{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T13:01:59Z","timestamp":1648904519386},"reference-count":39,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1016\/s0065-2458(00)80010-8","type":"book-chapter","created":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T00:56:21Z","timestamp":1295398581000},"page":"451-497","source":"Crossref","is-referenced-by-count":0,"title":["Defective software: An overview of legal remedies and technical measures available to consumers"],"prefix":"10.1016","author":[{"given":"Colleen Kotyk","family":"Vossler","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Voas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0065-2458(00)80010-8_bib1","series-title":"Internet economy tied to internet ecosystem of networked businesses and customer","author":"Cisco Company","year":"1999"},{"issue":"4","key":"10.1016\/S0065-2458(00)80010-8_bib2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/irmj.1998100103","article-title":"The increasing threat of legal liability for software developers","volume":"11","author":"Sipior","year":"1998","journal-title":"Information Resources Management Journal"},{"key":"10.1016\/S0065-2458(00)80010-8_bib3","year":"1994"},{"issue":"1","key":"10.1016\/S0065-2458(00)80010-8_bib4","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MSPEC.1996.476733","article-title":"Viewpoint: improving software quality requires a \u201ccheck early, check often\u201d approach","volume":"33","author":"Moskun","year":"1996","journal-title":"IEEE Spectrum"},{"key":"10.1016\/S0065-2458(00)80010-8_bib5","first-page":"322","year":"1990","journal-title":"Black's Law Dictionary"},{"key":"10.1016\/S0065-2458(00)80010-8_bib6","author":"Vergari","year":"1991","journal-title":"Fundamentals of Computer-High Technology Law"},{"key":"10.1016\/S0065-2458(00)80010-8_bib7","unstructured":"Chatlos Sys. v. National Cash Register Corp., 479 F. Supp. 738 (D.N.J. 1979)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib8","unstructured":"RKB Enterp. Inc. v. Ernst & Young, 182 A. D.2d 971 (N.Y.S.2d 1992)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib9","unstructured":"Restatement (Second) of Torts \u00a7 282."},{"key":"10.1016\/S0065-2458(00)80010-8_bib10","author":"Keeton","year":"1984","journal-title":"Prosser & Keeton on Torts"},{"key":"10.1016\/S0065-2458(00)80010-8_bib11","first-page":"4","article-title":"Products liability for the general practitioner","author":"Sherman","year":"1981"},{"key":"10.1016\/S0065-2458(00)80010-8_bib12","doi-asserted-by":"crossref","unstructured":"Knight v. United States, 498 F. Supp 315 (E.D. Mich. 1980).","DOI":"10.1016\/S0140-6736(80)91052-1"},{"key":"10.1016\/S0065-2458(00)80010-8_bib13","unstructured":"Diversified Graphics, Lts. v. Groves, 868 F. 2d 293 (8th Cir. 1989)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib14","unstructured":"LeSueur Creamery, Inc. v. Haskon, Inc., 660 F.2d 342 (8th Cir. 1981)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib15","unstructured":"Restatement (Second) of Torts \u00a7 525."},{"key":"10.1016\/S0065-2458(00)80010-8_bib16","author":"Nimmer","year":"1997","journal-title":"The Law of Computer Technology"},{"key":"10.1016\/S0065-2458(00)80010-8_bib17","unstructured":"Scala v. Sequor Group, Inc., 1995 WL 225625 (S. D. N. Y. April 14, 1995)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib18","unstructured":"Ritchie Enterp. v. Honeywell Bull, Inc., 730 F. Supp. 1041, 1051 (D. Kan. 1990), quoting Ford Motor Credit Co. v. Suburban Ford, 699 P.2d 992, cert. denied, 474 U.S. 995 (1985)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib19","unstructured":"Sparacino v. Andover Controls Corp., 592 N. E.2d 431 (Ill. App. 3d 1992)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib20","first-page":"1513","article-title":"Scope of the Uniform Commercial Code: survey of computer law cases","volume":"43","author":"Boss","year":"1988","journal-title":"Business Law"},{"key":"10.1016\/S0065-2458(00)80010-8_bib21","first-page":"853","article-title":"Computer