{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:48:09Z","timestamp":1729608489435,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/isese.2005.1541826","type":"proceedings-article","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T15:49:09Z","timestamp":1134229749000},"page":"167-176","source":"Crossref","is-referenced-by-count":0,"title":["Determining how much software assurance is enough? a value-based approach"],"prefix":"10.1109","author":[{"family":"LiGuo Huang","sequence":"first","affiliation":[]},{"given":"B.","family":"Boehm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"56","article-title":"Calculating the value of testing","author":"bullock","year":"2000","journal-title":"Software Testing and Quality Engineering"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1293073"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1177\/1094342004048535"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638776"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185215"},{"key":"13","article-title":"Software design as an investment activity: A real options perspective","author":"sullivan","year":"1999","journal-title":"Real Options and Business Strategy Applications to Decision Making"},{"key":"14","article-title":"Stochastic optimal switching","author":"cai","year":"2002","journal-title":"24th International Conference on Software Engineering"},{"key":"11","article-title":"The potential for synergy between certification and insurance","author":"li","year":"2002","journal-title":"Special Edition of ACM SIGSOFT from the ICSR7"},{"key":"12","article-title":"Software risk management and insurance","author":"raz","year":"2001","journal-title":"19th International Conference on Software Engineering"},{"key":"21","article-title":"Value-based management of software testing","author":"biffl","year":"2005","journal-title":"Value-Based Software Engineering"},{"journal-title":"Risk-Based E-Business Testing","year":"2002","author":"gerrard","key":"20"},{"journal-title":"Microsoft Secrets","year":"1995","author":"cusumano","key":"22"},{"journal-title":"Pair Programming Illuminated","year":"2003","author":"williams","key":"23"},{"key":"24","first-page":"20","article-title":"Using the spiral model and MBASE to generate new acquisition process models: SAIV, CAIV, and SCQAIV","author":"boehm","year":"2002","journal-title":"Crosstalk"},{"key":"25","article-title":"Value-based management of software testing","author":"ramler","year":"2005","journal-title":"Value-Based Software Engineering"},{"journal-title":"Non-Functional Requirements in Software Engineering","year":"1999","author":"chung","key":"3"},{"key":"2","article-title":"Determining software quality using COQUALMO","author":"steece","year":"2002","journal-title":"Case Studies in Reliability and Maintenance"},{"key":"10","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/ICSE.2002.1007971","article-title":"Security Attribute Evaluation Method: A Cost-Benefit Approach","author":"shawn a butler","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"journal-title":"Software Cost Estimation with COCOMO II","year":"2000","author":"boehm","key":"1"},{"journal-title":"International Conference on Software Engineering","article-title":"The international workshop on economics-driven software engineering research","year":"0","key":"7"},{"key":"6","article-title":"Software dependability properties: A survey of definitions, measures and techniques","volume":"3","author":"rus","year":"2003","journal-title":"Fraunhofer Technical Report"},{"key":"5","article-title":"Fundamental concepts of computer system dependability","author":"avezienis","year":"2001","journal-title":"IARP\/IEEE-RAS Workshop on Robot Dependability Technological Challenge of Dependable Robots in Human Environments"},{"key":"4","article-title":"Characteristics of software quality","author":"boehm","year":"1978","journal-title":"TRW Report to National Bureau of Standards"},{"key":"9","first-page":"34","author":"nejmeh","year":"2002","journal-title":"Business-driven Product Planning Using Feature Vectors and Increments"},{"journal-title":"Making the Software Business Case","year":"2002","author":"reifer","key":"8"}],"event":{"name":"2005 International Symposium on Empirical Software Engineering, 2005.","location":"Queensland, Australia"},"container-title":["2005 International Symposium on Empirical Software Engineering, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10351\/32923\/01541826.pdf?arnumber=1541826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:36:50Z","timestamp":1497649010000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1541826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isese.2005.1541826","relation":{},"subject":[]}}