{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:28:20Z","timestamp":1742398100892},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icre.2002.1048521","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:45:08Z","timestamp":1056584708000},"page":"181-188","source":"Crossref","is-referenced-by-count":14,"title":["Validating functional system requirements with scenarios"],"prefix":"10.1109","author":[{"given":"A.","family":"Sutcliffe","sequence":"first","affiliation":[]},{"given":"A.","family":"Gregoriades","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1999.777985"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367"},{"journal-title":"Managing the Risks of Organizational Accidents","year":"2000","author":"reason","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35175-9_29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1999.777982"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/32.738340"},{"key":"ref16","article-title":"Modelling Trust in the i* Strategic Actors Framework","author":"yu","year":"2000","journal-title":"Proc 4th Workshop Deception Fraud and Trust in Agent Societies"},{"key":"ref17","first-page":"21","article-title":"Towards Modelling Strategic Actor Relationships for Information Systems Development, with Examples From Business Process Reengineering","author":"yu","year":"1994","journal-title":"Proceedings of 4th Workshop on Information Technologies and Systems"},{"key":"ref4","article-title":"Software Metrics","author":"fenton","year":"1997","journal-title":"A Rigorous Approach"},{"key":"ref3","first-page":"128","article-title":"On the Use of a Formal Representation","author":"dubois","year":"1997","journal-title":"Proceedings of ISRE 97 3rd IEEE International Symposium on Requirements Engineering"},{"key":"ref6","article-title":"Human Reliability Analysis","author":"hollnagel","year":"1993","journal-title":"The Context of Control"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0597-62"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/291469.293165"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0288"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00012-1"},{"key":"ref1","article-title":"Scenario-Based Design","author":"carroll","year":"1995","journal-title":"envisioning work and technology in system development"},{"key":"ref9","article-title":"Probabilistic Reasoning in Intelligent Systems","author":"pearl","year":"1988","journal-title":"Networks of Plausible Information"}],"event":{"name":"IEEE Joint International Conference on Requirements Engineering","acronym":"ICRE-02","location":"Essen, Germany"},"container-title":["Proceedings IEEE Joint International Conference on Requirements Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8115\/22462\/01048521.pdf?arnumber=1048521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:47:32Z","timestamp":1489441652000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1048521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icre.2002.1048521","relation":{},"subject":[]}}