{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T12:53:17Z","timestamp":1778763197221,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,19]]},"DOI":"10.1145\/3378539.3393861","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T00:52:21Z","timestamp":1591491141000},"page":"81-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["What Makes IT Professionals Special?"],"prefix":"10.1145","author":[{"given":"Barbara","family":"Prommegger","sequence":"first","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manuel","family":"Wiesche","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Helmut","family":"Krcmar","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216218.1216222"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"\u00c5gerfalk P.J. and Fitzgerald B. 2008. Outsourcing to an unknown workforce: Exploring opensurcing as a global sourcing strategy. MIS quarterly2008). 385--409.","DOI":"10.2307\/25148845"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ahuja M.K. 2002. Women in the information technology profession: A literature review synthesis and research agenda. European Journal of Information Systems 11 (1) (2002). 20--34.","DOI":"10.1057\/palgrave.ejis.3000417"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017329"},{"key":"e_1_3_2_1_5_1","unstructured":"Ang S. and Slaughter S. 2000. The missing context of information technology personnel: a review and future directions for research. Framing the domains of IT management: Projecting the future through the past2000). 305--327."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017114.1017118"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"713","article-title":"2015. Exhaustion from Information System Career Experience","volume":"39","author":"Armstrong D.J.","year":"2015","unstructured":"Armstrong, D.J., Brooks, N.G. and Riemenschneider, C.K., 2015. Exhaustion from Information System Career Experience: Implications for Turn-Away Intention. MIS Quarterly, 39 (3), (2015). 713--728.","journal-title":"Implications for Turn-Away Intention. MIS Quarterly"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.11.005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12185"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"55","article-title":"2006. Assessing personality profiles of software developers in agile development teams","volume":"18","author":"Balijepally V.","year":"2006","unstructured":"Balijepally, V., Mahapatra, R. and Nerur, S.P., 2006. Assessing personality profiles of software developers in agile development teams. Communications of the Association for Information Systems, 18 (1), (2006). 55--75.","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148659"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1289668.1289676"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(96)01091-9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Benbasat I. and Zmud R.W. 2003. The identity crisis within the IS discipline: Defining and communicating the discipline's core properties. MIS quarterly2003). 183--194.","DOI":"10.2307\/30036527"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2747544.2747546"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Brooks N.G. Riemenschneider C.K. Hardgrave B.C. and O'Leary-Kelly A.M. 2011. IT professional identity: needs perceptions and belonging. European Journal of Information Systems 20 (1) (2011). 87--102.","DOI":"10.1057\/ejis.2010.48"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Bryant A. 2008. The future of information systems--thinking informatically. European Journal of Information Systems 17 (6) (2008). 695--698.","DOI":"10.1057\/ejis.2008.52"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(92)90074-P"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084179.3084184"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.08.002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719051.1719053"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Coombs C.R. 2009. Improving retention strategies for IT professionals working in the public sector. Information & Management 46 (4) (2009). 233--240.","DOI":"10.1016\/j.im.2009.02.004"},{"key":"e_1_3_2_1_23_1","volume-title":"Synthesizing research: A guide for literature reviews","author":"Cooper H.M.","year":"1998","unstructured":"Cooper, H.M. 1998. Synthesizing research: A guide for literature reviews. Sage, 1998."},{"key":"e_1_3_2_1_24_1","volume-title":"Inc.","author":"Couger J.D.","year":"1980","unstructured":"Couger, J.D. and Zawacki, R.A. 1980. Motivating and managing computer personnel. John Wiley & Sons, Inc., New York, 1980."},{"key":"e_1_3_2_1_25_1","unstructured":"Daniel S. Maruping L. Cataldo M. and Herbsleb J. 2011. When cultures clash: Participation in open source communities and its implications for organizational commitment. 2011)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Davison R.M. and Martinsons M.G. 2016. Context is king! Considering particularism in research design and reporting. Journal of information technology 31 (3) (2016). 241--249.","DOI":"10.1057\/jit.2015.19"},{"issue":"11","key":"e_1_3_2_1_27_1","first-page":"1","article-title":"2009. The ethics of IT professionals","volume":"10","author":"Davison R.M.","year":"2009","unstructured":"Davison, R.M., Martinsons, M.G., Ou, C.X., Murata, K., Drummond, D., Li, Y. and Lo, H.W., 2009. The ethics of IT professionals in Japan and China. Journal of the Association for Information Systems, 10 (11), (2009). 1.","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_3_2_1_28_1","first-page":"123","article-title":"Daily recovery from work-related effort during non-work time. in Current perspectives on job-stress recovery","volume":"85","author":"Demerouti E.","year":"2009","unstructured":"Demerouti, E., Bakker, A.B., Geurts, S.A. and Taris, T.W. Daily recovery from work-related effort during non-work time. in Current perspectives on job-stress recovery, Emerald Group Publishing Limited, 2009, 85--123.","journal-title":"Emerald Group Publishing Limited"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00392"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Dub\u00e9 L. 2014. Exploring how IT professionals experience role transitions at the end of successful projects. Journal of Management Information Systems 31 (1) (2014). 