{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T04:12:47Z","timestamp":1772338367331,"version":"3.50.1"},"reference-count":126,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The problem of <jats:italic>compliance checking and assessment<\/jats:italic> is to ensure that the design or implementation of a system meets some desired properties and complies with some rules or regularities. This problem is a key issue in several human and engineering application domains such as organizational management and e-governance, software and IT industries, and software and systems quality engineering. To deal with this problem, some different approaches and methods have been proposed. In addition to the approaches such as formal methods, mathematical proofs, and logical evaluations, <jats:italic>benchmarking<\/jats:italic> can be used for compliance assessment. Naturally, a set of benchmarks can shape an applied solution to compliance assessment. In this paper we propose KARB solution system, i.e. keeping away compliance Anomalies through Rule-based Benchmarking. In fact, in our proposed method the rule-based benchmarking means evaluating the conformity of an under-compliance system to a set of rules. In this solution approach, the under-compliance system is specified symbolically (using formal and logical descriptions). Also, the desired rules are specified formally as the semantic logic in the evaluation process. After reviewing the proposed method, a case study was conducted to demonstrate and analyze the KARB solution. The IR-QUMA study (Iranian Survey on Quality in Messenger Apps) was then conducted to evaluate the quality of some messenger applications. According to the evaluation results, the hybrid DD-KARB method (with a combination of semantics-awareness and data-drivenness) is more effective than solo methods and can compute a good estimation for the messenger application user quality scores. Therefore, DD-KARB can be considered as a method for quality benchmarking in this technical context.<\/jats:p>","DOI":"10.1186\/s40537-022-00654-8","type":"journal-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T15:03:04Z","timestamp":1667314984000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DD-KARB: data-driven compliance to quality by rule based benchmarking"],"prefix":"10.1186","volume":"9","author":[{"given":"Mohammad Reza","family":"Besharati","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Izadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,1]]},"reference":[{"key":"654_CR1","unstructured":"Besharati MR, Izadi M. Semantics based compliance solving. In: Fundaments of software engineering (FSEN 2019), Student Poster Competition; 2019."},{"key":"654_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10115-017-1142-1","volume":"57","author":"M Hashmi","year":"2018","unstructured":"Hashmi M, Governatori G, Lam HP, Wynn MT. Are we done with business process compliance: state of the art and challenges ahead. Knowl Inf Syst. 2018;57:79\u2013133.","journal-title":"Knowl Inf Syst"},{"key":"654_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MS.2012.45","volume":"29","author":"O Turetken","year":"2012","unstructured":"Turetken O, Elgammal A, Van Den Heuvel WJ, Papazoglou MP. Capturing compliance requirements: a pattern-based approach. IEEE Softw. 2012;29:28\u201336. https:\/\/doi.org\/10.1109\/MS.2012.45.","journal-title":"IEEE Softw"},{"key":"654_CR4","unstructured":"Brandt C, Santini F, Kokash N, Arbab F. Modeling and simulation of selected operational IT risks in the banking sector. In: ESM 2012\u20132012 European simulation and modelling conference; 2012. p. 192\u2013200."},{"key":"654_CR5","doi-asserted-by":"publisher","unstructured":"Ingolfo S, Siena A, Susi A, Perini A, Mylopoulos J. Modeling laws with nomos 2. In: 2013 6th international workshop on requirements engineering and law (RELAW) 2013. IEEE; 2013. p. 69\u201371. https:\/\/doi.org\/10.1109\/RELAW.2013.6671350.","DOI":"10.1109\/RELAW.2013.6671350"},{"key":"654_CR6","doi-asserted-by":"publisher","unstructured":"Governatori G, Milosevic Z, Sadiq S. Compliance checking between business processes and business contracts. In: Proceedings of the 2006 10th IEEE international enterprise distributed object computing conference (EDOC'06) 2006; 2006. p. 221\u201332. https:\/\/doi.org\/10.1109\/EDOC.2006.22.","DOI":"10.1109\/EDOC.2006.22"},{"key":"654_CR7","first-page":"230","volume":"15","author":"A Zasada","year":"2015","unstructured":"Zasada A, Fellmann M. A pattern-based approach to transform natural text from laws into compliance controls in the food industry. LWA. 2015;15:230\u20138.","journal-title":"LWA"},{"key":"654_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.4018\/IJEACH.2019070104","volume":"1","author":"S Almpani","year":"2019","unstructured":"Almpani S, Stefaneas P, Boley H, Mitsikas T, Frangos P. A rule-based model for compliance of medical devices applied to the European market. Int J Extrem Autom Connect Healthc. 2019;1:56\u201378.","journal-title":"Int J Extrem Autom Connect Healthc"},{"key":"654_CR9","doi-asserted-by":"publisher","first-page":"04016037","DOI":"10.1061\/(asce)cp.1943-5487.0000583","volume":"31","author":"J Zhang","year":"2017","unstructured":"Zhang J, El-Gohary NM. Semantic-based logic representation and reasoning for automated regulatory compliance checking. J Comput Civ Eng. 2017;31:04016037. https:\/\/doi.org\/10.1061\/(asce)cp.1943-5487.0000583.","journal-title":"J Comput Civ Eng"},{"key":"654_CR10","unstructured":"Bragaglia S. Monitoring complex processes to verify system conformance: a declarative rule-based framework; 2013."