{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T17:03:39Z","timestamp":1682615019272},"reference-count":25,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[1992,10,1]],"date-time":"1992-10-01T00:00:00Z","timestamp":717897600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1992,10]]},"DOI":"10.1016\/0950-5849(92)90069-2","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T21:31:39Z","timestamp":1060291899000},"page":"640-654","source":"Crossref","is-referenced-by-count":15,"title":["Failures, faults and changes in dependability measurement"],"prefix":"10.1016","volume":"34","author":[{"given":"P","family":"Mellor","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0950-5849(92)90069-2_BIB1","series-title":"Dependability: basic concepts and terminology","volume":"Vol 5","year":"1992"},{"key":"10.1016\/0950-5849(92)90069-2_BIB3","series-title":"Software metrics: a rigorous approach","author":"Fenton","year":"1991"},{"key":"10.1016\/0950-5849(92)90069-2_BIB5","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/TR.1979.5220510","article-title":"How to measure software reliability and how not to","author":"Littlewood","year":"1979","journal-title":"IEEE Trans. Reliability R-28(2)"},{"key":"10.1016\/0950-5849(92)90069-2_BIB6_1","series-title":"Software Reliability: Pergamon Infotech State of the Art Report","first-page":"165","article-title":"Software reliability data collection: problems and standards","author":"Mellor","year":"1986"},{"key":"10.1016\/0950-5849(92)90069-2_BIB6_2","series-title":"Software Reliability: Pergamon Infotech State of the Art Report","first-page":"256","article-title":"Software reliability data collection: problems and standards","author":"Mellor","year":"1986"},{"key":"10.1016\/0950-5849(92)90069-2_BIB9","series-title":"PDCS 1st Year Deliverables","article-title":"Dependability: a unifying concept for reliable computing and fault tolerance","author":"Laprie","year":"1990"},{"key":"10.1016\/0950-5849(92)90069-2_BIB10","series-title":"Proc. FTCS 15","first-page":"2","article-title":"Dependable computing and fault-tolerance: concepts and terminology","author":"Laprie","year":"1985"},{"key":"10.1016\/0950-5849(92)90069-2_BIB11","series-title":"Towards operational measures of computer security","author":"Littlewood","year":"1991"},{"key":"10.1016\/0950-5849(92)90069-2_BIB12","series-title":"Predictably Dependable Computing Systems","article-title":"Measurement of operational security: request for data ESPRIT BRA 3092","author":"Brocklehurst","year":"1992"},{"issue":"No 3","key":"10.1016\/0950-5849(92)90069-2_BIB13","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1147\/sj.153.0182","article-title":"Design and code inspections to reduce errors in program development","volume":"Vol 15","author":"Fagan","year":"1976","journal-title":"IBM Systems J."},{"key":"10.1016\/0950-5849(92)90069-2_BIB14","series-title":"PDCS 2nd Year Deliverables","article-title":"X-ware dependability modeling and evaluation","author":"Laprie","year":"1991"},{"key":"10.1016\/0950-5849(92)90069-2_BIB15","series-title":"Statistical computer performance analysis","first-page":"465","article-title":"Software reliability research","author":"Jelinski","year":"1972"},{"key":"10.1016\/0950-5849(92)90069-2_BIB16","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TR.1981.5221099","article-title":"Stochastic reliability growth: a model for fault removal in computer programs and hardware designs","author":"Littlewood","year":"1981","journal-title":"IEEE Trans. Reliability R-30(4)"},{"key":"10.1016\/0950-5849(92)90069-2_BIB17","series-title":"Software reliability: measurement, prediction, application","author":"Musa","year":"1986"},{"key":"10.1016\/0950-5849(92)90069-2_BIB18","series-title":"Proc. Nat. Comp. Conf.","first-page":"537","article-title":"A proposed causative software error classification scheme","author":"Collofello","year":"1985"},{"key":"10.1016\/0950-5849(92)90069-2_BIB19","article-title":"Hardware\/software FMEA applied to airplane safety","author":"van Baal","year":"1984"},{"key":"10.1016\/0950-5849(92)90069-2_BIB20","series-title":"Datamation","first-page":"88","article-title":"Software bugs: a matter of life and liability","author":"Joyce","year":"1987"},{"key":"10.1016\/0950-5849(92)90069-2_BIB21","article-title":"Programmed for disaster, software errors that imperil lives","author":"Jacky","year":"1989","journal-title":"The Sciences, Journal of The New York Academy of Sciences"},{"key":"10.1016\/0950-5849(92)90069-2_BIB22","series-title":"Risks to the public in computers and related systems","volume":"Vol 11","year":"1986"},{"key":"10.1016\/0950-5849(92)90069-2_BIB23","series-title":"Risks to the public in computers and related systems","volume":"Vol 12","year":"1987"},{"key":"10.1016\/0950-5849(92)90069-2_BIB24","unstructured":"Article in Computer Weekly Thursday 19 October 1989, and reported to the RISKS forum by Prof. B Randell of Newcastle University"},{"key":"10.1016\/0950-5849(92)90069-2_BIB25","unstructured":"Confidential personal communication to the author"},{"key":"10.1016\/0950-5849(92)90069-2_BIB26","unstructured":"Author's personal experience. (I wrote the utility program used in the work-around)"},{"key":"10.1016\/0950-5849(92)90069-2_BIB27","unstructured":"Author's personal experience. (This story is true. I know. I was that consultant!)"},{"key":"10.1016\/0950-5849(92)90069-2_BIB28","unstructured":"Author's personal recollection. (No, I was not the engineer who wrote the rabbit!)"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0950584992900692?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0950584992900692?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:27:11Z","timestamp":1552609631000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0950584992900692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,10]]},"references-count":25,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1992,10]]}},"alternative-id":["0950584992900692"],"URL":"https:\/\/doi.org\/10.1016\/0950-5849(92)90069-2","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1992,10]]}}}