{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:25:46Z","timestamp":1763580346407},"reference-count":69,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1080\/08874417.2006.11645922","type":"journal-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T21:16:32Z","timestamp":1515705392000},"page":"14-29","source":"Crossref","is-referenced-by-count":17,"title":["Ontological Modeling Rules for UML: An Empirical Assessment"],"prefix":"10.1080","volume":"46","author":[{"given":"Joerg","family":"Evermann","sequence":"first","affiliation":[{"name":"Victoria University of Wellington Wellington, New Zeland"}]},{"given":"Yair","family":"Wand","sequence":"additional","affiliation":[{"name":"The University of British Columbia Vancouver, BC, V6T 1Z2"}]}],"member":"301","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"key":"CIT0001","volume-title":"Cognitive Psychology and Its Implications","author":"Anderson J.","year":"1995","edition":"4"},{"key":"CIT0002","volume-title":"Dictionary of Philosophy","author":"Angeles P.","year":"1981"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0202-8"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75579"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.4.384.9702"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/32.6191"},{"key":"CIT0007","volume-title":"Treatise on General Ontology, Ontology I \u2013 The Furniture of the World","author":"Bunge M.","year":"1977"},{"key":"CIT0008","volume-title":"Treatise on General Ontology, Ontology II \u2013 A World of Systems","author":"Bunge M.","year":"1979"},{"key":"CIT0009","first-page":"104","volume-title":"Proceedings of the International Conference on Information Systems","author":"Burton-Jones A.","year":"2002"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.82.6.407"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(70)90142-3"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(69)80069-1"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"CIT0014","volume-title":"Structured Analysis and System Specification","author":"DeMarco T.","year":"1978"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/1125944.1125949"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2004040104"},{"key":"CIT0017","first-page":"82","volume-title":"Ontologies and Business System Analysis","author":"Evermann J.","year":"2006"},{"key":"CIT0018","first-page":"91","volume-title":"Proceedings of the Workshop on Information Technologies and Systems WITS'01","author":"Evermann J.","year":"2001"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0208-2"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45581-7_27"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.15"},{"key":"CIT0022","volume-title":"UML Distilled: A Brief Guide to the Standard Object Oriented Modeling Language","author":"Fowler M.","year":"2000"},{"key":"CIT0023","volume-title":"Structured System Analysis: Tools and Techniques","author":"Gane C.","year":"1979"},{"key":"CIT0024","volume-title":"\u201cEmpirical Comparisons of Systems Analysis Modeling Techniques,\u201d","author":"Gemino A.","year":"1999"},{"key":"CIT0025","volume-title":"\u201cComparing Object Oriented with Structured Analysis Techniques in Conceptual Modeling,\u201d","author":"Gemino A.","year":"2001"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.12.009"},{"key":"CIT0027","volume-title":"Proceedings of the 3rd Symposium on Research in Systems Analysis and Design","author":"Gemino A.","year":"2004"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1145\/944217.944243"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0204-6"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(00)00010-7"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.172"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1287\/isre.5.1.48"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1991.11517925"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265814"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1991.130660"},{"key":"CIT0036","volume-title":"Principles of Program Design","author":"Jackson M.A.","year":"1975"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1145\/225014.225041"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.3.284.12206"},{"key":"CIT0039","volume-title":"Information System Design Methodologies: Improving the Practice","author":"Kung C.","year":"1986"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.2307\/3250969"},{"key":"CIT0041","volume-title":"Proceedings of the 10th Information Workshop on Exploring Modeling Methods in Systems Analysis and Design","author":"Lu S.","year":"2005"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.3102\/00346543059001043"},{"key":"CIT0043","volume-title":"Instructor's Resource Manual for Modern Systems Analysis and Design","author":"Miller L.","year":"2002"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"CIT0045","volume-title":"Conceptual Modeling, Databases and Cases","author":"Mylopoulos J.","year":"1992"},{"key":"CIT0046","volume-title":"Human Problem Solving","author":"Newell A.","year":"1972"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200012"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00123-0"},{"issue":"1","key":"CIT0049","first-page":"43","volume":"1","author":"Opdahl A.","year":"2002","journal-title":"Software and Systems Modeling"},{"issue":"3","key":"CIT0050","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1080\/07421222.2002.11045730","volume":"19","author":"Parsons J.","year":"2002","journal-title":"Journal of Management Information Systems"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.12.008"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1145\/265563.265578"},{"key":"CIT0053","volume-title":"Prentice Hall Test Manager for Hoffer, George Valacich \u2013 Modern Systems Analysis and Design","year":"2001","edition":"3"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97998-9"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49524-6_20"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.1999100105"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2004010103"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2001010103"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2005070103"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0203-7"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1201\/1078.10580530\/46108.23.3.20060601\/93706.5"},{"key":"CIT0062","first-page":"633","volume-title":"Proceedings of the 2002 America's Conference on Information Systems (AMCIS 2002)","author":"Siau K.","year":"2002"},{"key":"CIT0063","first-page":"7","volume-title":"Proceedings of the 12th Workshop in Information Technology and Systems (WITS '02)","author":"Siau K.","year":"2002"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(97)00009-4"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.175"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2002040101"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1145\/331983.331989"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.1993.tb00127.x"},{"key":"CIT0069","volume-title":"Modern Structured Analysis","author":"Yourdon E.","year":"1989"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2006.11645922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T21:17:31Z","timestamp":1515705451000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2006.11645922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":69,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2016,1,5]]},"published-print":{"date-parts":[[2006,6]]}},"alternative-id":["10.1080\/08874417.2006.11645922"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2006.11645922","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}