{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:18Z","timestamp":1750307118694,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,3]],"date-time":"2011-10-03T00:00:00Z","timestamp":1317600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,3]]},"DOI":"10.1145\/2072221.2072260","type":"proceedings-article","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T17:50:15Z","timestamp":1323107415000},"page":"290-293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A grounded theory research investigation into the importance of social relationships and networks within corporate information systems projects"],"prefix":"10.1145","author":[{"given":"A C","family":"Leonard","sequence":"first","affiliation":[{"name":"University of Pretoria"}]}],"member":"320","published-online":{"date-parts":[[2011,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/00222500500323101"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/089856200413473"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.2.183.12514"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000606"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/03684929910253243"},{"key":"e_1_3_2_1_6_1","unstructured":"Sauer C. 1993 Why Information Systems Fail: A Case Study Approach Wiley New York (NY)..   Sauer C. 1993 Why Information Systems Fail: A Case Study Approach Wiley New York (NY).."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Standing C. 1998 Myths and the Art of Deception in Information Systems Work Study Vol 47 (1).  Standing C. 1998 Myths and the Art of Deception in Information Systems Work Study Vol 47 (1).","DOI":"10.1108\/00438029810196667"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/09564239610109429"}],"event":{"name":"SAICSIT '11: South African Institute of Computer Scientists and Information Technologists Conference","sponsor":["University of Cape Town","SAICSIT So. African Inst. Of Computer Scientists & Info Tecnologists"],"location":"Cape Town South Africa","acronym":"SAICSIT '11"},"container-title":["Proceedings of the South African Institute of Computer Scientists and Information Technologists Conference on Knowledge, Innovation and Leadership in a Diverse, Multidisciplinary Environment"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2072221.2072260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2072221.2072260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:20Z","timestamp":1750240100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2072221.2072260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,3]]},"references-count":8,"alternative-id":["10.1145\/2072221.2072260","10.1145\/2072221"],"URL":"https:\/\/doi.org\/10.1145\/2072221.2072260","relation":{},"subject":[],"published":{"date-parts":[[2011,10,3]]},"assertion":[{"value":"2011-10-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}