{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:13:50Z","timestamp":1770995630305,"version":"3.50.1"},"reference-count":85,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Information Systems"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1057\/palgrave.ejis.3000540","type":"journal-article","created":{"date-parts":[[2005,9,15]],"date-time":"2005-09-15T06:03:11Z","timestamp":1126764191000},"page":"229-243","source":"Crossref","is-referenced-by-count":57,"title":["A critical approach to evaluation"],"prefix":"10.1080","volume":"14","author":[{"given":"Ela","family":"Klecun","sequence":"first","affiliation":[{"name":"Department of Information SystemsLondon School of Economics and Political Science London U.K."}]},{"given":"Tony","family":"Cornford","sequence":"additional","affiliation":[{"name":"Department of Information SystemsLondon School of Economics and Political Science London U.K."}]}],"member":"301","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"CIT0001","volume-title":"Department of Information Systems and Computing","author":"Abdulrasul S","year":"2001"},{"key":"CIT0002","volume-title":"Critical Management Studies","author":"Alvesson M","year":"1992"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(03)00131-X"},{"key":"CIT0004","first-page":"5","volume-title":"Evaluaing Health Care Information Systems","author":"Anderson JD","year":"1994"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/0268-4012(95)00046-A"},{"key":"CIT0006","first-page":"55","volume-title":"Sixth European Conference on Information Technology Evaluation","author":"Bannister F","year":"1999"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1504\/IJHTM.2001.001109"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(99)00011-8"},{"key":"CIT0009","volume-title":"Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change","author":"Bijker WE","year":"1997"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1992.tb00401.x"},{"key":"CIT0011","volume-title":"Research Methods in Health: Investigating Health and Health Services","author":"Bowling A","year":"1997"},{"key":"CIT0012","volume-title":"Critical Management Studies Conference","author":"Bryans P","year":"1999"},{"key":"CIT0013","volume-title":"Sociological Paradigms and Organizational Analysis: Elements of the Sociology of Corporate Life","author":"Burrell G","year":"1985"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(94)90030-2"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1017\/S0963180101002079"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/BF02678527"},{"key":"CIT0017","volume-title":"Second Oxford Clinical Intranet and Internet Conference","author":"Dabrowska E","year":"1999"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(92)90059-O"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"CIT0020","volume-title":"The Handbook of Qualitative Research","author":"Denzin NK","year":"1994"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.2307\/3348969"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1126\/science.417400"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1057\/jit.1998.8"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1108\/09593849910278196"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1995.5"},{"key":"CIT0028","volume-title":"How to Evaluate IT Investment: A Study of Methods and Practices","author":"Farbey B","year":"1993"},{"key":"CIT0029","volume-title":"Critical Theory of Technology","author":"Feenberg A","year":"1991"},{"key":"CIT0030","volume-title":"Telemedicine: A Guide to Assessing Telecommunications in Health Care","author":"Field MJ","year":"1996"},{"key":"CIT0031","volume-title":"Evaluation Methods in Medical Informatics","author":"Friedman CP","year":"1996"},{"key":"CIT0032","volume-title":"Philosophical Hermeneutics","author":"Gadamer H-G","year":"1976"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1287\/inte.8.4.59"},{"key":"CIT0034","volume-title":"Communication and the Evolution of Society","author":"Habermas J","year":"1979"},{"key":"CIT0035","volume-title":"The Theory of Communicative Action \u2013 The Critique of Functionalist Reason","author":"Habermas J","year":"1987"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1108\/09593849910278277"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.316.7149.1959"},{"key":"CIT0038","first-page":"194","volume-title":"Sociological Theory and Medical Sociology","author":"Hillier S","year":"1987"},{"key":"CIT0039","first-page":"188","volume-title":"Critical Theory: Selected Essays","author":"Horkheimer M","year":"1972"},{"key":"CIT0040","volume-title":"Dialectic of Enlightenment","author":"Horkheimer M","year":"1972"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1108\/10662240010322957"},{"key":"CIT0043","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-14549-2","volume-title":"Management, Information and Power: A Narrative of the Involved Manager","author":"Introna LD","year":"1997"},{"key":"CIT0044","first-page":"155","volume-title":"Global and Organizational Discourse about Information Technology","author":"Introna