{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T10:38:56Z","timestamp":1779100736606,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"LIT","award":["LIT-2019-7-INC-316"],"award-info":[{"award-number":["LIT-2019-7-INC-316"]}]},{"name":"NSF","award":["CNS-1931962"],"award-info":[{"award-number":["CNS-1931962"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3468534","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:44:18Z","timestamp":1629337458000},"page":"8-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Hazard analysis for human-on-the-loop interactions in sUAS systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2672-9230","authenticated-orcid":false,"given":"Michael","family":"Vierhauser","sequence":"first","affiliation":[{"name":"JKU Linz, Austria"}]},{"given":"Md Nafee Al","family":"Islam","sequence":"additional","affiliation":[{"name":"University of Notre Dame, USA"}]},{"given":"Ankit","family":"Agrawal","sequence":"additional","affiliation":[{"name":"University of Notre Dame, USA"}]},{"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[{"name":"University of Notre Dame, USA"}]},{"given":"James","family":"Mason","sequence":"additional","affiliation":[{"name":"Northrop Grumman, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. Interaction Design for Situation Awareness-Eyetracking and Heuristics for Control Centers.  2009. Interaction Design for Situation Awareness-Eyetracking and Heuristics for Control Centers."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of the 2020 Conf. on Human Factors in Computing Systems.","author":"Agrawal A.","unstructured":"A. Agrawal , S. Abraham , B. Burger , C. Christine , L. Fraser , J. Hoeksema , S. Hwang , E. Travnik , S. Kumar , W. Scheirer , J. Cleland-Huang , M. Vierhauser , R. Bauer , and S. Cox . 2020. The Next Generation of Human-Drone Partnerships: Co-Designing an Emergency Response System . In Proc. of the 2020 Conf. on Human Factors in Computing Systems. A. Agrawal, S. Abraham, B. Burger, C. Christine, L. Fraser, J. Hoeksema, S. Hwang, E. Travnik, S. Kumar, W. Scheirer, J. Cleland-Huang, M. Vierhauser, R. Bauer, and S. Cox. 2020. The Next Generation of Human-Drone Partnerships: Co-Designing an Emergency Response System. In Proc. of the 2020 Conf. on Human Factors in Computing Systems."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the 41st Int\u2019l Conf. on Software Engineering. 1222\u20131233","author":"Agrawal A.","unstructured":"A. Agrawal , S. Khoshmanesh , M. Vierhauser , M. Rahimi , J. Cleland-Huang , and R. R. Lutz . 2019. Leveraging artifact trees to evolve and reuse safety cases . In Proc. of the 41st Int\u2019l Conf. on Software Engineering. 1222\u20131233 . A. Agrawal, S.Khoshmanesh, M. Vierhauser, M. Rahimi, J. Cleland-Huang, and R. R. Lutz. 2019. Leveraging artifact trees to evolve and reuse safety cases. In Proc. of the 41st Int\u2019l Conf. on Software Engineering. 1222\u20131233."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MoDRE51215.2020.00007"},{"key":"e_1_3_2_1_5_1","unstructured":"Ardupilot. 2020. Ardupilot \u2013 open source autopilot software. https:\/\/ardupilot.org [Last accessed 01-06-2021].  Ardupilot. 2020. Ardupilot \u2013 open source autopilot software. https:\/\/ardupilot.org [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_6_1","unstructured":"Ardupilot. 2020. MissionPlanner. https:\/\/ardupilot.org\/planner [Last accessed 01-06-2021].  Ardupilot. 2020. MissionPlanner. https:\/\/ardupilot.org\/planner [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_7_1","unstructured":"Aviation Safety Reporting System. 2021. ASRS Database Report Set: Unmanned Aerial Vehicle (UAV) Reports (ACN: 1599671). https:\/\/asrs.arc.nasa.gov\/docs\/rpsts\/uav.pdf [Last accessed 01-06-2021].  Aviation Safety Reporting System. 2021. ASRS Database Report Set: Unmanned Aerial Vehicle (UAV) Reports (ACN: 1599671). https:\/\/asrs.arc.nasa.gov\/docs\/rpsts\/uav.pdf [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/prs.11506"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931218621427"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the 25th IEEE Int\u2019l Symp. on Software Reliability Engineering Workshops. 