{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:46:48Z","timestamp":1772783208735,"version":"3.50.1"},"reference-count":103,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636709","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"92-104","source":"Crossref","is-referenced-by-count":135,"title":["Requirements elicitation: Towards the unknown unknowns"],"prefix":"10.1109","author":[{"given":"Alistair","family":"Sutcliffe","sequence":"first","affiliation":[]},{"given":"Pete","family":"Sawyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0129-9"},{"key":"36","first-page":"3","article-title":"Social modeling for requirements engineering: An introduction","author":"yu","year":"2011","journal-title":"Social Modeling for Requirements Engineering"},{"key":"33","author":"alexander","year":"2004","journal-title":"Scenarios Stories Use Cases through the Systems Development Life-Cycle"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"key":"39","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-02463-4_7","article-title":"Social modeling and i","author":"yu","year":"2009","journal-title":"Conceptual Modeling Foundations and Applications Essays in Honor of John Mylopoulos"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0087-7"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671112"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2004.11.017"},{"key":"42","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/S0306-4379(02)00012-1","article-title":"Towards requirements-driven software development methodology: The Tropos project","volume":"27","author":"castro","year":"2002","journal-title":"Information Systems"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/291469.293165"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0198-0"},{"key":"22","first-page":"152","article-title":"Techniques for requirements elicitation","author":"gougen","year":"1993","journal-title":"IEEE Intl Symposium on Requirements Engineering"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/972648.972651"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-768-8"},{"key":"25","first-page":"632","article-title":"Can requirements be creative? Experiences with an enhanced air space management system","author":"maiden","year":"2007","journal-title":"Proceedings ICSE-07"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0133-0"},{"key":"27","first-page":"153","author":"mancini","year":"2010","journal-title":"Contravision Exploring Users' Reactions to Futuristic Technology"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0077-9"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2006.05.003"},{"key":"3","author":"gause","year":"1989","journal-title":"Exploring Requirements Quality Before Design"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336523"},{"key":"1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/07421222.2004.11045786","article-title":"A unified model of requirements elicitation","volume":"20","author":"hickey","year":"2004","journal-title":"Journal of Management Information Systems"},{"key":"30","first-page":"2213","author":"gaver","year":"2009","journal-title":"Anatomy of A Failure How We Knew When Our Design Went Wrong and What We Learned from It"},{"key":"7","author":"van lamsweerde","year":"2009","journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0217-5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0118-z"},{"key":"5","author":"sommerville","year":"1998","journal-title":"Requirements Engineering Processes and Techniques"},{"key":"31","first-page":"17","author":"hutchinson","year":"2003","journal-title":"Technology Probes Inspiring Design for and with Families"},{"key":"4","author":"robertson","year":"1999","journal-title":"Mastering the Requirements Process"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.17"},{"key":"8","year":"2013","journal-title":"Business Computing World"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1037\/10096-006"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.12"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511620539"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0068-0_20"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.49"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345835"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34419-0_2"},{"key":"11","first-page":"183","volume":"11","author":"maiden","year":"1996","journal-title":"ACRE Selecting Methods for Requirements Acquisition Software Engineering Journal"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0163-2"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35175-9_29"},{"key":"20","author":"carroll","year":"1995","journal-title":"Scenario-Based Design Envisioning Work and Technology in System Development"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.27"},{"key":"102","year":"0","journal-title":"Wikipedia Space Shuttle Columbia Disaster"},{"key":"99","article-title":"An introduction to human error, interaction and the development of safety-critical systems","author":"johnson","year":"2011","journal-title":"The Handbook of Human-Machine Interaction A Human-Centered Design Approach"},{"key":"101","year":"2013","journal-title":"Wikipedia Air France Flight 447"},{"key":"100","doi-asserted-by":"crossref","DOI":"10.1201\/b12455","author":"sutcliffe","year":"2002","journal-title":"The Domain Theory Patterns for Knowledge and Software Reuse"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1109\/32.825764"},{"key":"97","author":"leveson","year":"1995","journal-title":"Safeware"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-006-0030-0"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.13"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0207-3"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0014-5"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.35"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0151-6"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051660"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200004"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.10.007"},{"key":"89","first-page":"72","article-title":"Interview patterns for requirements elicitation","volume":"2011","author":"scheinholtz","year":"2011","journal-title":"Proceedings REFSQ-11"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1995.512555"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335679"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1007\/s007660050005"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1145\/1868914.1868937"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227089"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0016-3"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.304"},{"key":"86","first-page":"453","author":"kittur","year":"2008","journal-title":"Crowdsourcing User Studies with Mechanical Turk Proceedings Chi-08"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.20"},{"key":"84","first-page":"47","article-title":"How interaction between roles shapes the communication structure in requirements-driven collaboration","author":"marczak","year":"2009","journal-title":"Proceedings 19th IEEE Int Conference on Requirements Engineering (RE'01)"},{"key":"85","first-page":"707","article-title":"StakeRare: Using social networks and collaborative filtering for large-scale requirements elicitation","volume":"383","author":"lim","year":"2012","journal-title":"IEEE Transactions on Software Engineering"},{"key":"67","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1007\/978-3-642-04425-0_36","article-title":"A goal- Based modeling approach to develop requirements of an adaptive system with environmental uncertainty","author":"cheng","year":"2009","journal-title":"Proceedings 12th ACM\/IEEE International on Model Driven Engineering Languages and Systems (MODELS-09)"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0075-y"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.12"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253499"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.29"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048537"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.34"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.21"},{"key":"74","first-page":"60","article-title":"Awareness requirements for adaptive systems","author":"silva souza","year":"0","journal-title":"Proceedings SEAMS-11"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0101-0"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1109\/32.738338"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.31"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.72"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1007\/PL00010342"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232775"},{"key":"55","first-page":"155","article-title":"Using i in requirements projects: Some experiences and lessons","author":"maiden","year":"2011","journal-title":"Social Modeling for Requirements Engineering"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.47"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0079-7"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008617922496"},{"key":"63","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.knosys.2007.11.009","article-title":"A flexible framework to experiment with ontology learning techniques","volume":"21","author":"gacitua","year":"2007","journal-title":"Knowledge- Based Systems"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0063-7"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345795"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051662"},{"key":"48","first-page":"59","article-title":"Finding solutions in goal models: An interactive backward reasoning approach","author":"horkoff","year":"2010","journal-title":"Proceedings 29th Int Conference on Conceptual Modeling (ER 2010) Vancouver Canada"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.59"},{"key":"44","author":"hollnagel","year":"1998","journal-title":"Cognitive Reliability & Error Analysis Method"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/32.738340"},{"key":"46","first-page":"181","article-title":"Validating functional system requirements with scenarios","author":"sutcliffe","year":"2012","journal-title":"Proceedings 10th IEEE Int Conference on Requirements Engineering (RE'02) Essen Germany"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.67"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1145\/58566.59297"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0603&4_2"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1994.1029"},{"key":"50","article-title":"Problem frames: Analysing and structuring software development problems","author":"jackson","year":"2001","journal-title":"Harlow Eng Pearson Education"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","location":"Rio de Janeiro-RJ, Brazil","start":{"date-parts":[[2013,7,15]]},"end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636709.pdf?arnumber=6636709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:22:53Z","timestamp":1596759773000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636709","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}