{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:15:19Z","timestamp":1774556119834,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T00:00:00Z","timestamp":1647993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T00:00:00Z","timestamp":1647993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10796-022-10266-5","type":"journal-article","created":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T16:06:05Z","timestamp":1648051565000},"page":"819-834","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Key Factors in Achieving Service Level Agreements (SLA) for Information Technology (IT) Incident Resolution"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2252-1213","authenticated-orcid":false,"given":"Ajaya K.","family":"Swain","sequence":"first","affiliation":[]},{"given":"Valeria R.","family":"Garza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,23]]},"reference":[{"issue":"3","key":"10266_CR1","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1287\/isre.2014.0546","volume":"25","author":"R Agarwal","year":"2014","unstructured":"Agarwal, R., & Dhar, V. (2014). Editorial - Big data, data science, and analytics: The opportunity and challenge for IS research. Information Systems Research, 25(3), 443\u2013448.","journal-title":"Information Systems Research"},{"key":"10266_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, R., & Lucas Jr, H. C. (2005). The information systems identity crisis: Focusing on high-visibility and high-impact research. MIS Quarterly,\u00a029(3)381\u2013398.","DOI":"10.2307\/25148689"},{"key":"10266_CR3","doi-asserted-by":"publisher","first-page":"54007","DOI":"10.1109\/ACCESS.2019.2909969","volume":"7","author":"L Ali","year":"2019","unstructured":"Ali, L., Niamat, A., Khan, J. A., Golilarz, N. A., Xingzhong, X., Noor, A., Nour, R., & Bukhari, S. A. C. (2019). An optimized stacked support vector machines based expert system for the effective prediction of heart failure. IEEE Access, 7, 54007\u201354014.","journal-title":"IEEE Access"},{"issue":"6","key":"10266_CR4","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.jksuci.2019.04.001","volume":"33","author":"F Al-Hawari","year":"2021","unstructured":"Al-Hawari, F., & Barham, H. (2021). A machine learning based help desk system for IT service management. Journal of King Saud University - Computer and Information Sciences., 33(6), 702\u2013718.","journal-title":"Journal of King Saud University - Computer and Information Sciences."},{"key":"10266_CR5","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.procs.2017.12.191","volume":"124","author":"HM Astuti","year":"2017","unstructured":"Astuti, H. M., Muqtadiroh, F. A., Tyas Darmaningrat, E. W., & Putri, C. U. (2017). Risks Assessment of Information Technology Processes Based on COBIT 5 Framework: A Case Study of ITS Service Desk. Procedia Computer Science, 124, 569\u2013576.","journal-title":"Procedia Computer Science"},{"issue":"4","key":"10266_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2753\/MIS0742-1222260402","volume":"26","author":"IR Bardhan","year":"2010","unstructured":"Bardhan, I. R., Demirkan, H., Kannan, P. K., Kauffman, R. J., & Sougstad, R. (2010). An Interdisciplinary Perspective on IT Services Management and Service Science. Journal of Management Information Systems, 26(4), 13\u201364.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"10266_CR7","doi-asserted-by":"crossref","first-page":"6","DOI":"10.69554\/JMIJ8204","volume":"14","author":"CJ Biddle","year":"2020","unstructured":"Biddle, C. J. (2020). Epidemics and pandemics as high consequence events: Expanding leadership challenges and responsibilities in business continuity during the COVID-19 pandemic and beyond. Journal of Business Continuity & Emergency Planning, 14(1), 6.","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"10266_CR8","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural networks for pattern recognition","author":"CM Bishop","year":"1995","unstructured":"Bishop, C. M. (1995). Neural networks for pattern recognition. Oxford University Press."},{"key":"10266_CR9","unstructured":"Chaykowski, K., & Coatney, M. (2018). From Broke To Billionaire: How Fred Luddy Built The World\u2019s Most Innovative Company. Retrieved August 29, 2020, from\u00a0https:\/\/www.forbes.com\/feature\/innovative-companies-service-now\/. Accessed 11 March\u00a02020."