{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:47:00Z","timestamp":1749703620014,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/sees.2012.6225490","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T21:25:33Z","timestamp":1341869133000},"page":"44-50","source":"Crossref","is-referenced-by-count":4,"title":["Liability for software in safety-critical mechatronic systems: An industrial questionnaire"],"prefix":"10.1109","author":[{"given":"Holger M.","family":"Kienle","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Sundmark","sequence":"additional","affiliation":[]},{"given":"Kristina","family":"Lundqvist","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Johnsen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Software Engineering Best Practices","year":"2009","author":"jones","key":"19"},{"key":"17","article-title":"Rethinking software process: The key to negligence liability","author":"tuner","year":"0","journal-title":"5th IASTED International Conference on Software Engineering and Applications Aug 2001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2003.1181918"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.116"},{"key":"16","first-page":"4","article-title":"Both sides always lose: Litigation of software-intensive contracts","volume":"13","author":"demarco","year":"2000","journal-title":"Crosstalk"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/52.922719"},{"journal-title":"Software Liability","year":"1997","author":"kaner","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"journal-title":"Engineering A Safer World","year":"2009","author":"leveson","key":"12"},{"key":"21","article-title":"Legal sufficiency of testing processes","author":"tuner","year":"1996","journal-title":"SAFECOMP'96"},{"journal-title":"Software Negligence and Testing Coverage","year":"1996","author":"kaner","key":"20"},{"journal-title":"Software Product Liability","year":"1993","author":"armour","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971637"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1026533.1026570"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1201\/9781482268324","author":"bott","year":"2000","journal-title":"Professional Issues in Software Engineering"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882390"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1992.285859"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2307\/249305"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/2.587545"},{"journal-title":"IEEE Trial-Use Supplement to IEEE Standard for Information Technology - Software Reuse - Data Model for Reuse Library Interoperability Intellectual Property Rights Framework","year":"1999","key":"1"},{"key":"7","article-title":"Can you afford not to certify your control system?","author":"a?kerholm","year":"2009","journal-title":"iVTinternational"},{"key":"6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-16612-9_1","article-title":"1st International Conference on Runtime Verification (RV 2010)","volume":"6418","author":"ackermann","year":"0","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018404"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(01)00054-7"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203443"},{"key":"8","first-page":"745","article-title":"No more soft landings for software: Liability for defects in and industry that has come of age","volume":"21","author":"zollers","year":"2005","journal-title":"Santa Clara Computer &amp High Tech Law J"}],"event":{"name":"2012 2nd International Workshop on Software Engineering for Embedded Systems (SEES)","start":{"date-parts":[[2012,6,9]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2012,6,9]]}},"container-title":["2012 Second International Workshop on Software Engineering for Embedded Systems (SEES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6220313\/6225480\/06225490.pdf?arnumber=6225490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T13:32:52Z","timestamp":1594387972000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6225490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/sees.2012.6225490","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}