@conference {1533, title = {Call for Papers: Criticality and Values in Digital Transformation Research}, booktitle = {IFIP 8.2 pre-ICIS OASIS Workshop 2022}, year = {2022}, publisher = {IFIP Working Group 8.2}, organization = {IFIP Working Group 8.2}, address = {Copenhagen, Denmark}, abstract = {The OASIS pre-ICIS 2022 workshop calls for submissions that take a value-reflective and critical stance on digital transformation. While researchers have paid great attention to understanding how digital transformation can uphold and better the status-quo, there is an emerging awareness of negative consequences and new socioeconomic challenges triggered by digital technologies. Indeed, we face a multitude of societal and organizational issues that digital technologies have the potential to amplify or alleviate; depending on which values we value. The ubiquity of computing blurs boundaries between work and life. Always-on engenders a contorted reality of self and others, yet it also enables flexibility and autonomy. Artificial intelligence (AI) can fuel discrimination, undermine freedom of speech or disassemble entire democracies, while it can also drive progress in society and economy for instance, by helping people with disabilities, optimizing energy generation and consumption, or supporting the development of new drugs. All too often, digital technologies are built on the principle of privacy violation rather than of privacy as a basic human right, and security is used as an argument for enhanced surveillance and control rather than for human wellbeing and protection in the digital sphere. At the same time, we have to tackle social and environmental sustainability issues such as climate change, poverty and inequality in which digital technologies can take a positive role. All this calls for a value-reflective stance and exploration of the criticality of digital transformation. After all, we must acknowledge that any attempt to leverage technology for good can also have negative corollary effects. Hence, the OASIS pre-ICIS 2022 workshop aims to promote research that engages and reflects the value positions and criticality in digital transformation research. We propose an inclusive agenda embracing the more traditional IFIP 8.2 community while being open towards other relevant topics outside IFIP 8.2.}, keywords = {Criticality, Digital transformation, Information infrastructure, Responsible Artificial Intelligence, values}, author = {Markus P. Zimmer and Polyxeni Vasilakopoulou and Miria Grisot and Marko Niemimaa} } @proceedings {1534, title = {Digital Platform-Enabled Organizational Resilience in Major Exogeneous Shocks: A Multimethod Exploration Study of Platform{\textquoteright}s Network Effect on SMEs{\textquoteright} Digital Resilience during COVID-19}, year = {2022}, publisher = {IFIP Working Group 8.2}, address = {Copenhagen, Denmark}, author = {Hoang Ton Nu Huong Giang and Ahmad Asadullah and Alfred Ong and Teo Hock-Hai} } @conference {1535, title = {Digital Transformations in Non-Governmental Organizations {\textendash} A Case Study on the Effect of Power Imbalances}, booktitle = {IFIP 8.2 pre-ICIS OASIS Workshop 2022}, year = {2022}, publisher = {IFIP Working Group 8.2}, organization = {IFIP Working Group 8.2}, address = {Copenhagen, Denmark}, author = {Marie E. Godefroid and Ralf Plattfaut and Bj{\"o}rn Niehaves} } @proceedings {1536, title = {A Value Analysis of Machine Learning-based Usable Privacy}, year = {2022}, publisher = {IFIP Working Group 8.2}, address = {Copenhagen, Denmark}, abstract = {With the ubiquitous presence of machine learning based decision making in the digitalization of various processes, workflows and solutions across every functional area of our society, it is important to understand the value of such systems. Especially, to understand the value of them in the light of end user{\textquoteright}s privacy because machine learning programs learn accurate inferences by inductively extracting information from various pieces of data. We aim to study the relationship of a machine learning based detection of anti-privacy user interface design patterns (dark patterns) and self-determination of the end users, in order to analyze the value of the machine learning technology. To this end, we are in the process of i) investigating the perspectives of practitioners in the field of machine learning-based usable privacy and ii) developing a machine learning program that detects dark patterns in website{\textquoteright}s consent form designs. Following which, we plan to conduct user studies to empirically study end users perspectives for example on machine learning assisted decision on one{\textquoteright}s online privacy.