{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:46:46Z","timestamp":1772052406559,"version":"3.50.1"},"reference-count":65,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Decision Systems"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.3166\/jds.16.451-468","type":"journal-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T04:20:38Z","timestamp":1199420438000},"page":"451-468","source":"Crossref","is-referenced-by-count":5,"title":["A Simple Tool to Assist in Agile Methodology Adoption Decisions"],"prefix":"10.1080","volume":"16","author":[{"given":"John","family":"McAvoy","sequence":"first","affiliation":[{"name":"a Business Information Systems , University College Cork , Ireland"}]},{"given":"David","family":"Sammon","sequence":"additional","affiliation":[{"name":"a Business Information Systems , University College Cork , Ireland"}]},{"given":"Ian","family":"Owens","sequence":"additional","affiliation":[{"name":"b Department of Information Systems , Cranfield University Defence Academy of the UK , Shrivenham , Swindon , SN6 8LA , UK"}]}],"member":"301","published-online":{"date-parts":[[2012,4,18]]},"reference":[{"key":"CIT0001","volume-title":"Agile software development methods, Review and analysis","author":"Abrahamsson P.","year":"2002"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/17.865899"},{"key":"CIT0003","first-page":"528","volume-title":"Encyclopedia of Software Engineering","author":"Basili V. R.","year":"1994"},{"key":"CIT0004","volume-title":"Planning extreme programming","author":"Beck K.","year":"2001"},{"key":"CIT0005","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4302-1147-1","volume-title":"Software development on a leash","author":"Birmingham D.","year":"2002"},{"issue":"1","key":"CIT0006","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/2.976920","volume":"35","author":"Boehm B.","year":"2002","journal-title":"IEEE Computer"},{"key":"CIT0007","first-page":"1","volume-title":"Extreme programming and Agile methods \u2013 Xp\/Agile universe","author":"Boehm B.","year":"2003"},{"key":"CIT0008","volume-title":"Balancing agility and discipline","author":"Boehm B.","year":"2004"},{"key":"CIT0009","first-page":"1069","volume-title":"Proceedings of the 10th IFIP World Computing Conference","author":"Brookes F."},{"key":"CIT0010","volume-title":"The Management of Innovation","author":"Burns T.","year":"1961"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/2.963450"},{"key":"CIT0012","first-page":"113","volume-title":"DSDM Business focused development","author":"Coesmans P.","year":"2003"},{"key":"CIT0013","volume-title":"Management Theory and Practice","author":"Cole G.","year":"1988"},{"issue":"6","key":"CIT0014","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MC.2002.1009175","volume":"35","author":"De Marco T.","year":"2002","journal-title":"IEEE Computing"},{"issue":"1","key":"CIT0015","first-page":"23","volume":"20","author":"Dolan S.","year":"2003","journal-title":"International Journal of Management"},{"key":"CIT0016","volume-title":"DSDM Consortium","author":"DSDM","year":"1998"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1287\/isre.10.3.255"},{"issue":"8","key":"CIT0018","first-page":"28","volume":"9","author":"Fowler M.","year":"2001","journal-title":"Software Development"},{"issue":"1","key":"CIT0019","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1108\/02756660310508245","volume":"24","author":"Gandossy R.","year":"2003","journal-title":"Journal of Business Strategy"},{"issue":"3","key":"CIT0020","first-page":"51","volume":"32","author":"Gallivan M.","year":"2001","journal-title":"DATABASE"},{"issue":"3","key":"CIT0021","first-page":"28","volume":"35","author":"Gallivan M.","year":"2004","journal-title":"DATABSE"},{"issue":"12","key":"CIT0022","first-page":"12","volume":"14","author":"Glass R.","year":"2001","journal-title":"Cutter IT Journal"},{"issue":"1","key":"CIT0023","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.hitech.2003.10.001","volume":"15","author":"Green G.","year":"2004","journal-title":"Journal of High Technology Management"},{"issue":"6","key":"CIT0024","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/52.965799","volume":"18","author":"Greening J.","year":"2001","journal-title":"IEEE Software"},{"issue":"2","key":"CIT0025","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.ejor.2003.07.013","volume":"160","author":"Hayes J.","year":"2003","journal-title":"European Journal of Operational Research"},{"issue":"12","key":"CIT0026","first-page":"2","volume":"14","author":"Highsmith J.","year":"2001","journal-title":"Cutter IT Journal"},{"key":"CIT0027","volume-title":"Agile Software Development Ecosystems","author":"Highsmith J.","year":"2002"},{"key":"CIT0028","volume-title":"Agile Project Management","author":"Highsmith J.","year":"2004"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/2.947100"},{"key":"CIT0030","first-page":"27","volume-title":"Beyond chaos: The expert edge in managing software development","author":"Jeffries R.","year":"2001"},{"key":"CIT0031","first-page":"52","volume-title":"Extreme Programming and Agile methods \u2013 XP\/Agile Universe Chicago","author":"Johansen K.","year":"2002"},{"issue":"2","key":"CIT0032","first-page":"24","volume":"11","author":"Jones