{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T02:36:48Z","timestamp":1775097408843,"version":"3.50.1"},"reference-count":31,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,2,1]]},"abstract":"<jats:p>The failure of organizations to adopt CASE tools has been an area of interest to business researchers for over a decade. The purpose of this study is to test whether the previous research provides a basis for predicting the current adoption of CASE tools by organizations. This study uses a neural network methodology to predict CASE tool adoption using factors that were previously identified in the literature. The model consisted of six variables: IS department stability, need to improve IS department performance, use of external sources of knowledge, job rotation, pressure to reduce development time, and CASE champion. The study found that all the variables were relevant in the prediction of CASE tool adoption with an average accuracy of 71.43 percent.<\/jats:p>","DOI":"10.1108\/02635570410522099","type":"journal-article","created":{"date-parts":[[2004,3,30]],"date-time":"2004-03-30T18:14:37Z","timestamp":1080670477000},"page":"129-135","source":"Crossref","is-referenced-by-count":46,"title":["Prediction of CASE adoption: a neural network approach"],"prefix":"10.1108","volume":"104","author":[{"given":"Steven A.","family":"Morris","sequence":"first","affiliation":[]},{"given":"Timothy H.","family":"Greer","sequence":"additional","affiliation":[]},{"given":"Cary","family":"Hughes","sequence":"additional","affiliation":[]},{"given":"W.","family":"Jeff Clark","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021320240047700_B1","doi-asserted-by":"crossref","unstructured":"Aiken, M. (1999), \u201cUsing a neural network to forecast inflation\u201d, Industrial Management & Data Systems, Vol. 99 No. 7, pp. 296\u2010301.","DOI":"10.1108\/02635579910291984"},{"key":"key2022021320240047700_B2","doi-asserted-by":"crossref","unstructured":"Azjen, I. (1991), \u201cTheory of planned behavior\u201d, Organizational Behavior and Human Decision Process, Vol. 50, pp. 179\u2010211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2022021320240047700_B3","doi-asserted-by":"crossref","unstructured":"Bajgoric, N., Altinel, I.K., Draman, M. and Unal, A.T. (2002), \u201cSome aspects of using CASE tools in a fusion\u2010based application development project for production optimization\u201d, Industrial Management & Data Systems, Vol. 102 No. 8, pp. 463\u201071.","DOI":"10.1108\/02635570210445899"},{"key":"key2022021320240047700_B4","doi-asserted-by":"crossref","unstructured":"Bhattacherjee, A. (2002), \u201cIndividual trust in online firms: scale development and initial test\u201d, Journal of Management Information Systems, Vol. 19 No. 1, pp. 211\u201041.","DOI":"10.1080\/07421222.2002.11045715"},{"key":"key2022021320240047700_B5","doi-asserted-by":"crossref","unstructured":"Chau, P.Y.K. (1996), \u201cAn empirical investigation of factors affecting the acceptance of CASE by systems developers\u201d, Information & Management, Vol. 30, pp. 269\u201080.","DOI":"10.1016\/S0378-7206(96)01074-9"},{"key":"key2022021320240047700_B6","doi-asserted-by":"crossref","unstructured":"Crede, A. (1997), \u201cSocial, cultural, economic and legal barriers to the development of technology\u2010based information systems\u201d, Industrial Management & Data Systems, Vol. 97 No. 1, January, pp. 58\u201062.","DOI":"10.1108\/02635579710161368"},{"key":"key2022021320240047700_B7","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, September, pp. 319\u201040.","DOI":"10.2307\/249008"},{"key":"key2022021320240047700_B8","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022021320240047700_B9","unstructured":"Dillman, D.A. (1978), Mail and Telephone Surveys: The Total Design Method, John Wiley and Sons, New York, NY."},{"key":"key2022021320240047700_B10","doi-asserted-by":"crossref","unstructured":"Dorsey, R.E. and Mayer, W.J. (1995), \u201cGenetic algorithms for estimation problems with multiple optima, non\u2010differentiability, and other irregular features\u201d, Journal of Business and Economic Statistics, Vol. 13 No. 1, pp. 53\u201066.","DOI":"10.1080\/07350015.1995.10524579"},{"key":"key2022021320240047700_B11","doi-asserted-by":"crossref","unstructured":"Gallivan, M.J. (2001), \u201cOrganizational adoption and assimilation of complex technological innovations: development and application of a new framework\u201d, The DATA BASE for Advances in Information Systems, Vol. 32 No. 3, Summer, pp. 51\u201085.","DOI":"10.1145\/506724.506729"},{"key":"key2022021320240047700_B12","doi-asserted-by":"crossref","unstructured":"Glass, R.L. (1999), \u201cThe realities of software technology pay\u2010offs\u201d, Communications of the ACM, Vol. 42 No. 2, pp. 74\u20109.","DOI":"10.1145\/293411.293481"},{"key":"key2022021320240047700_B13","unstructured":"Heiat, A., Heiat, N. and Spicer, J. (1995), \u201cFuture software training needs: contrast in needs as perceived by business and academia\u201d, Journal of IS Education, Vol. 7 No. 3, pp. 102\u20108."