}, author = {Jenni Reuben and Ala Sarah Alaqra} } @inbook {miscione2020authenticatingregistries, title = {Authenticating deeds / organizing society: Considerations for Blockchain-based Land Registries}, booktitle = {DeVries W. (ed.). Responsible and Smart Land Management Interventions: An African Context}, year = {2020}, month = {Jul}, publisher = {Routledge}, organization = {Routledge}, abstract = {This chapter steps back from specific empirical cases and discusses alternative theoretical lenses that can be used to study if and how blockchain-based registries in Africa will be affecting organizations and society. Those lenses are: Neoinstitutionalism, Structuration theory, and Actor-Network theory. Each of them is adopted to outline aspects of blockchain first, then to highlight specificities in Ghana, finally to suggest research lines. This plurality of theoretical lenses encourages to foster a more nuanced understanding of unconventional contexts of technology in use, thus to derive better recommendations than those based on reductionist frameworks, which often overlook specificities of developing countries.}, author = {Miscione, G and Richter, C and Ziolkowski, R}, editor = {DeVries, W} } @inbook {miscione2020authenticatingsociety, title = {Authenticating Deeds/Organizing Society}, booktitle = {Responsible and Smart Land Management Interventions}, year = {2020}, month = {Jul}, pages = {133{\textendash}150}, publisher = {CRC Press}, organization = {CRC Press}, doi = {10.1201/9781003021636-14}, author = {Miscione, G and Richter, C and Ziolkowski, R} } @article {zavolokina2020buyerslemons, title = {Buyers of {\textquoteleft}lemons{\textquoteright}: How can a blockchain platform address buyers{\textquoteright} needs in the market for {\textquoteleft}lemons{\textquoteright}?}, journal = {Electronic Markets}, volume = {30}, number = {2}, year = {2020}, month = {Jun}, pages = {227{\textendash}239}, abstract = {{\textcopyright} 2019, Institute of Applied Informatics at University of Leipzig. The second-hand automotive market is one with the least trust from consumers. Customers on the second-hand car market suffer from such problems as the car being in worse condition than initially indicated, accident damage that is not disclosed, fraud, etc. Akerlof, described the market for used cars as an example of the problem of information asymmetries and resulting quality uncertainty. In order to cope with quality uncertainties, used car buyers actively engage themselves in information seeking. Blockchain technology promises to automatize the tracking of cars through their lifecycles and provide reliable information at any point in time it is needed. In our study, we investigate the problems car buyers face during information seeking and propose requirements for the design of a blockchain-based system to address these.}, issn = {1019-6781}, doi = {10.1007/s12525-019-00380-9}, author = {Zavolokina, L and Miscione, G and Schwabe, G} } @article {miscione2020decisionshoes, title = {Decision Problems in Blockchain Systems: old wine in new bottles of walking in someone else shoes?}, journal = {Journal of Management Information Systems}, year = {2020}, publisher = {Taylor \& Francis}, abstract = {Blockchain technology comes with the promise of being a disruptive technology with the potential for novel ways of interaction in a wide range of applications. Following broader application, scholarly interest in the technology is growing, though an extensive analysis of blockchain applications from a governance perspective is lacking to date. This research pays special attention to the governance of blockchain systems and illustrates decision problems in 14 blockchain systems from four application domains. Based on academic literature, semi-structured interviews with representatives from those organizations, and content analysis of grey literature, common problems in blockchain governance have been singled out and contextualized. Studying their enactment revealed their relevance to major organizational theories in what we labelled {\textquotedblleft}Patrolling the borders{\textquotedblright}, {\textquotedblleft}External Legitimation{\textquotedblright}, {\textquotedblleft}Reduction of Discretionality{\textquotedblright}, and {\textquotedblleft}Temporal Management{\textquotedblright}. The identification of these problems enriches the scarce body of knowledge on the governance of blockchain systems, resulting in a better understanding of how blockchain governance links to existing concepts and how it is enacted in practice.