},{"key":"10266_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Q., Li, J. W., Liu, J. G., Han, J. T., Shi, Y., & Guo, X. H. (2020). Borrower learning effects: do prior experiences promote continuous successes in peer-to-peer lending?. Information Systems Frontiers,\u00a023(4), 963\u2013986","DOI":"10.1007\/s10796-020-10006-7"},{"issue":"1","key":"10266_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.compbiomed.2005.11.002","volume":"37","author":"E \u00c7omak","year":"2007","unstructured":"\u00c7omak, E., Arslan, A., & T\u00fcrko\u011flu, \u0130. (2007). A decision support system based on support vector machines for diagnosis of the heart valve diseases. Computers in Biology and Medicine, 37(1), 21\u201327.","journal-title":"Computers in Biology and Medicine"},{"key":"10266_CR12","unstructured":"Desai, J. (2010).\u00a0Service Level Agreements: A legal and practical guide. Ely: IT Governance Publishing."},{"issue":"12","key":"10266_CR13","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/2500499","volume":"56","author":"V Dhar","year":"2013","unstructured":"Dhar, V. (2013). Data science and prediction. Communications of the ACM, 56(12), 64\u201373.","journal-title":"Communications of the ACM"},{"issue":"1","key":"10266_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10796-014-9500-y","volume":"17","author":"YK Dwivedi","year":"2015","unstructured":"Dwivedi, Y. K., Wastell, D., Laumer, S., Henriksen, H. Z., Myers, M. D., Bunker, D., Elbanna, A., Ravishankar, M. N., & Srivastava, S. C. (2015). Research on information systems failures and successes: Status update and future directions. Information Systems Frontiers, 17(1), 143\u2013157.","journal-title":"Information Systems Frontiers"},{"issue":"5","key":"10266_CR15","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1007\/s10796-018-9878-z","volume":"20","author":"S Ghosh","year":"2018","unstructured":"Ghosh, S., Ghosh, K., Ganguly, D., Chakraborty, T., Jones, G. J., Moens, M. F., & Imran, M. (2018). Exploitation of social media for emergency relief and preparedness: Recent research and trends. Information Systems Frontiers, 20(5), 901\u2013907.","journal-title":"Information Systems Frontiers"},{"issue":"186","key":"10266_CR16","doi-asserted-by":"publisher","first-page":"51","DOI":"10.15446\/dyna.v81n186.37953","volume":"81","author":"H Gil-G\u00f3mez","year":"2014","unstructured":"Gil-G\u00f3mez, H., Oltra-Badenes, R., & Adarme-Jaimes, W. (2014). Service quality management based on the application of the ITIL standard \/ Gesti\u00f3n de la calidad de servicios apoyados en la aplicaci\u00f3n del est\u00e1ndar ITIL. DYNA, 81(186), 51\u201356.","journal-title":"DYNA"},{"key":"10266_CR17","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10796-008-9067-6","volume":"12","author":"J Goo","year":"2010","unstructured":"Goo, J. (2010). Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. Information Systems Frontiers, 12, 185\u2013205. https:\/\/doi.org\/10.1007\/s10796-008-9067-6","journal-title":"Information Systems Frontiers"},{"key":"10266_CR18","unstructured":"Gunn, S. (1998). Support Vector Machines for Classification and Regression (pp. 5\u201316, Tech.). Image Speech & Intelligent Systems Group, University of Southampton. Retrieved 2020, from\u00a0https:\/\/svms.org\/tutorials\/Gunn1998.pdf. Accessed 14 Aug 2020."},{"issue":"3","key":"10266_CR19","doi-asserted-by":"publisher","first-page":"1664","DOI":"10.1007\/s10664-017-9532-2","volume":"23","author":"M Gupta","year":"2018","unstructured":"Gupta, M., Asadullah, A., Padmanabhuni, S., & Serebrenik, A. (2018). Reducing user input requests to improve IT support ticket resolution process. Empirical Software Engineering: An International Journal, 23(3), 1664.","journal-title":"Empirical Software Engineering: An International Journal"},{"issue":"4","key":"10266_CR20","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1016\/j.eswa.2007.03.002","volume":"34","author":"D Hanbay","year":"2008","unstructured":"Hanbay, D., Turkoglu, I., & Demir, Y. (2008). An expert system based on wavelet decomposition and neural network for modeling Chua\u2019s circuit. Expert Systems with Applications, 34(4), 2278\u20132283. https:\/\/doi.org\/10.1016\/j.eswa.2007.03.002","journal-title":"Expert Systems with Applications"},{"key":"10266_CR21","volume-title":"Principles of data mining","author":"DJ Hand","year":"2001","unstructured":"Hand, D. J., Mannila, H., & Smyth, P. (2001). Principles of data mining. MIT Press."