software: does article 2 of the Uniform Commercial Code apply?","volume":"35","author":"Rodau","year":"1986","journal-title":"Emory Law Journal"},{"key":"10.1016\/S0065-2458(00)80010-8_bib22","first-page":"9","article-title":"Application of article two of the Uniform Commercial Code to computer system acquisitions","volume":"1","author":"Holmes","year":"1982","journal-title":"Rutgers Computer and Technical Law Journal"},{"key":"10.1016\/S0065-2458(00)80010-8_bib23","unstructured":"Advent Sys., Ltd. v. Unisys Corp., 925 F.2d 670 (3d Cir. 1991)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib24","unstructured":"13 Pa. Const. Stat. Ann. \u00a7 1102, comment 1 (Purdon 1984)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib25","unstructured":"RRX Indus. Inc. v. LabCon, Inc., 772 F. 2d 543 (9th Cir. 1985)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib26","unstructured":"Triangle Underwriters, Inc. v. Honeywell, Inc., 604 F. 2d 737 (2d. Cir. 1979)."},{"key":"10.1016\/S0065-2458(00)80010-8_bib27","series-title":"NCCUSL to promulgate freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL announce that legal rules for computer information will not be part of UCC","author":"NCCUSL","year":"1999"},{"key":"10.1016\/S0065-2458(00)80010-8_bib28","doi-asserted-by":"crossref","DOI":"10.1038\/20819","article-title":"Uniform law for computer info transactions is offered","author":"Ring","year":"1999","journal-title":"National Law Journal"},{"key":"10.1016\/S0065-2458(00)80010-8_bib29","series-title":"Article 2B's new uniform: a free-standing Computer Information Transactions Act","author":"Miller","year":"1999"},{"key":"10.1016\/S0065-2458(00)80010-8_bib30","volume":"312","author":"Kaner","year":"1998","journal-title":"Bad Software"},{"key":"10.1016\/S0065-2458(00)80010-8_bib31","article-title":"Closing notes on UCITA","volume":"October","author":"Kaner","year":"1999","journal-title":"UCC Bulletin"},{"issue":"5","key":"10.1016\/S0065-2458(00)80010-8_bib32","first-page":"18","article-title":"An Ethical Can of Worms for Software Certifiers","volume":"1","author":"Miller","year":"1999","journal-title":"ITPro Magazine"},{"key":"10.1016\/S0065-2458(00)80010-8_bib33","article-title":"Third party testing and the quality of software components","volume":"July","author":"Councill","year":"1999","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(00)80010-8_bib34","series-title":"Electronic Systems Effectiveness and Life Cycle Costing","article-title":"Failure model, effect, and criticality analysis","author":"Lawson","year":"1983"},{"issue":"4","key":"10.1016\/S0065-2458(00)80010-8_bib35","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"Weiser","year":"1984","journal-title":"Program slicing. IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0065-2458(00)80010-8_bib36","author":"Barlow","year":"1975"},{"key":"10.1016\/S0065-2458(00)80010-8_bib37","series-title":"Software fault injection: inoculating programs against errors","author":"Voas","year":"1998"},{"issue":"4","key":"10.1016\/S0065-2458(00)80010-8_bib38","doi-asserted-by":"crossref","first-page":"201","DOI":"10.3727\/108812898791918226","article-title":"Analyzing software sensitivity to human error","volume":"2","author":"Voas","year":"1998","journal-title":"Journal of Failure and Lessons Learned in Information Technology Management"},{"key":"10.1016\/S0065-2458(00)80010-8_bib39","article-title":"The inevitable: death, taxes, bugs","author":"Lewis","year":"1999","journal-title":"New York Times, C1"}],"container-title":["Advances in Computers","Emphasizing Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245800800108?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245800800108?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T19:38:55Z","timestamp":1559936335000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245800800108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(00)80010-8","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}