{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T22:59:23Z","timestamp":1762297163750},"reference-count":40,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1989,6,1]],"date-time":"1989-06-01T00:00:00Z","timestamp":612662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowledge Acquisition"],"published-print":{"date-parts":[[1989,6]]},"DOI":"10.1016\/s1042-8143(89)80020-2","type":"journal-article","created":{"date-parts":[[2007,1,18]],"date-time":"2007-01-18T07:20:09Z","timestamp":1169104809000},"page":"215-233","source":"Crossref","is-referenced-by-count":33,"title":["A framework for the validation of knowledge acquisition"],"prefix":"10.1016","volume":"1","author":[{"given":"Izak","family":"Benbasat","sequence":"first","affiliation":[]},{"given":"Jasbir S.","family":"Dhaliwal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1042-8143(89)80020-2_bib1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/356876.356879","article-title":"Validation, verification, and testing of computer software","volume":"14","author":"Adrion","year":"1982","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S1042-8143(89)80020-2_bib2","series-title":"Standards for Educational and Psychological testing","author":"American Psychological Association","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib3","first-page":"21","article-title":"R1 revisited: four years in the trenches","volume":"5","author":"Bachant","year":"1984","journal-title":"AI Magazine"},{"key":"10.1016\/S1042-8143(89)80020-2_bib4","series-title":"Representation and Understanding: Studies in Cognitive Science","first-page":"1","article-title":"Dimensions of representation","author":"Bobrow","year":"1975"},{"key":"10.1016\/S1042-8143(89)80020-2_bib5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0020-7373(87)80032-9","article-title":"Expertise transfer and complex problems: using Acquinas as a knowledge acquisition workbench for expert systems","volume":"26","author":"Boose","year":"1987","journal-title":"International Journal of Man\u2014Machine Studies"},{"key":"10.1016\/S1042-8143(89)80020-2_bib6","series-title":"Rule-Based Expert Systems: The MYCIN Experiments of the Stanford Heuristic Programming Project","author":"Buchanan","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib7","volume":"vol. 6","author":"Bunge","year":"1983"},{"key":"10.1016\/S1042-8143(89)80020-2_bib8","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1207\/s15516709cog0502_2","article-title":"Categorization and representation of physics problems by experts and novices","volume":"5","author":"Chi","year":"1981","journal-title":"Cognitive Science"},{"key":"10.1016\/S1042-8143(89)80020-2_bib9","series-title":"Proceedings of the 3rd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"5.1","article-title":"A methodology for validating large knowledge-bases","author":"Enand","year":"1988"},{"key":"10.1016\/S1042-8143(89)80020-2_bib10","first-page":"274","article-title":"Computers and Thought","author":"Feigenbaum","year":"1963"},{"key":"10.1016\/S1042-8143(89)80020-2_bib11","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/25051.25053","article-title":"Key factors in knowledge acquisition","volume":"11","author":"Fellers","year":"1987","journal-title":"Computer Personnel"},{"key":"10.1016\/S1042-8143(89)80020-2_bib12","series-title":"Proceedings of the International Conference on Expert Systems and the Leading Edge in Production Planning and Control","first-page":"213","article-title":"Rapid prototyping for expert systems","author":"Gaines","year":"1987"},{"key":"10.1016\/S1042-8143(89)80020-2_bib13","series-title":"Proceedings of the 3rd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"8.1","article-title":"Knowledge acquisition and technology","author":"Gaines","year":"1988"},{"key":"10.1016\/S1042-8143(89)80020-2_bib14","series-title":"Building Expert Systems","first-page":"241","article-title":"Evaluation of expert systems: issues and case studies","author":"Gaschnig","year":"1983"},{"key":"10.1016\/S1042-8143(89)80020-2_bib15","series-title":"Proceedings of Western Conference on Expert Systems","first-page":"38","article-title":"Verification and validation of expert systems","author":"Green","year":"1987"},{"key":"10.1016\/S1042-8143(89)80020-2_bib16","series-title":"Building Expert Systems","author":"Hayes-Roth","year":"1983"},{"key":"10.1016\/S1042-8143(89)80020-2_bib17","series-title":"Proceedings of the 3rd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"13.1","article-title":"Knowledge representation for knowledge elicitation","author":"Johnson","year":"1988"},{"key":"10.1016\/S1042-8143(89)80020-2_bib18","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1093\/jmp\/8.1.77","article-title":"What kind of expert should a system be?","volume":"8","author":"Johnson","year":"1983","journal-title":"The Journal of Medicine and Philosophy"},{"key":"10.1016\/S1042-8143(89)80020-2_bib19","series-title":"Proceedings of 1st AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"19.0","article-title":"Specification of expertise: knowledge acquisition for expert systems","author":"Johnson","year":"1986"},{"key":"10.1016\/S1042-8143(89)80020-2_bib20","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1287\/mnsc.14.2.B92","article-title":"Verification of computer simulation models","volume":"14","author":"Naylor","year":"1967","journal-title":"Management Science"},{"key":"10.1016\/S1042-8143(89)80020-2_bib21","series-title":"Psychometric Theory","author":"Nunnally","year":"1967"},{"key":"10.1016\/S1042-8143(89)80020-2_bib22","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MEX.1987.5006538","article-title":"Validating expert system performance","volume":"2","author":"O'Keefe","year":"1987","journal-title":"IEEE Expert."