{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:38:51Z","timestamp":1725694731014},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781461352600"},{"type":"electronic","value":"9781461508311"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-1-4615-0831-1_1","type":"book-chapter","created":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T19:16:11Z","timestamp":1343502971000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["The Organization\u2019s Most Important Data Issues"],"prefix":"10.1007","author":[{"given":"Robert W.","family":"Pautke","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas C.","family":"Redman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Who Owns Information?: From Privacy to Public Access","author":"AW Branscomb","year":"1994","unstructured":"Branscomb, A. W., Who Owns Information?: From Privacy to Public Access, New York, NY: Basic Books, 1994."},{"key":"1_CR2","first-page":"47","volume-title":"\u201cCultivating an Information Culture,\u201d (interview with T. H. Davenport) CIO Magazine","author":"L Buchanan","year":"1995","unstructured":"Buchanan, L., \u201cCultivating an Information Culture,\u201d (interview with T. H. Davenport) CIO Magazine, December 15, 1994\/Jan 1, 1995; 47\u201351."},{"key":"1_CR3","first-page":"53","volume-title":"\u201cInformation Politics,\u201d Sloan Management Review","author":"TH Davenport","year":"1992","unstructured":"Davenport, T. H., Eccles, R. G., and Prusak, L., \u201cInformation Politics,\u201d Sloan Management Review, 33, Fall, 1992; 53\u201365."},{"key":"1_CR4","first-page":"119","volume-title":"\u201cSaving IT\u2019s Soul: Human-Centered Information Management,\u201d","author":"TH Davenport","year":"1994","unstructured":"Davenport, T. H., \u201cSaving IT\u2019s Soul: Human-Centered Information Management,\u201d Harvard Business Review, March-April, 1994; 119\u2013131."},{"key":"1_CR5","volume-title":"The Limits of Privacy","author":"Amitai Etzioni","year":"1999","unstructured":"Etzioni, Amitai, The Limits of Privacy, New York, NY: Basic Books, 1999."},{"key":"1_CR6","volume-title":"Blown to Bits","author":"P Evans","year":"2000","unstructured":"Evans, P. and Wurster, T. S.Blown to BitsBoston, MA: Harvard Business School Press, 2000."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0306-4573(94)90020-5","volume":"1","author":"CJ Fox","year":"1994","unstructured":"Fox, C. J., Levitin, A. V., and Redman, T. C., \u201cThe Notion of Data and Its Quality Dimensions,\u201d Information Processing and Management, 30, January, 1994; 1:9\u201319.","journal-title":"Information Processing and Management"},{"key":"1_CR8","first-page":"22","volume-title":"\u201cMore Work Ahead,\u201d","author":"L Gerstner","year":"2000","unstructured":"Gerstner, L., quoted in McDougall, P., \u201cMore Work Ahead,\u201d Information Week, Dec.18\u201325,2000; 22."},{"key":"1_CR9","series-title":"Wall Street Journal","volume-title":"\u201cWhy Many Businesses Can\u2019t Keep Their Secrets,\u201d","author":"M Geyelin","year":"1995","unstructured":"Geyelin, M., \u201cWhy Many Businesses Can\u2019t Keep Their Secrets,\u201d Wall Street Journal, November 20, 1995."},{"key":"1_CR10","volume-title":"The 48 Laws of Power","author":"R Greene","year":"1998","unstructured":"Greene, R. and Elfers, J.The 48 Laws of PowerNew York, NY: Penguin Group, 1998."},{"key":"1_CR11","volume-title":"The Trouble with Computers","author":"TK Landauer","year":"1997","unstructured":"Landauer, T. K.The Trouble with ComputersBoston, MA: MIT Press, 1997."},{"key":"1_CR12","first-page":"89","volume-title":"\u201cData vs. Traditional Resources: Properties, Implications, and Prescriptions for Management,\u201d","author":"AV Levitin","year":"1998","unstructured":"Levitin, A. V. and Redman, T. C., \u201cData vs. Traditional Resources: Properties, Implications, and Prescriptions for Management,\u201d Sloan Management Review, 40, No 1, Fall, 1998; 89\u2013101"},{"key":"1_CR13","volume-title":"\u201cThief Reveals Credit Card Data When Web Extortion Plot Fails,\u201d","author":"J Markoff","year":"2000","unstructured":"Markoff, J., \u201cThief Reveals Credit Card Data When Web Extortion Plot Fails,\u201d The New York Times, January 10, 2000; Al"},{"key":"1_CR14","unstructured":"McNamee, M., Dwyer, P., Schmitt, C., and Lavelle, L., \u201cAccounting Wars,\u201d Business Week, 9\/25\/00; 158."},{"key":"1_CR15","volume-title":"\u201cC.I.A. Fires Officer Blamed in Bombing of Chinese Embassy\u201d","author":"SL Meyers","year":"2000","unstructured":"Meyers, S. L., \u201cC.I.A. Fires Officer Blamed in Bombing of Chinese Embassy\u201d The New York Times, April 9, 2000; Al."},{"key":"1_CR16","first-page":"99","volume":"2","author":"TC Redman","year":"1995","unstructured":"Redman, T. C., \u201cOpinion: Improve Data Quality for Competitive Advantage,\u201d Sloan Management Review, 36, Winter, 1995; 2:99\u2013107.","journal-title":"Winter"},{"key":"1_CR17","volume-title":"Data Quality: The Field Guide","author":"TC Redman","year":"2001","unstructured":"Redman, T. C.Data Quality: The Field GuideBoston, MA: Butterworth-Heinemann, 2001."},{"key":"1_CR18","volume-title":"The Politics of Information Management","author":"P Strassman","year":"1995","unstructured":"Strassman, P.The Politics of Information ManagementNew Canaan, CT: The Information Economics Press, 1995."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Tayi, G. K., and Ballou, D. P., \u201cIntroduction (to a Special Section: Examining Data Quality),\u201d Communications of the ACM 41; 2:54\u201357.","DOI":"10.1145\/269012.269021"},{"key":"1_CR20","first-page":"30","volume-title":"\u201cThe War for the White House,\u201d","author":"E Thomas","year":"2000","unstructured":"Thomas, E. and Isikoff, M, \u201cThe War for the White House,\u201d Newsweek, November 27, 2000; 30\u201341."},{"key":"1_CR21","first-page":"42","volume-title":"\u201cTempting Fate,\u201d","author":"B Violino","year":"1993","unstructured":"Violino, B., \u201cTempting Fate,\u201d InformationWeek, October 4, 1993; 42\u201352."}],"container-title":["Advances in Database Systems","Information and Database Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4615-0831-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T22:32:07Z","timestamp":1553812327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4615-0831-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781461352600","9781461508311"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-1-4615-0831-1_1","relation":{},"ISSN":["1386-2944"],"issn-type":[{"type":"print","value":"1386-2944"}],"subject":[],"published":{"date-parts":[[2002]]}}}