},{"key":"654_CR11","unstructured":"Vuotto S. Requirements-driven design of cyber-physical systems. In: CEUR workshop Proc.; 2018."},{"key":"654_CR12","doi-asserted-by":"crossref","unstructured":"Pek C, Rusinov V, Manzinger S, \u00dcste MC, Althoff M. CommonRoad drivability checker: simplifying the development and validation of motion planning algorithms. In: 2020 IEEE intelligent vehicles symposium (IV); 2020. p. 1013\u201320.","DOI":"10.1109\/IV47402.2020.9304544"},{"key":"654_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10458-020-09441-2","volume":"34","author":"BO Akinkunmi","year":"2020","unstructured":"Akinkunmi BO, Babalola FM. A norm enforcement mechanism for a time-constrained conditional normative framework. Auton Agent Multi Agent Syst. 2020;34:1\u201354. https:\/\/doi.org\/10.1007\/s10458-020-09441-2.","journal-title":"Auton Agent Multi Agent Syst"},{"key":"654_CR14","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/THMS.2020.3017784","volume":"50","author":"FJ Miandashti","year":"2020","unstructured":"Miandashti FJ, Izadi M, Shirehjini AAN, Shirmohammadi S. An empirical approach to modeling user-system interaction conflicts in smart homes. IEEE Trans Hum Mach Syst. 2020;50:573\u201383.","journal-title":"IEEE Trans Hum Mach Syst"},{"key":"654_CR15","doi-asserted-by":"publisher","unstructured":"Ranise S, Siswantoro H. Automated legal compliance checking by security policy analysis. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics); 2017. p. 361\u2013372. https:\/\/doi.org\/10.1007\/978-3-319-66284-8_30.","DOI":"10.1007\/978-3-319-66284-8_30"},{"key":"654_CR16","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ssci.2018.07.004","volume":"110","author":"GCC Elise","year":"2018","unstructured":"Elise GCC, Kift RL. Keeping track of railway safety and the mechanisms for risk. Saf Sci. 2018;110:195\u2013205.","journal-title":"Saf Sci"},{"key":"654_CR17","unstructured":"Castellanos Ardila JP. Facilitating automated compliance checking of processes against safety standards. Doctoral dissertation, M\u00e4lardalen University; 2019."},{"key":"654_CR18","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O Kupferman","year":"2001","unstructured":"Kupferman O, Vardi MY. Model checking of safety properties. Form Methods Syst Des. 2001;19:291\u2013314.","journal-title":"Form Methods Syst Des"},{"key":"654_CR19","doi-asserted-by":"publisher","first-page":"1746","DOI":"10.1109\/TIFS.2019.2948287","volume":"15","author":"NB Truong","year":"2020","unstructured":"Truong NB, Sun K, Lee GM, Guo Y. GDPR-compliant personal data management: a blockchain-based solution. IEEE Trans Inf Forensics Secur. 2020;15:1746\u201361. https:\/\/doi.org\/10.1109\/TIFS.2019.2948287.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"654_CR20","unstructured":"OCR. Summary of the HIPAA privacy rule: HIPAA compliance assistance. Office for Civil Rights; 2003."},{"key":"654_CR21","volume-title":"The foundations of EU data protection law","author":"O Lynskey","year":"2015","unstructured":"Lynskey O. The foundations of EU data protection law. Oxford: Oxford University Press; 2015."},{"key":"654_CR22","doi-asserted-by":"publisher","unstructured":"Butin D, Chicote M, Le M\u00e9tayer D. Log design for accountability. In: Proceedings of the 2013 IEEE security and privacy workshops, SPW 2013. IEEE; 2013. p. 1\u20137. https:\/\/doi.org\/10.1109\/SPW.2013.26.","DOI":"10.1109\/SPW.2013.26"},{"key":"654_CR23","doi-asserted-by":"crossref","unstructured":"Bukhsh FA, Queiroz PGG. Conceptual modeling for corporate social responsibility: a systematic literature review. In: 16th international conference on the economics of grids, clouds, systems, and services; 2019. p. 218.","DOI":"10.1007\/978-3-030-36027-6_19"},{"key":"654_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.websem.2018.02.001","volume":"50","author":"R Samavi","year":"2018","unstructured":"Samavi R, Consens MP. Publishing privacy logs to facilitate transparency and accountability. J Web Semant. 2018;50:1\u201320.","journal-title":"J Web Semant"},{"key":"654_CR25","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s00769-020-01442-8","volume":"25","author":"S Gay","year":"2020","unstructured":"Gay S, Badrick T, Ross J. \u201cState of the art\u201d for competency assessment in Australian medical laboratories. Accredit Qual Assur. 2020;25:323\u20137.","journal-title":"Accredit Qual Assur"},{"key":"654_CR26","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3506951","volume-title":"The Cambridge handbook of compliance","author":"JP Kesan","year":"2020","unstructured":"Kesan JP, Gruner RS. Intellectual property compliance: systematic methods for building and using intellectual property. In: The Cambridge handbook of compliance. Cambridge: Cambridge University Press; 2020. https:\/\/doi.org\/10.2139\/ssrn.3506951."},{"key":"654_CR27","unstructured":"Abrantes-Metz RM, Prewitt E. Antitrust compliance 2.0: the use of structural analysis and empirical screens to detect collusion and corruption in bidding procurement processes. Antitrust Chron Compet Policy Int. 2015. https:\/\/ssrn.com\/abstract=3291651."},{"key":"654_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s11528-019-00421-2","volume":"64","author":"SM Baule","year":"2020","unstructured":"Baule SM. Evaluating the accessibility of special education cooperative websites for individuals with disabilities. TechTrends. 