{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:14:54Z","timestamp":1732032894557},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,1,8]],"date-time":"2009-01-08T00:00:00Z","timestamp":1231372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s00766-008-0073-5","type":"journal-article","created":{"date-parts":[[2009,1,7]],"date-time":"2009-01-07T07:44:02Z","timestamp":1231314242000},"page":"47-70","source":"Crossref","is-referenced-by-count":33,"title":["Designing socio-technical systems: from stakeholder goals to social networks"],"prefix":"10.1007","volume":"14","author":[{"given":"Volha","family":"Bryl","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Giorgini","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,8]]},"reference":[{"key":"73_CR1","doi-asserted-by":"crossref","unstructured":"Albers S, Eilts S, Even-Dar E, Mansour Y, Roditty L (2006) On Nash equilibria for a network creation game. In: SODA\u201906, pp 89\u201398","DOI":"10.1145\/1109557.1109568"},{"key":"73_CR2","doi-asserted-by":"crossref","unstructured":"Anderson JS, Fickas S (1989) A proposed perspective shift: viewing specification design as a planning problem. In: IWSSD\u201989\u00a0pp 177\u2013184","DOI":"10.1145\/75199.75227"},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Anshelevich E, Dasgupta A, Tardos E, Wexler T (2003) Near-optimal network design with selfish agents. In: STOC\u201903, pp 511\u2013520","DOI":"10.1145\/780542.780617"},{"key":"73_CR4","unstructured":"Asnar Y, Bryl V, Giorgini P (2006) Using risk analysis to evaluate design alternatives. In: AOSE\u201906 post-proceedings, vol 4405. Springer, Heidelberg, pp 140\u2013155"},{"key":"73_CR5","unstructured":"Baier J, Bacchus F, McIlraith S (2007) A heuristic search approach to planning with temporally extended preferences. In: IJCAI\u201907, pp 1808\u20131815"},{"key":"73_CR6","volume-title":"Value-based software engineering","author":"S Biffl","year":"2005","unstructured":"Biffl S, Aurum A, Boehm B, Erdogmus H, Gr\u00fcnbacher P (2005) Value-based software engineering. Springer, New York"},{"issue":"3","key":"73_CR7","first-page":"203","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A (2004) Tropos: an agent-oriented software development methodology. JAAMAS 8(3):203\u2013236","journal-title":"JAAMAS"},{"key":"73_CR8","doi-asserted-by":"crossref","unstructured":"Bresciani P, Giorgini P, Mouratidis H, Manson G (2004) Multi-agent systems and security requirements analysis. In: Software engineering for multi-agent systems II, Springer, Heidelberg, pp 35\u201348","DOI":"10.1007\/978-3-540-24625-1_3"},{"key":"73_CR9","unstructured":"Bryl V, Giorgini P (2006) Self-configuring socio-technical systems: redesign at runtime. In: SOAS\u201906"},{"key":"73_CR10","doi-asserted-by":"crossref","unstructured":"Bryl V, Giorgini P, Mylopoulos J (2006) Designing cooperative IS: exploring and evaluating alternatives. In: CoopIS\u201906, pp 533\u2013550","DOI":"10.1007\/11914853_32"},{"key":"73_CR11","unstructured":"Bryl V, Giorgini P, Mylopoulos J (2007) Supporting requirements analysis in Tropos: a planning-based approach. In: PRIMA\u201907"},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Bryl V, Massacci F, Mylopoulos J, Zannone N (2006) Designing security requirements models through planning. In: CAiSE\u201906, pp 33\u201347","DOI":"10.1007\/11767138_4"},{"key":"73_CR13","unstructured":"Castillo L, Fdez-Olivares J, Gonzalez A (2003) Integrating hierarchical and conditional planning techniques into a software design process for automated manufacturing. In: ICAPS\u201903, pp 28\u201339"},{"key":"73_CR14","doi-asserted-by":"crossref","unstructured":"Chung LK, Nixon BA, Yu E, Mylopoulos J (2000) Non-functional requirements in software engineering. Kluwer, Dordrecht","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"73_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0167-6423(93)90021-G","volume":"20","author":"A Dardenne","year":"1993","unstructured":"Dardenne A, van Lamsweerde A, Fickas S (1993) Goal-directed requirements acquisition. Sci Comput Program 20:3\u201350","journal-title":"Sci Comput Program"},{"issue":"6","key":"73_CR16","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIS.2003.1249168","volume":"18","author":"RK