{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:57:42Z","timestamp":1725487062082},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374210"},{"type":"electronic","value":"9783642374227"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37422-7_18","type":"book-chapter","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T00:31:51Z","timestamp":1364171511000},"page":"253-268","source":"Crossref","is-referenced-by-count":3,"title":["Risk Identification at the Interface between Business Case and Requirements"],"prefix":"10.1007","author":[{"given":"David","family":"Callele","sequence":"first","affiliation":[]},{"given":"Birgit","family":"Penzenstadler","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Wnuk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"de Marco, T.: All late projects are the same. IEEE Software, 102\u2013103 (2012)"},{"key":"18_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/638750.638776","volume":"28","author":"B. Boehm","year":"2003","unstructured":"Boehm, B.: Value-based software engineering. ACM Software Engineering Notes\u00a028, 1\u201312 (2003)","journal-title":"ACM Software Engineering Notes"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-73031-6_8","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"A. Aurum","year":"2007","unstructured":"Aurum, A., Wohlin, C.: A value-based approach in requirements engineering: Explaining some of the fundamental concepts. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol.\u00a04542, pp. 109\u2013115. Springer, Heidelberg (2007)"},{"key":"18_CR4","unstructured":"Hughes, B., Cotterell, M.: Software Project Management. McGraw-Hill (2009)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Weinstein, L., Adam, J.A.: Guesstimation: Solving the World\u2019s Problems on the Back of a Cocktail Napkin. Princeton University Press (2008)","DOI":"10.1515\/9781400824441"},{"key":"18_CR6","unstructured":"Bubenko, J.: Challenges in requirements engineering. In: Proc. Second IEEE Int. Symposium on Requirements Engineering, pp. 160\u2013165. IEEE Press (1995)"},{"key":"18_CR7","unstructured":"WebFinance, Inc.: Definition by Business Dictionary: Business Case (2012) \n \n http:\/\/www.businessdictionary.com\/definition\/business-case.html"},{"key":"18_CR8","unstructured":"Atle Gulla, J., Brasethvik, T.: On the challenges of business modeling in large-scale reengineering projects. In: Proceedings of the 4th International Conference on Requirements Engineering, pp. 17\u201326 (2000)"},{"key":"18_CR9","unstructured":"Farbey, B., Finkelstein, A.: Software acquisition: a business strategy analysis. In: Proceedings of the Fifth IEEE International Symposium on Requirements Engineering, pp. 76\u201383 (2001)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Arao, T., Goto, E., Nagata, T.: \u201dbusiness process\u201d oriented requirements engineering process. In: Proceedings of the 13th IEEE International Conference on Requirements Engineering, pp. 395\u2013399 (2005)","DOI":"10.1109\/RE.2005.1"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Lehtola, L., Kauppinen, M., Kujala, S.: Linking the business view to requirements engineering: long-term product planning by roadmapping. In: Proceedings of the 13th IEEE Int. Conference on Requirements Engineering, pp. 439\u2013443 (2005)","DOI":"10.1109\/RE.2005.36"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Monteiro, M., Ebert, C., Recknagel, M.: Improving the exchange of requirements and specifications between business partners. In: 17th IEEE International Conference on Requirements Engineering, RE 2009, pp. 253\u2013260 (2009)","DOI":"10.1109\/RE.2009.7"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Gordijn, J., Petit, M., Wieringa, R.: Understanding business strategies of networked value constellations using goal- and value modeling. In: 14th IEEE International Conference on Requirements Engineering, pp. 129\u2013138 (2006)","DOI":"10.1109\/RE.2006.69"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Wegmann, A., Julia, P., Regev, G., Perroud, O., Rychkova, I.: Early requirements and business-it alignment with seam for business. In: 15th IEEE International Conference on Requirements Engineering, RE 2007, pp. 111\u2013114 (2007)","DOI":"10.1109\/RE.2007.12"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Karagiannis, D., Mylopoulos, J., Schwab, M.: Business process-based regulation compliance: The case of the sarbanes-oxley act. In: 15th IEEE International Conference on Requirements Engineering, RE 2007, pp. 315\u2013321 (2007)","DOI":"10.1109\/RE.2007.15"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Wever, A., Maiden, N.: What are the day-to-day factors that are preventing business analysts from effective business analysis? In: 2011 19th IEEE International Requirements Engineering Conference (RE), pp. 293\u2013298 (2011)","DOI":"10.1109\/RE.2011.6051624"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1057\/palgrave.ejis.3000253","volume":"6","author":"J. Ropponen","year":"1997","unstructured":"Ropponen, J., Lyytinen, K.: Can software risk management improve system development: an exploratory study. European Journal of Information Systems\u00a06, 41\u201350 (1997)","journal-title":"European Journal of Information Systems"},{"key":"18_CR18","first-page":"257","volume-title":"Oxford surveys in information technology","author":"K. Lyytinen","year":"1987","unstructured":"Lyytinen, K., Hirschheim, R.: Oxford surveys in information technology, pp. 257\u2013309. Oxford University Press, Inc., New York (1987)"},{"key":"18_CR19","first-page":"53","volume":"8","author":"K. Lyytinen","year":"1996","unstructured":"Lyytinen, K., Mathiassen, L., Ropponen, J.: A framework for software risk management. Scandinavian Journal of Information Systems\u00a08, 53\u201368 (1996)","journal-title":"Scandinavian Journal of Information Systems"},{"key":"18_CR20","unstructured":"Palmer, J., Evans, R.: Software risk management: requirements-based risk metrics. In: 1994 IEEE International Conference on Systems, Man, and Cybernetics, Humans, Information and Technology, vol.\u00a01, pp. 836\u2013841 (1994)"},{"key":"18_CR21","unstructured":"Yin, R.: Case study research: Design and methods. Sage Publications (2008)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Runeson, P., Host, M., Rainer, A., Regnell, B.: Case Study Research in Software Engineering: Guidelines and Examples. Wiley (2012)","DOI":"10.1002\/9781118181034"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"C. Seaman","year":"1999","unstructured":"Seaman, C.: Qualitative methods in empirical studies of software engineering. IEEE Transactions on Software Engineering\u00a025, 557\u2013572 (1999)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Robson, C.: Real World Research. Blackwell Publishing (2002)","DOI":"10.1016\/S0262-1762(02)80276-0"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10664-005-1290-x","volume":"10","author":"T. Lethbridge","year":"2005","unstructured":"Lethbridge, T., Sim, S., Singer, J.: Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering Journal\u00a010, 311\u2013341 (2005)","journal-title":"Empirical Software Engineering Journal"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Easterbrook, S.M., Singer, J., Storey, M., Damian, D.: Selecting Empirical Methods for Software Engineering Research. In: Guide to Advanced Empirical Software Engineering, pp. 285\u2013311. Springer (2007)","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"18_CR27","unstructured":"Brennan, K.: A Guide to the Business Analysis Body of Knowledge (Babok Guide). International Institute of Business Analysis (2009)"},{"key":"18_CR28","unstructured":"Project Management Institute: A Guide To The Project Management Body Of Knowledge (PMBOK Guides). Project Management Institute (2008)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37422-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T19:44:02Z","timestamp":1557603842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37422-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374210","9783642374227"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37422-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}