{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:27:43Z","timestamp":1709818063811},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1993,9,1]],"date-time":"1993-09-01T00:00:00Z","timestamp":746841600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[1993,9]]},"DOI":"10.1007\/bf01901818","type":"journal-article","created":{"date-parts":[[2005,7,7]],"date-time":"2005-07-07T11:04:59Z","timestamp":1120734299000},"page":"225-237","source":"Crossref","is-referenced-by-count":2,"title":["Expert identification and selection: Legal liability concerns and directions"],"prefix":"10.1007","volume":"7","author":[{"given":"Kathleen","family":"Mykytyn","sequence":"first","affiliation":[]},{"given":"Peter P.","family":"Mykytyn","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Lunce","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF01901818_CR1","first-page":"135","volume":"8","author":"N. Birnbaum","year":"1988","unstructured":"Birnbaum, N. (1988) Strict Products Liability and Computer Software.Computer\/Law Journal,8, 135\u2013156.","journal-title":"Computer\/Law Journal"},{"key":"BF01901818_CR2","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1093\/comjnl\/31.5.386","volume":"31","author":"N. Bjorn-Anderson","year":"1988","unstructured":"Bjorn-Anderson, N. (1988) Are \u2018Human Factors\u2019 Human?The Computer Journal,31, 386\u2013390.","journal-title":"The Computer Journal"},{"key":"BF01901818_CR3","volume-title":"Black's Law Dictionary","author":"H.C. Black","year":"1979","unstructured":"Black, H.C. (1979).Black's Law Dictionary. West Publishing, St Paul, MN."},{"key":"BF01901818_CR4","first-page":"85","volume":"35","author":"R. Bloombecker","year":"1989","unstructured":"Bloombecker, R. (1989). Malpractice in IS?Datamation,35, 85\u201386.","journal-title":"Datamation"},{"key":"BF01901818_CR5","doi-asserted-by":"crossref","unstructured":"Bost v. Riley. (1980). 44 NC App 638, 262 SE2d 391.","DOI":"10.1090\/S0002-9947-1980-0586723-4"},{"key":"BF01901818_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1017\/S009885880000486X","volume":"7","author":"V. Brannigan","year":"1981","unstructured":"Brannigan, V. and Dayhoff, R. (1981) Liability for Personal Injuries Caused by Defective Medical Computer Programs.American Journal of Law & Medicine,7, 123\u2013144.","journal-title":"American Journal of Law & Medicine"},{"key":"BF01901818_CR7","series-title":"Research Report","volume-title":"Legal Aspects of Artificial Intelligence","author":"R. Brown","year":"1991","unstructured":"Brown R. and McCombs, D. (April 1991). Legal Aspects of Artificial Intelligence.Research Report, Haynes and Boone, Dallas, TX."},{"key":"BF01901818_CR8","first-page":"127","volume":"X","author":"G.S. Cole","year":"1990","unstructured":"Cole, G.S. (1990). Tort Liability for Artificial Intelligence and Expert Systems,Computer\/Law Journal,X, 127\u2013231.","journal-title":"Computer\/Law Journal"},{"key":"BF01901818_CR9","first-page":"69","volume-title":"Uncertainty: Social and Behavioral Dimensions","author":"T. Connolly","year":"1980","unstructured":"Connolly, T. (1980). Uncertainty, Action and Competence: Some Alternatives to Omniscience in Complex Problem-Solving. In Fiddle (ed)Uncertainty: Social and Behavioral Dimensions, Praeger, New York, 69\u201391."},{"key":"BF01901818_CR10","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0957-4174(90)90005-F","volume":"1","author":"M. Constantine","year":"1990","unstructured":"Constantine, M. and Ulvila, J. (1990). Testing Knowledge-Based Systems: The State of the Practice and Suggestions for Improvement,Expert Systems With Applications,1, 237\u2013248.","journal-title":"Expert Systems With Applications"},{"key":"BF01901818_CR11","doi-asserted-by":"crossref","unstructured":"Fridena v. Evans. (1980). 127 Ariz 516, 622 P2d 463.","DOI":"10.1149\/1.2129699"},{"key":"BF01901818_CR12","first-page":"173","volume":"8","author":"M. Germignani","year":"1981","unstructured":"Germignani, M. (1981). Product Liability and Software.Rutgers Computer & Technology Law Journal,8, 173\u2013204.","journal-title":"Rutgers Computer & Technology Law Journal"},{"key":"BF01901818_CR13","unstructured":"Glavin v. Rhode Island Hospital. (1879). 12 RI 411."},{"key":"BF01901818_CR14","first-page":"47","volume":"X","author":"W. Hagendorf","year":"1990","unstructured":"Hagendorf, W. (1990). Bulls and Bears and Bugs: Computer Investment Advisory Programs That Go Awry.Computer\/Law Journal,X, 47\u201369.","journal-title":"Computer\/Law Journal"},{"key":"BF01901818_CR15","unstructured":"Halstead v. United States. (1982), 535 F. Supp. 782 (Conn. 1982)."},{"key":"BF01901818_CR16","unstructured":"Independent School District No. 454 v. Statistical Tabulating Corp. (1973), 359 F. Supp. 1095 (N.D. Ill. 1973)."