{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:27:50Z","timestamp":1762918070606},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T00:00:00Z","timestamp":1576108800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T00:00:00Z","timestamp":1576108800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s10270-019-00770-9","type":"journal-article","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T15:08:39Z","timestamp":1576163319000},"page":"763-784","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Using empirical studies to mitigate symbol overload in iStar extensions"],"prefix":"10.1007","volume":"19","author":[{"given":"Enyo","family":"Gon\u00e7alves","sequence":"first","affiliation":[]},{"given":"Camilo","family":"Almendra","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Goul\u00e3o","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Ara\u00fajo","sequence":"additional","affiliation":[]},{"given":"Jaelson","family":"Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,12]]},"reference":[{"key":"770_CR1","volume-title":"Model-Driven Software Engineering in Practice. Morgan & Claypool Publishers Series Synthesis Lectures on Software Engineering","author":"M Brambilla","year":"2012","unstructured":"Brambilla, M., Cabot, J., Wimmer, M.: Model-Driven Software Engineering in Practice. Morgan & Claypool Publishers Series Synthesis Lectures on Software Engineering. Morgan & Claypool Publishers, San Rafael (2012)"},{"key":"770_CR2","volume-title":"Learning UML 2.0","author":"R Miles","year":"2006","unstructured":"Miles, R., Hamilton, K.: Learning UML 2.0. O\u2019Reilly, Newton (2006)"},{"key":"770_CR3","doi-asserted-by":"crossref","unstructured":"Mussbacher, G., Amyot, D., Breu, R., Bruel, J., Cheng, B., Collet, P., Combemale, B., France, R., Heldal, R., Hill, J., Kienzle, J., Sch\u00f6ttle, M., Steimann, F., Stikkolorum, D., Whittle, J.: The relevance of model-driven engineering thirty years from now. In: Model-Driven Engineering Languages and Systems, pp. 183\u2013200. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-11653-2_12"},{"key":"770_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0167-6423(93)90021-G","volume":"20","author":"A Dardene","year":"1993","unstructured":"Dardene, A., Van Lamsweerde, A., Fickas, S.: Goal-directed requirements acquisition. Sci. Comput. Program. 20, 3\u201350 (1993)","journal-title":"Sci. Comput. Program."},{"key":"770_CR5","unstructured":"Dalpiaz, F., Franch, X., Horkoff, J.: iStar 2.0 language guide. arXiv:1605.07767. May 2016. http:\/\/arxiv.org\/pdf\/1605.07767v1.pdf"},{"key":"770_CR6","unstructured":"Yu, E.: Towards modelling and reasoning support for early phase requirements engineering. In: Proceedings of the 3rd IEEE International Conference on Requirements Engineering (1997)"},{"key":"770_CR7","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Rizzi, S., Garzetti, M.: Goal-oriented requirement analysis for data warehouse design. DOLAP (2005)","DOI":"10.1145\/1097002.1097011"},{"key":"770_CR8","doi-asserted-by":"crossref","unstructured":"Lapouchnian, A., Yu, E., Liaskos, S., Mylopoulos, J.: Requirements-driven design of autonomic application software. In: Conference of the Center for Advanced Studies on Collaborative Research (2006)","DOI":"10.1145\/1188966.1188976"},{"key":"770_CR9","doi-asserted-by":"crossref","unstructured":"Ghanavati, S., Amyot, D., Rifaut, A.: Legal Goal-Oriented Requirement Language (Legal GRL) for modelling regulations. In: 6th International Workshop on Modelling in Software Engineering, MiSE (2014)","DOI":"10.1145\/2593770.2593780"},{"key":"770_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2017.11.023","volume":"137","author":"E Gon\u00e7alves","year":"2018","unstructured":"Gon\u00e7alves, E., Castro, J., Araujo, J., Heineck, T.: A systematic literature review of iStar extensions. J. Syst. Softw. 137, 1\u201333 (2018)","journal-title":"J. Syst. Softw."