{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:45:05Z","timestamp":1750229105849},"reference-count":45,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1992,2,1]],"date-time":"1992-02-01T00:00:00Z","timestamp":696902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1992,2]]},"DOI":"10.1016\/0164-1212(92)90095-2","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T04:31:55Z","timestamp":1060317115000},"page":"189-199","source":"Crossref","is-referenced-by-count":18,"title":["Toward a taxonomy of software application domains: History"],"prefix":"10.1016","volume":"17","author":[{"given":"Robert L.","family":"Glass","sequence":"first","affiliation":[]},{"given":"Iris","family":"Vessey","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No. 3","key":"10.1016\/0164-1212(92)90095-2_BIB1","doi-asserted-by":"crossref","DOI":"10.1016\/0164-1212(89)90034-4","article-title":"Volume, Distance and Productivity","volume":"vol. 10","author":"Blum","year":"1989","journal-title":"J. Systems Software"},{"key":"10.1016\/0164-1212(92)90095-2_BIB2","series-title":"Proceedings of the 11th International Conference on Software Engineering","year":"1989"},{"key":"10.1016\/0164-1212(92)90095-2_BIB3","series-title":"Proceedings of the 9th International Conference on Software Engineering","year":"1987"},{"issue":"No. 3","key":"10.1016\/0164-1212(92)90095-2_BIB4","doi-asserted-by":"crossref","DOI":"10.1109\/32.21764","article-title":"The Case for Eclectic Design of Real-Time Software","volume":"Vol. 15","author":"Sanden","year":"1989","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0164-1212(92)90095-2_BIB5","doi-asserted-by":"crossref","DOI":"10.1111\/j.1540-5915.1991.tb00344.x","article-title":"Cognitive Fit: A Theory-Based Analysis of the Graphs and Tables Literature","volume":"Vol. 22","author":"Vessey","year":"1991","journal-title":"Decision Sci."},{"key":"10.1016\/0164-1212(92)90095-2_BIB6","series-title":"Father, Son& Co.","author":"Watson","year":"1990"},{"key":"10.1016\/0164-1212(92)90095-2_BIB7","doi-asserted-by":"crossref","DOI":"10.1109\/MAHC.1981.10021","article-title":"Early IBM Computers: Edited Testimony","author":"Hurd","year":"1981","journal-title":"Ann. Hist. Comput."},{"key":"10.1016\/0164-1212(92)90095-2_BIB8","doi-asserted-by":"crossref","DOI":"10.1145\/356540.356543","article-title":"Electronic Computers\u2014A Historical Survey","author":"Rosen","year":"1969","journal-title":"ACM Comput. Surveys"},{"key":"10.1016\/0164-1212(92)90095-2_BIB9","series-title":"Special Issue: Fortran's 25th Anniversary","year":"1984"},{"key":"10.1016\/0164-1212(92)90095-2_BIB10","doi-asserted-by":"crossref","DOI":"10.1109\/MAHC.1979.10013","article-title":"The History of Fortran I, II and III","author":"Backus","year":"1979","journal-title":"Ann. Hist. Comput."},{"key":"10.1016\/0164-1212(92)90095-2_BIB11","series-title":"Programming Languages and Systems","author":"Rosen","year":"1967"},{"key":"10.1016\/0164-1212(92)90095-2_BIB12","series-title":"Programming Languages: History and Fundamentals","author":"Sammet","year":"1969"},{"issue":"No. 7","key":"10.1016\/0164-1212(92)90095-2_BIB13","doi-asserted-by":"crossref","DOI":"10.1145\/361454.361485","article-title":"Programming Languages: History and Future","volume":"Vol. 15","author":"Sammet","year":"1972","journal-title":"Comm. ACM"},{"key":"10.1016\/0164-1212(92)90095-2_BIB14","series-title":"The Programmer's Algol","author":"Lecht","year":"1967"},{"key":"10.1016\/0164-1212(92)90095-2_BIB15","series-title":"Algol 60 Implementation","author":"Randell","year":"1964"},{"key":"10.1016\/0164-1212(92)90095-2_BIB16","series-title":"Special Issue: SAGE (Semi-Automated Ground Environment)","year":"1983"},{"key":"10.1016\/0164-1212(92)90095-2_BIB17","series-title":"Machine-Independent Computer Programming","author":"Halstead","year":"1962"},{"key":"10.1016\/0164-1212(92)90095-2_BIB18","series-title":"The Second Coming: More Computing Projects which Failed","article-title":"The \u201cProject which Failed\u201d which Succeeded","author":"Glass","year":"1980"},{"key":"10.1016\/0164-1212(92)90095-2_BIB19","series-title":"Tales of Computing Folk: Hot Dogs and Mixed Nuts","article-title":"Parochialism and the Commercial\/Scientific Merger","author":"Glass","year":"1978"},{"key":"10.1016\/0164-1212(92)90095-2_BIB20","doi-asserted-by":"crossref","DOI":"10.1109\/MAHC.1986.10033","article-title":"System\/360: A Retrospective View","author":"Evans","year":"1986","journal-title":"Ann. Hist. Comput."