Publications
Export 536 results:
Filters: First Letter Of Last Name is M [Clear All Filters]
Telemedicine in the upper Amazon: Interplay with local health care practices. MIS Quarterly: Management Information Systems, 31, 403–425. presented at the Jan. doi:10.2307/25148797
. (2007). The'Business' of Authentication-From Iron Cage to Silicon Enclosure?. In OII–University of Oxford, Oxford, United Kingdom, 2 February 2016.
. (2016). Theoretical Frameworks: Valuable Aids or Seductive Traps?. In , Information Systems: Current Issues and Future Changes (pp. 303-305). Laxenburg: IFIP.
. (1998). . (2013).
Thinking with Monsters. ( )Living with Monsters? Social Implications of Algorithmic Phenomena, Hybrid Agency, and the Performativity of Technology. San Francisco, CA: Springer International Publishing. doi:10.1007/978-3-030-04091-8_12
. (2018). Three Perspectives: If Markus' 1983 Classic Study, "Power, Politics, and MIS Implementation," Were Being Reviewed Today. Twenty First International Conference on Information Systems. presented at the 10-13 December 2, Brisbane.
. (2000). The time-image and Deleuze's transcendental experience. Continental Philosophy Review, 35(3), 325 - 345. presented at the 2002/07/01/. Retrieved from http://dx.doi.org/10.1023/A:1022687422795
. (2002). To Be Seen, Or Not To Be Seen: A Study of Blackberrys in the Context of Organizational Surveillance. In 24th European Group for Organizational Studies (EGOS) Colloquium. presented at the 10-12 July, Amsterdam.
. (2008). To Be Seen, Or Not To Be Seen: A Study of Blackberrys in the Context of Organizational Surveillance. In 24th European Group for Organizational Studies (EGOS) Colloquium. presented at the 10-12 July, Amsterdam.
. (2008). To share or not to share: a critical research perspective on knowledge management systems. European Journal of Information Systems, 21, 496-511. doi:10.1057/ejis.2012.10
. (2012). The tool that has to build itself: The case of Dutch geo-data. In (Vol. 7443 LNCS, pp. 137–148). presented at the Sep. doi:10.1007/978-3-642-33489-4_12
. (2012). Toward an Integrated Theory of IT-related Risk Control. Organizational and Social Perspectives on IT.
. (2000). Towards a Model of Technology Adoption: A Conceptual Model Proposition. Information Systems – Creativity and Innovation in Small and Medium-Sized Enterprises. Springer. doi:http://dx.doi.org/10.1007/978-3-642-02388-0_20
. (2009). Tracing ‘Reality’ in the Design – Reality Gap: A Stakeholder Practice Based Model for IS Implementation in Developing Countries. In 11th International Conference on Social Implications of Computers in Developing Countries (pp. 181-194). International Federation of Information Processing. Retrieved from http://www.ifipwg94.org/
. (2011). Translating Telemedicine in Upper Amazon into the Academy (Ecole de Mines, Paris). presented at the Apr.
. (2005). Tribal Governance: The Business of Blockchain Authentication. In . presented at the Jan, Urban Centre for Computation and Data.
. (2018). Tribal Governance: The Business of Blockchain Authentication. SSRN Electronic Journal. doi:10.24251/HICSS.2018.566
. (2017). Tribal governance, the necessity of strategizing-as-practice. In . presented at the Jul, Tallinn, Estonia.
. (2018). Trustworthy mobile transactions: A longitudinal study of M-PESA in Kenya. In Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives (pp. 160–173). presented at the Dec. doi:10.4018/978-1-61520-901-9.ch010
. (2010). Trustworthy mobile transactions: A longitudinal study of M-PESA in Kenya. In Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives (pp. 160–173). presented at the Dec. doi:10.4018/978-1-61520-901-9.ch010
. (2010). Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya. Latusek, & Gerbasi (Eds.), Trust and Technology, 160–173.
. (2010). Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya. Latusek, & Gerbasi (Eds.), Trust and Technology, 160–173.
. (2010). Trying To Improve Communication And Collaboration With Information Technology: An Action Research Project Which Failed. Information Technology & People, 12, 317-332.
. (1999). Twenty Years of Applying Grounded Theory in Information Systems: A Coding Method, Useful Theory Generation Method, or an Orthodox Positivist Method of Data Analysis ?. Information Systems Research. presented at the 2004. Retrieved from http://dx.doi.org/10.1007/1-4020-8095-6_35
. (2004). Twenty Years of Applying Grounded Theory in Information Systems: A Coding Method, Useful Theory Generation Method, or an Orthodox Positivist Method of Data Analysis?. ( )Information Systems Research: Relevant Theory and Informed Practice. Norwell, MA: Kluwer Academic Publishers.
. (2004).