},{"key":"10266_CR22","unstructured":"Hedman, J., Srinivasan, N., & Lindgren, R. (2013, December). Digital traces of information systems: Sociomateriality made researchable. In proceedings of the 34th international conference on information systems (ICIS), December 15\u201318. Milan: Italy."},{"key":"10266_CR23","unstructured":"IBM Cloud Education. (2019). IT Infrastructure Library (ITIL). Retrieved September 21, 2020, from https:\/\/www.ibm.com\/cloud\/learn\/it-infrastructure-library#toc-what-does--u0gdth6p. Accessed 11 March 2022."},{"key":"10266_CR24","unstructured":"International Monetary Fund. (2015). World Economic Outlook Database October 2015. Retrieved December 10, 2020, from https:\/\/www.imf.org\/en\/Publications\/WEO\/weo-database\/2015\/October.\u00a0Accessed 10 Dec\u00a02020.\u00a0"},{"issue":"2","key":"10266_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.4301\/s1807-17752017000200004","volume":"14","author":"M J\u00e4ntti","year":"2017","unstructured":"J\u00e4ntti, M., & Cater-Steel, A. (2017). Proactive Management of IT Operations to Improve IT Services. JISTEM - Journal of Information Systems and Technology Management, 14(2), 191\u2013218. https:\/\/doi.org\/10.4301\/s1807-17752017000200004","journal-title":"JISTEM - Journal of Information Systems and Technology Management"},{"issue":"3","key":"10266_CR26","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.ijinfomgt.2013.03.001","volume":"33","author":"J J\u00e4rvel\u00e4inen","year":"2013","unstructured":"J\u00e4rvel\u00e4inen, J. (2013). IT incidents and business impacts: Validating a framework for continuity management in information systems. International Journal of Information Management, 33(3), 583\u2013590.","journal-title":"International Journal of Information Management"},{"key":"10266_CR27","doi-asserted-by":"publisher","unstructured":"Johnson, M., Albizri, A., & Harfouche, A. (2021). Responsible artificial intelligence in healthcare: Predicting and preventing insurance claim denials for economic and social wellbeing. Information Systems Frontiers.\u00a0https:\/\/doi.org\/10.1007\/s10796-021-10137-5","DOI":"10.1007\/s10796-021-10137-5"},{"issue":"11","key":"10266_CR28","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1287\/mnsc.2013.1720","volume":"59","author":"D Kc","year":"2013","unstructured":"Kc, D., Staats, B. R., & Gino, F. (2013). Learning from my success and from others\u2019 failure: Evidence from minimally invasive cardiac surgery. Management Science, 59(11), 2435\u20132449.","journal-title":"Management Science"},{"issue":"1","key":"10266_CR29","doi-asserted-by":"publisher","first-page":"205395171452848","DOI":"10.1177\/205395171452848","volume":"1","author":"R Kitchin","year":"2014","unstructured":"Kitchin, R. (2014). Big Data, new epistemologies and paradigm shifts. Big Data & Society, 1(1), 2053951714528481. https:\/\/doi.org\/10.1177\/205395171452848","journal-title":"Big Data & Society"},{"issue":"4","key":"10266_CR30","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.infoandorg.2008.05.001","volume":"18","author":"HK Klein","year":"2008","unstructured":"Klein, H. K., & Hirschheim, R. (2008). The structure of the IS discipline reconsidered: Implications and reflections from a community of practice perspective. Information and Organization, 18(4), 280\u2013302.","journal-title":"Information and Organization"},{"key":"10266_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94048-9","volume-title":"Transforming the IT Services Lifecycle with AI Technologies","author":"K Kloeckner","year":"2018","unstructured":"Kloeckner, K., Davis, J., Fuller, N. C., Lanfranchi, G., Pappe, S., Paradkar, A., Shwartz, L., Surendra, M., & Wiesmann, D. (2018). Transforming the IT Services Lifecycle with AI Technologies. Springer."},{"key":"10266_CR32","unstructured":"Lucidchart Content Team. (2019). How to Implement a Successful Incident Management Process. Retrieved August 29, 2020, from\u00a0https:\/\/www.lucidchart.com\/blog\/incident-management-process. Accessed 11 March 2022."},{"key":"10266_CR33","doi-asserted-by":"publisher","unstructured":"Lyubinets, V., Boiko, T., & Nicholas, D. (2018).\u00a0Automated labeling of bugs and tickets using attention-based mechanisms in recurrent neural networks. 