{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:40:51Z","timestamp":1729672851898,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icsai.2017.8248540","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T22:42:24Z","timestamp":1515451344000},"page":"1604-1609","source":"Crossref","is-referenced-by-count":1,"title":["Selection of requirement elicitation techniques using laddering"],"prefix":"10.1109","author":[{"given":"Ja-Hee","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seung Mo","family":"Ham","sequence":"additional","affiliation":[]},{"given":"Hwan-Ju","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Kwang Kook","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"380","article-title":"A hybrid machine learning model for selecting suitable requirements elicitation techniques","volume":"14","author":"darwish","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref11","first-page":"225","article-title":"Effective requirements development-a comparison of requirements elicitation techniques","author":"zhang","year":"2007","journal-title":"Proceedings of 15th Software Quality Management Conference (SQM2007) British Computer Society"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/20322-2408"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2013.03.05"},{"key":"ref14","first-page":"1059","article-title":"A practical guide to requirements elicitation techniques selection-an empirical study","volume":"11","author":"anwar","year":"2012","journal-title":"Middle-East Journal of Scientific Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1890810.1890819"},{"journal-title":"Understanding Consumer Decision Making The Means-End Approach to Marketing and Advertising Strategy","year":"2001","author":"thomas","key":"ref16"},{"journal-title":"Consumer Behavior","year":"2009","author":"paul","key":"ref17"},{"key":"ref18","first-page":"11","article-title":"Laddering theory, method, analysis, and interpretation","volume":"28","author":"thomas","year":"1988","journal-title":"Journal of Advertising Research"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S1474-0346(03)00003-X","article-title":"A strategy for acquiring customer requirement patterns using laddering technique and art2 neural network","volume":"16","author":"chun-hsien","year":"2002","journal-title":"Advanced Engineering Informatics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/spip.293"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1996.0024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CONSEG.2012.6349486"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.107"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/224155.224157"},{"key":"ref9","first-page":"385","article-title":"Selecting a software elicitation technique according to layers of knowledge and preciseness: A case study","volume":"23","author":"sanchez-segura","year":"2017","journal-title":"Journal of Universal Computer Science"}],"event":{"name":"2017 4th International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2017,11,11]]},"location":"Hangzhou","end":{"date-parts":[[2017,11,13]]}},"container-title":["2017 4th International Conference on Systems and Informatics (ICSAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233022\/8248252\/08248540.pdf?arnumber=8248540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T04:11:32Z","timestamp":1570594292000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8248540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icsai.2017.8248540","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}