{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:06:15Z","timestamp":1770818775815,"version":"3.50.1"},"reference-count":203,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2023,4,4]]},"DOI":"10.1080\/0144929x.2022.2032348","type":"journal-article","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T23:23:25Z","timestamp":1644362605000},"page":"596-623","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Practical applicability of user experience capability\/maturity models in the development processes of free and open-source software: a systematic literature review"],"prefix":"10.1080","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9396-376X","authenticated-orcid":false,"given":"Phesto","family":"Namayala","sequence":"first","affiliation":[{"name":"Department of Computer science and Engineering, University of Dodoma, Dodoma, Tanzania"}]},{"given":"Tabu","family":"Kondo","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications Engineering, University of Dodoma, Dodoma, Tanzania"}]},{"given":"Majuto","family":"Manyilizu","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications Engineering, University of Dodoma, Dodoma, Tanzania"}]},{"given":"Kilavo","family":"Hassan","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications Engineering, University of Dodoma, Dodoma, Tanzania"}]}],"member":"301","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2016.08.004"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2764946"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871710"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40409-7"},{"issue":"4","key":"CIT0005","first-page":"307","volume":"43","author":"Al-Qutaish R. E.","year":"2011","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/2639189.2641208"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/CONIITI.2018.8587080"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.02.062"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1002\/smr.311"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02032-2_21"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0546"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58077-7_49"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-009-0044-5"},{"key":"CIT0014","volume":"42","author":"Becker Joerg","year":"2010","journal-title":"Maturity Models in IS Research"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.06.004"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1145\/2141512.2141522"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.14236\/jhi.v23i2.866"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/985921.985991"},{"issue":"2","key":"CIT0019","first-page":"143","volume":"18","author":"Biberoglu E.","year":"2002","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.29085\/9781856048767"},{"key":"CIT0021","first-page":"48","volume":"4","author":"Boer J. de","year":"2013","journal-title":"Compact"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44811-3_12"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwt007"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134500"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1007\/11767718_23"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3206-8_3"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2007.12.001"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72486-7_32"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-999-1.ch021"},{"key":"CIT0030","unstructured":"Carraro, J. M. 2014. How Mature is Your Organization when it Comes to UX\u202f? UX Magazine. https:\/\/uxmag.com\/articles\/how-mature-is-your-organization-when-it-comes-to-ux."},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67383-7_7"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.10.012"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07638-6_2"},{"key":"CIT0034","volume-title":"Literature Review: Developing a Search Strategy","author":"Charles Stuart University","year":"2019"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188467"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29093-0_12"},{"key":"CIT0037","unstructured":"CMMI Product Team. 2010. CMMI for Development, Version 1.3. Software Engineering Process Management Program, November, 1\u2013520. https:\/\/CMU\/SEI-2010-TR-033ESC-TR-2010-033."},{"key":"CIT0038","volume-title":"Systematic Reviews: Inclusion and Exclusion Criteria","author":"Condron P.","year":"2019"},{"key":"CIT0039","unstructured":"Critical Appraisal Guidance Sheets. 2021. Oxford; https:\/\/www.cebm.ox.ac.uk\/resources\/ebm-tools\/critical-appraisal-tools."},{"key":"CIT0040","unstructured":"Critical Appraisal Skills Programme. 2020. CASP for Systematic Reviews Checklist. Oxford;, 2018, 368. https:\/\/casp-uk.net\/wp-content\/uploads\/2018\/01\/CASP-Systematic-Review-Checklist_2018.pdf%0Ahttps:\/\/casp-uk.net\/wp-content\/uploads\/2018\/03\/CASP-Systematic-Review-Checklist-2018_fillable-form.pdf."},{"key":"CIT0041","unstructured":"Damsa, D. 2017. UX Maturity Model: A Tool To Improve Collaboration With The UX Team. https:\/\/uxstudioteam.com\/ux-blog\/ux-maturity-model\/."},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1109\/52.300079"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914368"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1089\/g4h.2015.0091"},{"key":"CIT0045","unstructured":"de Bruin, T., M. Rosemann, R. Freeze, and U. Kulkarni. 2005. \u201cUnderstanding the main phases of developing a maturity assessment model.