{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T15:00:20Z","timestamp":1761490820930,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030148492"},{"type":"electronic","value":"9783030148508"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-14850-8_7","type":"book-chapter","created":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T05:36:42Z","timestamp":1564551402000},"page":"97-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["System Theoretic Process Analysis: A Literature Survey on the Approaches Used for Improving the Safety in Complex Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0675-7173","authenticated-orcid":false,"given":"Saulo Rodrigues","family":"e Silva","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,4]]},"reference":[{"key":"7_CR1","unstructured":"Abdulkhaleq, A., Vost, S., Wagner, S., & Thomas, J. (2016). An industrial case study on the evaluation of a safety engineering approach for software-intensive systems in the automotive domain."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Abdulkhaleq, A., Wagner, S., & Leveson, N. (2015). A comprehensive safety engineering approach for software-intensive systems based on STPA. Procedia Engineering, 128, 2\u201311. In Proceedings of the 3rd European STAMP Workshop October 5\u20136, 2015, Amsterdam.","DOI":"10.1016\/j.proeng.2015.11.498"},{"key":"7_CR3","unstructured":"Antoine, B. (2013). Systems theoretic hazard analysis (STPA) applied to the risk review of complex systems: an example from the medical device industry. (Ph.D. thesis, Massachusetts Institute of Technology)."},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/0951-8320(95)00068-D","volume":"50","author":"JB Bowles","year":"1995","unstructured":"Bowles, J. B., & Pel\u00e1ez, C. E. (1995). Fuzzy logic prioritization of failures in a system failure mode, effects and criticality analysis. Reliability Engineering & System Safety, 50(2), 203\u2013213.","journal-title":"Reliability Engineering & System Safety"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.ssci.2018.04.013","volume":"108","author":"DS Castilho","year":"2018","unstructured":"Castilho, D. S., Urbina, L. M., & de Andrade, D. (2018). Stpa for continuous controls: A flight testing study of aircraft crosswind takeoffs. Safety Science, 108, 129\u2013139.","journal-title":"Safety Science"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Dehlinger, J., & Lutz, R. R. (2004). Software fault tree analysis for product lines. In Proceedings Eighth IEEE International Symposium on High Assurance Systems Engineering, pp. 12\u201321. IEEE.","DOI":"10.1109\/HASE.2004.1281726"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ssci.2013.03.013","volume":"58","author":"IM Dokas","year":"2013","unstructured":"Dokas, I. M., Feehan, J., & Imran, S. (2013). Ewasap: An early warning sign identification approach based on a systemic hazard analysis. Safety Science, 58, 11\u201326.","journal-title":"Safety Science"},{"key":"7_CR8","unstructured":"EN, B. (2006). 60812: 2006 analysis techniques for system reliability. Procedure for failure mode and effects analysis (FMEA)."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Ericson, C. A. (2005). Event tree analysis. Hazard Analysis Techniques for System Safety, 223\u2013234.","DOI":"10.1002\/0471739421.ch12"},{"key":"7_CR10","unstructured":"Ericson, C. A. et al. (2015). Hazard analysis techniques for system safety. Wiley."},{"key":"7_CR11","unstructured":"France, M. E. (2017). Engineering for humans: a new extension to STPA (Ph.D. thesis, Massachusetts Institute of Technology)."},{"key":"7_CR12","unstructured":"Haasl, D. F., Roberts, N., Vesely, W., & Goldberg, F. (1981). Fault tree handbook. Technical report, Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research."},{"key":"7_CR13","unstructured":"Heinrich, H. W. et al. (1941). Industrial accident prevention. a scientific approach. In Industrial accident prevention. A scientific approach (2nd ed.)."},{"key":"7_CR14","unstructured":"IEC, B. (2001). 61882: 2001: Hazard and operability studies (hazop studies). Application guide. British Standards Institute."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/24.75348","volume":"40","author":"R Kenarangui","year":"1991","unstructured":"Kenarangui, R. (1991). Event-tree analysis by fuzzy probability. IEEE Transactions on Reliability, 40(1), 120\u2013124.","journal-title":"IEEE Transactions on Reliability"},{"issue":"4","key":"7_CR16","first-page":"45","volume":"70","author":"H Lawley","year":"1974","unstructured":"Lawley, H. (1974). Operability studies and hazard analysis. Chemical Engineering Progress, 70(4), 45\u201356.","journal-title":"Chemical Engineering Progress"},{"issue":"4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0925-7535(03)00047-X","volume":"42","author":"N Leveson","year":"2004","unstructured":"Leveson, N. (2004). A new accident model for engineering safer systems. Safety Science, 42(4), 237\u2013270.","journal-title":"Safety Science"},{"key":"7_CR18","unstructured":"Leveson, N. (2011). Engineering a safer world: Systems thinking applied to safety. MIT press."},{"key":"7_CR19","unstructured":"Leveson, N., & Thomas, J. (2013). An STPA primer. Cambridge, MA."},{"key":"7_CR20","unstructured":"Leveson, N. G. et al. (2014). Extending the human controller methodology in systems-theoretic process analysis (STPA) (Ph.D. thesis, Massachusetts Institute of Technology)."