{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:30:52Z","timestamp":1729614652923,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/sysose.2012.6384123","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:49:45Z","timestamp":1359568185000},"page":"59-64","source":"Crossref","is-referenced-by-count":3,"title":["Socio-technical considerations for enterprise system interfaces in Systems of Systems"],"prefix":"10.1109","author":[{"given":"C.E.","family":"Siemieniuch","sequence":"first","affiliation":[]},{"given":"M.A.","family":"Sinclair","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SYSTEMS.2009.4815828"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/1520-6564(200022)10:3<251::AID-HFM3>3.3.CO;2-H"},{"journal-title":"Defining Changeability Reconciling Flexibility Adaptability Scalability Modifiability and Robustness for Maintaining System Lifecycle Value","year":"2008","author":"ross","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(00)00009-0"},{"key":"16","article-title":"KOMPASS: A method for complementary system design","author":"wailer","year":"2003","journal-title":"Handbook of Cognitive Task Design"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/17.277402"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1177\/001872678704000303"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1080\/00140130701639474"},{"journal-title":"The Black Swan The Impact of the Highly Improbable","year":"2008","author":"taleb","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-46429-8_25","article-title":"Mo?bius: An extensible tool for performance and dependability modeling","author":"daly","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"20","first-page":"153","article-title":"Modeling the resilience of large and evolving systems","volume":"4","author":"kaa?niche","year":"2008","journal-title":"International Journal of Performability Engineering"},{"key":"22","first-page":"265","article-title":"Dependability analysis in the early phases of UML based system design","volume":"16","author":"bondavalli","year":"2001","journal-title":"Int J Comput Syst Sci Eng"},{"journal-title":"HIDENETS - HIghly DEpendable Ip-based NETworks and Services","year":"2006","key":"23"},{"key":"24","article-title":"A Comparison of Leading Data Mining Tools","author":"elder","year":"0","journal-title":"Proc of the Fourth Int Conf on Knowledge Discovery and Data Mining New York 1998"},{"journal-title":"Aligning COBIT ITIL and ISO 17799 for Business Benefit","year":"2000","author":"guldentops","key":"25"},{"journal-title":"Social Networking for Business - Choosing the Right Tools and Resources to Fit Your Needs","year":"2010","author":"shah","key":"26"},{"key":"27","article-title":"Keynote: On the wicked problem of defence acquisition","author":"daw","year":"0","journal-title":"7th AIAA Aviation Technology Integration and Operations Conference Challenges in Systems Engineering for Advanced Technology Programmes Belfast NI 2007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/BF01405730"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1177\/106480469700500105"},{"journal-title":"NCOIC Interoperability Framework","year":"2011","key":"3"},{"journal-title":"How to Prepare for a Black Swan [Online]","year":"0","author":"lemerle","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2007.05.005"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SYSTEMS.2008.4518994"},{"journal-title":"Dialog Mapping Building Shared Understanding of Wicked Problems","year":"2006","author":"conklin","key":"30"},{"key":"7","article-title":"An emergent perspective on interoperation in systems of systems","author":"fisher","year":"2006","journal-title":"Carnegie- Mellon University Technical Report CMU\/SEI-2006-TR-003"},{"journal-title":"The Resilient Enterprise Overcoming Vulnerability for Competitive Advantage","year":"2005","author":"sheffi","key":"6"},{"journal-title":"Management and Development Reliability Organisations","year":"2004","author":"tranfield","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2010.5544113"},{"journal-title":"The Getting and Keeping of Wisdom","year":"2002","author":"hammer","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2002.1032403"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1201\/9781420005684"}],"event":{"name":"2012 7th International Conference on System of Systems Engineering (SoSE)","start":{"date-parts":[[2012,7,16]]},"location":"Genova","end":{"date-parts":[[2012,7,19]]}},"container-title":["2012 7th International Conference on System of Systems Engineering (SoSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6324004\/6355890\/06384123.pdf?arnumber=6384123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:42:04Z","timestamp":1498012924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6384123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/sysose.2012.6384123","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}