Dash","year":"2003","unstructured":"Dash RK, Jennings NR, Parkes DC (2003) Computational mechanism design: a call to arms. IEEE Intell Syst 18(6):40\u201347","journal-title":"IEEE Intell Syst"},{"key":"73_CR17","unstructured":"Davidson M, Garagnani M (2002) Pre-processing planning domains containing language axioms. In: PlanSIG\u201902, pp 23\u201334"},{"key":"73_CR18","unstructured":"Edelkamp S, Hoffmann J (2004) PDDL2.2: The language for the classical part of the 4th international planning competition. Technical Report 195, University of Freiburg, Germany"},{"key":"73_CR19","volume-title":"Characteristics of socio-technical systems","author":"F Emery","year":"1959","unstructured":"Emery F (1959) Characteristics of socio-technical systems. Tavistock, London"},{"key":"73_CR20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1613\/jair.1129","volume":"20","author":"M Fox","year":"2003","unstructured":"Fox M, Long D (2003) PDDL2.1: an extension to PDDL for expressing temporal planning domains. JAIR 20:61\u2013124","journal-title":"JAIR"},{"key":"73_CR21","doi-asserted-by":"crossref","unstructured":"Franch X (2006) On the quantitative analysis of agent-oriented models. In: CAiSE\u201906, pp 495\u2013509","DOI":"10.1007\/11767138_33"},{"key":"73_CR22","unstructured":"Gans G, Jarke M, Kethers S, Lakemeyer G (2001) Modeling the impact of trust and distrust in agent networks. In: AOIS\u201901, pp 45\u201358"},{"key":"73_CR23","unstructured":"Garagnani M (2000) A correct algorithm for efficient planning with preprocessed domain axioms. Research and Development in Intelligent Systems XVII, Springer, Heidelberg, pp 363\u2013374"},{"key":"73_CR24","unstructured":"Garzetti M, Giorgini P, Mylopoulos J, Sannicol\u00f2 F (2002) Applying Tropos methodology to a real case study: complexity and criticality analysis. In: WOA\u201902, pp 7\u201313"},{"key":"73_CR25","doi-asserted-by":"crossref","unstructured":"Gazen BC, Knoblock CA (1997) Combining the expressivity of UCPOP with the efficiency of Graphplan. In: ECP\u201997, pp 221\u2013233","DOI":"10.1007\/3-540-63912-8_88"},{"key":"73_CR26","unstructured":"Gerevini A, Long D (2005) Plan constraints and preferences in PDDL3. Technical Report RT 2005-08-47, University of Brescia, Italy"},{"key":"73_CR27","unstructured":"Ghallab M, Howe A, Knoblock C, McDermott D, Ram A, Veloso M, Weld D, Wilkins D (1998) PDDL\u2014the planning domain definition language. In: AIPS\u201998"},{"issue":"1\u20132","key":"73_CR28","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0004-3702(00)00031-X","volume":"121","author":"GD Giacomo","year":"2000","unstructured":"Giacomo GD, Lesperance Y, Levesque HJ (2000) ConGolog, a concurrent programming language based on the situation calculus. Artif Intell 121(1\u20132):109\u2013169","journal-title":"Artif Intell"},{"key":"73_CR29","doi-asserted-by":"crossref","unstructured":"Giorgini P, Mylopoulos J, Nicchiarelli E, Sebastiani R (2002) Reasoning with goal models. In: ER\u201902, pp 167\u2013181","DOI":"10.1007\/3-540-45816-6_22"},{"issue":"1","key":"73_CR30","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s007660170013","volume":"6","author":"D Gross","year":"2001","unstructured":"Gross D, Yu ESK (2001) From non-functional requirements to design through patterns. Requir Eng 6(1):18\u201336","journal-title":"Requir Eng"},{"issue":"4","key":"73_CR31","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s00766-005-0017-2","volume":"10","author":"H Kaiya","year":"2005","unstructured":"Kaiya H, Shinbara D, Kawano J, Saeki M (2005) Improving the detection of requirements discordances among stakeholders. Requir Eng 10(4):289\u2013303","journal-title":"Requir Eng"},{"key":"73_CR32","doi-asserted-by":"crossref","unstructured":"Koehler J, Nebel B, Hoffmann J, Dimopoulos Y (1997) Extending planning graphs to an ADL subset. In: ECP\u201997, pp 273\u2013285","DOI":"10.1007\/3-540-63912-8_92"},{"key":"73_CR33","doi-asserted-by":"crossref","unstructured":"Koutsoupias E, Papadimitriou C Worst-Case Equilibria. In: STACS\u201999","DOI":"10.1007\/3-540-49116-3_38"},{"key":"73_CR34","unstructured":"Lai K, Feldman M, Stoica I, Chuang J (2003) Incentives for cooperation in peer-to-peer networks. In: Workshop on economics of peer-to-peer