{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:14:00Z","timestamp":1761621240800},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/tnsm.2015.2510080","type":"journal-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T19:40:05Z","timestamp":1450381205000},"page":"58-70","source":"Crossref","is-referenced-by-count":26,"title":["Experimental Evidence on Decision-Making in Availability Service Level Agreements"],"prefix":"10.1109","volume":"13","author":[{"given":"Ulrik","family":"Franke","sequence":"first","affiliation":[]},{"given":"Markus","family":"Buschle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(73)90011-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4870(99)00031-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2014.907970"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon.2014.6819270"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.540"},{"key":"ref30","article-title":"A game theoretic framework for SLA negotiation","author":"figueroa","year":"2008"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1287\/msom.1070.0188"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000013358.61395.96"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SRII.2011.83"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.509"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2007.106"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2010.59"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2336051"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07950-9_7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-1583-0.ch005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15681-6_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2378779"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.34"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.I9P0305"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2007.021104"},{"key":"ref50","author":"marcus","year":"2003","journal-title":"Blueprints for High Availability"},{"key":"ref51","article-title":"How to calculate the cost of continuously available IT services","author":"malik","year":"2010"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.407"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-014-0241-8"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0307-3"},{"key":"ref55","first-page":"3","article-title":"Research design and issues of validity","author":"brewer","year":"2000","journal-title":"Handbook of Research Methods in Social and Personality Psychology"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035193"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501185"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.06.I8P0287"},{"key":"ref10","article-title":"Increase availability through best-in-class benchmarking and by targeting causes of downtime","author":"smith","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-009-9115-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM.2009.5304893"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02414-1_19"},{"key":"ref14","first-page":"2705","article-title":"Service level agreements","author":"held","year":"2011","journal-title":"Encyclopedia of Information Assurance"},{"key":"ref15","year":"2000","journal-title":"TOGAF Glossary"},{"key":"ref16","year":"2012","journal-title":"IT Definitions and Glossary"},{"key":"ref17","article-title":"Enterprise software system integration: An architectural perspective","author":"johnson","year":"2002"},{"key":"ref18","author":"fowler","year":"2003","journal-title":"Patterns of Enterprise Application Architecture"},{"key":"ref19","author":"morris","year":"1976","journal-title":"American Heritage Dictionary of the English Language"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2004.1317766"},{"key":"ref3","article-title":"Use this 10-step approach to service-level management to deliver business value","author":"spafford","year":"2013"},{"key":"ref6","author":"taylor","year":"2007","journal-title":"Service Design (ITIL)"},{"key":"ref5","article-title":"The challenges and approaches of establishing IT infrastructure monitoring SLAs in IT operations","author":"williams","year":"2010"},{"key":"ref8","first-page":"377","article-title":"Business continuity planning: Evolution in response to major news events","author":"jackson","year":"2011","journal-title":"Encyclopedia of Information Assurance"},{"key":"ref7","article-title":"Improving systems availability","year":"1998"},{"key":"ref49","article-title":"N&#x00E4;r handlar vi?&#x2014;Om konsumtionsm&#x00F6;nster i den traditionella detaljhandeln","author":"bergstr\u00f6m","year":"2005"},{"key":"ref9","author":"taylor","year":"2007","journal-title":"Service Operation (ITIL)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.110811.110122"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2013.10.008"},{"key":"ref48","first-page":"185","article-title":"A simple way to estimate the cost of downtime","author":"patterson","year":"0","journal-title":"Proc 16th Syst Admin Conf (LISA)"},{"key":"ref47","author":"h\u00f8yland","year":"1994","journal-title":"System Reliability Theory Models and Statistical Methods"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2009.10.014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1257\/jel.38.2.332"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11238-014-9446-z"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1120.1670"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/7429995\/7360206.pdf?arnumber=7360206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:48:46Z","timestamp":1642006126000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7360206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":58,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2015.2510080","relation":{},"ISSN":["1932-4537"],"issn-type":[{"value":"1932-4537","type":"print"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}