{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:45:48Z","timestamp":1730220348395,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/es.2013.6690085","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T19:11:25Z","timestamp":1388776285000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Using a meeting room system to improve targeting of Strategic Scanning"],"prefix":"10.1109","author":[{"given":"Edison","family":"Loza Aguirre","sequence":"first","affiliation":[]},{"given":"Marie-Laurence","family":"Caron-Fasan","sequence":"additional","affiliation":[]},{"given":"Hatem","family":"Haddad","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Lesca","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Groupware Computer Support for Business Teams","year":"1988","author":"johansen","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1086\/208812"},{"journal-title":"Strategic Management A Stakeholder Aproach","year":"1984","author":"freeman","key":"17"},{"journal-title":"Psychometric Theory","year":"1994","author":"nunnally","key":"36"},{"journal-title":"Readings in Human-Computer Interaction Toward the Year 2000","year":"1995","author":"baecker","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1108\/09600030810882816"},{"journal-title":"Information Management for the Intelligent Organization The art of Scanning the Environment","year":"1998","author":"choo","key":"15"},{"journal-title":"L'analyse de Contenu 1 Vol","year":"2007","author":"bardin","key":"34"},{"journal-title":"Early Warning Using Competitive Intelligence to Anticipate Market Shifts Control Risk and Create Powerful Strategies","year":"2003","author":"gilad","key":"16"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1080\/014492997119806"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(89)90006-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.15.2.191.14447"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"journal-title":"Human-Computer Interaction","year":"2004","author":"dix","key":"11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1080\/10447319509526114"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.2.189"},{"key":"21","doi-asserted-by":"crossref","first-page":"329","DOI":"10.2307\/25148642","article-title":"Special issue on action research in information systems: Making IS research relevant to practice-Foreword","volume":"28","author":"baskerville","year":"2004","journal-title":"MIS Quart"},{"journal-title":"Fundamentals of Information Systems","year":"2012","author":"stair","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1080\/026839696345289"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00162.x"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.2307\/2392581"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000298"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MBSE.2009.5031719"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2002.1009142"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/2.59"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-493X.2009.03162.x"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2307\/249743"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.21"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2307\/249273"},{"key":"10","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.2307\/41703506","article-title":"Web 2.0 environmental scanning and adaptive decision support for business mergers and acquisitions","volume":"36","author":"lau","year":"2012","journal-title":"MIS Quart"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1993.284198"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.pursup.2008.01.007"},{"key":"6","article-title":"Investigating information systems with action research","volume":"2","author":"baskerville","year":"1999","journal-title":"Comm AIS"},{"key":"5","article-title":"Veille strate?gique: la me?thode l.e.scanning","author":"lesca","year":"2003","journal-title":"Colombelles Ed EMS"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1108\/09600031111123778"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/9781118602775"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1002\/bse.607"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.04.016"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00002-7"}],"event":{"name":"First International Conference on Enterprise Systems (ES 2013)","start":{"date-parts":[[2013,11,7]]},"location":"Cape Town","end":{"date-parts":[[2013,11,8]]}},"container-title":["Proceedings of the First International Conference on Enterprise Systems: ES 2013"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6683941\/6690073\/06690085.pdf?arnumber=6690085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T11:09:05Z","timestamp":1580814545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6690085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/es.2013.6690085","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}