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2018, pp. 271\u2013275, https:\/\/doi.org\/10.1109\/DSMP.2018.8478511.","DOI":"10.1109\/DSMP.2018.8478511"},{"issue":"3","key":"10266_CR34","doi-asserted-by":"publisher","first-page":"451","DOI":"10.5465\/amj.2010.51467631","volume":"53","author":"PM Madsen","year":"2010","unstructured":"Madsen, P. M., & Desai, V. (2010). Failing to learn? the effects of failure and success on organizational learning in the global orbital launch vehicle industry. Academy of Management Journal, 53(3), 451\u2013476.","journal-title":"Academy of Management Journal"},{"key":"10266_CR35","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.ins.2014.03.110","volume":"279","author":"S Maldonado","year":"2014","unstructured":"Maldonado, S., P\u00e9rez, J., Weber, R., & Labb\u00e9, M. (2014). Feature selection for support vector machines via mixed integer linear programming. Information Sciences, 279, 163\u2013175.","journal-title":"Information Sciences"},{"issue":"2","key":"10266_CR36","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s10796-017-9749-z","volume":"21","author":"ST March","year":"2019","unstructured":"March, S. T., & Scudder, G. D. (2019). Predictive maintenance: Strategic use of IT in manufacturing organizations. Information Systems Frontiers, 21(2), 327\u2013341.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10266_CR37","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/259034","volume":"24","author":"RG McGrath","year":"1999","unstructured":"McGrath, R. G. (1999). Falling forward: Real options reasoning and entrepreneurial failure. Academy of Management Review, 24(1), 13\u201330.","journal-title":"Academy of Management Review"},{"issue":"4","key":"10266_CR38","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s10796-019-09928-8","volume":"21","author":"L Motiwalla","year":"2019","unstructured":"Motiwalla, L., Deokar, A. V., Sarnikar, S., & Dimoka, A. (2019). Leveraging data analytics for behavioral research. Information Systems Frontiers, 21(4), 735\u2013742.","journal-title":"Information Systems Frontiers"},{"key":"10266_CR39","doi-asserted-by":"publisher","first-page":"30184","DOI":"10.1109\/ACCESS.2017.2744677","volume":"6","author":"S Mubeen","year":"2017","unstructured":"Mubeen, S., Asadollah, S. A., Papadopoulos, A. V., Ashjaei, M., Pei-Breivold, H., & Behnam, M. (2017). Management of service level agreements for cloud services in IoT: A systematic mapping study. IEEE Access, 6, 30184\u201330207.","journal-title":"IEEE Access"},{"key":"10266_CR40","unstructured":"Muhren, W. J., Van Den Eede, G., & de Walle, B. V. (2007). Organizational learning for the incident management process: Lessons from high reliability organizations.\u00a0In proceedings of the european conference on information systems, 65"},{"issue":"4","key":"10266_CR41","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1057\/ejis.2016.2","volume":"25","author":"O M\u00fcller","year":"2016","unstructured":"M\u00fcller, O., Junglas, I., Vom Brocke, J., & Debortoli, S. (2016). Utilizing big data analytics for information systems research: Challenges, promises and guidelines. European Journal of Information Systems, 25(4), 289\u2013302.","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10266_CR42","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/10580531003684959","volume":"27","author":"CE Pollard","year":"2010","unstructured":"Pollard, C. E., Gupta, D., & Satzinger, J. W. (2010). Teaching systems development: A compelling case for integrating the SDLC with the ITSM lifecycle. Information Systems Management, 27(2), 113\u2013122.","journal-title":"Information Systems Management"},{"key":"10266_CR43","unstructured":"Ponemon Institute. (2013). 2013 Cost of Data Center Outages (Rep.). Retrieved December 10, 2020, from Ponemon Institute website:\u00a0https:\/\/www.ponemon.org\/news-updates\/blog\/security\/2013-cost-of-data-center-outages.html. Accessed 10 Dec 2020."},{"key":"10266_CR44","unstructured":"Ponemon Institute. (2016). 2015 Cost of Data Center Outages (Rep.). Retrieved December 10, 2020, from Vertiv website: https:\/\/www.vertiv.com\/en-us\/about\/news-and-insights\/articles\/white-papers\/2016-ponemon-institute-report-on-cost-of-data-center-outages\/"},{"issue":"1","key":"10266_CR45","doi-asserted-by":"publisher","first-page":"33","DOI":"10.33557\/journalisi.v2i1.38","volume":"2","author":"MA Pratiwi","year":"2020","unstructured":"Pratiwi, M. A., & Tanaamah, A. R. (2020). Analysis of IT Service Management in the Salatigaku Application Using the Framework Information Technology Infrastructure Library (ITIL) V3. Journal of Information Systems and Informatics, 2(1), 33\u201343.","journal-title":"Journal of Information Systems and Informatics"},{"key":"10266_CR46","volume-title":"How and why things happen: anatomy of IT service incidents","author":"K Saarelainen","year":"2016","unstructured":"Saarelainen, K. (2016). How and why things happen: anatomy of IT service incidents. University of Eastern Finland."