2020;64:50\u20136.","journal-title":"TechTrends"},{"key":"654_CR29","doi-asserted-by":"publisher","unstructured":"Correia JP, Visser J. Benchmarking technical quality of software products. In: Proceedings of the 2008 15th working conference on reverse engineering, WCRE\u201908. IEEE; 2008. p. 297\u2013300. https:\/\/doi.org\/10.1109\/WCRE.2008.16.","DOI":"10.1109\/WCRE.2008.16"},{"key":"654_CR30","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11219-011-9144-9","volume":"20","author":"R Baggen","year":"2012","unstructured":"Baggen R, Correia JP, Schill K, Visser J. Standardized code quality benchmarking for improving software maintainability. Softw Qual J. 2012;20:287\u2013307. https:\/\/doi.org\/10.1007\/s11219-011-9144-9.","journal-title":"Softw Qual J"},{"key":"654_CR31","doi-asserted-by":"crossref","unstructured":"Lenarduzzi V, Lomio F, Moreschini S, Taibi D, Tamburri DA. Software quality for AI: where we are now? In: International conference on software quality; 2021. p. 43\u201353.","DOI":"10.1007\/978-3-030-65854-0_4"},{"key":"654_CR32","doi-asserted-by":"publisher","first-page":"11070","DOI":"10.1021\/acs.est.0c02436","volume":"54","author":"S De Craemer","year":"2020","unstructured":"De Craemer S, Vercauteren J, Fierens F, Lefebvre W, Meysman FJR. Using large-scale NO2 data from citizen science for air-quality compliance and policy support. Environ Sci Technol. 2020;54:11070\u20138. https:\/\/doi.org\/10.1021\/acs.est.0c02436.","journal-title":"Environ Sci Technol"},{"key":"654_CR33","doi-asserted-by":"crossref","unstructured":"Schreiber C. Automated sustainability compliance checking using process mining and formal logic. In: Proceedings of the 7th international conference on ICT for sustainability; 2020. p. 181\u20134.","DOI":"10.1145\/3401335.3401355"},{"key":"654_CR34","first-page":"1","volume":"7","author":"L Alonso-Virg\u00f3s","year":"2020","unstructured":"Alonso-Virg\u00f3s L, Espada JP, Mart\u00ednez OS, Crespo RG. Compliance and application tests of usability guidelines about giving information quickly and comprehensibly. Complex Intell Syst. 2020;7:1\u201321.","journal-title":"Complex Intell Syst"},{"key":"654_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102662","volume":"117","author":"M Zhu","year":"2020","unstructured":"Zhu M, Wang Y, Pu Z, Hu J, Wang X, Ke R. Safe, efficient, and comfortable velocity control based on reinforcement learning for autonomous driving. Transp Res Part C Emerg Technol. 2020;117: 102662.","journal-title":"Transp Res Part C Emerg Technol"},{"key":"654_CR36","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.bushor.2020.03.002","volume":"63","author":"A Christina","year":"2020","unstructured":"Christina A, Fort TL. Finding the fit: why compliance and ethics programs should seek to match individual and corporate values. Bus Horiz. 2020;63:451\u201362.","journal-title":"Bus Horiz"},{"key":"654_CR37","doi-asserted-by":"crossref","unstructured":"Gavine A, Spillers F. Toward a disability-centric model of user participation in accessibility efforts: lessons from a case study of school children. In: International conference on human\u2013computer interaction; 2020. p. 76\u201386.","DOI":"10.1007\/978-3-030-60149-2_7"},{"key":"654_CR38","first-page":"16","volume":"1","author":"R Tahir","year":"2015","unstructured":"Tahir R, Arif F. A measurement model based on usability metrics for mobile learning user interface for children. Int J E-Learn Educ Technol Digit Media. 2015;1:16\u201331.","journal-title":"Int J E-Learn Educ Technol Digit Media"},{"key":"654_CR39","doi-asserted-by":"publisher","unstructured":"Bajenaru L, Marinescu IA, Dobre C, Prada GI, Constantinou CS. Towards the development of a personalized healthcare solution for elderly: from user needs to system specifications. In: Proceedings of the 2020 12th international conference on electronics, computers and artificial intelligence (ECAI). IEEE; 2020. p. 1\u20136. https:\/\/doi.org\/10.1109\/ECAI50035.2020.9223254.","DOI":"10.1109\/ECAI50035.2020.9223254"},{"key":"654_CR40","unstructured":"Besharati M, Izadi M. Deciding About semantic complexity of text by DAST model. arXiv:1908.09080. 2019."},{"key":"654_CR41","doi-asserted-by":"publisher","unstructured":"Jacobvitz AN, Hilton AD, Sorin DJ. Multi-program benchmark definition. In: 2015 IEEE international symposium on performance analysis of systems and software (ISPASS); 2015. p. 72\u201382. https:\/\/doi.org\/10.1109\/ISPASS.2015.7095786.","DOI":"10.1109\/ISPASS.2015.7095786"},{"key":"654_CR42","first-page":"239","volume":"7","author":"TVVV Prasad","year":"2017","unstructured":"Prasad TVVV, Korrapati RB. Computerized applications of natural language processing in digital economy: a review. Int J Eng Manag Res. 2017;7:239\u201341.","journal-title":"Int J Eng Manag Res"},{"key":"654_CR43","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.compag.2011.05.009","volume":"78","author":"E Nash","year":"2011","unstructured":"Nash E, Wiebensohn J, Nikkil\u00e4 R, Vatsanidou A, Fountas S, Bill R. Towards automated compliance checking based on a formal representation of agricultural production standards. Comput Electron Agric. 