{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T12:11:58Z","timestamp":1714997518202},"reference-count":13,"publisher":"CRC Press","isbn-type":[{"value":"9781420059779","type":"print"},{"value":"9781420059786","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,24]]},"DOI":"10.1081\/e-ese-120044247","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:09:12Z","timestamp":1469718552000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["Acquisitions Management"],"prefix":"10.1081","author":[{"given":"Ronald W.","family":"Morrison","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,7,28]]},"reference":[{"key":"CIT0001","volume-title":"CMMI for Outsourcing","author":"Hofmann H.","year":"2006"},{"key":"CIT0002","volume-title":"Risk Management Guide for DOD Acquisition","author":"Bahnmaier W.","year":"2003","edition":"5"},{"key":"CIT0004","volume-title":"IEEE Recommended Practice for Software Acquisition, IEEE Std 1062","year":"1998"},{"issue":"5","key":"CIT0005","first-page":"42","author":"Morrison R. W.","year":"1987","journal-title":"Program Manager"},{"key":"CIT0008","unstructured":"IEEE , Proceedings of the First International Conference on Requirements Engineering . , Colorado Springs, Co. , 1994 ."},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/52.526834"},{"key":"CIT0010","volume-title":"The Program Manager's Guide to Software Acquisition Best Practices (Version 2.0)","author":"Brown N.","year":"1997"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"},{"issue":"1","key":"CIT0015","first-page":"392","volume":"13","author":"Cottingen D.","year":"2006","journal-title":"Def. Acquis. Rev. J."},{"issue":"8","key":"CIT0017","first-page":"7","volume":"10","author":"Morrison R. W.","year":"1997","journal-title":"When is it useful, when is it not? Crosstalk"},{"key":"CIT0018","unstructured":"Brown , N. Missile Defense Agency's High-Confidence Software-Process Assessment Approach . , MDA National Team Software Group (Brief) , 2004 April ."},{"key":"CIT0019","volume-title":"Team Risk Management: A New Model for Customer-Supplier Relationships","author":"Higuera R.","year":"1994"},{"issue":"4","key":"CIT0020","first-page":"5","author":"DeMarco T.","year":"1998","journal-title":"Cutter IT J."}],"container-title":["Encyclopedia of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-ESE-120044247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:17:42Z","timestamp":1469719062000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-ESE-120044247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,24]]},"ISBN":["9781420059779","9781420059786"],"references-count":13,"alternative-id":["10.1081\/E-ESE-120044247","10.1081\/E-ESE"],"URL":"https:\/\/doi.org\/10.1081\/e-ese-120044247","relation":{},"subject":[],"published":{"date-parts":[[2010,11,24]]}}}