{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:48:56Z","timestamp":1725997736305},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259930"},{"type":"electronic","value":"9783540292630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/3-540-29263-2_1","type":"book-chapter","created":{"date-parts":[[2006,2,19]],"date-time":"2006-02-19T18:22:56Z","timestamp":1140373376000},"page":"3-14","source":"Crossref","is-referenced-by-count":47,"title":["Value-Based Software Engineering: Overview and Agenda"],"prefix":"10.1007","author":[{"given":"Barry W.","family":"Boehm","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Boehm, B. W.: Software Engineering Economics (Prentice Hall, 1981)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Boehm, B. W.: Software Risk Management (IEEE-CS Press, 1989)","DOI":"10.1007\/3-540-51635-2_29"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Boehm, B. W. and In H.: Identifying Quality-Requirement Conflicts. IEEE Software (March 1996), pp 25\u201335","DOI":"10.1109\/52.506460"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Boehm, B. W. and Huang, L.: Value-Based Software Engineering: A Case Study. IEEE Computer (March 2003), pp 33\u201341","DOI":"10.1109\/MC.2003.1185215"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Boehm, B. W., Sullivan, K., Software Economics: A Roadmap. In: The Future of Software Economics, ed by Finkelstein, A. (ACM Press, 2000), pp 319\u2013343","DOI":"10.1145\/336512.336584"},{"key":"1_CR6","unstructured":"Bullock, J.: Calculating the Value of Testing. Software Testing and Quality Engineering (May\/June 2000), pp 56\u201362"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Butler, S.: Security Attribute Evaluation Method: A Cost-Benefit Approach. Proceedings ICSE 2002 (ACM\/IEEE, May 2002), pp 232\u2013240","DOI":"10.1145\/581339.581370"},{"key":"1_CR8","unstructured":"Charette, R.: Software Engineering Risk Analysis and Management (McGraw Hill, 1989)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering (Kluwer, 1999)","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"1_CR10","unstructured":"Clements, P., Kazman, R., Klein, M.: Evaluating Software Architecture: Methods and Case Studies (Addison Wesley, 2002)"},{"key":"1_CR11","unstructured":"Cockburn, A.: Agile Software Development (Addison Wesley, 2002)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Collins, W., Miller, K., Spielman, B., Wherry, J.: How Good is Good Enough? Communications of the ACM (January 1994), pp 81\u201391","DOI":"10.1145\/175222.175229"},{"key":"1_CR13","unstructured":"DeMarco, T., Lister, T.: Waltzing with Bears (Dorset House, 2003)"},{"key":"1_CR14","unstructured":"Denne, M., Cleland-Huang, J.: Software by Numbers (Prentice Hall, 2003)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Erdogmus, H., Favaro, J., Strigel, W. (eds.): Special Issue: Return on Investment. IEEE Software, (May\/June 2004)","DOI":"10.1109\/MS.2004.1293068"},{"key":"1_CR16","unstructured":"Erdogmus, H., Favaro, J.: Keep your Options Open: Extreme Programming and the Economics of Flexibility. In: Extreme Programming Perspectives, ed by G. Succi et al. (Addison Wesley, 2002), pp 503\u2013552"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Favaro, J.: A Comparison of Approaches to Reuse Investment Analysis. Proceedings, ICSR 4, (IEEE, 1996)","DOI":"10.1109\/ICSR.1996.496121"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Faulk, S., Harmon, D., Raffo, D.: Value-Based Software Engineering (VBSE): A Value-Driven Approach to Product-Line Engineering. Proceedings, First International Conference on Software Product Line Engineering, (August 2000)","DOI":"10.1007\/978-1-4615-4339-8_12"},{"key":"1_CR19","unstructured":"Gerrard, P., Thompson, N.: Risk-Based E-Business Testing (Artech House, 2002)"},{"issue":"3","key":"1_CR20","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s10270-003-0038-6","volume":"3","author":"P. Gr\u00fcnbacher","year":"2004","unstructured":"Gr\u00fcnbacher, P., Egyed, A. F., Medvidovic, N.: Reconciling software requirements and architectures with intermediate models. In: Software and System Modeling (SoSyM), Vol. 3, No 3, (Springer, 2004), pp 235\u2013253","journal-title":"Software and System Modeling (SoSyM)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Highsmith, J.: Agile Software Development Ecosystems (Addison Wesley, 2002)","DOI":"10.1145\/512526.512514"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Karlsson, J., Ryan, K.: A Cost-Value Approach for Prioritizing Requirements. IEEE Software (September\u2013October, 1997), pp 67\u201374","DOI":"10.1109\/52.605933"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Kazman, R., Asundi J., Klein, M.: Quantifying the Costs and Benefits of Architectural Decisions. Proceedings, ICSE, (ACM\/IEEE, 2001), pp 297\u2013306","DOI":"10.1109\/ICSE.2001.919103"},{"key":"1_CR24","unstructured":"Kleijnen, J.: Computers and Profits: Quantifying Financial Benefits of Information (Addison Wesley, 1980)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Marschak, J.: Economic Information, Decision, and Prediction (3 volumes), 1974","DOI":"10.1007\/978-94-010-9276-0_1"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Persson, C., Yilmazturk, N.: Establishment of Automated Regression Testing at ABB: Industrial Experience Report on \u2018Avoiding the Pitfalls.\u2019 Proc. ISESE 2004, IEEE, August 2004, pp 112\u2013121","DOI":"10.1109\/ASE.2004.1342729"},{"key":"1_CR27","unstructured":"Phister, M.: Data Processing Technology and Economics (Digital Press, 1979)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Rawls, J.: A Theory of Justice. (Belknap\/Harvard U. Press, 1971, 1999)","DOI":"10.4159\/9780674042605"},{"key":"1_CR29","unstructured":"Raz, O., Shaw, M.: Software Risk Management and Insurance. Proceedings, EDSER-3, IEEE-CS Press, 2001"},{"key":"1_CR30","unstructured":"Reifer, D.: Making the Software Business Case (Addison Wesley, 2002)"},{"key":"1_CR31","unstructured":"Schwaber, K., Beedle, M.: Agile Software Development with Scrum (Prentice Hall, 2002)"},{"key":"1_CR32","unstructured":"Sharpe, W.: The Economics of Computers (Columbia U. Press, 1969)"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Sullivan, K., Cai, Y., Hallen B., Griswold, W.: The Structure and Value of Modularity in Software Design. Proceedings, ESEC\/FSE, 2001, ACM Press, pp 99\u2013108","DOI":"10.1145\/503209.503224"},{"key":"1_CR34","unstructured":"Tockey, S.: Return on Software (Addison Wesley, 2004)"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"(van Solingen, 2004)_van Solingen, R.: Measuring the ROI of Software Process Improvement. IEEE Software, May\/June 2004, pp 32\u201338","DOI":"10.1109\/MS.2004.1293070"},{"key":"1_CR36","unstructured":"Webster\u2019s Collegiate Dictionary, Merriam-Webster, 2002"}],"container-title":["Value-Based Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-29263-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T10:42:39Z","timestamp":1683369759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-29263-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540259930","9783540292630"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/3-540-29263-2_1","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}