{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:37:16Z","timestamp":1775230636047,"version":"3.50.1"},"reference-count":53,"publisher":"Informa UK Limited","issue":"5","license":[{"start":{"date-parts":[[2007,10,1]],"date-time":"2007-10-01T00:00:00Z","timestamp":1191196800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Information Systems"],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1057\/palgrave.ejis.3000703","type":"journal-article","created":{"date-parts":[[2007,10,30]],"date-time":"2007-10-30T11:27:50Z","timestamp":1193743670000},"page":"531-541","source":"Crossref","is-referenced-by-count":71,"title":["Concepts of product software"],"prefix":"10.1080","volume":"16","author":[{"given":"Lai","family":"Xu","sequence":"first","affiliation":[{"name":"CSIRO ICT Centre Hobart Australia"}]},{"given":"Sjaak","family":"Brinkkemper","sequence":"additional","affiliation":[{"name":"Institute of Information and Computing Sciences, Utrecht University Utrecht the Netherlands"}]}],"member":"301","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00039-7"},{"key":"CIT0002","volume-title":"Software Architecture in Practice","author":"Bass L","year":"1998"},{"key":"CIT0003","volume-title":"Extreme Programming Explained: Embrace Change","author":"Beck K","year":"2000"},{"key":"CIT0004","doi-asserted-by":"crossref","DOI":"10.1145\/336512.336584","volume-title":"Software Economics: A Roadmap","author":"Boehm BW","year":"2000"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/52.854068"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/163298.163309"},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-60578-9_14","volume-title":"Software Configuration Management: ICSE SCM-4 and SCM-5 Workshops: Selected Papers","author":"Buffenbarger J","year":"1995"},{"key":"CIT0008","first-page":"961","volume-title":"11th International Workshop on Database and Expert Systems Applications (DEXA\u201900)","author":"Carlshamre P","year":"2000"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/019722497129322"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/17.366403"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1108\/09593849810204503"},{"key":"CIT0012","volume-title":"SEI Monographs on Use of Commercial Software in Government Systems","author":"Carney D","year":"1997"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/52.841700"},{"key":"CIT0014","volume-title":"The Business of Software","author":"Cusumano MA","year":"2004"},{"key":"CIT0015","volume-title":"Microsoft Secrets","author":"Cusumano MA","year":"1995"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/2.796110"},{"key":"CIT0018","volume-title":"Proceedings of the Workshop on Software Change and Evolution (SCE\u201999)","author":"Deifel B","year":"1999"},{"key":"CIT0019","first-page":"279","volume-title":"The Future of Software Engineering 2000","author":"Estublier J","year":"2000"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380090402"},{"key":"CIT0021","volume-title":"Managing Quality: The Strategic and Competitive Edge","author":"Garvin DA","year":"1998"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/52.391837"},{"key":"CIT0023","first-page":"63","volume":"66","author":"Hauser J","year":"1988","journal-title":"Harvard Business Review"},{"key":"CIT0025","first-page":"246","volume-title":"Software Quality \u2013 ECSQ\u201802, 7th International Conference","author":"Jaccheri ML","year":"2002"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1002\/smr.330"},{"key":"CIT0027","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/ICSE.1996.493416","volume-title":"Proceedings of the 18th international conference on Software engineering","author":"Kontio J","year":"1996"},{"key":"CIT0028","volume-title":"The Rational Unified Process: An Introduction","author":"Kruchten P","year":"2000"},{"key":"CIT0029","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-93177-748-3.ch001","volume-title":"Theoretical Models in IS Research and the Technology Acceptance Model (TAM)","author":"Leong L","year":"2003"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1002\/smr.240"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1145\/1060710.1060742"},{"key":"CIT0032","first-page":"1062","volume-title":"Proceedings of the 12th European Conference on Information Systems","author":"Light B","year":"2004"},{"key":"CIT0033","volume-title":"Rapid Development: Taming Wild Software Schedules","author":"McConnell S","year":"1996"},{"key":"CIT0034","first-page":"165","volume-title":"Proceedings of the first International Conference on COTS Based Software Systems (ICCBBS\u2019 2002)","author":"Morisio M","year":"2002"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:19971350"},{"key":"CIT0036","volume-title":"The Art of Software Testing","author":"Myers GJ","year":"1979"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.1"},{"key":"CIT0038","first-page":"283","volume-title":"Proceedings of the 12th International Requirements Engineering Conference","author":"Natt Och Dag J","year":"2004"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233986"},{"key":"CIT0040","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/METRIC.2001.915536","volume-title":"Proceedings of the Seventh International Software Metrics Symposium (METRICS\u201901)","author":"Ochs M","year":"2001"},{"key":"CIT0043","volume-title":"Software Engineering: A Practitioner's Approach","author":"Pressman RS","year":"2000"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/0019-8501(94)90024-8"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1007\/s007660170015"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000345"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1145\/384150.384168"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1147\/sj.374.0552"},{"key":"CIT0049","volume-title":"Agile Software Development with Scrum","author":"Schwaber K","year":"2001"},{"key":"CIT0050","volume-title":"Software Engineering","author":"Sommerville I","year":"1995"},{"key":"CIT0051","volume-title":"DSDM: A Framework for Business Centered Development","author":"Stapleton J","year":"1997"},{"key":"CIT0052","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-60578-9_20","volume-title":"Software Configuration Management \u2013 ICSE SCM-4 and SCM5-5 Workshops, Selected Papers","author":"Tryggeseth E","year":"1995"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6451.00133"},{"key":"CIT0054","volume-title":"Software Engineering Principles and Practice","author":"Van Vliet H","year":"2000"},{"key":"CIT0055","first-page":"312","volume-title":"Proceedings of the 14th International Requirements Engineering Conference","author":"Van de Weerd I","year":"2006"},{"key":"CIT0056","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-63014-7_4","volume-title":"Proceedings of the SCM-7 Workshop on Software Configuration Management","author":"Wingerd L","year":"1997"},{"key":"CIT0057","first-page":"1","volume-title":"Proceedings of the first International Workshop on Development and Deployment of Product Software 2005 (DDoPS\u201905)","author":"Xu L","year":"2005"}],"container-title":["European Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/palgrave.ejis.3000703.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1057\/palgrave.ejis.3000703\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1057\/palgrave.ejis.3000703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/palgrave.ejis.3000703.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T13:34:19Z","timestamp":1629984859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1057\/palgrave.ejis.3000703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":53,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,12,19]]},"published-print":{"date-parts":[[2007,10]]}},"alternative-id":["10.1057\/palgrave.ejis.3000703"],"URL":"https:\/\/doi.org\/10.1057\/palgrave.ejis.3000703","relation":{},"ISSN":["0960-085X","1476-9344"],"issn-type":[{"value":"0960-085X","type":"print"},{"value":"1476-9344","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10]]}}}