{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:42:29Z","timestamp":1730295749677,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/sera.2006.16","type":"proceedings-article","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:01:13Z","timestamp":1158930073000},"page":"22-30","source":"Crossref","is-referenced-by-count":4,"title":["Applying a Goal-Oriented Method for Hazard Analysis: A Case Study"],"prefix":"10.1109","author":[{"given":"S.","family":"Supakkul","sequence":"first","affiliation":[]},{"family":"Lawrence Chung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2005.19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"journal-title":"Secrets & Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/291469.293165"},{"key":"16","article-title":"Development of hazard analysis techniques for human-computer systems","author":"neal","year":"2003","journal-title":"Innovation Consolidation in Aviation"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/32.142871"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232791"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"3","article-title":"Using security patterns to model and analyze security requirements","author":"cheng","year":"2003","journal-title":"Proc Requirements for High Assurance Systems Workshop (RHAS 03)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2000.870392"},{"key":"2","article-title":"Software Risk Management","author":"boehm","year":"1989","journal-title":"IEEE Computer Society Press"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/7474.7528"},{"key":"7","article-title":"Background to qualitative decision theory","volume":"20","author":"doyle","year":"1999","journal-title":"AI Magazine"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048527"},{"key":"5","article-title":"Representing NFRs and FRs: A goal-oriented and use case driven approach","volume":"3647","author":"chung","year":"2005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7"},{"journal-title":"The Unified Software Development Process","year":"1999","author":"jacobson","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200016"}],"event":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","start":{"date-parts":[[2006,8,9]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2006,8,11]]}},"container-title":["Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11135\/35650\/01691357.pdf?arnumber=1691357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T13:38:52Z","timestamp":1489585132000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1691357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/sera.2006.16","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}