},{"key":"BF01901818_CR17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1080\/01449298608914505","volume":"5","author":"V. Jacob","year":"1986","unstructured":"Jacob, V., Gaultney, L. and Salvendy, G. (1986). Strategies and Biases in Human Decision-Making and Their Implications for Expert Systems.Behaviour and Information Technology,5, 119\u2013140.","journal-title":"Behaviour and Information Technology"},{"key":"BF01901818_CR18","volume-title":"Business and the Legal Environment","author":"M. Jennings","year":"1991","unstructured":"Jennings, M. (1991).Business and the Legal Environment. PWS-Kent, Boston MA."},{"key":"BF01901818_CR19","unstructured":"Joiner v. Mitchell County Hospital Authority. (1971). 125 GA App 1, 186 SE2d 307."},{"key":"BF01901818_CR20","unstructured":"Kociemba v. Searle (1989). 707 F. Supp. 1517 (D. Minn. 1989)."},{"key":"BF01901818_CR21","first-page":"87","volume":"X","author":"B. Lathrop","year":"1990","unstructured":"Lathrop, B. (1990) Design-Induced Errors in Computer Systems.Computer\/Law Journal,X, 87\u2013126.","journal-title":"Computer\/Law Journal"},{"key":"BF01901818_CR22","first-page":"103","volume":"11","author":"M. Madden","year":"1988","unstructured":"Madden, M. (1988). The Duty to Warn in Product Liability: Contours and Criticism.Journal of Products Liability,11, 103\u2013179.","journal-title":"Journal of Products Liability"},{"key":"BF01901818_CR23","volume-title":"Building Expert Systems","author":"J. Martin","year":"1988","unstructured":"Martin, J. and Oxman, S. (1988).Building Expert Systems. Prentice-Hall, Englewood Cliffs, N.J."},{"key":"BF01901818_CR24","first-page":"181","volume":"II","author":"C.S. Massingale","year":"1988","unstructured":"Massingale, C.S. and Borthick, A.F. (1988) Risk Allocation for Injury Due to Defective Medical Software.Journal of Products Liability,II, 181\u2013198.","journal-title":"Journal of Products Liability"},{"key":"BF01901818_CR25","doi-asserted-by":"crossref","first-page":"27","DOI":"10.2307\/249305","volume":"14","author":"K. Mykytyn","year":"1990","unstructured":"Mykytyn, K., Mykytyn, P., and Slinkman, C. (1990). Expert Systems: A Question of Liability?MIS Quarterly,14, 27\u201342.","journal-title":"MIS Quarterly"},{"key":"BF01901818_CR26","first-page":"1","volume":"7","author":"S. Nycum","year":"1979","unstructured":"Nycum, S. (1979). Liability for Malfunction of a Computer Program.Rutgers Journal of Computers, Technology and the Law,7, 1\u201322.","journal-title":"Rutgers Journal of Computers, Technology and the Law"},{"key":"BF01901818_CR27","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MEX.1987.5006538","volume":"2","author":"R. O'Keefe","year":"1987","unstructured":"O'Keefe, R., Balci, O., and Smith E. (1987). Validating Expert System Performance.IEEE Expert,2, 81\u201389.","journal-title":"IEEE Expert"},{"key":"BF01901818_CR28","first-page":"120","volume":"67","author":"M. Prietula","year":"1989","unstructured":"Prietula, M. and H. Simon. (1989). The Experts in Your Midst.Harvard Business Review,67, 120\u2013124.","journal-title":"Harvard Business Review"},{"key":"BF01901818_CR29","unstructured":"Restatement (Second) of Torts. (1965). American Law Institute, St. Paul, MN."},{"key":"BF01901818_CR30","unstructured":"Restatement (Second) of Torts. (1977). American Law Institute, St Paul, MN."},{"key":"BF01901818_CR31","unstructured":"Roach v. Kononen. (1974). 264 Or. 457, 525 P. 2d 125."},{"key":"BF01901818_CR32","volume-title":"Business Law","author":"M. Roszkowski","year":"1992","unstructured":"Roszkowski, M. (1992)Business Law, 3rd Edition, Harper Collins, New York.","edition":"3rd Edition"},{"key":"BF01901818_CR33","unstructured":"Saloomey v. Jeppesen & Co. (1983). 707F.2d 671 (2d. Cir. 1983)."},{"issue":"1","key":"BF01901818_CR34","first-page":"41","volume":"20","author":"B.T. Thomas","year":"1979","unstructured":"Thomas, B.T. (Fall 1979). Unauthorized Practice and Computer Aided Legal Analysis Systems.Jurimetrics Journal,20 (1), 41\u201351.","journal-title":"Jurimetrics Journal"},{"key":"BF01901818_CR35","first-page":"117","volume":"IV","author":"J. Tyde","year":"1990","unstructured":"Tyde, J. (1990). Medical Computer software: RX for Deadly Errors.Software Law Journal,IV, 117\u2013145.","journal-title":"Software Law Journal"},{"key":"BF01901818_CR36","first-page":"144","volume-title":"Management Information Systems","author":"E. Warner","year":"1990","unstructured":"Warner, E. (1990). Expert Systems and the Law. In Boynton and Zmud (eds)Management Information Systems, Scott Foresman\/Little Brown Higher Education, Glenview, IL, 144\u2013149."}],"container-title":["AI &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01901818.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01901818\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01901818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T18:16:28Z","timestamp":1683137788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01901818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,9]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,9]]}},"alternative-id":["BF01901818"],"URL":"https:\/\/doi.org\/10.1007\/bf01901818","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993,9]]}}}