2011;78:28\u201337. https:\/\/doi.org\/10.1016\/j.compag.2011.05.009.","journal-title":"Comput Electron Agric"},{"key":"654_CR44","doi-asserted-by":"publisher","unstructured":"Maxwell JC, Ant\u00f3n AI. Developing production rule models to aid in acquiring requirements from legal texts. In: Proceedings of the 2009 17th IEEE international requirements engineering conference; 2009. p. 101\u201310. https:\/\/doi.org\/10.1109\/RE.2009.21.","DOI":"10.1109\/RE.2009.21"},{"key":"654_CR45","volume-title":"Nomos 3: legal compliance of software requirements","author":"S Ingolfo","year":"2015","unstructured":"Ingolfo S. Nomos 3: legal compliance of software requirements. Trento: University of Trento; 2015."},{"key":"654_CR46","volume-title":"Towards controlling software architecture erosion through runtime conformance monitoring","author":"LR De Silva","year":"2014","unstructured":"De Silva LR. Towards controlling software architecture erosion through runtime conformance monitoring. St Andrews: University of St Andrews; 2014."},{"key":"654_CR47","unstructured":"Moaven S, Ahmadi H, Habibi J, Kamandi A. Decision support system environment for software architecture style selection (DESAS v1. 0). In: SEKE09; 2009. p. 147\u201351."},{"key":"654_CR48","doi-asserted-by":"publisher","unstructured":"Nawaz F, Mohsin A, Fatima S, Janjua NK. Rule-based multi-criteria framework for SaaS application architecture selection. In: IFIP international conference on artificial intelligence in theory and practice; 2015. p. 129\u201338. https:\/\/doi.org\/10.1007\/978-3-319-25261-2_12.","DOI":"10.1007\/978-3-319-25261-2_12"},{"key":"654_CR49","doi-asserted-by":"publisher","unstructured":"Alebrahim A, Fassbender S, Filipczyk M, Goedicke M, Heisel M. Towards systematic selection of architectural patterns with respect to quality requirements. In: The ACM international conference proceeding series; 2015. p. 1\u201320. https:\/\/doi.org\/10.1145\/2855321.2855362.","DOI":"10.1145\/2855321.2855362"},{"key":"654_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.10.003","volume":"58","author":"M del Mar Rold\u00e1n-Garc\u00eda","year":"2019","unstructured":"del Mar Rold\u00e1n-Garc\u00eda M, Garc\u00eda-Nieto J, Mat\u00e9 A, Trujillo J, Aldana-Montes JF. Ontology-driven approach for KPI meta-modelling, selection and reasoning. Int J Inf Manag. 2019;58: 102018. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.10.003.","journal-title":"Int J Inf Manag"},{"key":"654_CR51","doi-asserted-by":"publisher","unstructured":"Preidel C, Borrmann A. Refinement of the visual code checking language for an automated checking of building information models regarding applicable regulations. In: Congress on computing in civil engineering, proceedings; 2017. p. 157\u2013165. https:\/\/doi.org\/10.1061\/9780784480823.020.","DOI":"10.1061\/9780784480823.020"},{"key":"654_CR52","doi-asserted-by":"publisher","unstructured":"Kokash N, Arbab F. Formal behavioral modeling and compliance analysis for service-oriented systems. In: Lecture notes in computer science. (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics); 2009. p. 21\u201341. https:\/\/doi.org\/10.1007\/978-3-642-04167-9_2.","DOI":"10.1007\/978-3-642-04167-9_2"},{"key":"654_CR53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981789","author":"A Nowroozi","year":"2020","unstructured":"Nowroozi A, Teymoori P, Ramezanifarkhani T, Besharati MR, Izadi M. A crisis situations decision-making systems software development process with rescue experiences. IEEE Access. 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.2981789.","journal-title":"IEEE Access"},{"key":"654_CR54","doi-asserted-by":"publisher","unstructured":"Kokaly S, Salay R, Sabetzadeh M, Chechik M, Maibaum T. Model management for regulatory compliance: a position paper. In: 2016 IEEE\/ACM 8th international workshop on modeling in software engineering (MiSE) 2016. ACM; 2016. p. 74\u201380. https:\/\/doi.org\/10.1145\/2896982.2896985.","DOI":"10.1145\/2896982.2896985"},{"key":"654_CR55","volume-title":"Requirements engineering: from system goals to UML models to software","author":"A Van Lamsweerde","year":"2009","unstructured":"Van Lamsweerde A. Requirements engineering: from system goals to UML models to software. Chichester: Wiley; 2009."},{"key":"654_CR56","unstructured":"Kelly T, Weaver R. The goal structuring notation\u2014a safety argument notation. In: Proceedings of the dependable systems and networks 2004 workshop on assurance cases; 2004. p. 6."},{"key":"654_CR57","doi-asserted-by":"publisher","unstructured":"Dardar R, Gallina B, Johnsen A, Lundqvist K, Nyberg M. Industrial experiences of building a safety case in compliance with ISO 26262. In: Proceedings of the 2012 IEEE 23rd international symposium on software reliability engineering workshops, ISSREW 2012; 2012. https:\/\/doi.org\/10.1109\/ISSREW.2012.86.","DOI":"10.1109\/ISSREW.2012.86"},{"key":"654_CR58","volume-title":"Arguing safety: a systematic approach to managing safety cases","author":"TP Kelly","year":"1999","unstructured":"Kelly TP. Arguing safety: a systematic approach to managing safety cases. York: University of York; 1999."},{"key":"654_CR59","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.autcon.2016.08.027","volume":"73","author":"J Zhang","year":"2017","unstructured":"Zhang J, El-Gohary NM. Integrating semantic NLP and logic reasoning into a unified system for fully-automated code checking. Autom Constr. 