{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T18:25:25Z","timestamp":1777573525000,"version":"3.51.4"},"reference-count":13,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T00:00:00Z","timestamp":1290038400000},"content-version":"vor","delay-in-days":686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Secondary data users need three types of knowledge to analyze secondary data: knowledge about data, background knowledge necessary to understand and interpret data, and data analysis skills. Part of knowledge about data is provided by the documentation of data. Background knowledge and data analysis skills are internalized as users' absorptive capacity. When documentation and their absorptive capacity are inadequate, users need to seek outside information to use secondary data. In this paper, causes of inadequate documentation were analyzed, why and how secondary users seek outside information were reported. Then based on the findings, implications about how to facilitate secondary data use were discussed.<\/jats:p>","DOI":"10.1002\/meet.2009.145046024","type":"journal-article","created":{"date-parts":[[2010,1,28]],"date-time":"2010-01-28T15:50:39Z","timestamp":1264693839000},"page":"1-14","source":"Crossref","is-referenced-by-count":15,"title":["Overcoming inadequate documentation"],"prefix":"10.1002","volume":"46","author":[{"given":"Jinfang","family":"Niu","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,11,18]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7434.001.0001"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00342.x"},{"key":"e_1_2_8_4_1","first-page":"71","volume":"1","author":"Collins H. M.","year":"2001","journal-title":"Tacit Knowledge, Trust, and the Q of Sapphire' Social Studies of Science, 31"},{"key":"e_1_2_8_5_1","volume-title":"Sharing research data","author":"Fienberg S. E.","year":"1985"},{"key":"e_1_2_8_6_1","volume-title":"Externalities, Property Rights and the Coase Theorem. Ch. 16 of Microeconomics and Behavior","author":"Frank R. H.","year":"2007"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175230"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2001.11045671"},{"key":"e_1_2_8_9_1","unstructured":"Niu J.andHedstrom M.(2009).Documentation Evaluation Model for social science data: An empirical test. In Proceedings of the Digital Curation Curriculum (DigCCurr) conference Chapel Hill NC (April 1\u20103 2009)."},{"key":"e_1_2_8_10_1","unstructured":"Niu J.andHedstrom M.(2008).Documentation Evaluation Model for social science data. In Proceedings of the Annual Meeting of the American Society for Information Science Technology (ASIS T) Columbus OH (October 24\u201329)."},{"key":"e_1_2_8_11_1","unstructured":"Niu J.andHedstrom M.(2007).Streamlining the \u201cProducer\/Archive\u201d Interface: Mechanisms to Reduce Delays In Ingest And Release Of Social Science Data. DigCCurr2007 Conference Chapel Hill NC (April 18\u201020)."},{"key":"e_1_2_8_12_1","volume-title":"Personal knowledge: Toward a post\u2010critical philosophy","author":"Polanyi M.","year":"1962"},{"key":"e_1_2_8_13_1","unstructured":"Strathern M.(2005).Useful knowledge. Lecture presented at The Isaiah Berlin Lecture Manchester UK. Not published."},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250171105"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.145046024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.145046024","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2009.145046024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:19:17Z","timestamp":1760955557000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2009.145046024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1002\/meet.2009.145046024"],"URL":"https:\/\/doi.org\/10.1002\/meet.2009.145046024","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"value":"0044-7870","type":"print"},{"value":"1550-8390","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}