C.","year":"1998","journal-title":"American Programmer"},{"key":"CIT0033","first-page":"175","volume-title":"DSDM Business focused development","author":"Kalita T.","year":"2003"},{"key":"CIT0034","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/3-540-44870-5_53","volume-title":"Proceedings of the 4th International Conference in Extreme Programming and Agile processes in software engineering (XP 2003)","author":"Karlstrom D.","year":"2003"},{"key":"CIT0035","volume-title":"SEI Technical Review","author":"Kirkpatrick R.","year":"1992"},{"key":"CIT0036","first-page":"138","volume-title":"Decision Making in Action, Models and Methods","author":"Klein G. A.","year":"1993"},{"key":"CIT0037","first-page":"103","volume-title":"Bounded Rationality: The Adaptive Toolbox","author":"Klein G. A.","year":"2002"},{"key":"CIT0038","volume-title":"Proceedings of the 5th Extreme programming and Agile processes in software engineering Conference","author":"Koch S.","year":"2004"},{"key":"CIT0039","volume-title":"Management","author":"Koontz H.","year":"1980"},{"issue":"12","key":"CIT0040","first-page":"27","volume":"14","author":"Kruchen P.","year":"2001","journal-title":"Cutter IT Journal"},{"key":"CIT0041","volume-title":"Technical Report CMU\/SEI- 2002-TR-020","author":"Levine L.","year":"2002"},{"key":"CIT0042","first-page":"197","volume-title":"Proceedings of Extreme Programming and Agile methods \u2013 XP\/Agile Universe Chicago","author":"Lindvall M.","year":"2002"},{"key":"CIT0043","volume-title":"Companion to Management Studies","author":"Lucas H.","year":"1982"},{"key":"CIT0044","volume-title":"Agile software development, Principles, patterns, and practices","author":"Martin R.","year":"2003"},{"key":"CIT0045","volume-title":"The manager pool, Patterns for radical leadership","author":"Olson D.","year":"2002"},{"issue":"7","key":"CIT0046","first-page":"1","volume":"3","author":"Orr K.","year":"2002","journal-title":"Agile Project Management"},{"key":"CIT0047","volume-title":"Proceedings of Extreme Programming and Agile processes in software engineering (XP 2005)","author":"Pikkarainen M.","year":"2005"},{"issue":"6","key":"CIT0048","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/52.965801","volume":"18","author":"Poole C.","year":"2001","journal-title":"IEEE Software"},{"issue":"3","key":"CIT0049","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MS.2003.1196316","volume":"20","author":"Rasmusson J.","year":"2003","journal-title":"IEEE Software"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1080\/713770596"},{"key":"CIT0051","first-page":"185","volume-title":"Extreme Programming and Agile methods \u2013 XP\/Agile Universe Chicago","author":"Reifer D.","year":"2002"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1109\/52.854065"},{"key":"CIT0053","volume-title":"Diffusion of Innovations","author":"Rogers E.","year":"1962"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-188-9.ch004"},{"key":"CIT0055","first-page":"453","volume-title":"The Handbook of Qualitative Research","author":"Stake R.","year":"2000"},{"key":"CIT0056","volume-title":"DSDM Business focused development","author":"Stapleton J.","year":"2003"},{"key":"CIT0057","volume-title":"Managerial Prerogative and the Question of Control","author":"Storey J.","year":"1983"},{"issue":"12","key":"CIT0058","first-page":"5","volume":"14","author":"Sutherl J.","year":"2001","journal-title":"Cutter IT Journal"},{"key":"CIT0059","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/CSMR.2005.33","volume-title":"Proceedings of the 9th European Conference on Software Maintenance and Reengineering","author":"Svensson H.","year":"2005"},{"key":"CIT0060","first-page":"1","volume-title":"Diffusing software product and process innovations","author":"Swanson E.","year":"2001"},{"issue":"4","key":"CIT0061","doi-asserted-by":"crossref","first-page":"553","DOI":"10.2307\/25148655","volume":"28","author":"Swanson E. B.","year":"2004","journal-title":"MIS Quarterly"},{"key":"CIT0062","first-page":"458","volume-title":"Proceedings of the 8th Pacific Asia Conference on Information Systems","author":"Toleman M.","year":"2004"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2005100104"},{"issue":"4","key":"CIT0064","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/52.854064","volume":"17","author":"Williams L.","year":"2000","journal-title":"IEEE Software"},{"key":"CIT0065","first-page":"97","volume-title":"DSDM Business focused development","author":"Young G.","year":"2003"}],"container-title":["Journal of Decision Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.3166\/jds.16.451-468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T10:37:01Z","timestamp":1557139021000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.3166\/jds.16.451-468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":65,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2012,4,18]]},"published-print":{"date-parts":[[2007,1]]}},"alternative-id":["10.3166\/jds.16.451-468"],"URL":"https:\/\/doi.org\/10.3166\/jds.16.451-468","relation":{},"ISSN":["1246-0125","2116-7052"],"issn-type":[{"value":"1246-0125","type":"print"},{"value":"2116-7052","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}