},{"key":"10.1016\/S1042-8143(89)80020-2_bib23","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1111\/j.1540-5915.1987.tb01536.x","article-title":"Validation of expert systems\u2014with applications to auditing and accounting expert systems","volume":"18","author":"O'Leary","year":"1987","journal-title":"Decision Sciences"},{"key":"10.1016\/S1042-8143(89)80020-2_bib24","series-title":"Proceedings of Artificial Intelligence in Simulation","first-page":"3","article-title":"Artificial intelligence and simulation","author":"Oren","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib25","series-title":"Proceedings of the 1986 Winter Simulation Conference","first-page":"850","article-title":"Quality assurance in cognizant simulative design","author":"Oren","year":"1986"},{"key":"10.1016\/S1042-8143(89)80020-2_bib26","series-title":"Proceedings of the Symposium on Waste Management","first-page":"381","article-title":"Model reliability and software quality assurance in simulation of nuclear fuel waste management systems","author":"Oren","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib27","series-title":"Addison-Wesley Tapes on Knowledge Acquisition","author":"Quinlan","year":"1987"},{"key":"10.1016\/S1042-8143(89)80020-2_bib28","series-title":"Proceedings of 2nd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"15.0","article-title":"Cognitive primitives","author":"Rappaport","year":"1987"},{"key":"10.1016\/S1042-8143(89)80020-2_bib29","series-title":"Proceedings of the 3rd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"28.1","article-title":"House calls: building and maintaining a diagnostic rule-base","author":"Ruberg","year":"1988"},{"key":"10.1016\/S1042-8143(89)80020-2_bib30","series-title":"Proceedings of the Winter Simulation Conference","first-page":"15","article-title":"An expository on verification and validation of simulation models","author":"Sargent","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib31","series-title":"Expert Systems\u2014A Practical Introduction","author":"Sell","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib32","series-title":"Proceedings of the 3rd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"30.1","article-title":"A methodology for recognizing conflict, correspondence, consensus, and contrast in a knowledge acquisition system","author":"Shaw","year":"1988"},{"key":"10.1016\/S1042-8143(89)80020-2_bib33","doi-asserted-by":"crossref","DOI":"10.1016\/S0020-7373(88)80026-9","article-title":"Validation in a knowledge support system: replication and consistence with multiple experts","author":"Shaw","year":"1988","journal-title":"International Journal of Man\u2014Machine Studies"},{"key":"10.1016\/S1042-8143(89)80020-2_bib34","series-title":"Rule-Based Expert Systems: The MYCIN Experiments of the Stanford Heuristic Programming Project","article-title":"Completeness and consistency in a rule-based system","author":"Suwa","year":"1985"},{"key":"10.1016\/S1042-8143(89)80020-2_bib35","doi-asserted-by":"crossref","first-page":"493","DOI":"10.2307\/248979","article-title":"Process tracing methods in decision support system research: exploring the black box","volume":"11","author":"Todd","year":"1987","journal-title":"Management Information Systems Quarterly"},{"key":"10.1016\/S1042-8143(89)80020-2_bib36","first-page":"677","article-title":"Inferential simulation: hypothesis-testing by computer simulation","volume":"30","author":"Vendierendonck","year":"1975","journal-title":"Nederlands Tijdschrift voor de Psychologie"},{"key":"10.1016\/S1042-8143(89)80020-2_bib37","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1111\/j.1540-5915.1987.tb01532.x","article-title":"An expert system application for decision support in law enforcement","volume":"18","author":"Vedder","year":"1987","journal-title":"Decision Sciences"},{"key":"10.1016\/S1042-8143(89)80020-2_bib38","series-title":"Proceedings of the 3rd AAAI Knowledge Acquisition for Knowledge-Based Systems Workshop","first-page":"37.1","article-title":"Knowledge acquisition at the front-end: defining the domain","author":"Woodward","year":"1988"},{"key":"10.1016\/S1042-8143(89)80020-2_bib39","series-title":"Managing the Structural Techniques: Strategies for Software Development in the 1990s","author":"Yourdon","year":"1986"},{"key":"10.1016\/S1042-8143(89)80020-2_bib40","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1001\/jama.1979.03300120033020","article-title":"Antimicrobial selection by computer: a blinded evaluation by infectious disease experts","volume":"242","author":"Yu","year":"1975","journal-title":"Journal of American Medical Association"}],"container-title":["Knowledge Acquisition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1042814389800202?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1042814389800202?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T16:58:23Z","timestamp":1547053103000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1042814389800202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,6]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1989,6]]}},"alternative-id":["S1042814389800202"],"URL":"https:\/\/doi.org\/10.1016\/s1042-8143(89)80020-2","relation":{},"ISSN":["1042-8143"],"issn-type":[{"value":"1042-8143","type":"print"}],"subject":[],"published":{"date-parts":[[1989,6]]}}}