{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:37Z","timestamp":1750307617514,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,14]],"date-time":"2008-11-14T00:00:00Z","timestamp":1226620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,14]]},"DOI":"10.1145\/1477973.1477979","type":"proceedings-article","created":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T14:47:02Z","timestamp":1229525222000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Sysadmins and the need for verification information"],"prefix":"10.1145","author":[{"given":"Nicole F.","family":"Velasquez","sequence":"first","affiliation":[{"name":"The University of Arizona, Tucson, AZ"}]},{"given":"Alexandra","family":"Durcikova","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, AZ"}]}],"member":"320","published-online":{"date-parts":[[2008,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/248851"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1241021"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.06.002"},{"volume-title":"Proceedings of the ACM Conference on Human Factors in Computing (CHI '03)","author":"Kandogan E.","key":"e_1_3_2_1_4_1","unstructured":"Kandogan , E. and Maglio , P. Year . Why Don't You Trust Me Anymore? Or the Role of Trust in Troubleshooting Activities of System Administrators . In Proceedings of the ACM Conference on Human Factors in Computing (CHI '03) (Ft Lauderdale, FL, USA, Jan 1, Year). Kandogan, E. and Maglio, P. Year. Why Don't You Trust Me Anymore? Or the Role of Trust in Troubleshooting Activities of System Administrators. In Proceedings of the ACM Conference on Human Factors in Computing (CHI '03) (Ft Lauderdale, FL, USA, Jan 1, Year)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125708"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031672"},{"key":"e_1_3_2_1_7_1","unstructured":"IBM. Autonomic computing: IBM's perspective on the state of information technology. http:\/\/www.ibm.com\/industries\/government\/doc\/content\/resource\/thought\/278606109.html Accessed Jan 2006.  IBM. Autonomic computing: IBM's perspective on the state of information technology. http:\/\/www.ibm.com\/industries\/government\/doc\/content\/resource\/thought\/278606109.html Accessed Jan 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_9_1","volume-title":"University of California","author":"Patterson D.","year":"2002","unstructured":"Patterson , D. , Brown , A. , Broadwell , P. , Candea , G. , Chen , M. , Cutler , J. , Enriquez , P. , Fox , A. , Kiciman , E. , Merzbacker , M. , Oppenheimer , D. , Sastry , N. , Tetzlaff , W. , Traupman , J. and Treuhalf , N . 2002. Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies . University of California , Berkeley, Berkeley, CA , 2002 . Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kiciman, E., Merzbacker, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J. and Treuhalf, N. 2002. Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies. University of California, Berkeley, Berkeley, CA, 2002."},{"key":"e_1_3_2_1_10_1","unstructured":"SunMicrosystems. N1 Grid System. http:\/\/wwws.sun.com\/software\/solutions\/n1. Accessed Jan 2006.  SunMicrosystems. N1 Grid System. http:\/\/wwws.sun.com\/software\/solutions\/n1. Accessed Jan 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"http:\/\/h71028.www7.hp.com\/enterprise\/cache\/5003-0-0-0-121.aspx. Accessed","author":"Adaptive Infrastructure","year":"2006","unstructured":"HP. Adaptive Infrastructure . http:\/\/h71028.www7.hp.com\/enterprise\/cache\/5003-0-0-0-121.aspx. Accessed Jan 2006 . HP. Adaptive Infrastructure. http:\/\/h71028.www7.hp.com\/enterprise\/cache\/5003-0-0-0-121.aspx. Accessed Jan 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_01"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3166.3170"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_02"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.978356"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.903160"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/99977.99993"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Al-Gahtani S. and King M. 1999. Attitudes satisfaction and usage: Factors contributing to each in the acceptance of information technology. Behaviour &amp; Information Technology 18 4 1999) 277--297.  Al-Gahtani S. and King M. 1999. Attitudes satisfaction and usage: Factors contributing to each in the acceptance of information technology. Behaviour &amp; Information Technology 18 4 1999) 277--297.","DOI":"10.1080\/014492999119020"},{"key":"e_1_3_2_1_22_1","article-title":"The DeLone and McLean model of information systems success: A ten-year update","volume":"19","author":"DeLone W.","year":"2003","unstructured":"DeLone , W. and McLean , E. 2003 . The DeLone and McLean model of information systems success: A ten-year update . Journal of Management Information Systems , 19 , 4 2003), 9--30. DeLone, W. and McLean, E. 2003. The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19, 4 2003), 9--30.","journal-title":"Journal of Management Information Systems"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044317"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2307\/249689"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1988.4306775"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"D'Ambra J. and Wilson C. 2004. Explaining perceived performance of the World Wide Web: Uncertainty and the task-technology fit model. Internet Research - Electronic Networking Applications and Policy 14 4 2004) 294--310.  