{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T10:25:04Z","timestamp":1768731904631,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,3,4]],"date-time":"2009-03-04T00:00:00Z","timestamp":1236124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s10796-009-9162-3","type":"journal-article","created":{"date-parts":[[2009,3,3]],"date-time":"2009-03-03T16:02:47Z","timestamp":1236096167000},"page":"67-79","source":"Crossref","is-referenced-by-count":12,"title":["Information intermediaries for emergency preparedness and response: A case study from public health"],"prefix":"10.1007","volume":"12","author":[{"given":"Minu","family":"Ipe","sequence":"first","affiliation":[]},{"given":"T. S.","family":"Raghu","sequence":"additional","affiliation":[]},{"given":"Ajay","family":"Vinze","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,4]]},"reference":[{"issue":"4536","key":"9162_CR1","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1126\/science.7063839","volume":"215","author":"R. M. Anderson","year":"1982","unstructured":"Anderson, R. M., & May, R. M. (1982). Directly transmitted infectious diseases: control by vaccination. Science, 215(4536), 1053\u20131060. doi: 10.1126\/science.7063839 .","journal-title":"Science"},{"issue":"3","key":"9162_CR2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/10864415.1997.11518287","volume":"1","author":"J. P. Bailey","year":"1997","unstructured":"Bailey, J. P., & Bakos, Y. (1997). An exploratory study of the emerging role of information intermediaries. International Journal of Electronic Commerce, 1(3), 7\u201320.","journal-title":"International Journal of Electronic Commerce"},{"key":"9162_CR3","volume-title":"Handbooks in information systems: national security","author":"O. Burton","year":"2007","unstructured":"Burton, O., & Ipe, M. (2007). Organizational adaptations in national security: the impact of bioterrorism on surveillance processes and resources. In H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, & D. Zeng (Eds.), Handbooks in information systems: national security(2nd ed.). Boston, MA: Elsevier.","edition":"2"},{"issue":"5","key":"9162_CR4","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1342327.1342340","volume":"51","author":"R. Chen","year":"2008","unstructured":"Chen, R., Sharman, R., Rao, R., & Upadhyaya, S. (2008). Coordination in emergency response management. Communications of the ACM, 51(5), 66\u201373. doi: 10.1145\/1342327.1342340 .","journal-title":"Communications of the ACM"},{"issue":"1","key":"9162_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.8.1.1","volume":"8","author":"V. Choudhury","year":"1997","unstructured":"Choudhury, V. (1997). Strategic choices in the development of interorganizational information systems. Information Systems Research, 8(1), 1\u201324. doi: 10.1287\/isre.8.1.1 .","journal-title":"Information Systems Research"},{"issue":"1","key":"9162_CR6","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2307\/249741","volume":"21","author":"V. Choudhury","year":"1997","unstructured":"Choudhury, V., & Sampler, J. L. (1997). Information specificity and environmental scanning: an economic perspective. MIS Quarterly, 21(1), 25\u201353. doi: 10.2307\/249741 .","journal-title":"MIS Quarterly"},{"issue":"1","key":"9162_CR7","doi-asserted-by":"crossref","first-page":"15","DOI":"10.2307\/4132339","volume":"26","author":"E. Christiaanse","year":"2002","unstructured":"Christiaanse, E., & Venkatraman, N. (2002). Beyond saber: an empirical test of expertise exploitation in electronic channels. MIS Quarterly, 26(1), 15\u201338. doi: 10.2307\/4132339 .","journal-title":"MIS Quarterly"},{"issue":"1","key":"9162_CR8","doi-asserted-by":"crossref","first-page":"67","DOI":"10.2307\/249437","volume":"15","author":"K. Ewusi-Mensah","year":"1991","unstructured":"Ewusi-Mensah, K., & Przasnyski, Z. H. (1991). On information systems project abandonment: an exploratory study of organizational practices. MIS Quarterly, 15(1), 67\u201388. doi: 10.2307\/249437 .","journal-title":"MIS Quarterly"},{"key":"9162_CR9","volume-title":"Bioterrorism: information technology strategy could strengthen federal agencies\u2019 ability to respond to public health emergencies","author":"General Accounting Office","year":"2004","unstructured":"General Accounting Office (2004). Bioterrorism: information technology strategy could strengthen federal agencies\u2019 ability to respond to public health emergencies. Washington, DC: United States Government Printing Office."},{"key":"9162_CR10","first-page":"1155","volume":"25","author":"S. J. Grossman","year":"1981","unstructured":"Grossman, S. J. (1981). An introduction to the theory of rational expectations under asymmetric information. Strategic Management Journal, 25, 1155\u20131178.","journal-title":"Strategic Management Journal"},{"issue":"3","key":"9162_CR11","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1111\/j.1540-5915.1993.tb01295.x","volume":"24","author":"V. Grover","year":"1993","unstructured":"Grover, V. (1993). An empirically derived model for the adoption of customer-based interorganizational information systems. Decision Sciences, 24(3), 603\u2013640. doi: 10.1111\/j.1540-5915.1993.tb01295.x .","journal-title":"Decision Sciences"},{"issue":"3","key":"9162_CR12","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0378-7206(88)90005-5","volume":"14","author":"V. Grover","year":"1988","unstructured":"Grover, V., Lederer, A. L., & Sabherwal, R. (1988). Recognizing the politics of MIS. Information & Management, 14(3), 145\u2013156. doi: 10.1016\/0378-7206(88)90005-5 .","journal-title":"Information & Management"},{"issue":"1","key":"9162_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.9.1.1","volume":"9","author":"A. Kambil","year":"1998","unstructured":"Kambil, A., & van Heck, E. (1998). Reengineering the Dutch flower auctions: a framework for analyzing exchange organizations. Information Systems Research, 9(1), 1\u201319. doi: 10.1287\/isre.9.1.1 .","journal-title":"Information Systems Research"},{"key":"9162_CR14","first-page":"98","volume":"72","author":"R. M. Kanter","year":"1994","unstructured":"Kanter, R. M. (1994). Collaborative advantage: successful partnerships manage the relationships, not just the deal. Harvard Business Review, 72, 98\u2013108.","journal-title":"Harvard Business Review"},{"issue":"5","key":"9162_CR15","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1108\/10662240010349417","volume":"10","author":"M. Janssen","year":"2000","unstructured":"Janssen, M., & Sol, H. G. (2000). Evaluating the role of intermediaries in the electronic value chain. Internet Research, 10(5), 406. doi: 10.1108\/10662240010349417 .","journal-title":"Internet Research"},{"issue":"1","key":"9162_CR16","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1207\/s15327744joce1501_3","volume":"15","author":"M. Janssen","year":"2005","unstructured":"Janssen, M., & Verbraeck, A. (2005). Evaluating the information architecture of an electronic intermediary. Journal of Organizational Computing and Electronic Commerce, 15(1), 35\u201360. doi: 10.1207\/s15327744joce1501_3 .","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"6","key":"9162_CR17","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1037\/0278-7393.4.6.551","volume":"4","author":"S. P. Lichtenstein","year":"1978","unstructured":"Lichtenstein, S. P., Slovic, B., & Fischhoff, B. (1978). Judged frequency of lethal events. Journal of Experimental Psychology. Human Learning and Memory, 4(6), 551\u2013578. doi: 10.1037\/0278-7393.4.6.551 .","journal-title":"Journal of Experimental Psychology. Human Learning and Memory"},{"key":"9162_CR18","first-page":"257","volume":"4","author":"K. Lyytinen","year":"1987","unstructured":"Lyytinen, K., & Hirschheim, R. (1987). Information system failures. Oxford Surveys in Information Technology, 4, 257\u2013309.","journal-title":"Oxford Surveys in Information Technology"},{"issue":"6","key":"9162_CR19","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1145\/214762.214766","volume":"30","author":"T. W. Malone","year":"1987","unstructured":"Malone, T. W., Yates, J., & Benjamin, R. I. (1987). Electronic market and electronic hierarchies. Communications of the ACM, 30(6), 484\u2013497. doi: 10.1145\/214762.214766 .","journal-title":"Communications of the ACM"},{"key":"9162_CR20","volume-title":"Organizations","author":"J. G. March","year":"1958","unstructured":"March, J. G., & Simon, H. A. (1958). Organizations. New York, NY: Wiley."},{"key":"9162_CR21","volume-title":"Infectious disease epidemiology: theory and practice","author":"K. E. Nelson","year":"2005","unstructured":"Nelson, K. E., Williams, C. M., & Graham, N. M. H. (2005). Infectious disease epidemiology: theory and practice. Boston, MA: Jones and Bartlett."},{"key":"9162_CR22","first-page":"179","volume":"4","author":"A. M. Ramnath","year":"1998","unstructured":"Ramnath, A. M., Paul, R. J., & Macredie, R. (1998). Understanding IOS development. European Conference on IS\u201998, 4, 179\u2013194.","journal-title":"European Conference on IS\u201998"},{"key":"9162_CR23","volume-title":"Games and information: an introduction to game theory","author":"E. Rasmusen","year":"2001","unstructured":"Rasmusen, E. (2001). Games and information: an introduction to game theory. Malden, MA: Blackwell."},{"key":"9162_CR24","first-page":"289","volume-title":"Toward a competitive telecommunications industry: selected papers from the 1994 telecommunications policy research conference","author":"P. Resnick","year":"1995","unstructured":"Resnick, P., Zeckhauser, R., & Avery, C. (1995). Roles for electronic brokers. In G. W. Brock (Ed.), Toward a competitive telecommunications industry: selected papers from the 1994 telecommunications policy research conference (pp. 289\u2013306). Mahwah, NJ: Earlbaum."},{"key":"9162_CR25","volume-title":"Dynamics of competitive strategy","author":"K. G. Smith","year":"1992","unstructured":"Smith, K. G., Grimm, C. M., & Gannon, M. J. (1992). Dynamics of competitive strategy. Newbury Park, CA: Sage."},{"key":"9162_CR26","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/0377-2217(87)90168-8","volume":"28","author":"M. Weber","year":"1987","unstructured":"Weber, M. (1987). Decision making with incomplete information. European Journal of Operational Research, 28, 44\u201357. doi: 10.1016\/0377-2217(87)90168-8 .","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"9162_CR27","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2307\/248694","volume":"13","author":"P. Weill","year":"1989","unstructured":"Weill, P., & Olson, M. H. (1989). Managing investments in IT: mini case studies and examples. MIS Quarterly, 13(1), 3\u201317. doi: 10.2307\/248694 .","journal-title":"MIS Quarterly"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9162-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9162-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9162-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:36:12Z","timestamp":1559248572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9162-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,4]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["9162"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9162-3","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,4]]}}}