},{"issue":"3","key":"10266_CR47","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1023\/A:1010046210832","volume":"1","author":"AP Sage","year":"1999","unstructured":"Sage, A. P., & Rouse, W. B. (1999). Information systems frontiers in knowledge management. Information Systems Frontiers, 1(3), 205\u2013219.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10266_CR48","doi-asserted-by":"publisher","first-page":"107","DOI":"10.14257\/ijdta.2016.9.4.10","volume":"9","author":"R Sahal","year":"2016","unstructured":"Sahal, R., Khafagy, M. H., & Omara, F. A. (2016). A survey on SLA management for cloud computing and cloud-hosted big data analytic applications. International Journal of Database Theory and Application, 9(4), 107\u2013118.","journal-title":"International Journal of Database Theory and Application"},{"issue":"5","key":"10266_CR49","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1007\/s10796-020-10037-0","volume":"22","author":"D \u015een","year":"2020","unstructured":"\u015een, D., D\u00f6nmez, C. \u00c7., & Y\u0131ld\u0131r\u0131m, U. M. (2020). A hybrid bi-level metaheuristic for credit scoring. Information Systems Frontiers, 22(5), 1009\u20131019.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10266_CR50","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.eswa.2005.12.013","volume":"32","author":"A Sengur","year":"2007","unstructured":"Sengur, A., Turkoglu, I., & Ince, M. C. (2007). Wavelet packet neural networks for texture classification. Expert Systems with Applications, 32(2), 527\u2013533. https:\/\/doi.org\/10.1016\/j.eswa.2005.12.013","journal-title":"Expert Systems with Applications"},{"key":"10266_CR51","unstructured":"ServiceNow. (2020). Incident Management - ITSM. Retrieved August 29, 2020, from\u00a0https:\/\/www.servicenow.com\/products\/incident-management.html. Accessed 29 Aug 2022."},{"issue":"3","key":"10266_CR52","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1214\/10-STS330","volume":"25","author":"G Shmueli","year":"2010","unstructured":"Shmueli, G. (2010). To explain or to predict? Statistical Science, 25(3), 289\u2013310.","journal-title":"Statistical Science"},{"key":"10266_CR53","doi-asserted-by":"crossref","unstructured":"Shmueli, G., & Koppius, O. R. (2011). Predictive analytics in information systems research. MIS quarterly, 553\u2013572","DOI":"10.2307\/23042796"},{"key":"10266_CR54","doi-asserted-by":"publisher","unstructured":"Singh, J. P., Kumar, A., Rana, N. P., & Dwivedi, Y. K. (2020). Attention-based LSTM network for rumor veracity estimation of tweets. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-020-10040-5","DOI":"10.1007\/s10796-020-10040-5"},{"key":"10266_CR55","first-page":"231","volume":"14","author":"SB Sitkin","year":"1992","unstructured":"Sitkin, S. B. (1992). Learning through failure: The strategy of small losses. Research in Organizational Behavior, 14, 231\u2013266.","journal-title":"Research in Organizational Behavior"},{"key":"10266_CR56","doi-asserted-by":"crossref","unstructured":"Son, G., Hazlewood, V., & Peterson, G. (2014). On automating XSEDE user ticket classification. In Proceedings of the 2014 ACM Annual Conference on Extreme Science and Engineering Discovery Environment, pp. 41\u201348.","DOI":"10.1145\/2616498.2616549"},{"key":"10266_CR57","unstructured":"Splunk. (2019). Quantifying the Staggering Cost of IT Outages. Retrieved December 8, 2020, from https:\/\/priceonomics.com\/quantifying-the-staggering-cost-of-it-outages\/"},{"issue":"3","key":"10266_CR58","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/15228053.2016.1245522","volume":"18","author":"AK Swain","year":"2016","unstructured":"Swain, A. K. (2016). Mining big data to support decision making in healthcare. Journal of Information Technology Case and Application Research, 18(3), 141\u2013154.","journal-title":"Journal of Information Technology Case and Application