},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/0164-1212(83)90030-4","volume":"3","author":"NG Leveson","year":"1983","unstructured":"Leveson, N. G., & Harvey, P. R. (1983). Software fault tree analysis. Journal of Systems and Software, 3(2), 173\u2013181.","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"7_CR22","first-page":"74","volume":"11","author":"LS Lipol","year":"2011","unstructured":"Lipol, L. S., & Haq, J. (2011). Risk analysis method: FMEA\/FMECA in the organizations. International Journal of Basic & Applied Sciences, 11(5), 74\u201382.","journal-title":"International Journal of Basic & Applied Sciences"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Lutz, R. R., & Shaw, H.-Y. (1999). Applying adaptive safety analysis techniques (for embedded software). In Proceedings of 10th International Symposium on Software Reliability Engineering, 1999, pp. 42\u201349. IEEE.","DOI":"10.1109\/ISSRE.1999.809309"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Masci, P., Zhang, Y., Jones, P., & Campos, J. C. (2017). A hazard analysis method for systematic identification of safety requirements for user interface software in medical devices. In 15th International Conference on Software Engineering and Formal Methods (SEFM 2017), volume LNCS, vol. 10469, Springer. Springer.","DOI":"10.1007\/978-3-319-66197-1_18"},{"key":"7_CR25","unstructured":"NASA, N. (1966). S. Administration. Procedure for failure mode, effects and criticality analysis (FMECA), RM 63TMP-22. NASA, Tech. Rep."},{"issue":"1","key":"7_CR26","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1111\/j.1749-6632.1981.tb18113.x","volume":"365","author":"NC Rasmussen","year":"1981","unstructured":"Rasmussen, N. C. (1981). Methods of hazard analysis and nuclear safety engineering. Annals of the New York Academy of Sciences, 365(1), 20\u201336.","journal-title":"Annals of the New York Academy of Sciences"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Reason, J. (1990). Human error. Cambridge university press.","DOI":"10.1017\/CBO9781139062367"},{"issue":"3","key":"7_CR28","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TR.1979.5220578","volume":"28","author":"DJ Reifer","year":"1979","unstructured":"Reifer, D. J. (1979). Software failure modes and effects analysis. IEEE Transactions on Reliability, 28(3), 247\u2013249.","journal-title":"IEEE Transactions on Reliability"},{"key":"7_CR29","unstructured":"Robson, C., & McCartan, K. (2016). Real world research. Wiley."},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.jpowsour.2015.09.068","volume":"300","author":"D Rosewater","year":"2015","unstructured":"Rosewater, D., & Williams, A. (2015). Analyzing system safety in lithium-ion grid energy storage. Journal of Power Sources, 300, 460\u2013471.","journal-title":"Journal of Power Sources"},{"key":"7_CR31","unstructured":"Song, Y. (2012). Applying system-theoretic accident model and processes (STAMP) to hazard analysis (Ph.D. thesis)."},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Stadler, J. J., & Seidl, N. J. (2013). Software failure modes and effects analysis. In Reliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual, pp. 1\u20135. IEEE.","DOI":"10.1109\/RAMS.2013.6517710"},{"key":"7_CR33","unstructured":"Standard, U. M. (1980). MIL-STD-1629A. Procedures for Performing a Failure Mode, Effect and Criticality Analysis. Department of Defense, USA."},{"key":"7_CR34","unstructured":"Stringfellow, M. V. (2010). Accident analysis and hazard analysis for human and organizational factors (PhD thesis, Massachusetts Institute of Technology)."},{"issue":"4","key":"7_CR35","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/JPROC.2009.2039551","volume":"98","author":"MV Stringfellow","year":"2010","unstructured":"Stringfellow, M. V., Leveson, N. G., & Owens, B. D. (2010). Safety-driven design for software-intensive aerospace and automotive systems. Proceedings of the IEEE, 98(4), 515\u2013525.","journal-title":"Proceedings of the IEEE"},{"key":"7_CR36","unstructured":"Thimbleby, H. (2010). Press on: Principles of interaction programming. The MIT Press."},{"key":"7_CR37","unstructured":"Thomas, J., Lemos, F., & Leveson, N. (2012). Evaluating the safety of digital instrumentation and control systems in nuclear power plants. NRC Technical Research Report 2013."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Thomas IV, J. P. (2013). Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis (PhD thesis, Massachusetts Institute of Technology).","DOI":"10.2172\/1044959"},{"key":"7_CR39","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.proeng.2014.09.097","volume":"80","author":"C Yang","year":"2014","unstructured":"Yang, C. (2014). Software safety testing based on STPA. Procedia Engineering, 80, 399\u2013406.","journal-title":"Procedia Engineering"},{"key":"7_CR40","unstructured":"Young, W. E. (2014). STPA-SEC for cyber security mission assurance. Eng Syst. Div. Syst. Eng. Res. Lab."},{"issue":"5","key":"7_CR41","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/JRPROC.1962.288302","volume":"50","author":"LA Zadeh","year":"1962","unstructured":"Zadeh, L. A. (1962). From circuit theory to system theory. Proceedings of the IRE, 50(5), 856\u2013865.","journal-title":"Proceedings of the IRE"},{"key":"7_CR42","unstructured":"Wiegers, K., & Beatty, J. (2013). Software requirements. Pearson Education."}],"container-title":["Lecture Notes in Information Systems and Organisation","Information Systems for Industry 4.0"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14850-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T20:06:47Z","timestamp":1570133207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14850-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030148492","9783030148508"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14850-8_7","relation":{},"ISSN":["2195-4968","2195-4976"],"issn-type":[{"type":"print","value":"2195-4968"},{"type":"electronic","value":"2195-4976"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"4 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}