17--46.","DOI":"10.2753\/MIS0742-1222310102"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2014.27"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2014.05.010"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0413"},{"key":"e_1_3_2_1_34_1","volume-title":"Assessing the Risk of Acquired Information Technology Knowledge Loss. in ICIS 2010","author":"Fontaine A.","year":"2010","unstructured":"Fontaine, A. Year. Assessing the Risk of Acquired Information Technology Knowledge Loss. in ICIS 2010, (2010), 167."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Gallivan M.J. 2004. Examining IT professionals' adaptation to technological change: the influence of gender and personal attributes. ACM SIGMIS Database 35 (3) (2004). 28--49.","DOI":"10.1145\/1017114.1017119"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017114.1017121"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9072-9"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341971.1341976"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.10.009"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2013.0501"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.3.13"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184444.3184451"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12087"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1289800.1289804"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0558"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703462"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of ICIS 2010","author":"Joseph D.","year":"2010","unstructured":"Joseph, D., Koh, C.S.K. and Foo, A.C.H. Year. Sustainable IT-Specific Human Capital: Coping with the Threat of Professional obsolescence. in Proceedings of ICIS 2010, (2010), 46."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017336.2017343"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Joseph D. Tan M.L. and Ang S. 2011. Is Updating Play or Work?: The Mediating Role of Updating Orientation in Linking Threat of Professional Obsolescence to Turnover\/Turnaway Intentions. International Journal of Social and Organizational Dynamics in IT (IJSODIT) 1 (4) (2011). 37--47.","DOI":"10.4018\/ijsodit.2011100103"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084179.3084183"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Keil M. Lee H.K. and Deng T. 2013. Understanding the most critical skills for managing IT projects: A Delphi study of IT project managers. Information & management 50 (7) (2013). 398--414.","DOI":"10.1016\/j.im.2013.05.005"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Lacity M.C. Khan S. Yan A. and Willcocks L.P. 2010. A review of the IT outsourcing empirical literature and future research directions. Journal of Information technology 25 (4) (2010). 395--433.","DOI":"10.1057\/jit.2010.21"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/249598"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.12.008"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.08.011"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000094"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0652"},{"key":"e_1_3_2_1_58_1","volume-title":"The influence of gender, and race\/ethnicity on advancement in information technology (IT)","author":"McGee K.","year":"2018","unstructured":"McGee, K., 2018. The influence of gender, and race\/ethnicity on advancement in information technology (IT). Information and Organization, 28 (1), (2018). 1--36."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2002.11045719"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Moore J.E. 2000. One Road to Turnover: An Examination of Work Exhaustion in Technology Professionals. MIS Quarterly 24 (1) (2000). 141--168.","DOI":"10.2307\/3250982"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2894216.2894218"},{"key":"e_1_3_2_1_62_1","unstructured":"Nevo D. Kotlarsky J. and Nevo S. 2012. New capabilities: can IT service providers leverage crowdsourcing? 2012)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2894216.2894219"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Niederman F. Sumner M. and Maertz Jr C.P. 2007. Testing and extending the unfolding model of voluntary turnover to IT professionals. Human Resource Management 46 (3) (2007). 331--347.","DOI":"10.1002\/hrm.20167"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Orlikowski W.J. and Iacono C.S. 2001. Research commentary: Desperately seeking the \"IT\" in IT research-A call to theorizing the IT artifact. Information systems research 12 (2) (2001). 121--134.","DOI":"10.1287\/isre.12.2.121.9700"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00076-4"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000699"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00416.x"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Rao S.V. and Ramachandran S. 2011. Occupational Cultures of Information Systems Personnel and Managerial Personnel: Potential Conflicts. CAIS 292011). 31.","DOI":"10.17705\/1CAIS.02931"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Reich B.H. and Kaarst-Brown M.L. 1999. \" Seeding the line\": Understanding the transition from IT to non-IT careers. MIS Quarterly1999). 337--364.","DOI":"10.2307\/249467"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.30"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185335.1185345"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.07.002"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Rutner P. and Riemenschneider C. 2015. The Impact of Emotional Labor and Conflict-Management Style on Work Exhaustion of Information Technology Professionals. Communications of the Association for Information Systems 362015).","DOI":"10.17705\/1CAIS.03613"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952712.1952718"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Rutner P. and Riemenschneider C.K. 2015. The Impact of Emotional Labor and Conflict-Management Style on Work Exhaustion of Information Technology Professionals. CAIS 362015). 