186\u2013191","author":"Robin","unstructured":"Robin E. Bloomfield and Kateryna Netkachova. 2014. Building Blocks for Assurance Cases . In Proc. of the 25th IEEE Int\u2019l Symp. on Software Reliability Engineering Workshops. 186\u2013191 . Robin E. Bloomfield and Kateryna Netkachova. 2014. Building Blocks for Assurance Cases. In Proc. of the 25th IEEE Int\u2019l Symp. on Software Reliability Engineering Workshops. 186\u2013191."},{"key":"e_1_3_2_1_11_1","unstructured":"CBS SF Bay Area News Outlet. 2015. Pilot Of Drone That Nearly Hit CHP Helicopter Says It Was On Autopilot. https:\/\/sanfrancisco.cbslocal.com\/2015\/12\/17\/drone-near-miss-chp-helicopter-martinez-owen-ouyang-apology-autopilot [Last accessed 01-06-2021].  CBS SF Bay Area News Outlet. 2015. Pilot Of Drone That Nearly Hit CHP Helicopter Says It Was On Autopilot. https:\/\/sanfrancisco.cbslocal.com\/2015\/12\/17\/drone-near-miss-chp-helicopter-martinez-owen-ouyang-apology-autopilot [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of the Interdisciplinary WS on Human-Drone Interaction; co-located with the 2020 ACM CHI Conf. on Human Factors in Computing Systems.","author":"Cleland-Huang Jane","year":"2020","unstructured":"Jane Cleland-Huang and Ankit Agrawal . 2020 . Human-Drone Interactions with Semi-Autonomous Cohorts of Collaborating Drones . In Proc. of the Interdisciplinary WS on Human-Drone Interaction; co-located with the 2020 ACM CHI Conf. on Human Factors in Computing Systems. Jane Cleland-Huang and Ankit Agrawal. 2020. Human-Drone Interactions with Semi-Autonomous Cohorts of Collaborating Drones. In Proc. of the Interdisciplinary WS on Human-Drone Interaction; co-located with the 2020 ACM CHI Conf. on Human Factors in Computing Systems."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414950"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3000104"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28714-5_16"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183399.3183408"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781410618481"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-006-5469-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2335995"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2015.7311605"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45477-1_5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778077"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS20050.2012.6299215"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.199"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66266-4_11"},{"key":"e_1_3_2_1_26_1","unstructured":"Homayoon Dezfuli Allan Benjamin Christopher Everett Martin Feather Peter Rutledge Dev Sen and Robert Youngblood. 2015. NASA System Safety Handbook. Volume 2: System Safety Concepts Guidelines and Implementation Examples.  Homayoon Dezfuli Allan Benjamin Christopher Everett Martin Feather Peter Rutledge Dev Sen and Robert Youngblood. 2015. NASA System Safety Handbook. Volume 2: System Safety Concepts Guidelines and Implementation Examples."},{"key":"e_1_3_2_1_27_1","volume-title":"Designing for Situation Awareness: An Approach to User-Centered Design","author":"Endsley Mica R.","year":"2006","unstructured":"Mica R. Endsley . 2011. Designing for Situation Awareness: An Approach to User-Centered Design , Second Edition (2 nd ed.). CRC Press, Inc. , Boca Raton, FL, USA . isbn:14 2006 3553, 9781420063554 Mica R. Endsley. 2011. Designing for Situation Awareness: An Approach to User-Centered Design, Second Edition (2nd ed.). CRC Press, Inc., Boca Raton, FL, USA. isbn:1420063553, 9781420063554","edition":"2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025191"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the 1st Int\u2019l WS on Assurance Cases for Software-Intensive Systems. 29\u201333","author":"Martin","unstructured":"Martin S. Feather and Lawrence Z. Markosian. 2013. Architecting and generalizing a safety case for critical condition detection software: an experience report . In Proc. of the 1st Int\u2019l WS on Assurance Cases for Software-Intensive Systems. 29\u201333 . Martin S. Feather and Lawrence Z. Markosian. 2013. Architecting and generalizing a safety case for critical condition detection software: an experience report. In Proc. of the 1st Int\u2019l WS on Assurance Cases for Software-Intensive Systems. 