D'Ambra J. and Wilson C. 2004. Explaining perceived performance of the World Wide Web: Uncertainty and the task-technology fit model. Internet Research - Electronic Networking Applications and Policy 14 4 2004) 294--310.","DOI":"10.1108\/10662240410555315"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00101-3"},{"key":"e_1_3_2_1_28_1","volume-title":"Development and measurement validity of a task-technology fit instrument for user evaluations of information systems. Decision Sciences, 29, 1","author":"Goodhue D.","year":"1998","unstructured":"Goodhue , D. 1998. Development and measurement validity of a task-technology fit instrument for user evaluations of information systems. Decision Sciences, 29, 1 1998 ), 105--138. Goodhue, D. 1998. Development and measurement validity of a task-technology fit instrument for user evaluations of information systems. Decision Sciences, 29, 1 1998), 105--138."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00058-5"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766152"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.539719"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.1999.766976"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.422.0205"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.281.0077"},{"key":"e_1_3_2_1_35_1","volume-title":"Storage on Tap: Understanding the Business Value of Storage Service Providers","author":"Centrix","year":"2001","unstructured":"IT Centrix . 2001. Storage on Tap: Understanding the Business Value of Storage Service Providers . 2001 . ITCentrix. 2001. Storage on Tap: Understanding the Business Value of Storage Service Providers. 2001."},{"key":"e_1_3_2_1_36_1","volume-title":"Researching system administration. http.cs.berkeley.edu (Jan 1","author":"Anderson E.","year":"2002","unstructured":"Anderson , E. 2002. Researching system administration. http.cs.berkeley.edu (Jan 1 2002 ). Anderson, E. 2002. Researching system administration. http.cs.berkeley.edu (Jan 1 2002)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/371209.371231"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1036474.1036499"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/301353.301402"},{"key":"e_1_3_2_1_41_1","volume-title":"Information Types, Search Strategies and Relevance: Integrating Studies on Information Seeking and Retrieval","author":"Vakkari P.","year":"1999","unstructured":"Vakkari , P. Task Complexity , Information Types, Search Strategies and Relevance: Integrating Studies on Information Seeking and Retrieval . Taylor Graham Publishing , City , 1999 . Vakkari, P. Task Complexity, Information Types, Search Strategies and Relevance: Integrating Studies on Information Seeking and Retrieval. Taylor Graham Publishing, City, 1999."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(94)00041-Z"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630310506"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224299105500102"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02729762"},{"key":"e_1_3_2_1_46_1","unstructured":"Aldag R. and Brief A. 1979. Task Design and Employee Motivation. Scott Foresman Glenview IL.  Aldag R. and Brief A. 1979. Task Design and Employee Motivation. Scott Foresman Glenview IL."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1037\/e532082008-001"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.119.2.254"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Wood R. 1986. Task complexity: Definition of the construct. Organizational Behavior and Human Decision Processes 371986) 60--82.  Wood R. 1986. Task complexity: Definition of the construct. Organizational Behavior and Human Decision Processes 371986) 60--82.","DOI":"10.1016\/0749-5978(86)90044-0"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Stajkovic A. and Luthans F. 1998. Self-efficacy and work-related performance: A meta-analysis. Psychologica. Bulletin 1241998) 240--261.  Stajkovic A. and Luthans F. 1998. Self-efficacy and work-related performance: A meta-analysis. Psychologica. Bulletin 1241998) 240--261.","DOI":"10.1037\/0033-2909.124.2.240"},{"volume-title":"Proceedings of the Convention of the Association of Consumer Research","author":"Jacoby J.","key":"e_1_3_2_1_51_1","unstructured":"Jacoby , J. and Kaplan , L. Year . The Components of Perceived Risk . In Proceedings of the Convention of the Association of Consumer Research ( Iowa City, IA, Year). 382--393. Jacoby, J. and Kaplan, L. Year. The Components of Perceived Risk. In Proceedings of the Convention of the Association of Consumer Research (Iowa City, IA, Year). 382--393."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224297103500110"}],"event":{"name":"CHiMiT08: Computer Human Interaction for the Management of Information Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Diego California","acronym":"CHiMiT08"},"container-title":["Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1477973.1477979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1477973.1477979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:46Z","timestamp":1750250746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1477973.1477979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,14]]},"references-count":52,"alternative-id":["10.1145\/1477973.1477979","10.1145\/1477973"],"URL":"https:\/\/doi.org\/10.1145\/1477973.1477979","relation":{},"subject":[],"published":{"date-parts":[[2008,11,14]]},"assertion":[{"value":"2008-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}