{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:36:51Z","timestamp":1764873411980},"reference-count":74,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1080\/08874417.2013.11645636","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T08:49:38Z","timestamp":1460364578000},"page":"97-108","source":"Crossref","is-referenced-by-count":2,"title":["Requirements Uncertainty in Contract Software Development Projects"],"prefix":"10.1080","volume":"53","author":[{"given":"Werner","family":"Mellis","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Loebbecke","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Baskerville","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,10]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.27"},{"issue":"3","key":"CIT0002","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1080\/07421222.2002.11045695","volume":"18","author":"Andres H.","year":"2001","journal-title":"Journal of Management Information Systems"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.2307\/3150783"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00171.x"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/249565"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1241369"},{"key":"CIT0008","volume-title":"Extreme programming explained: Embrace change","author":"Beck K.","year":"1999"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/B0-12-369398-5\/00038-4"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1080\/026839699344782"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/2.59"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.110.2.305"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.111.4.1061"},{"issue":"3","key":"CIT0014","doi-asserted-by":"crossref","first-page":"479","DOI":"10.2307\/30036541","volume":"27","author":"Carte T.","year":"2003","journal-title":"MIS Quarterly"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0236"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/0007-6813(90)90040-I"},{"key":"CIT0017","volume-title":"Competing on internet time. Lessons from Netscape and its battle with Microsoft","author":"Cusumano M.","year":"1998"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/32.6190"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1147\/sj.211.0004"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"issue":"4","key":"CIT0021","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","volume":"19","author":"DeLone W.","year":"2003","journal-title":"Journal of Management Information Systems"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/1017816.1017819"},{"key":"CIT0023","volume-title":"Scale development. Theory and applications","author":"DeVellis R.","year":"2012","edition":"3"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2003.08.002"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.38.2.269.18845"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.006"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.5.2.155"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.12.1554.12072"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(91)90005-M"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"issue":"7","key":"CIT0032","first-page":"1","volume":"4","author":"Gefen D.","year":"2000","journal-title":"Communications of the AIS"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240301"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518248"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.4.451.12056"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.38.6.757"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2005100101"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.01.006"},{"issue":"5","key":"CIT0039","first-page":"108","volume":"75","author":"Iansiti M.","year":"1997","journal-title":"Harvard Business Review"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/358413.358430"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1086\/376806"},{"key":"CIT0042","volume-title":"Patterns of software systems failure and success","author":"Jones C.","year":"1996"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1145\/203330.203345"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.6.745.11941"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"},{"issue":"1","key":"CIT0046","doi-asserted-by":"crossref","first-page":"87","DOI":"10.2307\/20721416","volume":"34","author":"Lee G.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0047","volume-title":"\u201cUsing the \u2018Thinking Aloud\u2019 method in cognitive interface design,\u201d","author":"Lewis C.","year":"1982"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1111\/1540-5885.2003004"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1231158"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.1.133.10663"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.2307\/248674"},{"issue":"1","key":"CIT0052","doi-asserted-by":"crossref","first-page":"171","DOI":"10.2307\/20650283","volume":"33","author":"Marcoulides G.","year":"2009","journal-title":"MIS Quarterly"},{"issue":"27","key":"CIT0053","first-page":"483","volume":"23","author":"Mathiassen L.","year":"2008","journal-title":"Communications of the AIS"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1109\/CMPEUR.1990.113661"},{"issue":"11","key":"CIT0055","doi-asserted-by":"crossref","first-page":"569","DOI":"10.17705\/1jais.00143","volume":"8","author":"Mathiassen L.","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000357"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00049-2"},{"issue":"2","key":"CIT0058","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1080\/07421222.1996.11518124","volume":"13","author":"Nidumolu S.","year":"1996","journal-title":"Journal of Management Information Systems"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(96)01073-7"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.3.191"},{"key":"CIT0061","volume-title":"Psychometric theory","author":"Nunnally J.","year":"1978"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.15"},{"issue":"4","key":"CIT0063","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","volume":"31","author":"Petter S.","year":"2007","journal-title":"MIS Quarterly"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00047-1"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8116(02)00097-6"},{"key":"CIT0066","first-page":"1","volume-title":"Proceedings WESCON Western Electric Show and Convention","author":"Royce W.","year":"1987"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1993.39"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250171107"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.3.394.9772"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234420"},{"issue":"24","key":"CIT0071","first-page":"380","volume":"13","author":"Straub D.","year":"2004","journal-title":"Communication of the AIS"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.44.6.743"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0237"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.2307\/256134"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T09:19:45Z","timestamp":1567761585000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2013.11645636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":74,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,10]]},"published-print":{"date-parts":[[2013,3]]}},"alternative-id":["10.1080\/08874417.2013.11645636"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2013.11645636","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3]]}}}