29\u201333."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TOH.2018.2865302"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.02.028"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.3.c3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194317"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364916688255"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of the Next Generation of System Assurance Approaches for Safety-Critical Systems WS of the 32nd Int\u2019l Conf. on Computer Safety, Reliability and Security.","author":"Hawkins Richard","year":"2013","unstructured":"Richard Hawkins , Ibrahim Habli , and Tim Kelly . 2013 . Principled Construction of Software Safety Cases . In Proc. of the Next Generation of System Assurance Approaches for Safety-Critical Systems WS of the 32nd Int\u2019l Conf. on Computer Safety, Reliability and Security. Richard Hawkins, Ibrahim Habli, and Tim Kelly. 2013. Principled Construction of Software Safety Cases. In Proc. of the Next Generation of System Assurance Approaches for Safety-Critical Systems WS of the 32nd Int\u2019l Conf. on Computer Safety, Reliability and Security."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039539.1039541"},{"key":"e_1_3_2_1_37_1","unstructured":"Teton Valley News Julia Tellman. 2018. First-ever recorded drone-hot air balloon collision prompts safety conversation. https:\/\/www.postregister.com\/news\/local\/first-ever-recorded-drone-hot-air-balloon-collision-prompts-safety\/article_7cc41c24-6025-5aa6-b6dd-6d1ea5e85961.html [Last accessed 01-06-2021].  Teton Valley News Julia Tellman. 2018. First-ever recorded drone-hot air balloon collision prompts safety conversation. https:\/\/www.postregister.com\/news\/local\/first-ever-recorded-drone-hot-air-balloon-collision-prompts-safety\/article_7cc41c24-6025-5aa6-b6dd-6d1ea5e85961.html [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2666606"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/286498.286693"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of the dependable systems and networks 2004 workshop on assurance cases. 6.","author":"Kelly Tim","year":"2004","unstructured":"Tim Kelly and Rob Weaver . 2004 . The goal structuring notation\u2013a safety argument notation . In Proc. of the dependable systems and networks 2004 workshop on assurance cases. 6. Tim Kelly and Rob Weaver. 2004. The goal structuring notation\u2013a safety argument notation. In Proc. of the dependable systems and networks 2004 workshop on assurance cases. 6."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00079-X"},{"key":"e_1_3_2_1_42_1","volume-title":"Building a safety health system.","author":"Kohn L.T.","unstructured":"L.T. Kohn , J.M. Corrigan , and M.s. Donaldson . 1999. To err is human , Building a safety health system. Washington, DC : National Academy Press . L.T. Kohn, J.M. Corrigan, and M.s. Donaldson. 1999. To err is human, Building a safety health system. Washington, DC: National Academy Press."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6858777"},{"key":"e_1_3_2_1_44_1","volume-title":"System Safety and Computers","author":"Leveson Nancy G.","year":"1972","unstructured":"Nancy G. Leveson . 1995. Safeware , System Safety and Computers . Addison Wesley . isbn:0-201-1 1972 -2 Nancy G. Leveson. 1995. Safeware, System Safety and Computers. Addison Wesley. isbn:0-201-11972-2"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Mai Skjott Linneberg and Steffen Korsgaard. 2019. Coding qualitative data: A synthesis guiding the novice. Qualitative Research Journal.  Mai Skjott Linneberg and Steffen Korsgaard. 2019. Coding qualitative data: A synthesis guiding the novice. Qualitative Research Journal.","DOI":"10.1108\/QRJ-12-2018-0012"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUS48101.2019.8995982"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/590564.590572"},{"key":"e_1_3_2_1_48_1","first-page":"453","volume-title":"Proc. of the SIGCHI Conf. on Human Factors in Computing Systems. ACM, 164\u2013170","author":"McGrenere Joanna","unstructured":"Joanna McGrenere , Ronald M. Baecker , and Kellogg S. Booth . 