{"id":"https://openalex.org/W106343402","doi":"https://doi.org/10.1007/978-3-642-40511-2_13","title":"Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods","display_name":"Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W106343402","doi":"https://doi.org/10.1007/978-3-642-40511-2_13","mag":"106343402"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-40511-2_13","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-40511-2_13","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40511-2_13.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40511-2_13.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024651104","display_name":"Kristian Beckers","orcid":null},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kristian Beckers","raw_affiliation_strings":["Paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany"],"affiliations":[{"raw_affiliation_string":"Paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042136459","display_name":"Stephan Fa\u00dfbender","orcid":null},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stephan Fa\u00dfbender","raw_affiliation_strings":["Paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany"],"affiliations":[{"raw_affiliation_string":"Paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064516321","display_name":"Maritta Heisel","orcid":"https://orcid.org/0000-0002-3275-2819"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maritta Heisel","raw_affiliation_strings":["Paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany"],"affiliations":[{"raw_affiliation_string":"Paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083730359","display_name":"Federica Paci","orcid":"https://orcid.org/0000-0003-3122-0236"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Federica Paci","raw_affiliation_strings":["Department and Information Engineering and Computer Science, University Trento, Italy"],"affiliations":[{"raw_affiliation_string":"Department and Information Engineering and Computer Science, University Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024651104"],"corresponding_institution_ids":["https://openalex.org/I62318514"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.3542,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81029312,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"194"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8220778703689575},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.750070333480835},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.7275007963180542},{"id":"https://openalex.org/keywords/goal-modeling","display_name":"Goal modeling","score":0.6496710777282715},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.5434421300888062},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5127854943275452},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.509341835975647},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.4796605408191681},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.46599212288856506},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3711433410644531},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3300016522407532},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1550593376159668}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8220778703689575},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.750070333480835},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.7275007963180542},{"id":"https://openalex.org/C9586889","wikidata":"https://www.wikidata.org/wiki/Q5575167","display_name":"Goal modeling","level":4,"score":0.6496710777282715},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.5434421300888062},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5127854943275452},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.509341835975647},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.4796605408191681},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.46599212288856506},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3711433410644531},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3300016522407532},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1550593376159668},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-40511-2_13","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-40511-2_13","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40511-2_13.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01506766v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01506766","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.178-194","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-40511-2_13","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-40511-2_13","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40511-2_13.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W106343402.pdf","grobid_xml":"https://content.openalex.org/works/W106343402.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W135255265","https://openalex.org/W145602486","https://openalex.org/W146540859","https://openalex.org/W1452096359","https://openalex.org/W1514621177","https://openalex.org/W1523003890","https://openalex.org/W1551592336","https://openalex.org/W1556397256","https://openalex.org/W1563985110","https://openalex.org/W1644958379","https://openalex.org/W1845451745","https://openalex.org/W1974582201","https://openalex.org/W1998167229","https://openalex.org/W2035336560","https://openalex.org/W2106180253","https://openalex.org/W2107787645","https://openalex.org/W2111695375","https://openalex.org/W2116068721","https://openalex.org/W2129289644","https://openalex.org/W2152170542","https://openalex.org/W2164022737","https://openalex.org/W2492688925","https://openalex.org/W3141311175","https://openalex.org/W3212068863","https://openalex.org/W4255628482"],"related_works":["https://openalex.org/W2062417677","https://openalex.org/W1580887402","https://openalex.org/W2398544379","https://openalex.org/W2758128462","https://openalex.org/W2147529336","https://openalex.org/W2784073270","https://openalex.org/W3064350013","https://openalex.org/W3129877744","https://openalex.org/W1579096363","https://openalex.org/W4297779846"],"abstract_inverted_index":{"Several":[0],"requirements":[1,23,118,123,189],"engineering":[2,24,124,190],"methods":[3,25,32,42,53,84,99],"exist":[4],"that":[5,59,67,90,126,192],"differ":[6],"in":[7,12],"their":[8,13],"abstraction":[9,57,88],"level":[10,58,89],"and":[11,28,73,79,109,132,197],"view":[14,112],"on":[15,44,113],"the":[16,34,39,46,62,75,92,114,117,128,133,142,151,157,161,168],"system-to-be.":[17,40,94],"Two":[18],"fundamentally":[19],"different":[20,145],"classes":[21],"of":[22,36,64,97,147],"are":[26,68],"goal-":[27],"problem-based":[29,134],"methods.":[30],"Goal-based":[31,52],"analyze":[33,78,141],"goals":[35,108,146],"stakeholders":[37,148],"towards":[38],"Problem-based":[41,83],"focus":[43],"decomposing":[45],"development":[47],"problem":[48,169],"into":[49,179],"simple":[50],"sub-problems.":[51],"use":[54,85,160],"a":[55,65,71,86,101,110,122,187,199],"higher":[56],"consider":[60],"only":[61],"parts":[63],"system":[66,201],"relevant":[69],"for":[70,167],"goal":[72,81],"provide":[74,186],"means":[76,158],"to":[77,140,159],"solve":[80],"conflicts.":[82],"lower":[87],"describes":[91],"entire":[93],"A":[95],"combination":[96],"these":[98],"enables":[100],"seamless":[102],"software":[103],"development,":[104],"which":[105],"considers":[106,193],"stakeholders\u2019":[107],"comprehensive":[111],"system-to-be":[115],"at":[116],"level.":[119],"We":[120,138,203],"propose":[121,139],"method":[125,130,135,155,191,206],"combines":[127],"goal-based":[129],"SI*":[131,152,163],"Problem":[136,173],"Frames.":[137],"issues":[143],"between":[144],"first":[149],"using":[150,181,207],"method.":[153,171],"Our":[154],"provides":[156,198],"resulting":[162],"models":[164,175],"as":[165],"input":[166],"frame":[170],"These":[172],"Frame":[174],"can":[176],"be":[177],"refined":[178],"architectures":[180],"existing":[182],"research.":[183],"Thus,":[184],"we":[185],"combined":[188],"all":[194],"stakeholder":[195],"views":[196],"detailed":[200],"specification.":[202],"illustrate":[204],"our":[205],"an":[208],"E-Health":[209],"example.":[210]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
