{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:56:04Z","timestamp":1777492564313,"version":"3.51.4"},"reference-count":10,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1108\/09685220510614407","type":"journal-article","created":{"date-parts":[[2005,8,31]],"date-time":"2005-08-31T20:09:33Z","timestamp":1125518973000},"page":"274-280","source":"Crossref","is-referenced-by-count":15,"title":["Data mining as a technique for knowledge management in business process redesign"],"prefix":"10.1108","volume":"13","author":[{"given":"O.","family":"Folorunso","sequence":"first","affiliation":[]},{"given":"A.O.","family":"Ogunde","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1016\/0263-2373(94)00054-B"},{"key":"b2","doi-asserted-by":"publisher","DOI":"10.1080\/09537280150501239"},{"key":"b3","doi-asserted-by":"publisher","DOI":"10.1108\/14637150210449148"},{"key":"b4","unstructured":"Gupta, A. and McDaniel, J. (2002), \u201cCreating competitive advantage by effectively managing knowledge management\u201d, Journal of Knowledge Management Practice, Vol. 3 No. 2, pp. 40\u20109."},{"key":"b5","unstructured":"Hariharan, A. (2002), \u201cKnowledge management: a strategic tool\u201d, Journal of Knowledge Management Practice, Vol. 3 No. 3, pp. 50\u20109."},{"key":"b7","unstructured":"Kotter, J. (1995), \u201cLeading change: why transformation efforts fail\u201d, Harvard Business Review, March\u2010April, pp. 59\u201067."},{"key":"b9","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-5273(97)00037-6"},{"key":"b10","unstructured":"Selma, L.M., Farhi, M. and Hago, A.R. (2003), \u201cCase\u2010based reasoning as a technique for knowledge management in business process redesign\u201d, Electronic Journal of Knowledge Management, Vol. 1 No. 2, pp. 113\u201024."},{"key":"b11","unstructured":"Smith, S. (1996), \u201cRules of engagement\u201d, Computer Weekly, 14 March, pp. 36\u20107."},{"key":"b14","doi-asserted-by":"publisher","DOI":"10.1108\/13673279710800682"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510614407","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220510614407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:55Z","timestamp":1753402135000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/4\/274-280\/171323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["10.1108\/09685220510614407"],"URL":"https:\/\/doi.org\/10.1108\/09685220510614407","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}