13.","DOI":"10.17705\/1CAIS.03613"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Rutner P.S. Hardgrave B.C. and McKnight D.H. 2008. Emotional Dissonance and the IT Professional. MIS Quarterly 32 (3) (2008). 635--652.","DOI":"10.2307\/25148859"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2014.11645722"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2017.0734"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280109"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/13747"},{"key":"e_1_3_2_1_82_1","volume-title":"Year. College-Based Career Interventions: Raising Employability and Persistence in Early Careers of IT Professionals. in ICIS 2017","author":"Setor T.K.","year":"2017","unstructured":"Setor, T.K. and Joseph, D. Year. College-Based Career Interventions: Raising Employability and Persistence in Early Careers of IT Professionals. in ICIS 2017, (2017)."},{"key":"e_1_3_2_1_83_1","volume-title":"Year. On the Value of Formal IT Education in Early IT Careers: A Multilevel Analysis. in ICIS 2016","author":"Setor T.K.","year":"2016","unstructured":"Setor, T.K. and Joseph, D. Year. On the Value of Formal IT Education in Early IT Careers: A Multilevel Analysis. in ICIS 2016, (2016)."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"crossref","unstructured":"Shachaf P. 2008. Cultural diversity and information and communication technology impacts on global virtual teams: An exploratory study. Information & Management 45 (2) (2008). 131--142.","DOI":"10.1016\/j.im.2007.12.003"},{"key":"e_1_3_2_1_85_1","volume-title":"Year. The Critical Competencies of Successful Senior IT Leaders-A Field Study. in ICIS 2015","author":"Shoop J.","year":"2015","unstructured":"Shoop, J., Lyytinen, K. and Boyatzis, R. Year. The Critical Competencies of Successful Senior IT Leaders-A Field Study. in ICIS 2015, (2015)."},{"key":"e_1_3_2_1_86_1","unstructured":"Shoop J. Lyytinen K. and Boyatzis R. 2015. The Critical Competencies of Successful Senior IT Leaders-A Field Study. 2015)."},{"key":"e_1_3_2_1_87_1","volume-title":"ICIS 2009","author":"Slaughter K.T.","year":"2009","unstructured":"Slaughter, K.T. Year. Going IT alone: The experienced IT worker as integrator of business and IT domains of knowledge. in ICIS 2009, (2009), 131."},{"key":"e_1_3_2_1_88_1","volume-title":"Annual Meeting - Academy of Management","author":"Slaughter S.","year":"2001","unstructured":"Slaughter, S. Year. Is InformationTechnology A \"Boundaryless\" Profession? A Sequence Analysis of the Career Histories of IT Professionals From 1979--1998. in Annual Meeting - Academy of Management, (2001), Academy of Management Briarcliff Manor, NY 10510, A1-A6."},{"key":"e_1_3_2_1_89_1","volume-title":"Sage Publications","author":"Strauss A.","year":"1998","unstructured":"Strauss, A. and Corbin, J. 1998. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage Publications, Inc, 1998."},{"key":"e_1_3_2_1_90_1","volume-title":"ICIS 20072007)","author":"Tafti A.","unstructured":"Tafti, A., Mithas, S. and Krishnan, M.S., 2007. Complementarities between information technology and human resource practices in knowledge work. ICIS 20072007). 132."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2014.10.001"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(94)90094-9"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.2307\/249709"},{"key":"e_1_3_2_1_94_1","volume-title":"ICIS 2006","author":"Trauth E.","year":"2006","unstructured":"Trauth, E. and Quesenberry, J. Year. Are women an underserved community in the information technology profession? in ICIS 2006, (2006), 106."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"crossref","unstructured":"Trauth E.M. 2002. Odd girl out: an individual differences perspective on women in the IT profession. Information Technology & People 15 (2) (2002). 98--118.","DOI":"10.1108\/09593840210430552"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.31"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00426"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"crossref","unstructured":"Wang C. and Kaarst-Brown M.L. 2014. The IT compensation challenge: Theorizing the balance among multi-level internal and external uncertainties. Journal of the Association for Information Systems 15 (3) (2014). 111.","DOI":"10.17705\/1jais.00355"},{"key":"e_1_3_2_1_99_1","unstructured":"Webster J. and Watson R.T. 2002. Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly2002). xiii--xxiii."},{"key":"e_1_3_2_1_100_1","unstructured":"Wiesche M. Joseph D. Thatcher J. Gu B. and Krcmar H. IT Workforce MIS Quarterly Research Curations Ashley Bush and Arun Ra http:\/\/misq.org\/research-curations 2019."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000004"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12135"},{"key":"e_1_3_2_1_103_1","unstructured":"Yan J. and Wang X. 2013. From Open Source to Commercial Software Development-the Community Based Software Development Model. 2013)."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398834.2398837"}],"event":{"name":"SIGMIS-CPR '20: 2020 Computers and People Research Conference","location":"Nuremberg Germany","acronym":"SIGMIS-CPR '20","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"]},"container-title":["Proceedings of the 2020 Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378539.3393861","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378539.3393861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:19Z","timestamp":1750200079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378539.3393861"}},"subtitle":["A Literature Review on Context-Specific Theorizing in IT Workforce Research"],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":104,"alternative-id":["10.1145\/3378539.3393861","10.1145\/3378539"],"URL":"https:\/\/doi.org\/10.1145\/3378539.3393861","relation":{},"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"2020-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}