{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:26:57Z","timestamp":1754195217471},"reference-count":32,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[1996,3]]},"DOI":"10.1080\/07421222.1996.11518105","type":"journal-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T23:53:07Z","timestamp":1449877987000},"page":"161-185","source":"Crossref","is-referenced-by-count":5,"title":["A Framework to Limit Systems Developers\u2019 Legal Liabilities"],"prefix":"10.1080","volume":"12","author":[{"given":"Bijoy","family":"Bordoloi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kathleen","family":"Mykytyn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"Jr.","given":"Peter P.","family":"Mykytyn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"issue":"2","key":"CIT0002","first-page":"103","volume":"13","author":"Alter S.","year":"1979","journal-title":"TIMS Studies in Management Sciences"},{"key":"CIT0004","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1080\/07421222.1993.11518006","volume":"10","author":"Barki H.","year":"1993","journal-title":"Journal of Management Information Systems"},{"key":"CIT0005","volume-title":"Computer Law","author":"Bender D.","year":"1993"},{"key":"CIT0006","first-page":"135","volume":"8","author":"Birnbaum L.N.","year":"1988","journal-title":"Computer\/Law Journal"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-51635-2_29"},{"key":"CIT0008","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1017\/S009885880000486X","volume":"7","author":"Brannigan A.","year":"1981","journal-title":"American Journal of Law and Medicine"},{"key":"CIT0010","volume-title":"Software Engineering Risk Analysis and Management","author":"Charette R.N.","year":"1989"},{"key":"CIT0011","first-page":"127","volume":"10","author":"Cole G.S.","year":"1990","journal-title":"Computer\/Law Journal"},{"key":"CIT0014","first-page":"509","volume":"9","author":"Desilets R.B.","year":"1989","journal-title":"Computer\/Law Journal"},{"key":"CIT0017","first-page":"173","volume":"8","author":"Gemignani M.C.","year":"1981","journal-title":"Rutgers Computers & Technology Law Journal"},{"key":"CIT0018","volume-title":"A Legal Guide to EDP Management","author":"Gemignani M.C.","year":"1989"},{"key":"CIT0019","volume-title":"Law Dictionary","author":"Gifts S.H.","year":"1984"},{"key":"CIT0021","first-page":"47","volume":"10","author":"Hagendorf W.","year":"1990","journal-title":"Computer\/Law Journal"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1991.tb00589.x"},{"issue":"10","key":"CIT0026","first-page":"6","volume":"33","author":"Joyce E.","year":"1988","journal-title":"Datamation"},{"issue":"1","key":"CIT0027","first-page":"40","volume":"20","author":"Kangari R.","year":"1989","journal-title":"Project Management Journal"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"key":"CIT0029","volume-title":"American Standard Handbook of Software Law","author":"Lautsch J.C.","year":"1985"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"issue":"1","key":"CIT0031","first-page":"1","volume":"5","author":"Levy L.B.","year":"1990","journal-title":"High Technology Law Journal"},{"key":"CIT0033","first-page":"103","volume":"11","author":"Madden M.S.","year":"1988","journal-title":"Journal of Products Liability"},{"key":"CIT0034","volume-title":"Managing Information Technology","author":"Martin E.W.","year":"1994"},{"issue":"5","key":"CIT0035","first-page":"142","volume":"59","author":"McFarlan F.W.","year":"1981","journal-title":"Harvard Business Review"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.2307\/249305"},{"issue":"1","key":"CIT0037","first-page":"11","volume":"7","author":"Nycum S.","year":"1979","journal-title":"Rutgers Computer and Technology Law Journal"},{"key":"CIT0039","volume-title":"Restatement (Second) of Torts","year":"1965"},{"key":"CIT0040","unstructured":"Restatement (Second) of Torts\u00a7 552, St. Paul, MN: American Law Institute, 1977."},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1145\/151233.151234"},{"key":"CIT0048","first-page":"455","volume":"8","author":"Turley T.M.","year":"1988","journal-title":"Computer\/Law Journal"},{"issue":"1","key":"CIT0049","first-page":"117","volume":"4","author":"Tyde J.","year":"1990","journal-title":"Software Law Journal"},{"key":"CIT0051","first-page":"144","volume-title":"Management Information Systems","author":"Warner E.","year":"1990"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.2307\/249336"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.1996.11518105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,29]],"date-time":"2022-05-29T02:01:34Z","timestamp":1653789694000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.1996.11518105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,3]]},"references-count":32,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2015,12,11]]},"published-print":{"date-parts":[[1996,3]]}},"alternative-id":["10.1080\/07421222.1996.11518105"],"URL":"https:\/\/doi.org\/10.1080\/07421222.1996.11518105","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996,3]]}}}