},{"key":"10.1016\/0164-1212(92)90095-2_BIB21","series-title":"The Programmer's PL\/1","author":"Lecht","year":"1968"},{"key":"10.1016\/0164-1212(92)90095-2_BIB22","series-title":"Advances in Computer Architecture","author":"Myers","year":"1978"},{"key":"10.1016\/0164-1212(92)90095-2_BIB23","series-title":"Personal Computing with the UCSD P-System","article-title":"The Background of the P-System","author":"Overgaard","year":"1983"},{"key":"10.1016\/0164-1212(92)90095-2_BIB24","series-title":"Software Engineering with Ada","author":"Booch","year":"1983"},{"issue":"No. 1","key":"10.1016\/0164-1212(92)90095-2_BIB25","doi-asserted-by":"crossref","DOI":"10.1145\/366243.366299","article-title":"Discussion\u2014the Pros and Cons of a Special IR Language","volume":"Vol. 5","author":"Bohnert","year":"1962","journal-title":"Commun. ACM"},{"issue":"No. 3","key":"10.1016\/0164-1212(92)90095-2_BIB26","article-title":"President's Letter","volume":"Vol. 8","author":"Forsythe","year":"1965","journal-title":"Commun. ACM"},{"issue":"No. 6","key":"10.1016\/0164-1212(92)90095-2_BIB27","article-title":"The Teaching of Computing","volume":"Vol. 8","author":"Gruenberger","year":"1965","journal-title":"Commun. ACM"},{"issue":"No. 3","key":"10.1016\/0164-1212(92)90095-2_BIB28","doi-asserted-by":"crossref","DOI":"10.1145\/365230.365257","article-title":"The Next 700 Programming Languages","volume":"Vol. 9","author":"Landin","year":"1966","journal-title":"Commun. ACM"},{"issue":"No. 7","key":"10.1016\/0164-1212(92)90095-2_BIB29","article-title":"As the Industry Sees It","volume":"Vol. 15","author":"Bell","year":"1972","journal-title":"Commun. ACM"},{"issue":"No. 7","key":"10.1016\/0164-1212(92)90095-2_BIB30","doi-asserted-by":"crossref","DOI":"10.1145\/361454.361482","article-title":"Programming Systems and Languages 1965\u20131975","volume":"Vol. 15","author":"Rosen","year":"1972","journal-title":"Commun. ACM"},{"issue":"No. 5","key":"10.1016\/0164-1212(92)90095-2_BIB31","article-title":"Editor's Assessment: Two New Departments","volume":"Vol. 14","author":"Lynn","year":"1971","journal-title":"Comm. ACM"},{"issue":"No. 7","key":"10.1016\/0164-1212(92)90095-2_BIB32","doi-asserted-by":"crossref","DOI":"10.1145\/361454.361499","article-title":"On the Present and Future of Scientific Computing","volume":"Vol. 15","author":"Rice","year":"1972","journal-title":"Commun. ACM"},{"issue":"No. 12","key":"10.1016\/0164-1212(92)90095-2_BIB33","doi-asserted-by":"crossref","DOI":"10.1145\/361604.361608","article-title":"President's Letter","volume":"Vol. 18","author":"Sammet","year":"1975","journal-title":"Commun. ACM"},{"issue":"No. 2","key":"10.1016\/0164-1212(92)90095-2_BIB34","doi-asserted-by":"crossref","DOI":"10.1145\/42372.315792","article-title":"Policy Discussion","volume":"Vol. 31","author":"Denning","year":"1988","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(92)90095-2_BIB35","series-title":"Proceedings of the First International Conference on Information Systems","article-title":"The Management Information Systems Area: Problems, Challenges and Opportunities","author":"Dickson","year":"1980"},{"issue":"No. 7","key":"10.1016\/0164-1212(92)90095-2_BIB36","doi-asserted-by":"crossref","DOI":"10.1145\/362619.362622","article-title":"The State of Computer Oriented Curriculum in Business Schools 1970","volume":"Vol. 14","author":"McKenney","year":"1971","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(92)90095-2_BIB37","series-title":"Management Information Systems: Conceptual Foundations, Structure and Development","author":"Davis","year":"1974"},{"key":"10.1016\/0164-1212(92)90095-2_BIB38","series-title":"Proceedings of the First International Conference on Information Systems","article-title":"MIS Research: Reference Disciplines and a Cumulative Tradition","author":"Keen","year":"1980"},{"key":"10.1016\/0164-1212(92)90095-2_BIB39","series-title":"Proceedings of the Tenth International Conference on Information Systems","author":"MIS: Academic Discipline or Temporary Phenomena","year":"1989"},{"key":"10.1016\/0164-1212(92)90095-2_BIB40","article-title":"Schizophrenia in Software Engineering","author":"Glass","year":"1989","journal-title":"Syst. Dev."},{"issue":"No. 12","key":"10.1016\/0164-1212(92)90095-2_BIB41","article-title":"On the Cruelty of Really Teaching Computer Science","volume":"Vol. 32","author":"Dijkstra","year":"1989","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(92)90095-2_BIB42","article-title":"Software Aspects of Strategic Defense Systems","author":"Parnas","year":"1985","journal-title":"Am. Sci."},{"issue":"No. 4","key":"10.1016\/0164-1212(92)90095-2_BIB43","doi-asserted-by":"crossref","DOI":"10.1109\/MC.1987.1663532","article-title":"No Silver Bullet: Essence and Accidents of Software Engineering","volume":"Vol. 30","author":"Brooks","year":"1987","journal-title":"IEEE Computer"},{"issue":"No. 1","key":"10.1016\/0164-1212(92)90095-2_BIB44","doi-asserted-by":"crossref","DOI":"10.1109\/MS.1987.229789","article-title":"Classifying Software for Reusability","volume":"Vol. 4","author":"Prieto-Diaz","year":"1987","journal-title":"IEEE Software"},{"key":"10.1016\/0164-1212(92)90095-2_BIB45","series-title":"Taxonomy of Computer Science and Engineering","author":"The AFIPS Taxonomy Committee","year":"1980"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0164121292900952?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0164121292900952?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T05:33:38Z","timestamp":1585114418000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0164121292900952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,2]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1992,2]]}},"alternative-id":["0164121292900952"],"URL":"https:\/\/doi.org\/10.1016\/0164-1212(92)90095-2","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1992,2]]}}}