{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:13:04Z","timestamp":1742397184330},"reference-count":53,"publisher":"Wiley","issue":"14","license":[{"start":{"date-parts":[[2007,10,10]],"date-time":"2007-10-10T00:00:00Z","timestamp":1191974400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[2007,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Information systems (IS) project failure is a costly and common problem. This is despite advances in development tools and technologies. In this article, we argue that one reason for this is the failure of project post\u2010mortems to generate constructive \u201clessons learned\u201d from previous projects. Over time, the ineffective practices would persist in the organization, rendering it resistant to change. The attribution theory literature serves as one of the few promising theoretical bases to explain why project post\u2010mortems fail. A case study of a project post\u2010mortem undertaken for an abandoned electronic procurement system project is discussed and analyzed. We identify five antecedent conditions of attribution error: the presence of self\u2010appointed mindsets, the general persistence of negative beliefs, memory decay, selective recall of project events and the influence of power dynamics within the organization. We discuss the research and practical implications of these findings and suggest how the problem of attribution error may be minimized in project post\u2010mortems.<\/jats:p>","DOI":"10.1002\/asi.20693","type":"journal-article","created":{"date-parts":[[2007,10,10]],"date-time":"2007-10-10T19:47:04Z","timestamp":1192045624000},"page":"2255-2268","source":"Crossref","is-referenced-by-count":3,"title":["Information systems project post\u2010mortems: Insights from an attribution perspective"],"prefix":"10.1002","volume":"58","author":[{"given":"Gary","family":"Pan","sequence":"first","affiliation":[]},{"given":"Shan L","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Newman","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,12,21]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1090-5138(00)00059-3"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420190404"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2002.1003452"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/017084069801900104"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2005.04.005"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1996.28"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.526833"},{"key":"e_1_2_9_9_1","volume-title":"Microsoft secrets\u2014How the world's most powerful software company creates technology, shapes markets, and manages people","author":"Cusomano M.","year":"1995"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1995.tb00776.x"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/260750.260775"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/09513550310492085"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781503620766"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/255857"},{"key":"e_1_2_9_16_1","volume-title":"Attribution: Basic issues and applications","author":"Harvey J.","year":"1985"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/10628-000"},{"key":"e_1_2_9_18_1","series-title":"New directions in attribution research","volume-title":"Conversation with Fritz Heider","author":"Heider F.","year":"1976"},{"key":"e_1_2_9_19_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.4018\/joeuc.1997100101","article-title":"An attributional analysis of the rejection of information technology","author":"Henry J.","year":"1997","journal-title":"Journal of End User Computing, Fall"},{"key":"e_1_2_9_20_1","volume-title":"Causal attribution","author":"Hewstone M.","year":"1989"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/09513559910282849"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(87)90019-X"},{"key":"e_1_2_9_23_1","volume-title":"Victims of groupthink","author":"Janis I.","year":"1972"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000405"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2002100104"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1350507601321006"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/367211.367274"},{"key":"e_1_2_9_28_1","first-page":"782","article-title":"Attribution analysis of computer self\u2010efficacy","author":"Kelley H.","year":"1999","journal-title":"Proceedings of the American Conference of Information Systems"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ps.31.020180.002325"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/249410"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.1999.00051.x"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.1993070101"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/358141.358148"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.71.1.137"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.03.001"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20384"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.07.009"},{"key":"e_1_2_9_38_1","article-title":"Overcoming knowledge management challenges during ERP implementation: The need to share and integrate different types of knowledge","author":"Pan S.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00033-6"},{"key":"e_1_2_9_40_1","volume-title":"The human equation","author":"Pfeffer J.","year":"1998"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60357-3"},{"key":"e_1_2_9_42_1","first-page":"49","article-title":"Why bad projects are so hard to kill?","author":"Royer I.","year":"2003","journal-title":"Harvard Business Review, February"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/1350507604048275"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02173417"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(02)00096-0"},{"key":"e_1_2_9_46_1","volume-title":"An introduction to attribution processes","author":"Shaver K.","year":"1983"},{"issue":"6","key":"e_1_2_9_47_1","doi-asserted-by":"crossref","first-page":"294","DOI":"10.17705\/1jais.00041","article-title":"The circuits\u2010of\u2010power framework for studying power in institutionalization of information systems","volume":"4","author":"Silva L.","year":"2003","journal-title":"Journal of Association for Information Systems"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20222"},{"key":"e_1_2_9_49_1","first-page":"75","article-title":"Recovering and learning from service failure","author":"Tax S.","year":"1998","journal-title":"Sloan Management Review, Fall"},{"key":"e_1_2_9_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1990.9924601"},{"key":"e_1_2_9_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/249490"},{"key":"e_1_2_9_52_1","doi-asserted-by":"publisher","DOI":"10.1006\/jesp.1994.1023"},{"key":"e_1_2_9_53_1","volume-title":"Attribution theory: An organizational perspective","author":"Weiner B.","year":"1995"},{"key":"e_1_2_9_54_1","volume-title":"Case study research: Design and methods (rev. ed.)","author":"Yin R.","year":"1989"}],"container-title":["Journal of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.20693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.20693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T18:04:45Z","timestamp":1696701885000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/asi.20693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":53,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["10.1002\/asi.20693"],"URL":"https:\/\/doi.org\/10.1002\/asi.20693","archive":["Portico"],"relation":{},"ISSN":["1532-2882","1532-2890"],"issn-type":[{"value":"1532-2882","type":"print"},{"value":"1532-2890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}