Publications
Shifting Ground for Health Information Systems: Local Embeddedness, Global Fields, and Legitimation. International Journal of Sociotechnology and Knowledge Development (IJSKD), 1, 1–12.
. (2009). Shifting ground for health information systems: Local Embeddedness, Global Fields, and Legitimation. International Journal of Sociotechnology and Knowledge Development, 1, 1–12. presented at the Oct. doi:10.4018/jskd.2009062601
. (2009). . (2008).
Social Activism in Information Systems Research: Making the World a Better Place. Communications of the AIS, 19, 261-277.
. (2007). Social Activism in Information Systems Research: Making the World a Better Place. Communications of the AIS, 19, 261-277.
. (2007). Sources of Cryptocurrency Value Systems: The Case of Bitcoin. International Journal of Electronic Commerce, 24, 474–496. presented at the Oct. doi:10.1080/10864415.2020.1806469
. (2020). Special Issue on Action Research in Information Systems: Making IS Research Relevant to Practice-Foreword. MIS Quarterly, 28, 329-335.
. (2004). Special issue on the Kleinian approach to information system research - foreword. European Journal of Information Systems, 20, 418-421. Retrieved from http://dx.doi.org/10.1057/ejis.2011.15
. (2011). Stages of virtually: Instructor and student. TechTrends, 43(3), 23 - 26. presented at the 1998/04/30/. Retrieved from http://dx.doi.org/10.1007/BF02824051
. (1998). Telemedicine in the Upper Amazon: Interplay with local health care practices. MIS quarterly, 403–425.
. (2007). Telemedicine in the upper Amazon: Interplay with local health care practices. MIS Quarterly: Management Information Systems, 31, 403–425. presented at the Jan. doi:10.2307/25148797
. (2007). . (2013).
The time-image and Deleuze's transcendental experience. Continental Philosophy Review, 35(3), 325 - 345. presented at the 2002/07/01/. Retrieved from http://dx.doi.org/10.1023/A:1022687422795
. (2002). To share or not to share: a critical research perspective on knowledge management systems. European Journal of Information Systems, 21, 496-511. doi:10.1057/ejis.2012.10
. (2012). Tribal Governance: The Business of Blockchain Authentication. SSRN Electronic Journal. doi:10.24251/HICSS.2018.566
. (2017). Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya. Latusek, & Gerbasi (Eds.), Trust and Technology, 160–173.
. (2010). Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya. Latusek, & Gerbasi (Eds.), Trust and Technology, 160–173.
. (2010). Trying To Improve Communication And Collaboration With Information Technology: An Action Research Project Which Failed. Information Technology & People, 12, 317-332.
. (1999). The Use of Quality Function Deployment in Systems Development: A Case Study. Journal of International Information Management, 4, 63-75.
. (1995). The Use of Quality Function Deployment in Systems Development: A Case Study. Journal of International Information Management, 4, 63-75.
. (1995). Using social network analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122.
. (2012). Using social network analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122.
. (2012). Using social network analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122.
. (2012). Using Social Network Analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122. presented at the Sep. doi:10.1016/j.jtrangeo.2011.09.005
. (2012).