{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T12:46:44Z","timestamp":1692881204349},"reference-count":52,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1080\/08874417.2016.1163999","type":"journal-article","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T09:25:27Z","timestamp":1465809927000},"page":"288-294","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Examining System Administrators\u2019 Verification Information to Enhance IT Training Design"],"prefix":"10.1080","volume":"56","author":[{"given":"Nicole","family":"Forsgren","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Durcikova","sequence":"additional","affiliation":[]},{"given":"Robert J.","family":"Mills","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,6,13]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.2307\/248851"},{"key":"CIT0002","volume-title":"The Use of Aesthetics in HCI Systems. in ACM Conference on Human Factors in Computing Systems (CHI \u201807)","author":"Huh J","year":"2007"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.06.002"},{"key":"CIT0004","volume-title":"Why Don\u2019t You Trust Me Anymore? Or the Role of Trust in Troubleshooting Activities of System Administrators","author":"Kandogan E","year":"2003"},{"key":"CIT0005","doi-asserted-by":"crossref","DOI":"10.1145\/1125451.1125708","volume-title":"Trust as an Underlying Factor of System Administrator Interface Choice","author":"Takayama L","year":"2006"},{"key":"CIT0006","doi-asserted-by":"crossref","DOI":"10.1145\/1031607.1031672","volume-title":"Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices","author":"Barrett R","year":"2004"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"CIT0009","volume-title":"Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies, in Technical report CSD-02-1175","author":"Patterson D","year":"2002"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0141"},{"key":"CIT0011","first-page":"107","volume-title":"Competing in the information age: Strategic alignment and practice","author":"Piccoli G","year":"2002"},{"key":"CIT0012","first-page":"30","volume":"47","author":"Gilmer B.","year":"2005","journal-title":"Broadcast Eng"},{"key":"CIT0013","volume-title":"Keys to successful systems administration. in Computers in Libraries","author":"Akins ML","year":"1999"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1002\/pfi.4140410709"},{"key":"CIT0015","volume-title":"The agile maturity model applied to building and releasing software. ThoughtWorks White Paper","author":"Humble J","year":"2009"},{"key":"CIT0016","volume-title":"2014 State of DevOps Report., PuppetLabs","author":"Forsgren Velasquez N","year":"2014"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_01"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/3166.3170"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_02"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/93.978356"},{"key":"CIT0021","doi-asserted-by":"crossref","DOI":"10.1109\/52.903160","volume":"18","author":"Ferre X","year":"2001","journal-title":"IEEE Software"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/99977.99993"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/014492999119020"},{"key":"CIT0027","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","volume":"19","author":"DeLone W","year":"2003","journal-title":"J Manage Inf Syst"},{"key":"CIT0028","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/10864415.2004.11044317","volume":"9","author":"DeLone W","year":"2004","journal-title":"Int J Electron Commerce"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.2307\/3250989"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766152"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2009.5429030"},{"key":"CIT0033","first-page":"50","volume":"2","author":"Maglio P","year":"2004","journal-title":"Error messages: What\u2019s the problem? Queue"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1145\/379300.379314"},{"key":"CIT0035","first-page":"518","volume":"12","author":"Karjalainen M","year":"2011","journal-title":"J Assoc Inf Syst"},{"key":"CIT0036","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"Pujakainen P","year":"2010","journal-title":"MIS Q"},{"key":"CIT0037","first-page":"1","volume":"48","author":"Mills RJ","year":"2008","journal-title":"J Comput Inf Syst"},{"key":"CIT0038","first-page":"30","volume":"55","author":"Shouhong W","year":"2014","journal-title":"J Comput Inf Syst"},{"key":"CIT0039","volume-title":"The Systematic Design of Instruction, Third Edition","author":"Dick W","year":"1990"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303001"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1145\/301353.301402"},{"key":"CIT0042","first-page":"819","volume-title":"Task complexity, information types, search strategies and relevance: Integrating studies on information seeking and retrieval","volume":"35","author":"Vakkari P.","year":"1999"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(95)80035-R"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630310506"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.2307\/1252200"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/BF02729762"},{"key":"CIT0047","volume-title":"Task design and employee motivation","author":"Aldag R","year":"1979"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.2307\/258353"},{"key":"CIT0049","volume-title":"Scaling group tasks: A method for dimensional analysis, in Tech","volume":"1","author":"Shaw ME.","year":"1963"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.119.2.254"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(86)90044-0"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.2.240"},{"key":"CIT0053","volume-title":"The components of perceived risk. In Convention of the Association of Consumer Research","author":"Jacoby J","year":"1972"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.2307\/1250565"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T17:17:06Z","timestamp":1568049426000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2016.1163999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,13]]},"references-count":52,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,6,13]]},"published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1080\/08874417.2016.1163999"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2016.1163999","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}