{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:46:45Z","timestamp":1771872405371,"version":"3.50.1"},"reference-count":52,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1080\/08874417.2009.11645388","type":"journal-article","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T14:50:22Z","timestamp":1770389422000},"page":"95-105","source":"Crossref","is-referenced-by-count":1,"title":["The Factors Affecting Success of Knowledge-Based Systems at the Organizational Level"],"prefix":"10.1080","volume":"50","author":[{"given":"Gee-Woo","family":"Bock","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Seoul 110-745, Korea"}]},{"given":"Ayoung","family":"Suh","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul 120-750, Korea"}]},{"given":"Kyung-Shik","family":"Shin","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul 120-750, Korea"}]},{"given":"An","family":"Hu","sequence":"additional","affiliation":[{"name":"Avenue Asia Singapore Pte. Ltd., Singapore 049483"}]}],"member":"301","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250961"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2009.11646047"},{"key":"e_1_2_1_5_1","volume-title":"Organizational learning: creating, retaining and transferring knowledge.","author":"Argote L.","year":"1999","unstructured":"Argote, L. Organizational learning: creating, retaining and transferring knowledge. Norwell, Mass: Kluwer Academic Publishers, 1999."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.4.571.14424"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148718"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/41166671"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/249610"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0908"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/249620"},{"key":"e_1_2_1_12_1","unstructured":"Chin W. Overview of the PLS method available at: http:\/\/disc-nt.cba.uh.edu\/chin\/PLSINTRO.htm 2003."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148808"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393553"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.3.342"},{"key":"e_1_2_1_19_1","unstructured":"Feigenbaum E. Friedland P. E. Johnson B. Nii H. P. Schorr H. Shrobe H. and Engelmore R. \u201cKnowledge-based systems in Japan \u201d Japanese Technology Evaluation Center (JTEC) available at: http:\/\/www.wtec.org\/loyola\/kb\/toc.htm 1993."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/249689"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199602)17:2<109::AID-SMJ796>3.0.CO;2-P"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518102"},{"issue":"2","key":"e_1_2_1_23_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1080\/08874417.2003.11647083","article-title":"\u201cA verification-based conflict resolution strategy for knowledge management systems,\u201d","volume":"42","author":"Hicks R. C.","year":"2002","unstructured":"Hicks, R. C., Dattero, R., and Galup, S. D. \u201cA verification-based conflict resolution strategy for knowledge management systems,\u201d Journal of Computer Information Systems, (42:2), 2002, 36\u201341.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_1_24_1","volume-title":"The Source of innovation","author":"Hippel V. E.","year":"1998","unstructured":"Hippel, V. E. The Source of innovation, Oxford University Press, New York and Oxford, 1998."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2007.11645996"},{"key":"e_1_2_1_26_1","unstructured":"Kern T. \u201cThe Gestalt of an information technology outsourcing relationship: an exploratory analysis \u201d In Proceedings of the Eighteenth International Conference on Information Systems 1997 37\u201358."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(00)00048-2"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148668"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.7.5.502"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199805)19:5<461::AID-SMJ953>3.0.CO;2-L"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/249458"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00074-4"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518221"},{"issue":"5","key":"e_1_2_1_34_1","first-page":"23","article-title":"\u201cManaging your outsourcing vendor in the financial services industry,\u201d","volume":"43","author":"Lowell M.","year":"1992","unstructured":"Lowell, M. \u201cManaging your outsourcing vendor in the financial services industry,\u201d Journal of Systems Management (43:5), 1992, 23\u201336.","journal-title":"Journal of Systems Management"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2000.11045646"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/17.366399"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(02)00049-7"},{"issue":"2","key":"e_1_2_1_38_1","first-page":"9","article-title":"\u201cHow to manage an IT outsourcing alliance,\u201d","volume":"36","author":"McFarlan F. W.","year":"1995","unstructured":"McFarlan, F. W., and Nolan, R. L. \u201cHow to manage an IT outsourcing alliance,\u201d Sloan Management Review (36:2), 1995, 9\u201323.","journal-title":"Sloan Management Review"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2003010103"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2006100105"},{"key":"e_1_2_1_41_1","first-page":"96","volume-title":"Harvard Business Review on knowledge management.","author":"Nonaka I.","year":"1991","unstructured":"Nonaka, I. The knowledge-creating company. In Harvard Business Review on knowledge management. Harvard Business School Press: Boston, Mass, 1991, 96\u2013104."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.02.001"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.50.96"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/3556658"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.183"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jibs.8490188"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.4.351.14429"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250171105"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1995.tb00838.x"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.6.1.76"},{"issue":"4","key":"e_1_2_1_52_1","first-page":"45","article-title":"\u201cManage codified knowledge,\u201d","volume":"40","author":"Zack M. H.","year":"1999","unstructured":"Zack, M. H. \u201cManage codified knowledge,\u201d Sloan Management Review (40:4), 1999, 45\u201358.","journal-title":"Sloan Management Review"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(01)00050-6"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2009.11645388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T14:50:28Z","timestamp":1770389428000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2009.11645388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["10.1080\/08874417.2009.11645388"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2009.11645388","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12]]}}}