},{"key":"770_CR11","first-page":"23","volume":"41","author":"E Gon\u00e7alves","year":"2018","unstructured":"Gon\u00e7alves, E., Heineck, T., Ara\u00fajo, J., Castro, J.: CATIE: a catalogue of iStar extensions. Cadernos do IME-S\u00e9rie Inform\u00e1tica 41, 23\u201337 (2018)","journal-title":"Cadernos do IME-S\u00e9rie Inform\u00e1tica"},{"key":"770_CR12","doi-asserted-by":"crossref","unstructured":"Caire, P., Genon, N., Heymans, P., Moody, D.: Visual notation design 2.0: towards user comprehensible requirements engineering notations. In: 21st IEEE International Requirements Engineering Conference (RE) (2013)","DOI":"10.1109\/RE.2013.6636711"},{"issue":"5","key":"770_CR13","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/TSE.2009.67","volume":"35","author":"D Moody","year":"2009","unstructured":"Moody, D.: The, \u201cPhysics\u201d of notations: towards a scientific basis for constructing visual notations in software engineering. IEEE Trans. Softw. Eng. 35(5), 756\u2013779 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"770_CR14","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.infsof.2016.09.005","volume":"80","author":"DF Mendon\u00e7a","year":"2016","unstructured":"Mendon\u00e7a, D.F., Rodrigues, G.N., Ali, R., Alves, V., Baresi, L.: GODA: a goal-oriented requirements engineering framework for runtime dependability analysis. Inf. Softw. Technol. J. 80, 245\u2013264 (2016)","journal-title":"Inf. Softw. Technol. J."},{"issue":"1","key":"770_CR15","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10270-012-0255-y","volume":"13","author":"R Ali","year":"2014","unstructured":"Ali, R., Dalpiaz, F., Giorgini, P.: Requirements-driven deployment. J. Softw. Syst. Model. 13(1), 433\u2013456 (2014)","journal-title":"J. Softw. Syst. Model."},{"key":"770_CR16","doi-asserted-by":"crossref","unstructured":"Dalpiaz, F., Paja, E., Giorgini, P.: Security requirements engineering via commitments. In: 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) (2011)","DOI":"10.1109\/STAST.2011.6059249"},{"key":"770_CR17","doi-asserted-by":"crossref","unstructured":"France, R., Rumpe, B.: Model-driven development of complex software: a research roadmap. In: Future of Software Engineering at ICSE\u2019 07, pp. 37\u201354, Minneapolis (2007)","DOI":"10.1109\/FOSE.2007.14"},{"issue":"2","key":"770_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.268955","volume":"11","author":"OI Lindland","year":"1994","unstructured":"Lindland, O.I., Sindre, G., Solvberg, A.: Understanding quality in conceptual modeling. IEEE Softw. 11(2), 42\u201349 (1994)","journal-title":"IEEE Softw."},{"key":"770_CR19","doi-asserted-by":"crossref","unstructured":"Ali, R., Dalpiaz, F., Giorgini, P.: Location based software modelling and analysis: tropos-based approach. In: International Conference on Conceptual Modelling, Lecture Notes in Computer Science, vol. 5231, pp. 169\u2013182 (2008)","DOI":"10.1007\/978-3-540-87877-3_14"},{"issue":"1","key":"770_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s00766-015-0236-0","volume":"22","author":"M Morandini","year":"2015","unstructured":"Morandini, M., Penserini, A., Perini, A., Marchetto, A.: Engineering requirements for adaptive systems. Requir. Eng. J. 22(1), 77\u2013103 (2015)","journal-title":"Requir. Eng. J."},{"key":"770_CR21","unstructured":"Guzman, A., Martinez, A., Agudelo, F., Estrada, H., Perez, J., Ortiz, J.: A methodology for modelling ambient intelligence applications using i* framework. In: International iStar Workshop in IEEE International Requirements Engineering Conference, pp. 61\u201366 (2016)"},{"issue":"3","key":"770_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jsse.2012070101","volume":"3","author":"S Islam","year":"2012","unstructured":"Islam, S., Mouratidis, H., Kalloniatis, C., Hudic, A., Zechner, L.: Model based process to support security and privacy requirements engineering. Int. J. Secure Softw. Eng. 3(3), 1\u201322 (2012)","journal-title":"Int. J. Secure Softw. Eng."