{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:52:46Z","timestamp":1747806766173},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540205913"},{"type":"electronic","value":"9783540400523"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40052-3_2","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T18:06:19Z","timestamp":1277229979000},"page":"4-12","source":"Crossref","is-referenced-by-count":20,"title":["Extending Agile Methods: Postmortem Reviews as Extended Feedback"],"prefix":"10.1007","author":[{"given":"Torgeir","family":"Dings\u00f8yr","sequence":"first","affiliation":[]},{"given":"Geir Kjetil","family":"Hanssen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Beck, K.: Embracing Change with Extreme Programming. IEEE Computer, 70\u201377 (October 1999)","DOI":"10.1109\/2.796139"},{"key":"2_CR2","volume-title":"The Social Life of Information","author":"J.S. Brown","year":"2000","unstructured":"Brown, J.S., Duguid, P.: The Social Life of Information. Harvard Business School Press, Boston (2000)"},{"key":"2_CR3","volume-title":"Experiental Learning: Experience as the Source of Learning and Development","author":"D. Kolb","year":"1984","unstructured":"Kolb, D.: Experiental Learning: Experience as the Source of Learning and Development. Prentice Hall, Englewood Cliffs (1984)"},{"key":"2_CR4","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","volume-title":"The Knowledge-Creating Company","author":"I. Nonaka","year":"1995","unstructured":"Nonaka, I., Takeuchi, H.: The Knowledge-Creating Company. Oxford University Press, Oxford (1995)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053579","volume-title":"Fundamental Approaches to Software Engineering","author":"K. Beck","year":"1998","unstructured":"Beck, K.: Extreme Programming: A Humanistic Discipline in Software Development. In: Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. LNCS, vol.\u00a01382, p. 1. Springer, Heidelberg (1998)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Boehm, B.: Get Ready for Agile Methods, with Care. IEEE Computer, 64\u201369 (January 2002)","DOI":"10.1109\/2.976920"},{"key":"2_CR7","volume-title":"Introduction to Action Research","author":"D.J. Greenwood","year":"1998","unstructured":"Greenwood, D.J., Levin, M.: Introduction to Action Research. Sage Publications, Thousand Oaks (1998)"},{"issue":"1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/291469.291479","volume":"42","author":"D. Avison","year":"1999","unstructured":"Avison, D., Lau, F., Myers, M., Nielsen, P.A.: Action Research. Communications of the ACM\u00a042(1), 94\u201397 (1999)","journal-title":"Communications of the ACM"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Birk, A., Dings\u00f8yr, T., St\u00e5lhane, T.: Postmortem: Never leave a project without it. IEEE Software, special issue on knowledge management in software engineering, 43\u201345 (May\/June 2002)","DOI":"10.1109\/MS.2002.1003452"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Collier, B., DeMarco, T., Fearey, P.: A Defined Process For Project Post Mortem Review. IEEE Software, 65\u201372 (July 1996)","DOI":"10.1109\/52.526833"},{"key":"2_CR11","volume-title":"Microsoft Secrets - How the World\u2019s Most Powerful Software Company Creates Technology, Shapes Markets, and Manages People","author":"M.A. Cusomano","year":"1995","unstructured":"Cusomano, M.A., Selby, R.W.: Microsoft Secrets - How the World\u2019s Most Powerful Software Company Creates Technology, Shapes Markets, and Manages People. The Free Press, New York (1995)"},{"key":"2_CR12","unstructured":"St\u00e5lhane, T., Dings\u00f8yr, T., Moe, N.B., Hanssen, G.K.: Post Mortem - An Assessment of Two Approaches, presented at EuroSPI, Limrerick, Ireland (2001)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Dings\u00f8yr, T., Moe, N.B., Nytr\u00f8, \u00d8.: Augmenting Experience Reports with Lightweight Postmortem Reviews. Presented at Third International Conference on Product Focused Software Process Improvement, Kaiserslautern, Germany (2001)","DOI":"10.1007\/3-540-44813-6_17"},{"issue":"2","key":"2_CR14","doi-asserted-by":"crossref","first-page":"233","DOI":"10.17730\/humo.56.2.x335923511444655","volume":"56","author":"R. Scupin","year":"1997","unstructured":"Scupin, R.: The KJ Method: A Technique for Analyzing Data Derived from Japanese ethnology. Human Organization\u00a056(2), 233\u2013237 (1997)","journal-title":"Human Organization"},{"key":"2_CR15","volume-title":"Extreme Programming Explained","author":"K. Beck","year":"2000","unstructured":"Beck, K.: Extreme Programming Explained. Addison-Wesley, Reading (2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Learning Software Organizations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40052-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T19:13:35Z","timestamp":1711566815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40052-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540205913","9783540400523"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40052-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}