2017;73:45\u201357. https:\/\/doi.org\/10.1016\/j.autcon.2016.08.027.","journal-title":"Autom Constr"},{"key":"654_CR60","doi-asserted-by":"publisher","unstructured":"Siena A, Perini A, Susi A, Mylopoulos J. A meta-model for modelling law-compliant requirements. In: 2009 second international workshop on requirements engineering and law, RELAW 2009. IEEE; 2009. p. 45\u201351. https:\/\/doi.org\/10.1109\/RELAW.2009.1.","DOI":"10.1109\/RELAW.2009.1"},{"key":"654_CR61","unstructured":"Stratigaki C, Loucopoulos P, Nikolaidou M. Designing a meta model as the foundation for compliance capability. In: 1st international workshop on capabilitry-oriented business informatics organized in conjunction with the 16th IEEE conference on business informatics; 2014."},{"key":"654_CR62","doi-asserted-by":"publisher","unstructured":"Papazoglou MP. Making business processes compliant to standards & regulations. In: Proceedings of the IEEE 15th international enterprise distributed object computing conference, EDOC; 2011. p. 3\u201313. https:\/\/doi.org\/10.1109\/EDOC.2011.37.","DOI":"10.1109\/EDOC.2011.37"},{"key":"654_CR63","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/40.45825","volume":"9","author":"WJ Price","year":"1989","unstructured":"Price WJ. A benchmark tutorial. IEEE Micro. 1989;9:28\u201343. https:\/\/doi.org\/10.1109\/40.45825.","journal-title":"IEEE Micro"},{"key":"654_CR64","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1145\/2209249.2209271","volume":"55","author":"D Patterson","year":"2012","unstructured":"Patterson D. For better or worse, benchmarks shape a field: technical perspective. Commun ACM. 2012;55:104\u2013104.","journal-title":"Commun ACM"},{"key":"654_CR65","doi-asserted-by":"publisher","unstructured":"Almeida R, Vieira M. Benchmarking the resilience of self-adaptive software systems: perspectives and challenges. In: Proceedings of the 6th international symposium on software engineering for adaptive and self-managing systems; 2011. p. 190\u20135. https:\/\/doi.org\/10.1145\/1988008.1988035.","DOI":"10.1145\/1988008.1988035"},{"key":"654_CR66","volume-title":"Readings & cases in information security: law & ethics","author":"M Whitman","year":"2010","unstructured":"Whitman M, Mattord H. Readings & cases in information security: law & ethics. Boston: Nelson Education; 2010."},{"key":"654_CR67","doi-asserted-by":"publisher","DOI":"10.1002\/9780470370506","volume-title":"Dependability benchmarking for computer systems","author":"K Kanoun","year":"2008","unstructured":"Kanoun K, Spainhower L. Dependability benchmarking for computer systems. Hoboken: Wiley-IEEE Computer Society Press; 2008."},{"key":"654_CR68","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1016\/j.adhoc.2011.03.010","volume":"9","author":"J Friginal","year":"2011","unstructured":"Friginal J, De Andr\u00e9s D, Ruiz JC, Gil P. Towards benchmarking routing protocols in wireless mesh networks. Ad Hoc Netw. 2011;9:1374\u201388. https:\/\/doi.org\/10.1016\/j.adhoc.2011.03.010.","journal-title":"Ad Hoc Netw"},{"key":"654_CR69","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1109\/TSE.2015.2454513","volume":"41","author":"C Le Goues","year":"2015","unstructured":"Le Goues C, Holtschulte N, Smith EK, Brun Y, Devanbu P, Forrest S, Weimer W. The ManyBugs and IntroClass benchmarks for automated repair of C programs. IEEE Trans Softw Eng. 2015;41:1236\u201356. https:\/\/doi.org\/10.1109\/TSE.2015.2454513.","journal-title":"IEEE Trans Softw Eng"},{"key":"654_CR70","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/2.675631","volume":"31","author":"WF Tichy","year":"1998","unstructured":"Tichy WF. Should computer scientists experiment more? Computer. 1998;31:32\u201340. https:\/\/doi.org\/10.1109\/2.675631.","journal-title":"Computer"},{"key":"654_CR71","doi-asserted-by":"crossref","unstructured":"Friginal J, de Andr\u00e9s D, Ruiz JC, Moraes R. Using dependability benchmarks to support ISO\/IEC SQuaRE. In: 2011 IEEE 17th Pacific rim international symposium on dependable computing; 2011.","DOI":"10.1109\/PRDC.2011.13"},{"key":"654_CR72","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s10009-016-0419-0","volume":"19","author":"CA Furia","year":"2017","unstructured":"Furia CA, Nordio M, Polikarpova N, Tschannen J. AutoProof: auto-active functional verification of object-oriented programs. Int J Softw Tools Technol Transf. 2017;19:697\u2013716. https:\/\/doi.org\/10.1007\/s10009-016-0419-0.","journal-title":"Int J Softw Tools Technol Transf"},{"key":"654_CR73","volume-title":"Stream processing systems benchmark: StreamBench","author":"Y Wang","year":"2016","unstructured":"Wang Y. Stream processing systems benchmark: StreamBench. Espoo: Aalto University; 2016."},{"key":"654_CR74","doi-asserted-by":"publisher","unstructured":"Weide BW, Sitaraman M, Harton HK, Adcock B, Bucci P, Bronish D, Heym WD, Kirschenbaum J, Frazier D. Incremental benchmarks for software verification tools and techniques. In: Working conference on verified software: theories, tools, and experiments. (Lecture notes in computer science); 2008. p. 84\u201398. https:\/\/doi.org\/10.1007\/978-3-540-87873-5-10.","DOI":"10.1007\/978-3-540-87873-5-10"},{"key":"654_CR75","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s10898-017-0517-x","volume":"69","author":"S Sattari","year":"2017","unstructured":"Sattari S, Izadi M. An exact algorithm for the minimum dilation triangulation problem. J Glob Optim. 2017;69:343\u201367. https:\/\/doi.org\/10.1007\/s10898-017-0517-x.","journal-title":"J Glob Optim"},{"key":"654_CR76","first-page":"1772","volume-title":"Encyclopedia of information science and technology","author":"J Darmont","year":"2018","unstructured":"Darmont J. Data-centric benchmarking. In: Encyclopedia of information science and technology. Hershey: IGI Global; 2018. p. 1772\u201382."