\u201d ACIS 2005 Proceedings - 16th Australasian Conference on Information Systems."},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69566-0_17"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1002\/jsc.2137"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07374-3"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1515\/ijm-2017-0015"},{"key":"CIT0050","unstructured":"Dujinhouwer, F.W., and C. Widdows. 2003. Capgemini Expert Letter - Open Source Maturity Model."},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009800404137"},{"key":"CIT0052","first-page":"1","volume":"5","author":"Earthy J.","year":"1998","journal-title":"INUSE Project Deliverable D5"},{"key":"CIT0053","first-page":"84","author":"Earthy J.","year":"1999","journal-title":"Lloyd\u2019s Register of Shipping, Version 2."},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1145\/1593105.1593168"},{"key":"CIT0055","unstructured":"Feij\u00f3, R. 2010. Planning Your UX Strategy. We Made It. http:\/\/johnnyholland.org\/2010\/04\/planning-your-ux-strategy\/."},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.2307\/25148740"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.285"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.2001.952464"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3061930"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.04.002"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1136\/oem.55.8.562"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1016\/j.tate.2016.09.002"},{"key":"CIT0063","unstructured":"Golden, B. 2008. Making Open Source Ready for the Enterprise\u202f: The Open Source Maturity Model. Open Source Business Resource. http:\/\/timreview.ca\/article\/145."},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1097-0"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.38636.593461.68"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.3048"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.010"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1109\/ICPAIR.2011.5976928"},{"key":"CIT0068a","unstructured":"Harrington, H. J. 1991. \u2018Business Process Improvement: The Breakthrough Strategy for Total Quality, Productivity, and Competitiveness.\u201d Retrieved from http:\/\/books.google.com\/books?id=cf4xJJabZbsC&pgis=1."},{"key":"CIT0069","volume-title":"The UX Book: Process and Guidelines for Ensuring a Quality User Experience","author":"Hartson R.","year":"2012","edition":"1"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-2967-5_4"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.2200\/s00261ed1v01y201003hci008"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2009.5071359"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.01.007"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1080\/01449290801939400"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1109\/52.2014"},{"key":"CIT0077","unstructured":"ISO\/IEC. 2004. Information Technology - Process Assessment - Part 1: Concepts and Vocabulary. 28. http:\/\/www.iso.org\/iso\/home\/store\/catalogue_tc\/catalogue_detail.htm?csnumber\u2009=\u200938932."},{"key":"CIT0078","unstructured":"ISO\/IEC. 2010. Information Technology- Software Process Assessment Part 2: A Reference Model for Processes and Process Capability. 1998, 1\u2013130."},{"key":"CIT0079","unstructured":"ISO\/IEC. 2011. ISO\/IEC 25010:2011 - Systems and Software Engineering \u2013 Systems and Software Quality Requirements and Evaluation (SQuaRE) \u2013 System and Software Quality Models. http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber\u2009=\u200935733."},{"key":"CIT0080","unstructured":"ISO\/IEC. 2019. ISO 9241-210:2019 Ergonomics of Human-system Interaction \u2014 Part 210: Human-centred Design for Interactive Systems. 33."},{"key":"CIT0081","unstructured":"ISO\/TR. 2000. ISO\/TR 18529:2000 - Ergonomics \u2013 Ergonomics of human-system interaction \u2013 Human-centred lifecycle process descriptions. International Organization for Standardization. https:\/\/www.iso.org\/standard\/33499.html."},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1145\/1940761.1940806"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1080\/01449290500168079"},{"key":"CIT0084","unstructured":"Karapanos, E. 2010. Quantifying Diversity in User Experience."},{"issue":"11","key":"CIT0085","first-page":"1509","volume":"3","author":"Karume S. M.","year":"2012","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2764490"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.12.010"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1109\/ISCI.2011.5958975"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41590-7_6"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47240-5_14"},{"key":"CIT0091","unstructured":"Kitchenham, B., and S. Charters. 2007. \u201cGuidelines for Performing Systematic Literature Reviews in Software Engineering.\u201d EBSE Technical Report Nr. EBSE-2007-01. In EBSE Technical Report. http:\/\/www.dur.ac.uk\/ebse\/resources\/Systematic-reviews-5-8.pdf."