},{"key":"key2022021320240047700_B14","doi-asserted-by":"crossref","unstructured":"Henderson, J.C. and Cooprider, J.G. (1990), \u201cDimensions of I\/S planning and design aids: a functional model of CASE technology\u201d, Information Systems Research, Vol. 1 No. 3, September, pp. 227\u201054.","DOI":"10.1287\/isre.1.3.227"},{"key":"key2022021320240047700_B15","doi-asserted-by":"crossref","unstructured":"Holland, J.H. (1992), \u201cGenetic algorithms\u201d, Scientific America, July, pp. 66\u201072.","DOI":"10.1038\/scientificamerican0792-66"},{"key":"key2022021320240047700_B16","unstructured":"Hughes, C. and Clark, J. (1990), \u201cCASE: the reality of current utilization\u201d, Information Executive, Vol. 3 No. 3, pp. 14\u201016."},{"key":"key2022021320240047700_B17","doi-asserted-by":"crossref","unstructured":"Jurison, J. (2000), \u201cPerceived value and technology adoption across four end\u2010user groups\u201d, Journal of End\u2010User Computing, Vol. 12 No. 4, October\u2010December, pp. 21\u20108.","DOI":"10.4018\/joeuc.2000100103"},{"key":"key2022021320240047700_B18","doi-asserted-by":"crossref","unstructured":"McMurtrey, M.E., Teng, J.T.C., Grover, V. and Kher, H.V. (2000), \u201cCurrent utilization of CASE technology: lessons from the field\u201d, Industrial Management & Data Systems, Vol. 100 No. 1, January, pp. 22\u201030.","DOI":"10.1108\/02635570010273027"},{"key":"key2022021320240047700_B19","doi-asserted-by":"crossref","unstructured":"Nelson, A.C. and Rottman, J. (1996), \u201cBefore and after CASE adoption\u201d, Information & Management, Vol. 31, pp. 193\u2010202.","DOI":"10.1016\/S0378-7206(96)01063-4"},{"key":"key2022021320240047700_B20","doi-asserted-by":"crossref","unstructured":"Nord, D.G. and Nord. J.H. (1997), \u201cInformation systems project development: knowledge and domain requirements for the systems analyst\u201d, Industrial Management & Data Systems, Vol. 97 No. 1, January, pp. 17\u201024.","DOI":"10.1108\/02635579710161304"},{"key":"key2022021320240047700_B21","doi-asserted-by":"crossref","unstructured":"Prescott, M.B. and Van Slyke, C. (1997), \u201cUnderstanding the Internet as an innovation\u201d, Industrial Management & Data Systems, Vol. 97 No. 3\u20104, March\u2010April, pp. 119\u201024.","DOI":"10.1108\/02635579710173185"},{"key":"key2022021320240047700_B22","doi-asserted-by":"crossref","unstructured":"O\u2019Leary, D.E. (1998), \u201cUsing neural networks to predict corporate failure\u201d, International Journal of Intelligent Systems in Accounting, Finance & Management, Vol. 7, pp. 187\u201097.","DOI":"10.1002\/(SICI)1099-1174(199809)7:3<187::AID-ISAF144>3.0.CO;2-7"},{"key":"key2022021320240047700_B23","doi-asserted-by":"crossref","unstructured":"Rai, A. and Howard, G.S. (1994), \u201cPropagating CASE usage for software development: an empirical investigation of key organizational correlates\u201d, OMEGA: The International Journal of Management Science, Vol. 22 No. 2, pp. 133\u201047.","DOI":"10.1016\/0305-0483(94)90074-4"},{"key":"key2022021320240047700_B24","doi-asserted-by":"crossref","unstructured":"Rai, A. and Patnayakuni, R. (1996), \u201cA structural model for CASE adoption behavior\u201d, Journal of Management Information Systems, Vol. 13 No. 2, Fall, pp. 205\u201034.","DOI":"10.1080\/07421222.1996.11518129"},{"key":"key2022021320240047700_B25","doi-asserted-by":"crossref","unstructured":"Ravichandran, T. (2000), \u201cSwiftness and intensity of administrative innovation adoption: an empirical study of TQM in information systems\u201d, Decision Sciences, Vol. 31 No. 3, Summer, pp. 691\u2010724.","DOI":"10.1111\/j.1540-5915.2000.tb00939.x"},{"key":"key2022021320240047700_B26","unstructured":"Rogers, E.M. (1995), Diffusion of Innovations, 4th ed., Free Press, New York, NY."},{"key":"key2022021320240047700_B27","unstructured":"Sexton, R. and Dorsey, R. (1998), \u201cSimultaneous optimization of neural network complexity, dimensionality, and solutions through the use of the genetic algorithm\u201d, Proceedings of the 27th Annual Meeting of the Decision Sciences Institute, Vol. 2, pp. 651\u20103."},{"key":"key2022021320240047700_B28","doi-asserted-by":"crossref","unstructured":"Thorp, J. (1999), \u201cComputing the pay\u2010off from IT\u201d, Journal of Business Strategy, Vol. 20 No. 3, May\/June, pp. 35\u20109.","DOI":"10.1108\/eb040005"},{"key":"key2022021320240047700_B29","unstructured":"Trippi, R.R. and Turban, E. (1996), Neural Networks in Finance and Investing, rev. ed., Irwin, New York, NY."},{"key":"key2022021320240047700_B30","doi-asserted-by":"crossref","unstructured":"Yang, H.L. (1999), \u201cAdoption and implementation of CASE tools in Taiwan\u201d, Information & Management, Vol. 35, pp. 89\u2010112.","DOI":"10.1016\/S0378-7206(98)00081-0"},{"key":"key2022021320240047700_B31","doi-asserted-by":"crossref","unstructured":"Zmud, R.W. (1984), \u201cAn examination of \u2018push\u2010pull\u2019 theory applied to process innovation and knowledge work\u201d, Management Science, Vol. 30 No. 6, pp. 727\u201038.","DOI":"10.1287\/mnsc.30.6.727"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570410522099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410522099\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410522099\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:19Z","timestamp":1753400239000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/104\/2\/129-135\/184513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2,1]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,2,1]]}},"alternative-id":["10.1108\/02635570410522099"],"URL":"https:\/\/doi.org\/10.1108\/02635570410522099","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2004,2,1]]}}}