},{"key":"654_CR77","doi-asserted-by":"publisher","first-page":"84","DOI":"10.4018\/jisp.2009040106","volume":"3","author":"K Arnett","year":"2009","unstructured":"Arnett K, Templeton G, Vance D. Information security by words alone: the case for strong security policies. Int J Inf Secur Priv. 2009;3:84\u20139.","journal-title":"Int J Inf Secur Priv"},{"key":"654_CR78","first-page":"36","volume":"18","author":"EO Joslin","year":"1969","unstructured":"Joslin EO. Describing workload for acquiring ADP equipment and software. Comput Autom. 1969;18:36.","journal-title":"Comput Autom"},{"key":"654_CR79","first-page":"22","volume":"15","author":"EO Joslin","year":"1966","unstructured":"Joslin EO, Aiken JJ. The validity of basing computer selections on benchmark results. Comput Autom. 1966;15:22\u20133.","journal-title":"Comput Autom"},{"key":"654_CR80","first-page":"16","volume":"15","author":"JR Hillegass","year":"1966","unstructured":"Hillegass JR. Standardized benchmark problems measure computer performance. Comput Autom. 1966;15:16\u20139.","journal-title":"Comput Autom"},{"key":"654_CR81","doi-asserted-by":"crossref","unstructured":"Joslin EO, Chairman-Hitti RF. Evaluation and performance of computers: application benchmarks: the key to meaningful computer evaluations. In: Proceedings of the 1965 20th national conference. ACM; 1965. p. 27\u201337.","DOI":"10.1145\/800197.806031"},{"key":"654_CR82","unstructured":"Yeh J. A report on computer performance evaluation techniques; 1970."},{"key":"654_CR83","doi-asserted-by":"publisher","unstructured":"Camp RC. Benchmarking: the search for industry best practices that lead to superior performance. In: Benchmarking Search Ind. Best Pract. That Lead to Super. Perform. ASQC\/Quality Resources; 1989. https:\/\/doi.org\/10.5860\/choice.27-2173.","DOI":"10.5860\/choice.27-2173"},{"key":"654_CR84","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1108\/eb054394","volume":"21","author":"LS Pryor","year":"1993","unstructured":"Pryor LS, Katz SJ. How benchmarking goes wrong. Plan Rev. 1993;21:6\u201353.","journal-title":"Plan Rev"},{"key":"654_CR85","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3043-8","volume-title":"Information theory and best practices in the IT industry","author":"S Mohapatra","year":"2012","unstructured":"Mohapatra S. Information theory and best practices in the IT industry. New York: Springer Science & Business Media; 2012. https:\/\/doi.org\/10.1007\/978-1-4614-3043-8."},{"key":"654_CR86","volume-title":"Academic excellence centre for learning and development","author":"R Scott","year":"2011","unstructured":"Scott R. Benchmarking: a literature review. In: Academic excellence centre for learning and development. Joondalup: Edith Cowan University; 2011."},{"key":"654_CR87","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1108\/BIJ-10-2015-0093","volume":"24","author":"YA Adewunmi","year":"2017","unstructured":"Adewunmi YA, Iyagba R, Omirin M. Multi-sector framework for benchmarking in facilities management. Benchmarking. 2017;24:826\u201356. https:\/\/doi.org\/10.1108\/BIJ-10-2015-0093.","journal-title":"Benchmarking"},{"key":"654_CR88","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Commun ACM. 2010;53:50\u20138. https:\/\/doi.org\/10.1145\/1721654.1721672.","journal-title":"Commun ACM"},{"key":"654_CR89","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/2192-113X-2-6","volume":"2","author":"L Gillam","year":"2013","unstructured":"Gillam L, Li B, O\u2019Loughlin J, Tomar APS. Fair benchmarking for cloud computing systems. J Cloud Comput. 2013;2:6. https:\/\/doi.org\/10.1186\/2192-113X-2-6.","journal-title":"J Cloud Comput"},{"key":"654_CR90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44152-7","volume-title":"Handbook of human resources management","author":"M Zeuch","year":"2016","unstructured":"Zeuch M. Handbook of human resources management. Berlin: Springer; 2016. https:\/\/doi.org\/10.1007\/978-3-662-44152-7."},{"key":"654_CR91","doi-asserted-by":"publisher","unstructured":"Sim SE, Easterbrook S, Holt RC. Using benchmarking to advance research: a challenge to software engineering. In: Proceedings of the 25th international conference on software engineering; 2003. https:\/\/doi.org\/10.1109\/icse.2003.1201189.","DOI":"10.1109\/icse.2003.1201189"},{"key":"654_CR92","doi-asserted-by":"crossref","unstructured":"Zhioua Z, Roudier Y, Ameur-Boulifa R, Kechiche T, Short S. Tracking dependent information flows. In: ICISSP; 2017. p. 179\u201389.","DOI":"10.5220\/0006209301790189"},{"key":"654_CR93","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/TSC.2014.2310221","volume":"8","author":"N Antunes","year":"2015","unstructured":"Antunes N, Vieira M. Assessing and comparing vulnerability detection tools for web services: benchmarking approach and examples. IEEE Trans Serv Comput. 2015;8:269\u201383. https:\/\/doi.org\/10.1109\/TSC.2014.2310221.","journal-title":"IEEE Trans Serv Comput"},{"key":"654_CR94","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1007\/s10515-016-0202-1","volume":"24","author":"M Landh\u00e4u\u00dfer","year":"2017","unstructured":"Landh\u00e4u\u00dfer M, Weigelt S, Tichy WF. NLCI: a natural language command interpreter. Autom Softw Eng. 2017;24:839\u201361. https:\/\/doi.org\/10.1007\/s10515-016-0202-1.","journal-title":"Autom Softw Eng"},{"key":"654_CR95","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1006\/ijhc.1995.1066","volume":"43","author":"N Guarino","year":"1995","unstructured":"Guarino N. Formal ontology, conceptual analysis and knowledge representation. Int J Hum Comput Stud. 1995;43:625\u201340. https:\/\/doi.org\/10.1006\/ijhc.1995.1066.","journal-title":"Int J Hum Comput Stud"},{"key":"654_CR96","volume-title":"Artificial intelligence a modern approach","author":"S Russell","year":"2016","unstructured":"Russell S, Norvig P. Artificial intelligence a modern approach. 