},{"key":"770_CR23","unstructured":"Gans, G., Lakemeyer, G., Jarke, M., Vits, T.: SNET: a modelling and simulation environment for agent networks based on i* and Congolog. In: International Conference on Advanced Information Systems Engineering (2006)"},{"key":"770_CR24","doi-asserted-by":"crossref","unstructured":"Siena, A., Maiden, N., Lockerbie, J., Karlsen, K., Perini, A., Susi, A.: Exploring the effectiveness of normative i* modelling: results from a case study on food chain traceability. In: International Conference on Advanced Information Systems Engineering (2008)","DOI":"10.1007\/978-3-540-69534-9_15"},{"key":"770_CR25","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: IEEE International Conference on Requirements Engineering (2003)"},{"key":"770_CR26","volume-title":"Languages of Art: An Approach to a Theory of Symbols","author":"N Goodman","year":"1968","unstructured":"Goodman, N.: Languages of Art: An Approach to a Theory of Symbols. Bobbs-Merrill Co., Indianapolis (1968)"},{"key":"770_CR27","doi-asserted-by":"crossref","unstructured":"Horkoff, J., Yu, E.: Finding solutions in goal models: an interactive backward reasoning approach. In: International Conference on Conceptual Modelling (2010)","DOI":"10.1007\/978-3-642-16373-9_5"},{"issue":"4","key":"770_CR28","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1023\/A:1009844119158","volume":"5","author":"WF Tichy","year":"2000","unstructured":"Tichy, W.F.: Hints for reviewing empirical work in software engineering. Empir. Softw. Eng. 5(4), 309\u2013312 (2000)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"770_CR29","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10270-014-0447-8","volume":"16","author":"D Granada","year":"2017","unstructured":"Granada, D., Vara, J.M., Brambilla, M., Bollati, V., Marcos, E.: Analysing the cognitive effectiveness of the webml visual notation. Softw. Syst. Model. 16(1), 195\u2013227 (2017)","journal-title":"Softw. Syst. Model."},{"issue":"3","key":"770_CR30","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/0030-5073(68)90012-3","volume":"3","author":"WC Howell","year":"1968","unstructured":"Howell, W.C., Fuchs, A.H.: Population stereotypy in code design. Org. Behav. Hum. Perform. 3(3), 310\u2013339 (1968)","journal-title":"Org. Behav. Hum. Perform."},{"issue":"6","key":"770_CR31","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/00140138308963379","volume":"26","author":"S Jones","year":"1983","unstructured":"Jones, S.: Stereotypy in pictograms of abstract concepts. Ergonomics 26(6), 605\u2013611 (1983)","journal-title":"Ergonomics"},{"key":"770_CR32","unstructured":"Foster, J.J.: Graphical symbols: test methods for judged comprehensibility and for comprehension. ISO Bull., 11\u201313 (2001)"},{"issue":"1","key":"770_CR33","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/0003-6870(83)90220-X","volume":"14","author":"HJ Zwaga","year":"1983","unstructured":"Zwaga, H.J., Boersema, T.: Evaluation of a set of graphic symbols. Appl. Ergon. 14(1), 43\u201354 (1983)","journal-title":"Appl. Ergon."},{"key":"770_CR34","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, E.: PRISE: a process to support iStar extensions. Ph.D. thesis in Computer Science, Universidade Federal de Pernambuco (2019)","DOI":"10.1016\/j.jss.2020.110649"},{"key":"770_CR35","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, E., Araujo, J., Castro, J.: PRISE: a process to support iStar extensions. J. Syst. Softw. (2020) (submitted, for a copy contact: enyo@ufc.br)","DOI":"10.1016\/j.jss.2020.110649"},{"key":"770_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3304-4","volume-title":"Basics of Software Engineering Experimentation","author":"N Juristo","year":"2001","unstructured":"Juristo, N., Moreno, A.M.: Basics of Software Engineering Experimentation. Springer, Berlin (2001)"},{"key":"770_CR37","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s00766-018-0302-5","volume":"24","author":"E Gon\u00e7alves","year":"2018","unstructured":"Gon\u00e7alves, E., De Oliveira, M., Monteiro, I., Castro, J., Araujo, J.: Understanding what is important in iStar extension proposals: the viewpoint of researchers. Requir. Eng. J. 24, 55\u201384 (2018)","journal-title":"Requir. Eng. J."