{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:41Z","timestamp":1750306481532,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:00:00Z","timestamp":1443398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,28]]},"DOI":"10.1145\/2815782.2815798","type":"proceedings-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T14:32:43Z","timestamp":1450449163000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Organisational Barriers to Including Web Data in Traditional BI Practice"],"prefix":"10.1145","author":[{"given":"Henri","family":"Knoesen","sequence":"first","affiliation":[{"name":"CITANDA, Department of Information Systems, University of Cape Town, Rondebosch, South Africa, +27216504259"}]},{"given":"Lisa F.","family":"Seymour","sequence":"additional","affiliation":[{"name":"CITANDA, Department of Information Systems, University of Cape Town, Rondebosch, South Africa, +27216504259"}]}],"member":"320","published-online":{"date-parts":[[2015,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Almquist E. Senior J. & Springer T. (2015). Three promises and perils of big data. Retrieved from http:\/\/www.bain.com\/publications\/articles\/three-promises-and-perils-of-big-data.aspx on 12th August 2015.  Almquist E. Senior J. & Springer T. (2015). Three promises and perils of big data. Retrieved from http:\/\/www.bain.com\/publications\/articles\/three-promises-and-perils-of-big-data.aspx on 12th August 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/960182.960195"},{"volume-title":"Sixth Interdisciplinary Perspectives on Accounting Conference","year":"2000","author":"Askarany D.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"30","article-title":"Web data extraction for business intelligence: The lixto approach. Datenbanksysteme in Business","volume":"11","author":"Baumgartner R.","year":"2005","journal-title":"Technologie Und Web"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00064-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.12.002"},{"volume-title":"Moxie Insight","year":"2010","author":"Bevins T.","key":"e_1_3_2_1_7_1"},{"issue":"6","key":"e_1_3_2_1_8_1","first-page":"32","article-title":"Web analytics for business intelligence: Beyond hits and sessions","volume":"33","author":"Bhatnagar A.","year":"2009","journal-title":"Online"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0040-1625(71)80031-8"},{"key":"e_1_3_2_1_10_1","first-page":"42","article-title":"The problem with unstructured data","volume":"13","author":"Blumberg R.","year":"2003","journal-title":"DM Review"},{"key":"e_1_3_2_1_11_1","unstructured":"Brown L. A. (1981). Innovation diffusion; a new perspective. New York: Methuen and Co. Ltd.  Brown L. A. (1981). Innovation diffusion; a new perspective. New York: Methuen and Co. Ltd."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11576-013-0350-x"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"e_1_3_2_1_14_1","unstructured":"Chen H. Chiang R. H. & Storey V. C. (2011). Business intelligence research. MISQ Special Issue.  Chen H. Chiang R. H. & Storey V. C. (2011). Business intelligence research. MISQ Special Issue."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481674.2481683"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2005.11045821"},{"key":"e_1_3_2_1_17_1","unstructured":"Clark G. (1984). Innovation diffusion: Contemporary geographical approaches. Geo Books.  Clark G. (1984). Innovation diffusion: Contemporary geographical approaches. Geo Books."},{"volume-title":"Proceedings of the IADIS International Conference on Web Based Communities and Social Media (WBC'12)","year":"2012","author":"Costa P. R.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00498.x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516362"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/02756660710760935"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2009.07.004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1322-7696(08)60511-9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(00)00152-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Fried C. (1968). Privacy. Yale Law Journal (77) 203--222.  Fried C. (1968). Privacy. Yale Law Journal (77) 203--222.","DOI":"10.2307\/794941"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/rpm.2008.56"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125944.1125945"},{"key":"e_1_3_2_1_28_1","unstructured":"Heijnen J. (2012). Social business intelligence - how and where firms can use social media data for performance measurement an exploratory study. (Unpublished Masters). Delft University of Technology Holland.  Heijnen J. (2012). Social business intelligence - how and where firms can use social media data for performance measurement an exploratory study. (Unpublished Masters). Delft University of Technology Holland."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393393"},{"volume-title":"ICIS 2001 Proceedings, 2.","year":"2001","author":"Kearns G.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/503124.503127"},{"key":"e_1_3_2_1_32_1","unstructured":"Kimberly J. R. & de Pouvourville G. (1993). The migration of managerial innovation: Diagnosis-related groups and health care administration in Western Europe. Jossey-Bass Publishers.  Kimberly J. R. & de Pouvourville G. (1993). The migration of managerial innovation: Diagnosis-related groups and health care administration in Western Europe. Jossey-Bass Publishers."},{"key":"e_1_3_2_1_33_1","unstructured":"Linstone H. A. & Sahal D. (1976). Technological substitution: Forecasting techniques and applications. Elsevier Publishing Company.  Linstone H. A. & Sahal D. (1976). Technological substitution: Forecasting techniques and applications. Elsevier Publishing Company."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.39.2.149"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/009365087014005003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.10.002"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1002_4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1086\/208587"},{"issue":"1","key":"e_1_3_2_1_40_1","first-page":"70","article-title":"Barriers to the uptake of web-based technology by university teachers","volume":"16","author":"Pajo K.","year":"2007","journal-title":"International Journal of E-Learning & Distance Education"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966883.1966890"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.36.10.1279"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224298605000301"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1086\/208789"},{"key":"e_1_3_2_1_45_1","unstructured":"Rogers E. (1995). Diffusion of innovations. New York: Free Press.  Rogers E. (1995). Diffusion of innovations. New York: Free Press."},{"issue":"2","key":"e_1_3_2_1_46_1","first-page":"77","article-title":"Champions for radical new inventions","volume":"41","author":"Schon D. A.","year":"1963","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2000.2884"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1098214005283748"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-013-5219-4"},{"key":"e_1_3_2_1_50_1","article-title":"Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. Engineering Management","author":"Tornatzky L. G.","year":"1982","journal-title":"IEEE Transactions on, (1), 28--45."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-5885.1960412"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Wang Y. M. Wang Y. S. & Yang Y. F. (2010). Understanding the determinants of RFID adoption in the manufacturing industry. Technological forecasting and social change 77(5) 803--815.  Wang Y. M. Wang Y. S. & Yang Y. F. (2010). Understanding the determinants of RFID adoption in the manufacturing industry. Technological forecasting and social change 77(5) 803--815.","DOI":"10.1016\/j.techfore.2010.03.006"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.331"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Weiss P. (2003). Adoption of product and process innovations in differentiated markets: The impact of competition. Review of Industrial Organization 23(3--4) 301--314.  Weiss P. (2003). Adoption of product and process innovations in differentiated markets: The impact of competition. Review of Industrial Organization 23(3--4) 301--314.","DOI":"10.1023\/B:REIO.0000031372.79077.fc"},{"key":"e_1_3_2_1_55_1","unstructured":"Zaltman G. Duncan R. & Holbek J. (1973). Innovations and organizations. Wiley New York.  Zaltman G. Duncan R. & Holbek J. (1973). Innovations and organizations. Wiley New York."}],"event":{"name":"SAICSIT '15: The 2015 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists","acronym":"SAICSIT '15","location":"Stellenbosch South Africa"},"container-title":["Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815782.2815798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,28]]},"references-count":55,"alternative-id":["10.1145\/2815782.2815798","10.1145\/2815782"],"URL":"https:\/\/doi.org\/10.1145\/2815782.2815798","relation":{},"subject":[],"published":{"date-parts":[[2015,9,28]]},"assertion":[{"value":"2015-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}