},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.006"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwz015"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.23919\/PICMET.2017.8125371"},{"key":"CIT0095","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39179-8_6"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20898-5_6"},{"key":"CIT0097","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468455"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.5121\/ijsea.2012.3407"},{"key":"CIT0099","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.08.020"},{"key":"CIT0100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58071-5"},{"key":"CIT0101","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.264"},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.06.001"},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.1016\/j.erap.2015.08.002"},{"issue":"9","key":"CIT0104","first-page":"1","volume":"6","author":"Lasrado L. A.","year":"2015","journal-title":"Proceedings of the 38th Information Systems Research Seminar in Scandinavia (IRIS 38)"},{"issue":"2","key":"CIT0105","first-page":"58","volume":"922","author":"Law E. L. C.","year":"2012","journal-title":"CEUR Workshop Proceedings"},{"key":"CIT0106","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.09.006"},{"key":"CIT0107","doi-asserted-by":"publisher","DOI":"10.1109\/ALPIT.2007.83"},{"key":"CIT0108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01209-9_18"},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.33"},{"key":"CIT0110","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053345"},{"key":"CIT0111","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/hci2013.40"},{"key":"CIT0112","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.74862"},{"key":"CIT0113","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.60"},{"key":"CIT0114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20898-5_10"},{"key":"CIT0115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40409-7_42"},{"key":"CIT0116","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.153"},{"key":"CIT0117","doi-asserted-by":"publisher","DOI":"10.15265\/IY-2015-006"},{"key":"CIT0118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40480-1_46"},{"key":"CIT0119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23768-3_106"},{"key":"CIT0120","doi-asserted-by":"publisher","DOI":"10.1002\/spip.440"},{"key":"CIT0121","doi-asserted-by":"publisher","DOI":"10.4018\/jsds.2010100105"},{"key":"CIT0122","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337209"},{"key":"CIT0123","doi-asserted-by":"publisher","DOI":"10.5753\/isys.2020.761"},{"key":"CIT0124","doi-asserted-by":"publisher","DOI":"10.1108\/ITSE-05-2019-0025"},{"key":"CIT0125","doi-asserted-by":"publisher","DOI":"10.1108\/07378831011026698"},{"key":"CIT0126","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.037"},{"key":"CIT0127","volume":"2","author":"Nichols D. M.","year":"2005","journal-title":"First Monday"},{"key":"CIT0128","unstructured":"Nielsen, J. 2006a. Corporate UX Maturity: Stages 1-4. https:\/\/www.nngroup.com\/articles\/ux-maturity-stages-1-4\/."},{"key":"CIT0129","volume-title":"Corporate UX Maturity: Stages 5-8","author":"Nielsen J.","year":"2006"},{"key":"CIT0130","unstructured":"Noyes, K. 2013. Open source is Taking Over the Software World, Survey Says. ttps:\/\/www.pcworld.com\/article\/2035651\/open-source-is-taking-over-the-software-world-survey-says.html."},{"key":"CIT0131","first-page":"1","author":"Oreku G. S.","year":"2013","journal-title":"2013 IST-Africa Conference & Exhibition"},{"key":"CIT0132","doi-asserted-by":"publisher","DOI":"10.1109\/CBI49978.2020.10056"},{"key":"CIT0133","doi-asserted-by":"publisher","DOI":"10.1109\/Agile.2015.13"},{"key":"CIT0134","unstructured":"OWASP. 2017. Open Software Assurance Maturity Model (Open-SAMM). Cc, 1\u201396. http:\/\/www.opensamm.org\/."},{"key":"CIT0135","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.n71"},{"key":"CIT0136","doi-asserted-by":"publisher","DOI":"10.1590\/s1806-37562018000000088"},{"key":"CIT0137","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"CIT0138","doi-asserted-by":"publisher","DOI":"10.1109\/AGILE.2014.15"},{"key":"CIT0139","doi-asserted-by":"publisher","DOI":"10.1109\/CISTI.2015.7170443"},{"key":"CIT0140","doi-asserted-by":"publisher","DOI":"10.1017\/9781316585061"},{"key":"CIT0141","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/235392"},{"key":"CIT0142","unstructured":"Pickett, P. 2019. How Open-Source Software Works. https:\/\/www.thebalancecareers.com\/what-is-open-source-software-2071941."},{"key":"CIT0143","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2013.06.040"},{"key":"CIT0144","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9609-6"},{"key":"CIT0145","author":"P\u00f6ppelbu\u00df J.","year":"2011","journal-title":"19th European Conference on Information Systems, ECIS 2011, 4801"},{"issue":"4","key":"CIT0146","first-page":"2295","volume":"3","author":"Prasad D.","year":"2013","journal-title":"International Journal o Engine"},{"key":"CIT0147","doi-asserted-by":"publisher","DOI":"10.1145\/2815782.2815807"},{"key":"CIT0148","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480637"},{"key":"CIT0149","doi-asserted-by":"publisher","DOI":"10.1002\/pfi.119"},{"key":"CIT0150","first-page":"175","author":"Rabello R.","year":"2012","journal-title":"Proceedings of the 11th\u2009\u2026\u2009, 5138"},{"key":"CIT0151","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.10.009"},{"key":"CIT0152","doi-asserted-by":"publisher","DOI":"10.1145\/2523429.2523463"},{"key":"CIT0153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17837-0_6"},{"key":"CIT0154","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.01.018"},{"key":"CIT0155","doi-asserted-by":"publisher","DOI":"10.1007\/s00366-011-0222-1"},{"key":"CIT0156","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2937-0.ch001"},{"key":"CIT0157","unstructured":"Rooney, P. 2005. IBM Builds Dedicated Sales Channel For Red Hat, Novell Linux. http:\/\/www.crn.com\/news\/applications-os\/175002626\/ibm-builds-dedicated-sales-channel-for-red-hat-novell-linux.htm."