3rd ed. Hoboken: Pearson Education, Inc.; 2016.","edition":"3"},{"key":"654_CR97","unstructured":"Giblin C, Liu AY, M\u00fcller S, Pfitzmann B, Zhou X. Regulations expressed as logical models (REALM). JURIX. 2005;37\u201348."},{"key":"654_CR98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66655-6","volume-title":"Modeling with rules using semantic knowledge engineering","author":"GJ Nalepa","year":"2018","unstructured":"Nalepa GJ. Modeling with rules using semantic knowledge engineering. Berlin: Springer; 2018."},{"key":"654_CR99","doi-asserted-by":"publisher","unstructured":"Yip F, Wong AKY, Parameswaran N, Ray P. Towards robust and adaptive semantic-based compliance auditing. In: Proceedings of the 2007 eleventh international IEEE EDOC conference workshop. IEEE; 2007. p. 181\u20138. https:\/\/doi.org\/10.1109\/EDOCW.2007.33.","DOI":"10.1109\/EDOCW.2007.33"},{"key":"654_CR100","volume-title":"Domain-specific languages","author":"M Fowler","year":"2010","unstructured":"Fowler M. Domain-specific languages. London: Pearson Education; 2010."},{"key":"654_CR101","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1016\/j.autcon.2009.07.002","volume":"18","author":"C Eastman","year":"2009","unstructured":"Eastman C, Lee JM, Jeong YS, Lee JK. Automatic rule-based checking of building designs. Autom Constr. 2009;18:1011\u201333. https:\/\/doi.org\/10.1016\/j.autcon.2009.07.002.","journal-title":"Autom Constr"},{"key":"654_CR102","doi-asserted-by":"publisher","unstructured":"Ismail AS, Ali KN, Iahad NA. A review on BIM-based automated code compliance checking system. In: 2017 international conference on research and innovation in information systems (ICRIIS). IEEE; 2017. p. 1\u20136. https:\/\/doi.org\/10.1109\/ICRIIS.2017.8002486.","DOI":"10.1109\/ICRIIS.2017.8002486"},{"key":"654_CR103","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1142\/S0218843012400023","volume":"21","author":"A Elgammal","year":"2012","unstructured":"Elgammal A, Turetken O, Van Den Heuvel WJ. Using patterns for the analysis and resolution of compliance violations. Int J Coop Inf Syst. 2012;21:31\u201354. https:\/\/doi.org\/10.1142\/S0218843012400023.","journal-title":"Int J Coop Inf Syst"},{"key":"654_CR104","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1108\/13673270110384419","volume":"5","author":"GD Bhatt","year":"2001","unstructured":"Bhatt GD. Knowledge management in organizations: examining the interaction between technologies, techniques, and people. J Knowl Manag. 2001;5:68\u201375. https:\/\/doi.org\/10.1108\/13673270110384419.","journal-title":"J Knowl Manag"},{"key":"654_CR105","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1080\/0968776940020107","volume":"2","author":"DH Jonassen","year":"1994","unstructured":"Jonassen DH, Marra RM. Concept mapping and other formalisms as mindtools for representing knowledge. ALT-J. 1994;2:50\u20136. https:\/\/doi.org\/10.1080\/0968776940020107.","journal-title":"ALT-J"},{"key":"654_CR106","doi-asserted-by":"publisher","DOI":"10.4324\/9781315555140","volume-title":"The new natural resource: knowledge development, society and economics","author":"HCG Johnsen","year":"2016","unstructured":"Johnsen HCG. The new natural resource: knowledge development, society and economics. London: Routledge; 2016."},{"key":"654_CR107","first-page":"99","volume-title":"Schooling and the acquisition of knowledge","author":"A Ortony","year":"1977","unstructured":"Ortony A. The representation of knowledge in memory. In: Montague WE, Anderson RC, Spiro RJ, editors. Schooling and the acquisition of knowledge. Hillsdale: Lawrence Erlbaum Associates; 1977. p. 99\u2013135."},{"key":"654_CR108","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-63577-7_43","volume-title":"Algorithmic learning theory","author":"M Sato","year":"1997","unstructured":"Sato M. Classical Brouwer\u2013Heyting\u2013Kolmogorov interpretation. In: Algorithmic learning theory. Berlin: Springer; 1997. p. 176\u201396."},{"key":"654_CR109","unstructured":"Basili VR, Caldiera G, Rombach HD. The goal question metric approach. Encycl Softw Eng. 1994;528\u2013532."},{"key":"654_CR110","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9617-6","author":"H Hu","year":"2019","unstructured":"Hu H, Wang S, Bezemer CP, Hassan AE. Studying the consistency of star ratings and reviews of popular free hybrid Android and iOS apps. Empir Softw Eng. 2019. https:\/\/doi.org\/10.1007\/s10664-018-9617-6.","journal-title":"Empir Softw Eng"},{"key":"654_CR111","doi-asserted-by":"publisher","unstructured":"Arianto R, Gaol FL, Abdurachman E, Heryadi Y, Warnars HL, Soewito B, Perez-Sanchez H. Quality measurement of android messaging application based on user experience in microblog. In: Proceedings of the 2017 international conference on applied computer and communication technologies (ComCom) 2017. IEEE; 2017. p. 1\u20135. https:\/\/doi.org\/10.1109\/COMCOM.2017.8167099.","DOI":"10.1109\/COMCOM.2017.8167099"},{"key":"654_CR112","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.chb.2016.11.061","volume":"68","author":"CH Lien","year":"2017","unstructured":"Lien CH, Cao Y, Zhou X. Service quality, satisfaction, stickiness, and usage intentions: an exploratory evaluation in the context of WeChat services. Comput Human Behav. 