Research"},{"key":"10266_CR59","doi-asserted-by":"crossref","unstructured":"Swain, A. K., & Cao, Q. (2014). Impact of online firm generated content (FGC) on supply chain performance: An empirical analysis.In Proceedings of the 47th HawaiiInternational conference on system sciences (HICSS), Institute of Electrical and Electronics Engineers (pp. 561\u2013573). IEEE.","DOI":"10.1109\/HICSS.2014.77"},{"issue":"2","key":"10266_CR60","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10796-017-9762-2","volume":"21","author":"AK Swain","year":"2019","unstructured":"Swain, A. K., & Cao, R. Q. (2019). Using sentiment analysis to improve supply chain intelligence. Information Systems Frontiers, 21(2), 469\u2013484.","journal-title":"Information Systems Frontiers"},{"key":"10266_CR61","doi-asserted-by":"crossref","unstructured":"Tan, K. H., Wong, W. P., & Chung, L. (2015) Information and knowledge leakage in supply chain. Information Systems Frontiers, 18(3), 621\u2013638.","DOI":"10.1007\/s10796-015-9553-6"},{"key":"10266_CR62","unstructured":"Uptime Institute (2018). Retrieved January 4, 2021, from Uptime Institute website:\u00a0https:\/\/uptimeinstitute.com\/data-center-outages-are-common-costly-and-preventable. Accessed 4 Jan 2021."},{"key":"10266_CR63","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V Vapnik","year":"1995","unstructured":"Vapnik, V. (1995). The Nature of Statistical Learning Theory. Springer."},{"issue":"2","key":"10266_CR64","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/10580530902797532","volume":"26","author":"M Winniford","year":"2009","unstructured":"Winniford, M., Conger, S., & Erickson-Harris, L. (2009). Confusion in the Ranks: IT Service Management Practice and Terminology. Information Systems Management, 26(2), 153\u2013163.","journal-title":"Information Systems Management"},{"issue":"12","key":"10266_CR65","first-page":"1624","volume":"44","author":"DD Wu","year":"2014","unstructured":"Wu, D. D., Olson, D. L., & Luo, C. (2014). A decision support approach for accounts receivable risk management. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 44(12), 1624\u20131632.","journal-title":"Systems, Man, and Cybernetics: Systems, IEEE Transactions on"},{"issue":"10","key":"10266_CR66","doi-asserted-by":"publisher","first-page":"13274","DOI":"10.1016\/j.eswa.2011.04.147","volume":"38","author":"BW Yap","year":"2011","unstructured":"Yap, B. W., Ong, S. H., & Husain, N. H. M. (2011). Using data mining to improve assessment of credit worthiness via credit scoring models. Expert Systems with Applications, 38(10), 13274\u201313283.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"10266_CR67","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10796-008-9131-2","volume":"12","author":"R Yuan","year":"2010","unstructured":"Yuan, R., Li, Z., Guan, X., & Xu, L. (2010). An SVM-based machine learning method for accurate internet traffic classification. Information Systems Frontiers, 12(2), 149\u2013156.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10266_CR68","doi-asserted-by":"publisher","first-page":"37","DOI":"10.19030\/jabr.v21i2.1488","volume":"21","author":"J Zurada","year":"2011","unstructured":"Zurada, J., & Lonial, S. (2011). Comparison of the performance of several data mining methods for bad debt recovery in the healthcare industry. Journal of Applied Business Research, 21(2), 37\u201354.","journal-title":"Journal of Applied Business Research"},{"key":"10266_CR69","doi-asserted-by":"crossref","unstructured":"Rizk, A., & Elragal, A. (2020). Data science: developing theoretical contributions in information systems via text analytics.\u00a0Journal of Big Data, 7(1), 1\u201326.","DOI":"10.1186\/s40537-019-0280-6"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10266-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10266-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10266-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T11:24:31Z","timestamp":1744197871000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10266-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,23]]},"references-count":69,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10266"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10266-5","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,23]]},"assertion":[{"value":"4 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicting interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}