{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T06:33:18Z","timestamp":1712125998725},"reference-count":24,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2008,10,24]],"date-time":"2008-10-24T00:00:00Z","timestamp":1224806400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J of Knowledge Management"],"published-print":{"date-parts":[[2008,10,24]]},"DOI":"10.1108\/13673270810913630","type":"journal-article","created":{"date-parts":[[2008,10,11]],"date-time":"2008-10-11T11:09:46Z","timestamp":1223723386000},"page":"72-88","source":"Crossref","is-referenced-by-count":31,"title":["An ontology\u2010based competency model for workflow activity assignment policies"],"prefix":"10.1108","volume":"12","author":[{"given":"A.","family":"Macris","sequence":"first","affiliation":[]},{"given":"E.","family":"Papadimitriou","sequence":"additional","affiliation":[]},{"given":"G.","family":"Vassilacopoulos","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011461409620"},{"key":"b2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.12.002"},{"key":"b3","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(96)80004-7"},{"key":"b4","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"b5","unstructured":"Furnham, A. (1990), \u201cA question of competency\u201d,Personnel Management, June, pp. 37\u201041."},{"key":"b6","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"b7","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-3615(02)00003-9"},{"key":"b8","unstructured":"Haux, R., Seggewies, C., Baldauf\u2010Sobez, W., Kullmann, P., Reichert, H., Luedecke, L. and Seibold, H. (2003), \u201cSoarian \u2013 workflow management applied for health care\u201d,Methods of Information in Medicine, Vol. 42 No. 1, pp. 25\u201036."},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2003.09.003"},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2004.08.002"},{"key":"b13","doi-asserted-by":"crossref","unstructured":"Malamateniou, F., Vassilacopoulos, G. and Tsanakas, P. (1998), \u201cDeveloping a virtual patient record using XML and web\u2010based workflow technologies\u201d,IEEE Transactions on Information Technology in Biomedicine, Vol. 70, pp. 131\u20109.","DOI":"10.1109\/4233.735778"},{"key":"b14","unstructured":"Mansfield, R. (1999), \u201cWhat is competence all about\u201d,Competency, Vol. 6 No. 3, pp. 24\u20108."},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.141"},{"key":"b16","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2004.04.001"},{"key":"b17","unstructured":"Micolo, A. (1999), \u201cHR managers can survive and prosper\u201d,HR Focus, Vol. 76 No. 6, pp. 7\u20108."},{"key":"b19","doi-asserted-by":"publisher","DOI":"10.1023\/B:ITEM.0000031582.55219.2b"},{"key":"b22","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2004.04.012"},{"key":"b23","doi-asserted-by":"publisher","DOI":"10.1016\/S1366-5545(02)00042-X"},{"key":"b24","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"b25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2006.00609.x"},{"key":"b28","doi-asserted-by":"crossref","unstructured":"Thomas, R.K. and Sandhu, R.S. (1997), \u201cTask\u2010based authorization controls (TBAC): a family of models for active and enterprise\u2010oriented authorization management\u201d,Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, CA.","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"b33","unstructured":"Woodruffe, C. (1991), \u201cCompetent by any other name\u201d,Personnel Management, September, pp. 30\u20103."},{"key":"b34","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012972608697"},{"key":"b35","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-004-0674-3"}],"container-title":["Journal of Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/13673270810913630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/13673270810913630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T17:46:06Z","timestamp":1567532766000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13673270810913630\/full\/html"}},"subtitle":[],"editor":[{"given":"Militiadis","family":"Lytras","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2008,10,24]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,10,24]]}},"alternative-id":["10.1108\/13673270810913630"],"URL":"https:\/\/doi.org\/10.1108\/13673270810913630","relation":{},"ISSN":["1367-3270"],"issn-type":[{"value":"1367-3270","type":"print"}],"subject":[],"published":{"date-parts":[[2008,10,24]]}}}