LD","year":"2002"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1145\/358413.358430"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000405"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.1997.0040094"},{"key":"CIT0048","first-page":"327","volume-title":"IFIP WG8.2 & WG8.6 Joint Working Conference on Information Systems: Current Issues and Future Changes","author":"Kaplan B","year":"1998"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(01)00183-6"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(01)00184-8"},{"key":"CIT0051","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1055\/s-0038-1633862","volume":"43","author":"Kaplan B","year":"2004","journal-title":"Methods of Information in Medicine"},{"key":"CIT0052","first-page":"71","volume":"70","author":"Kaplan R","year":"1992","journal-title":"Harvard Business Review"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1504\/IJHTM.2003.004163"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2000.00074.x"},{"key":"CIT0055","volume-title":"Computerization and Controversy: Value Conflicts and Social Choices","author":"Kling R","year":"1996"},{"key":"CIT0056","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-0-387-35505-4_8","volume-title":"Organizational and Social Perspectives on Information Technology","author":"Land F","year":"2000"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1108\/09593849910278547"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.326.7394.860"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1258\/1357633971930977"},{"key":"CIT0060","volume-title":"The Social Shaping of Technology: How the Refrigerator Got Its Hum","author":"Mackenzie D","year":"1985"},{"key":"CIT0061","volume-title":"One-Dimensional Man","author":"Marcuse H","year":"1970"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(00)00394-4"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(02)00419-7"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1080\/0268396022000017734"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(93)90070-A"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2601033"},{"key":"CIT0067","doi-asserted-by":"crossref","DOI":"10.4135\/9781452243696","volume-title":"Critical Theory and Methodology","author":"Morrow RD","year":"1994"},{"key":"CIT0068","volume-title":"Designing Human Systems for New Technology: The ETHICS Method","author":"Mumford E","year":"1983"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1080\/02683960210145968"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(89)90045-1"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.4.404.14600"},{"key":"CIT0072","first-page":"11","volume":"38","author":"Orlikowski WJ","year":"1997","journal-title":"Sloan Management Review"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1057\/jors.1992.4"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1057\/jit.1991.30"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000304"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(99)00043-X"},{"key":"CIT0078","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1055\/s-0038-1634349","volume":"42","author":"Stoop AP","year":"2003","journal-title":"Methods of Information in Medicine"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1991.35"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(99)00035-0"},{"key":"CIT0081","first-page":"105","volume-title":"Introduction to Telemedicine","author":"Taylor P","year":"1999"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(99)00029-5"},{"key":"CIT0083","first-page":"55","volume-title":"Rethinking IT and Health","author":"Wallace S","year":"1998"},{"key":"CIT0084","volume-title":"Interpreting Information Systems in Organizations","author":"Walsham G","year":"1993"},{"key":"CIT0085","volume-title":"Beyond the IT Productivity Paradox","author":"Willcocks L","year":"1999"},{"key":"CIT0086","volume-title":"Information and Communication Technologies: Visions and Realities","author":"Williams R","year":"1996"},{"key":"CIT0088","volume-title":"Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought","author":"Winner L","year":"1977"},{"key":"CIT0089","volume-title":"Information and Communication Technologies: Visions and Realities","author":"Woolgar S","year":"1996"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(02)00108-9"}],"container-title":["European Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/palgrave.ejis.3000540.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1057\/palgrave.ejis.3000540\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1057\/palgrave.ejis.3000540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/palgrave.ejis.3000540.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T14:19:58Z","timestamp":1683209998000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1057\/palgrave.ejis.3000540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":85,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,12,19]]},"published-print":{"date-parts":[[2005,9]]}},"alternative-id":["10.1057\/palgrave.ejis.3000540"],"URL":"https:\/\/doi.org\/10.1057\/palgrave.ejis.3000540","relation":{},"ISSN":["0960-085X","1476-9344"],"issn-type":[{"value":"0960-085X","type":"print"},{"value":"1476-9344","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}