{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T17:11:36Z","timestamp":1724865096918},"reference-count":78,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Information Systems"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1057\/ejis.2012.54","type":"journal-article","created":{"date-parts":[[2013,1,15]],"date-time":"2013-01-15T04:46:11Z","timestamp":1358225171000},"page":"170-190","source":"Crossref","is-referenced-by-count":10,"title":["Shareholder reaction to firm investments in the capability maturity model: an event study"],"prefix":"10.1080","volume":"22","author":[{"given":"Greg","family":"Filbeck","sequence":"first","affiliation":[{"name":"Penn State Erie, The Behrend College, Sam and Irene Black School of Business Erie PA U.S.A."}]},{"given":"Matthew","family":"Swinarski","sequence":"additional","affiliation":[{"name":"Penn State Erie, The Behrend College, Sam and Irene Black School of Business Erie PA U.S.A."}]},{"given":"Xin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Penn State Erie, The Behrend College, Sam and Irene Black School of Business Erie PA U.S.A."}]}],"member":"301","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(99)00025-0"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.29"},{"issue":"2","key":"CIT0003","doi-asserted-by":"crossref","first-page":"445","DOI":"10.2307\/23044051","volume":"35","author":"Aggarwal N","year":"2011","journal-title":"MIS Quarterly"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1177\/0092070305277691"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-405X(96)00890-2"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1177\/014920639101700108"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2009.04.001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1997.tb03808.x"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2002.11045723"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/52.895170"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0358"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1995.11518097"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2006.09.001"},{"key":"CIT0014","volume-title":"Out of the Crisis","author":"Deming WE","year":"1986"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.3.219"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0120"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6803.1999.tb00720.x"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/0304-405X(83)90018-1"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1287\/isre.4.1.1"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1086\/209744"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1002\/smj.433"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-405X(98)00026-9"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/0304-405X(93)90023-5"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.4018\/jitsr.2006070103"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1100.1162"},{"issue":"1","key":"CIT0026","first-page":"801","volume":"17","author":"Gefen D","year":"2006","journal-title":"Communications of the Association of Information Systems"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-006-0008-0"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1993.tb05139.x"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1287\/msom.1080.0234"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/52.542292"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.4.451.12056"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.6.784.16023"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2000.14.2.109"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2001.15.1.3"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.42.3.415"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.43.9.1258"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-6963(00)00049-8"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.3.359.9773"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2006.02.002"},{"key":"CIT0040","doi-asserted-by":"crossref","DOI":"10.21236\/ADA286444","volume-title":"Benefits of CMM-based Software Process Improvement: Initial Results","author":"Herbsleb J","year":"1994"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1145\/255656.255692"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/43199.19.1.20020101\/31479.10"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1111\/0022-1082.00330"},{"key":"CIT0044","volume-title":"Managing the Software Process","author":"Humphrey WS","year":"1989"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/52.300031"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1080\/15228053.2003.10856013"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.1.103.9718"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1993.tb04702.x"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00052-1"},{"key":"CIT0050","volume-title":"Juran on Planning for Quality","author":"Juran JM","year":"1988"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1109\/52.854073"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1109\/2.796108"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1109\/32.824401"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.6.745.11941"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010054412650"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1995.tb05166.x"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/0304-405X(96)84701-5"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.2307\/249630"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2007.02.045"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.12.007"},{"issue":"2","key":"CIT0061","first-page":"86","volume":"49","author":"Morris S","year":"2008","journal-title":"The Journal of Computer Information Systems"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2002.808267"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2006.20.1.19"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1109\/52.363163"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1002\/mde.1126"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1080\/0954412997901"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1080\/09544120220149287"},{"issue":"2","key":"CIT0068","doi-asserted-by":"crossref","first-page":"437","DOI":"10.2307\/25148847","volume":"32","author":"Ramasubbu N","year":"2008","journal-title":"MIS Quarterly"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0084"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2003.817278"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1991.tb03743.x"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5414.2005.00102.x"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.900785"},{"issue":"3","key":"CIT0074","first-page":"330","volume":"11","author":"Simmons BL","year":"1999","journal-title":"Journal of Managerial Issues"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.135.9698"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.2008.01362.x"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2008.22.1.125"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1109\/32.368125"}],"container-title":["European Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/ejis.2012.54.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1057\/ejis.2012.54\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1057\/ejis.2012.54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/ejis.2012.54.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T16:41:38Z","timestamp":1515516098000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1057\/ejis.2012.54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":78,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,12,19]]},"published-print":{"date-parts":[[2013,3]]}},"alternative-id":["10.1057\/ejis.2012.54"],"URL":"https:\/\/doi.org\/10.1057\/ejis.2012.54","relation":{},"ISSN":["0960-085X","1476-9344"],"issn-type":[{"value":"0960-085X","type":"print"},{"value":"1476-9344","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3]]}}}