{"id":"https://openalex.org/W3198901462","doi":"https://doi.org/10.18293/seke2021-192","title":"Risk Analysis for Collaborative Systems during Requirements Engineering (S)","display_name":"Risk Analysis for Collaborative Systems during Requirements Engineering (S)","publication_year":2021,"publication_date":"2021-07-05","ids":{"openalex":"https://openalex.org/W3198901462","doi":"https://doi.org/10.18293/seke2021-192","mag":"3198901462"},"language":"en","primary_location":{"id":"doi:10.18293/seke2021-192","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2021-192","pdf_url":"https://doi.org/10.18293/seke2021-192","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2021-192","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038782792","display_name":"Kirthy Kolluri","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147944","display_name":"ABS Consulting (United States)","ror":"https://ror.org/03yxyad36","country_code":"US","type":"company","lineage":["https://openalex.org/I4210147944"]},{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kirthy Kolluri","raw_affiliation_strings":["Department of Computer Science The University of Texas at Dallas Richardson, TX, USA","Tom Hill Fellows Consulting Group Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science The University of Texas at Dallas Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]},{"raw_affiliation_string":"Tom Hill Fellows Consulting Group Dallas, TX, USA","institution_ids":["https://openalex.org/I4210147944"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5038782792"],"corresponding_institution_ids":["https://openalex.org/I162577319","https://openalex.org/I4210147944"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19147224,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2021","issue":null,"first_page":"297","last_page":"302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7524315118789673},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5908907651901245},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5604302883148193},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.4428040385246277},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.4369357228279114},{"id":"https://openalex.org/keywords/life-critical-system","display_name":"Life-critical system","score":0.4364160895347595},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3892991542816162},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.365342378616333},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08416998386383057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7524315118789673},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5908907651901245},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5604302883148193},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.4428040385246277},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.4369357228279114},{"id":"https://openalex.org/C163707989","wikidata":"https://www.wikidata.org/wiki/Q1996307","display_name":"Life-critical system","level":3,"score":0.4364160895347595},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3892991542816162},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.365342378616333},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08416998386383057},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2021-192","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2021-192","pdf_url":"https://doi.org/10.18293/seke2021-192","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2021-192","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2021-192","pdf_url":"https://doi.org/10.18293/seke2021-192","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3198901462.pdf","grobid_xml":"https://content.openalex.org/works/W3198901462.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1576423955","https://openalex.org/W1972276999","https://openalex.org/W1980201832","https://openalex.org/W2008866090","https://openalex.org/W2010954288","https://openalex.org/W2084815973","https://openalex.org/W2113435553","https://openalex.org/W2115904912","https://openalex.org/W2396727281","https://openalex.org/W2510480591","https://openalex.org/W4229716508","https://openalex.org/W6652531967"],"related_works":["https://openalex.org/W1490921502","https://openalex.org/W2472769502","https://openalex.org/W4254568495","https://openalex.org/W2047626779","https://openalex.org/W2512714094","https://openalex.org/W4235167339","https://openalex.org/W2238632658","https://openalex.org/W142054160","https://openalex.org/W2062417677","https://openalex.org/W2242308721"],"abstract_inverted_index":{"Risk,":[0],"a":[1,33,136],"potential":[2],"occurrence":[3],"of":[4,128],"some":[5],"undesirable":[6],"event,":[7],"can":[8,26],"be":[9,27],"dangerous":[10],"if":[11],"not":[12,93,198],"adequately":[13],"identified":[14],"and":[15,85,124,132,163,192],"dealt":[16],"with":[17,57,66],"early":[18],"on":[19],"during":[20],"software":[21,35],"development.":[22],"However,":[23],"identifying":[24,115],"risks":[25,116,162,188],"difficult,":[28],"hence":[29,98],"oftentimes":[30],"resulting":[31],"in":[32,89,121],"particular":[34],"system":[36,84,96],"that":[37,73,178,184,195],"is":[38],"unable":[39],"to":[40,109,144,160,169],"address":[41],"risks,":[42],"especially":[43],"critical":[44,191],"ones":[45,194],"adequately.":[46],"This":[47],"paper":[48],"proposes":[49],"an":[50,106],"ontology-based":[51],"framework":[52],"for":[53,172],"performing":[54,173],"risk":[55,67,112,147,166,174],"analysis":[56,113,167],"the":[58,74,80,83,86,95,99,119,122,129,165,190],"Augmented":[59],"Reference":[60,63,70],"Model":[61,64,71],"-The":[62],"augmented":[65],"analysis.":[68,148,175],"The":[69],"emphasizes":[72],"user":[75],"requirements":[76],"are":[77],"met":[78],"through":[79],"collaboration":[81],"between":[82],"events":[87,120,134],"occurring":[88],"its":[90],"environment":[91,123],"-i.e.,":[92],"by":[94,114],"alone,":[97],"term":[100],"\"collaborative":[101],"system.\"":[102],"We":[103,176],"also":[104],"offer":[105],"activity-oriented":[107],"ontology":[108],"carry":[110],"out":[111],"from":[117],"negating":[118],"system.":[125],"Such":[126],"negations":[127],"requirements,":[130],"specifications,":[131],"domain":[133],"generate":[135,170],"graph-like":[137],"representation,":[138],"called":[139],"Risk":[140],"Analysis":[141],"Graph":[142],"(RAG),":[143],"help":[145],"perform":[146],"To":[149],"validate":[150],"our":[151],"framework,":[152],"we":[153,196],"have":[154,199],"performed":[155],"two":[156],"experiments":[157,182],"using":[158],"questionnaires":[159],"identify":[161,187],"use":[164],"tool":[168],"RAG":[171,185],"feel":[177],"at":[179],"least":[180],"these":[181],"show":[183],"helps":[186],"-especially":[189],"uncommon":[193],"would":[197],"thought":[200],"of.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
