{"id":"https://openalex.org/W4253669516","doi":"https://doi.org/10.1007/978-3-540-76292-8_36","title":"Extending Argumentation to Goal-Oriented Requirements Engineering","display_name":"Extending Argumentation to Goal-Oriented Requirements Engineering","publication_year":2007,"publication_date":"2007-11-12","ids":{"openalex":"https://openalex.org/W4253669516","doi":"https://doi.org/10.1007/978-3-540-76292-8_36"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-76292-8_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-76292-8_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017840476","display_name":"Ibrahim Habli","orcid":"https://orcid.org/0000-0003-2736-8238"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ibrahim Habli","raw_affiliation_strings":["Department of Computer Science, The University of York, York YO10 5DD,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of York, York YO10 5DD,","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029591154","display_name":"Weihang Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Weihang Wu","raw_affiliation_strings":["Department of Computer Science, The University of York, York YO10 5DD,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of York, York YO10 5DD,","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020709562","display_name":"Katrina Attwood","orcid":"https://orcid.org/0000-0002-1642-0881"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Katrina Attwood","raw_affiliation_strings":["Department of Computer Science, The University of York, York YO10 5DD,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of York, York YO10 5DD,","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048332271","display_name":"Tim Kelly","orcid":null},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tim Kelly","raw_affiliation_strings":["Department of Computer Science, The University of York, York YO10 5DD,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of York, York YO10 5DD,","institution_ids":["https://openalex.org/I52099693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017840476"],"corresponding_institution_ids":["https://openalex.org/I52099693"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":7.4922,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.96814404,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"306","last_page":"316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/argumentation-theory","display_name":"Argumentation theory","score":0.7570382356643677},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.7139766216278076},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.6940653920173645},{"id":"https://openalex.org/keywords/goal-modeling","display_name":"Goal modeling","score":0.6599956154823303},{"id":"https://openalex.org/keywords/requirements-traceability","display_name":"Requirements traceability","score":0.5866068005561829},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5584923028945923},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.5561568737030029},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.5460397005081177},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.48381465673446655},{"id":"https://openalex.org/keywords/argument","display_name":"Argument (complex analysis)","score":0.4770164489746094},{"id":"https://openalex.org/keywords/requirements-management","display_name":"Requirements management","score":0.47156378626823425},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4659493863582611},{"id":"https://openalex.org/keywords/requirements-elicitation","display_name":"Requirements elicitation","score":0.465482622385025},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.46297308802604675},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4244273602962494},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.38860511779785156},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3624013662338257},{"id":"https://openalex.org/keywords/requirement","display_name":"Requirement","score":0.3462064266204834},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.33474084734916687},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11367392539978027},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10596907138824463},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07030749320983887}],"concepts":[{"id":"https://openalex.org/C65059942","wikidata":"https://www.wikidata.org/wiki/Q270105","display_name":"Argumentation theory","level":2,"score":0.7570382356643677},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.7139766216278076},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.6940653920173645},{"id":"https://openalex.org/C9586889","wikidata":"https://www.wikidata.org/wiki/Q5575167","display_name":"Goal modeling","level":4,"score":0.6599956154823303},{"id":"https://openalex.org/C35084680","wikidata":"https://www.wikidata.org/wiki/Q848201","display_name":"Requirements traceability","level":5,"score":0.5866068005561829},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5584923028945923},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.5561568737030029},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.5460397005081177},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.48381465673446655},{"id":"https://openalex.org/C98184364","wikidata":"https://www.wikidata.org/wiki/Q1780131","display_name":"Argument (complex analysis)","level":2,"score":0.4770164489746094},{"id":"https://openalex.org/C173577280","wikidata":"https://www.wikidata.org/wiki/Q530038","display_name":"Requirements management","level":4,"score":0.47156378626823425},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4659493863582611},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.465482622385025},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.46297308802604675},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4244273602962494},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.38860511779785156},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3624013662338257},{"id":"https://openalex.org/C135475081","wikidata":"https://www.wikidata.org/wiki/Q774228","display_name":"Requirement","level":4,"score":0.3462064266204834},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.33474084734916687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11367392539978027},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10596907138824463},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07030749320983887},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-76292-8_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-76292-8_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1575709632","https://openalex.org/W1976880037","https://openalex.org/W2017739343","https://openalex.org/W2113435553","https://openalex.org/W2120978952","https://openalex.org/W2151451947","https://openalex.org/W2413095543","https://openalex.org/W4212912845","https://openalex.org/W4229680087","https://openalex.org/W4242182825","https://openalex.org/W4254189011"],"related_works":["https://openalex.org/W2472769502","https://openalex.org/W1617997706","https://openalex.org/W2574990557","https://openalex.org/W2398544379","https://openalex.org/W2566533024","https://openalex.org/W1991761041","https://openalex.org/W3129877744","https://openalex.org/W2164030517","https://openalex.org/W2567178710","https://openalex.org/W2153860654"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
