Wang","year":"2002","unstructured":"Wang RY (2002) A product perspective on total data quality management. Commun ACM 41(2):58\u201365. https:\/\/doi.org\/10.1145\/269012.269022","journal-title":"Commun ACM"},{"key":"129_CR68","unstructured":"Wang RY, Shankaranarayanan G (2000) IP-MAP : Representing the manufacture of an information product. In: Proceedings of the conference on information quality, pp 1\u201316"},{"key":"129_CR69","doi-asserted-by":"publisher","unstructured":"Wieringa R (2009) Design science as nested problem solving. In: Proceedings of the 4th international conference on design science research in information systems and technology, DESRIST \u201909 pp 1\u201312, https:\/\/doi.org\/10.1145\/1555619.1555630","DOI":"10.1145\/1555619.1555630"},{"key":"129_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer, Berlin"},{"key":"129_CR71","doi-asserted-by":"publisher","unstructured":"Wu L, Kaiser G, Rudin C, Anderson R (2011) Data quality assurance and performance measurement of data mining for preventive maintenance of power grid. In: Proceedings of the 1st international workshop on data mining for service and maintenance, KDD4 service-held in conjunction with SIGKDD\u201911, pp 28\u201332, https:\/\/doi.org\/10.1145\/2018673.2018679","DOI":"10.1145\/2018673.2018679"}],"container-title":["Journal on Data Semantics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13740-021-00129-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13740-021-00129-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13740-021-00129-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T11:48:49Z","timestamp":1636631329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13740-021-00129-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":71,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["129"],"URL":"https:\/\/doi.org\/10.1007\/s13740-021-00129-8","relation":{},"ISSN":["1861-2032","1861-2040"],"issn-type":[{"value":"1861-2032","type":"print"},{"value":"1861-2040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"11 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}