2002. An Evaluation of a Multiple Interface Design Solution for Bloated Software . In Proc. of the SIGCHI Conf. on Human Factors in Computing Systems. ACM, 164\u2013170 . isbn:1-58113- 453 - 453 Joanna McGrenere, Ronald M. Baecker, and Kellogg S. Booth. 2002. An Evaluation of a Multiple Interface Design Solution for Bloated Software. In Proc. of the SIGCHI Conf. on Human Factors in Computing Systems. ACM, 164\u2013170. isbn:1-58113-453-3"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"D.C. Nagel. 1998. Human error in aviation Operations. Human factors in Aviation E.L.Weiner and E.C.Nagel (Eds) 263\u2013303.  D.C. Nagel. 1998. Human error in aviation Operations. Human factors in Aviation E.L.Weiner and E.C.Nagel (Eds) 263\u2013303.","DOI":"10.1016\/B978-0-08-057090-7.50015-1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2016.2623867"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169166"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.22260\/ISARC2013\/0171"},{"key":"e_1_3_2_1_53_1","unstructured":"Parsif.al. 2021. Tool support for Systematic Literature Reviews. https:\/\/parsif.al [Last accessed 01-06-2021].  Parsif.al. 2021. Tool support for Systematic Literature Reviews. https:\/\/parsif.al [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_54_1","unstructured":"PX4. 2021. Open Source Flight Controller. https:\/\/px4.io [Last accessed 01-06-2021].  PX4. 2021. Open Source Flight Controller. https:\/\/px4.io [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_55_1","unstructured":"QGroundControl. 2021. Ground Control Station. http:\/\/qgroundcontrol.com [Last accessed 01-06-2021].  QGroundControl. 2021. Ground Control Station. http:\/\/qgroundcontrol.com [Last accessed 01-06-2021]."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2307258"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220578"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2011.23"},{"key":"e_1_3_2_1_59_1","volume-title":"Safety Critical Computer Systems","author":"Storey Neil R.","year":"2014","unstructured":"Neil R. Storey . 1996. Safety Critical Computer Systems . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA . isbn:0 2014 27877 Neil R. Storey. 1996. Safety Critical Computer Systems. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA. isbn:0201427877"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44902-9_13"},{"key":"e_1_3_2_1_61_1","volume-title":"The Twenty-Ninth Annual Int\u2019l Symp on Fault-Tolerant Computing. IEEE Computer Society, 232\u2013235","author":"Sullivan Kevin J.","year":"1999","unstructured":"Kevin J. Sullivan , Joanne Bechta Dugan , and David Coppit . 1999 . The Galileo Fault Tree Analysis Tool. In Digest of Papers: FTCS-29 , The Twenty-Ninth Annual Int\u2019l Symp on Fault-Tolerant Computing. IEEE Computer Society, 232\u2013235 . Kevin J. Sullivan, Joanne Bechta Dugan, and David Coppit. 1999. The Galileo Fault Tree Analysis Tool. In Digest of Papers: FTCS-29, The Twenty-Ninth Annual Int\u2019l Symp on Fault-Tolerant Computing. IEEE Computer Society, 232\u2013235."},{"key":"e_1_3_2_1_62_1","volume-title":"Proc. of the 10th IEEE Int\u2019l Symp. on High Assurance Systems Engineering. IEEE Computer Society, 15\u201322","author":"Sun Hongyu","unstructured":"Hongyu Sun , Miriam Hauptman , and Robyn R. Lutz . 2007. Integrating Product-Line Fault Tree Analysis into AADL Models . In Proc. of the 10th IEEE Int\u2019l Symp. on High Assurance Systems Engineering. IEEE Computer Society, 15\u201322 . Hongyu Sun, Miriam Hauptman, and Robyn R. Lutz. 2007. Integrating Product-Line Fault Tree Analysis into AADL Models. In Proc. of the 10th IEEE Int\u2019l Symp. on High Assurance Systems Engineering. IEEE Computer Society, 15\u201322."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953900"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/10508410902766549"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010412"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468534","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:50Z","timestamp":1750195490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":65,"alternative-id":["10.1145\/3468264.3468534","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3468534","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}