systems"},{"issue":"6","key":"73_CR35","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/1041685.1029905","volume":"29","author":"E Letier","year":"2004","unstructured":"Letier E, van Lamsweerde A (2004) Reasoning about partial goal satisfaction for requirements and design engineering. SIGSOFT Softw Eng Notes 29(6):53\u201362","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"73_CR36","unstructured":"LPG Homepage. LPG-td Planner. http:\/\/zeus.ing.unibs.it\/lpg\/"},{"key":"73_CR37","doi-asserted-by":"crossref","unstructured":"Moscibroda T, Schmid S, Wattenhofer R (2006) On the topologies formed by selfish peers. In: PODC\u201906, pp 133\u2013142","DOI":"10.1145\/1146381.1146403"},{"issue":"2","key":"73_CR38","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"MEJ Newman","year":"2003","unstructured":"Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167\u2013256","journal-title":"SIAM Rev"},{"key":"73_CR39","unstructured":"Osborne MJ, Rubinstein A (1994) A course in game theory. MIT Press, USA"},{"key":"73_CR40","unstructured":"Peer J (2005) Web service composition as AI planning\u2014a survey. Technical report, University of St. Gallen, Switzerland"},{"key":"73_CR41","unstructured":"Polleres A (2003) Advances in answer set planning. PhD thesis, Vienna University of Technology, Austria"},{"key":"73_CR42","doi-asserted-by":"crossref","unstructured":"Potts C, Newstetter WC (1997) Naturalistic inquiry and requirements engineering: reconciling their theoretical foundations. In: RE\u201997, p 118","DOI":"10.1109\/ISRE.1997.566849"},{"key":"73_CR43","doi-asserted-by":"crossref","unstructured":"Ropohl G (1999) Philosophy of socio-technical systems. Soc Philos Technol 4(3):55\u201371","DOI":"10.5840\/techne19994311"},{"key":"73_CR44","unstructured":"Security and Dependability Tropos Tool. http:\/\/sesa.dit.unitn.it\/sistar_tool\/"},{"key":"73_CR45","unstructured":"Serenity: System Engineering for Security and Dependability. Deliverable A1.D2.1. Security and Privacy Requirements at Organizational Level. http:\/\/www.serenity-forum.org\/Work-package-1-2.html"},{"key":"73_CR46","unstructured":"Simon HA (1969) The science of the artificial. MIT Press, USA"},{"key":"73_CR47","unstructured":"Sommerville I (2004) Software engineering, 7th edn. Addison-Wesley, USA"},{"key":"73_CR48","doi-asserted-by":"crossref","unstructured":"Sutcliffe AG, Minocha S (1999) Linking business modelling to socio-technical system design. In: CAiSE\u201999. pp 73\u201387","DOI":"10.1007\/3-540-48738-7_7"},{"key":"73_CR49","doi-asserted-by":"crossref","unstructured":"van Lamsweerde A (2000) Requirements engineering in the year 00: a research perspective. In: ICSE\u201900, pp 5\u201319","DOI":"10.1145\/337180.337184"},{"key":"73_CR50","doi-asserted-by":"crossref","unstructured":"Walker GH, Stanton NA, Salmon PM, Jenkins DP (2008) A review of sociotechnical systems theory: a classic concept for new command and control paradigms. Theor IssuesErgonomics Sci 9(6):479\u2013499","DOI":"10.1080\/14639220701635470"},{"key":"73_CR51","unstructured":"Weiss M, Amyot D, Mussbacher G (2006) Formalizing architectural patterns with the goal-oriented requirement language. In: VikingPLoP\u201906"},{"issue":"2","key":"73_CR52","first-page":"93","volume":"20","author":"DS Weld","year":"1999","unstructured":"Weld DS (1999) Recent advances in AI planning. AI Mag 20(2):93\u2013123","journal-title":"AI Mag"},{"key":"73_CR53","unstructured":"Yu ESK (1996) Modelling strategic relationships for process reengineering. PhD thesis, University of Toronto, Canada"},{"key":"73_CR54","unstructured":"Zannone N (2006) A requirements engineering methodology for trust, security, and privacy. PhD thesis, University of Trento, Italy"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-008-0073-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-008-0073-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-008-0073-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T05:59:27Z","timestamp":1559109567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-008-0073-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,8]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["73"],"URL":"https:\/\/doi.org\/10.1007\/s00766-008-0073-5","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,8]]}}}