2017;68:403\u201310. https:\/\/doi.org\/10.1016\/j.chb.2016.11.061.","journal-title":"Comput Human Behav"},{"key":"654_CR113","volume-title":"Studying the perceived quality consistency of cross-platform mobile apps","author":"H Hu","year":"2017","unstructured":"Hu H. Studying the perceived quality consistency of cross-platform mobile apps. Kingston: Queen\u2019s University; 2017."},{"key":"654_CR114","volume-title":"Quantifying chatbot performance by using data analytics","author":"CM Jongerius","year":"2018","unstructured":"Jongerius CM. Quantifying chatbot performance by using data analytics. Utrecht: Utrecht University; 2018."},{"key":"654_CR115","doi-asserted-by":"publisher","unstructured":"Vaziripour E, Farahbakhsh R, O\u2019Neill M, Wu J, Seamons K, Zappala D. A survey of the privacy preferences and practices of Iranian users of telegram. In: Workshop on usable security; 2018. https:\/\/doi.org\/10.14722\/usec.2018.23033.","DOI":"10.14722\/usec.2018.23033"},{"key":"654_CR116","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s13278-019-0575-9","volume":"9","author":"A Hashemi","year":"2019","unstructured":"Hashemi A, Zare Chahooki MA. Telegram group quality measurement by user behavior analysis. Soc Netw Anal Min. 2019;9:33. https:\/\/doi.org\/10.1007\/s13278-019-0575-9.","journal-title":"Soc Netw Anal Min"},{"key":"654_CR117","first-page":"7","volume":"13","author":"H Kermani","year":"2018","unstructured":"Kermani H, Mozaffari A. The study of Iranian users\u2019 reasons in preferring Telegram on other instant messaging applications. MEDIA Stud. 2018;13:7\u201320.","journal-title":"MEDIA Stud"},{"key":"654_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/j.jairtraman.2020.101817","volume":"86","author":"G B\u00fcy\u00fck\u00f6zkan","year":"2020","unstructured":"B\u00fcy\u00fck\u00f6zkan G, Havle CA, Feyzio\u011flu O. A new digital service quality model and its strategic analysis in aviation industry using interval-valued intuitionistic fuzzy AHP. J Air Transp Manag. 2020;86: 101817. https:\/\/doi.org\/10.1016\/j.jairtraman.2020.101817.","journal-title":"J Air Transp Manag"},{"key":"654_CR119","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s00500-019-03923-6","volume":"24","author":"C Yue","year":"2020","unstructured":"Yue C. An intuitionistic fuzzy projection-based approach and application to software quality evaluation. Soft Comput. 2020;24:429\u201343.","journal-title":"Soft Comput"},{"key":"654_CR120","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/JIFS-191153","volume":"38","author":"M Khan","year":"2020","unstructured":"Khan M, Ansari MD. Multi-criteria software quality model selection based on divergence measure and score function. J Intell Fuzzy Syst. 2020;38:1\u201310. https:\/\/doi.org\/10.3233\/JIFS-191153.","journal-title":"J Intell Fuzzy Syst"},{"key":"654_CR121","doi-asserted-by":"publisher","unstructured":"Schneider Y, Busch A, Koziolek A. Using informal knowledge for improving software quality trade-off decisions. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer; 2018. p. 265\u2013283. https:\/\/doi.org\/10.1007\/978-3-030-00761-4_18.","DOI":"10.1007\/978-3-030-00761-4_18"},{"key":"654_CR122","doi-asserted-by":"publisher","unstructured":"Perry DE, Sim SE, Easterbrook SM. Case studies for software engineers. In: Proceedings of the 28th international conference on software engineering; 2006. p. 1045\u20136. https:\/\/doi.org\/10.1109\/icse.2004.1317512.","DOI":"10.1109\/icse.2004.1317512"},{"key":"654_CR123","doi-asserted-by":"publisher","DOI":"10.17632\/d89gphmnsk.3","author":"MR Besharati","year":"2020","unstructured":"Besharati MR, Izadi M. IR-QUMA. 2020. Mendeley Data. https:\/\/doi.org\/10.17632\/d89gphmnsk.3."},{"key":"654_CR124","first-page":"1","volume":"140","author":"R Likert","year":"1932","unstructured":"Likert R. A technique for the measurement of attitudes. Arch Psychol. 1932;140:1\u201355.","journal-title":"Arch Psychol."},{"key":"654_CR125","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.jss.2015.05.008","volume":"107","author":"L Gren","year":"2015","unstructured":"Gren L, Torkar R, Feldt R. The prospects of a quantitative measurement of agility: a validation study on an agile maturity model. J Syst Softw. 2015;107:38\u201349. https:\/\/doi.org\/10.1016\/j.jss.2015.05.008.","journal-title":"J Syst Softw"},{"key":"654_CR126","volume-title":"Model checking of component connectors","author":"M Izadi","year":"2011","unstructured":"Izadi M. Model checking of component connectors. Leiden: Leiden University; 2011."}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-022-00654-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-022-00654-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-022-00654-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T15:04:06Z","timestamp":1667315046000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-022-00654-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":126,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["654"],"URL":"https:\/\/doi.org\/10.1186\/s40537-022-00654-8","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"assertion":[{"value":"25 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Consents to participate were obtained.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"There is no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"103"}}