{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:03:31Z","timestamp":1745208211594,"version":"3.40.4"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2001]]},"DOI":"10.1109\/24.983391","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T20:14:45Z","timestamp":1030220085000},"page":"337-345","source":"Crossref","is-referenced-by-count":6,"title":["Reliability analysis of systems based on software and human resources"],"prefix":"10.1109","volume":"50","author":[{"given":"A.","family":"Pasquini","sequence":"first","affiliation":[]},{"given":"G.","family":"Pistolesi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Rizzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","first-page":"22","article-title":"Overview of a procedure for human reliability analysis","volume":"1","author":"Bell","year":"1985","journal-title":"Hazard Prevention"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/52.143100"},{"key":"ref3","first-page":"24","article-title":"Combination of predictions obtained from different software reliability growth models","volume-title":"Proc. 10th Annual Software Reliability Symp.","author":"Brocklehurst","year":"1992"},{"key":"ref4","article-title":"The model human processor. An engineering model of human performance","volume-title":"Handbook of Perception and Human Performance","author":"Card","year":"1986"},{"volume-title":"The Statistical Analysis of a Series of Events","year":"1978","author":"Cox","key":"ref5"},{"issue":"8","key":"ref6","first-page":"47","article-title":"Phobos 1 & 2 computer failures","volume":"245","author":"Hartley","year":"1989","journal-title":"Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497658"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010297"},{"key":"ref9","article-title":"Trend analysis","volume-title":"Software Reliability Engineering","author":"Kanoun","year":"1996"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"volume-title":"Safeware","year":"1995","author":"Leveson","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2346781"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/163359.163373"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CASE.1992.200165"},{"volume-title":"Knowledge and Error","year":"1967","author":"Mach","key":"ref15"},{"volume-title":"Software Reliability Models: Theoretical Developments, Evaluation, and Application","year":"1991","author":"Malaiya","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220648"},{"key":"ref18","first-page":"230","article-title":"A logarithmic Poisson execution time model for software reliability measurement","volume-title":"Proc. 7th Int. Conf. Software Eng.","author":"Musa","year":"1984"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4324\/9780203728178-6"},{"volume-title":"Things That Make Us Smart","year":"1995","author":"Norman","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/24.556576"},{"key":"ref22","article-title":"Some remarks on mental load","volume-title":"Mental Workload: Its Theory and Measurement","author":"Rasmussen","year":"1979"},{"key":"ref23","article-title":"Human factors in high risk technology","volume-title":"High Risk Safety Technology","author":"Rasmussen","year":"1982"},{"volume-title":"Information Processing and Human\u2013Machine Interaction","year":"1986","author":"Rasmussen","key":"ref24"},{"volume-title":"New Technology and Human Error","year":"1987","author":"Rasmussen","key":"ref25"},{"volume-title":"Human Error","year":"1988","author":"Reason","key":"ref26"},{"key":"ref27","first-page":"125","article-title":"Guidelines for managing human error","volume":"6","author":"Rizzo","year":"1996","journal-title":"SIGCHI Bullettin"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-70536-5.50013-0"},{"key":"ref29","first-page":"51","article-title":"Too much too soon: Information overload","author":"Smith","year":"1987","journal-title":"IEEE Spectrum"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1980.5220814"},{"key":"ref31","first-page":"416","article-title":"Problems of mingling men and machines","author":"Voysey","year":"1977","journal-title":"New Scientists"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370030103"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1801_3"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/24\/21195\/00983391.pdf?arnumber=983391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T04:27:59Z","timestamp":1745123279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/983391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/24.983391","relation":{},"ISSN":["0018-9529"],"issn-type":[{"type":"print","value":"0018-9529"}],"subject":[],"published":{"date-parts":[[2001]]}}}