},{"key":"770_CR38","unstructured":"Gon\u00e7alves, E., Araujo, J., Castro, J.: Towards extension mechanisms in iStar 2.0. In: 11th International i* Workshop co-located with the 30th International Conference on Advanced Information Systems Engineering (2018)"},{"key":"770_CR39","doi-asserted-by":"crossref","unstructured":"Santos, M., Gralha, C., Goul\u00e3o, M., Ara\u00fajo, J.: Increasing the semantic transparency of the KAOS goal model concrete syntax. In: 37th International Conference on Conceptual Modelling (2018)","DOI":"10.1007\/978-3-030-00847-5_30"},{"key":"770_CR40","doi-asserted-by":"crossref","unstructured":"Henriques, H., Louren\u00e7o, H., Amaral, V., Goul\u00e3o, V.: Improving the developer experience with a low-code process modelling language. In: 21st International Conference on Model Driven Engineering Languages and Systems (2018)","DOI":"10.1145\/3239372.3239387"},{"key":"770_CR41","doi-asserted-by":"crossref","unstructured":"Siena, A., Jureta, I., Ingolfo, S., Susi, A., Perini, A., Mylopoulos, J.: Capturing variability of law with Nomos 2. In: International Conference on Conceptual Modelling (2012)","DOI":"10.1007\/978-3-642-34002-4_30"},{"key":"770_CR42","doi-asserted-by":"crossref","unstructured":"Schulz, F., Meissner, J., Rossak, W.: Tracing the Interdependencies between architecture and organization in goal-oriented extensible models. In: 3rd Eastern European Regional Conference on the Engineering of Computer Based Systems (2013)","DOI":"10.1109\/ECBS-EERC.2013.12"},{"key":"770_CR43","doi-asserted-by":"crossref","unstructured":"Siena, A., Mylopoulos, J., Perini, A., Susi, A.: Designing law-compliant software requirements. In: International Conference on Conceptual Modelling (2009)","DOI":"10.1109\/ICSE-COMPANION.2009.5070994"},{"key":"770_CR44","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1016\/j.csi.2013.12.006","volume":"36","author":"D Mellado","year":"2014","unstructured":"Mellado, D., Mouratidis, H., Fernandez-Medina, E.: Secure Tropos framework for software product lines requirements engineering. Comput. Stand. Interfaces 36, 711\u2013722 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"770_CR45","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1016\/j.jss.2013.03.011","volume":"26","author":"H Mouratidis","year":"2013","unstructured":"Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 26, 2276\u20132293 (2013)","journal-title":"J. Syst. Softw."},{"key":"770_CR46","unstructured":"Murukannaiah, P., Sigh, M.: Xipho: extending Tropos to engineer context-aware personal agents and multi-agent systems (2014)"},{"key":"770_CR47","doi-asserted-by":"publisher","first-page":"625","DOI":"10.13053\/CyS-17-4-2013-013","volume":"17","author":"H Estrada","year":"2013","unstructured":"Estrada, H., Martinez, A., Santill\u00e1n, L.C., P\u00e9rez, J.: A new service-based approach for enterprise modelling. Computacion y Sistemas 17, 625\u2013639 (2013)","journal-title":"Computacion y Sistemas"},{"key":"770_CR48","unstructured":"Ali, R., Dalpiaz, F., Giorgini, P.A.: Goal modelling framework for self-contextualizable software. In: Enterprise, Business Process and Information Systems Modelling Workshop on International Conference on Advanced Information Systems Engineering (2013)"},{"key":"770_CR49","doi-asserted-by":"crossref","unstructured":"Chopra, A., Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Modelling and reasoning about service-oriented applications via goals and commitments. In: International Conference on Advanced Information Systems Engineering (2010)","DOI":"10.1007\/978-3-642-13094-6_10"},{"issue":"1","key":"770_CR50","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.dss.2006.12.001","volume":"45","author":"P Giorgini","year":"2008","unstructured":"Giorgini, P., Rizzi, S., Garzetti, M.: GRAnD: a goal-oriented approach to requirement analysis in data warehouses. Dec. Support Syst. J. 45(1), 4\u201321 (2008)","journal-title":"Dec. Support Syst. J."},{"key":"770_CR51","unstructured":"Liaskos, S., Mylopoulos, J.: On temporally annotating goal models. In: International i* Workshop (2010)"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-019-00770-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-019-00770-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-019-00770-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T09:33:40Z","timestamp":1665221620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-019-00770-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,12]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["770"],"URL":"https:\/\/doi.org\/10.1007\/s10270-019-00770-9","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,12]]},"assertion":[{"value":"1 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}