},{"key":"CIT0158","unstructured":"Roto, V., E. Law, A. Vermeeren, and J. Hoonhout. 2011. \u201cUser Experience White Paper: Bringing clarity to the concept of user experience.\u201d Seminar, 1\u201312. http:\/\/www.allaboutux.org\/files\/UX-WhitePaper.pdf."},{"key":"CIT0159","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19860-6"},{"key":"CIT0160","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23535-2_26"},{"key":"CIT0161","doi-asserted-by":"publisher","DOI":"10.5100\/jje.30.1"},{"key":"CIT0162","unstructured":"Sakhardande, P., and R. Thanawala. 2014. UX Maturity Model: From Usable to Delightful. User Experience Magazine. User Experience, The Magazine of the User Experience Professionals Association. http:\/\/uxpamagazine.org\/ux-maturity-model\/."},{"issue":"3","key":"CIT0163","first-page":"21","volume":"5","author":"Saleh M. F.","year":"2011","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"CIT0164","first-page":"173","volume-title":"20th International Conference on Software Engineering and Knowledge Engineering, SEKE 2008","author":"Salviano C. F.","year":"2008"},{"key":"CIT0165","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09684-1_19"},{"key":"CIT0166","doi-asserted-by":"publisher","DOI":"10.2478\/s13531-012-0070-9"},{"key":"CIT0167","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.75"},{"key":"CIT0168","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053350"},{"key":"CIT0169","doi-asserted-by":"publisher","DOI":"10.1017\/S0266462303000163"},{"key":"CIT0170","doi-asserted-by":"publisher","DOI":"10.1145\/1295014.1295019"},{"key":"CIT0171","doi-asserted-by":"publisher","DOI":"10.1002\/spip.255"},{"key":"CIT0172","unstructured":"Semeteys, R. 2008. Method for Qualification and Selection of Open Source Software. Open Source Business Resource. http:\/\/timreview.ca\/article\/146."},{"key":"CIT0173","first-page":"1","author":"Senyard A.","year":"2004","journal-title":"Asia-Pacific Software Engineering"},{"key":"CIT0174","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.j4008"},{"key":"CIT0175","doi-asserted-by":"publisher","DOI":"10.4230\/OASIcs.ICCSW.2014.74"},{"key":"CIT0176","doi-asserted-by":"publisher","DOI":"10.5120\/20080-2132"},{"key":"CIT0177","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2010.494535"},{"key":"CIT0178","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.09.008"},{"key":"CIT0179","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13244-5_36"},{"key":"CIT0180","doi-asserted-by":"publisher","DOI":"10.1109\/52.819970"},{"issue":"2007","key":"CIT0181","first-page":"35","volume":"2","author":"Sward D.","year":"2007","journal-title":"Towards a UX Manifesto"},{"key":"CIT0182","first-page":"426","volume-title":"ICSEA - The Tenth International Conference on Software Engineering Advances","author":"Taibi D.","year":"2015"},{"key":"CIT0183","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72486-7_14"},{"key":"CIT0184","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753476"},{"key":"CIT0185","doi-asserted-by":"publisher","DOI":"10.1080\/00207590701396674"},{"key":"CIT0186","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.033"},{"key":"CIT0187","first-page":"17","volume":"662","author":"Van Steenbergen M.","year":"2010","journal-title":"CEUR Workshop Proceedings"},{"key":"CIT0188","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02806-9_74"},{"key":"CIT0189","unstructured":"Von-Wangenheim, C. G. V., J. C. R. Hauck, C. F. Salviano, and A. Von-Wangenheim. 2010. Systematic Literature Review of Software Process Capability\/Maturity Models. 10th International SPICE Conference on Software Process Improvement and Capability Determination, SPICE 2010, April 2015."},{"key":"CIT0190","doi-asserted-by":"publisher","DOI":"10.1145\/3131085.3131105"},{"key":"CIT0191","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.02.029"},{"key":"CIT0192","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3009514"},{"key":"CIT0193","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.07.007"},{"key":"CIT0194","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810862751"},{"key":"CIT0195","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"CIT0195a","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"CIT0196","doi-asserted-by":"publisher","DOI":"10.1177\/0739456X17723971"},{"key":"CIT0197","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.034"},{"key":"CIT0198","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.06.007"},{"key":"CIT0199","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918172"},{"key":"CIT0200","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2017.1421006"},{"key":"CIT0201","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.010"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2022.2032348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T14:22:16Z","timestamp":1682518936000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2022.2032348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,8]]},"references-count":203,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,4,4]]}},"alternative-id":["10.1080\/0144929X.2022.2032348"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2022.2032348","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-12-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}