}, issn = {0742-1222}, author = {Miscione, G and Ziolkowski, R and Schwabe, G} } @conference {ziolkowski2020exploringconstitution, title = {Exploring Decentralized Autonomous Organizations: Towards Shared Interests and {\textquoteleft}Code is Constitution{\textquoteright}}, year = {2020}, author = {Ziolkowski, R and Miscione, G and Schwabe, G} } @article {wingreen2020sourcesbitcoin, title = {Sources of Cryptocurrency Value Systems: The Case of Bitcoin}, journal = {International Journal of Electronic Commerce}, volume = {24}, number = {4}, year = {2020}, month = {Oct}, pages = {474{\textendash}496}, publisher = {Informa UK Limited}, issn = {1086-4415}, doi = {10.1080/10864415.2020.1806469}, author = {Wingreen, SC and Kavanagh, D and John Ennis, P and Miscione, G} } @article {kavanagh2019themethod, title = {The Bitcoin game: Ethno-resonance as method}, journal = {Organization}, volume = {26}, number = {4}, year = {2019}, month = {Jul}, pages = {517{\textendash}536}, abstract = {{\textcopyright} The Author(s) 2019. The global financial crisis and the contemporaneous emergence of the digital currency Bitcoin invite us to think about money and how it often functions almost imperceptibly in society. In this article, we show that Bitcoin is a {\textquoteleft}new object of concern{\textquoteright} that also compels us to reimagine ethnography in a digital age. We present a method, which we term ethno-resonance, that is both a reaction to the conditions presented by the Bitcoin phenomenon and a way of maintaining critical distance from its cyberlibertarian politics. We explicate six aspects of the method, framed around answers to what, why, how, who, when and where questions. Applied to cryptocurrencies, the method leads us to depict Bitcoin as a game, and we analyse the game{\textquoteright}s dynamics through mapping the interplay between four foundational myths that animate, complicate and sustain the game. More broadly, this contributes to our understanding of the nature of money and alternative currencies.}, issn = {1350-5084}, doi = {10.1177/1350508419828567}, author = {Kavanagh, D and Miscione, G and Ennis, PJ} } @booklet {miscione2019blockchaintechnology, title = {Blockchain as organizational technology}, year = {2019}, month = {Feb}, publisher = {University of Zurich}, abstract = {Institute for Informatics Colloquium}, url = {https://www.ifi.uzh.ch/en/studies/phd/colloquium/spring-2019/details-colloquium-spring-2019.html}, author = {Miscione, G} } @conference {zavolokina2019buyerstechnology, title = {Buyers of Lemons: Addressing Buyers{\textquoteright} Needs in the Market for Lemons with Blockchain Technology}, booktitle = {Proceedings of the 52nd Hawaii International Conference on System Sciences}, year = {2019}, publisher = {Hawaii International Conference on System Sciences}, organization = {Hawaii International Conference on System Sciences}, isbn = {9780998133126}, doi = {10.24251/hicss.2019.223}, author = {Zavolokina, L and Miscione, G and Schwabe, G} } @article {kavanagh2019carnivalinfrastructures, title = {Carnival in the global village: Re-imagining information infrastructures}, journal = {Information Society}, volume = {35}, number = {5}, year = {2019}, month = {Oct}, pages = {299{\textendash}313}, abstract = {{\textcopyright}, Published with license by Taylor \& Francis. {\textcopyright} Donncha Kavanagh and Gianluca Miscione. Infrastructures are typically seen as boring and serious, and are routinely depicted using metaphors from transportation. We argue that the carnival is a fruitful metaphor for understanding emerging information infrastructures, as the information age is also the age of the carnival. We distinguish between the ubiquitous or distal carnival and its particular manifestations{\textendash}the proximate carnival{\textendash}both of which are characterized by play, anarchy, dissimulation, vulgar language, and excessive consumption. The article focuses on Bitcoin, which we see as a nascent information infrastructure and an exemplary instance of a proximate carnival. It also considers how the carnival metaphor might help us reimagine our study of the information age.}, issn = {0197-2243}, doi = {10.1080/01972243.2019.1647321}, author = {Kavanagh, D and Miscione, G} } @conference {miscione2019ascene, title = {A claim upon what? Cryptocurrencies as {\textquoteright}scene{\textquoteright}}, year = {2019}, month = {Feb}, publisher = {Edinburgh, Scotland}, organization = {Edinburgh, Scotland}, author = {Miscione, G and Kavanagh, D} } @booklet {miscione2019currenciesinfrastructures, title = {Currencies as infrastructures}, year = {2019}, abstract = {The Baseline podcast by Dan Frost}, author = {Miscione, G} } @booklet {miscione2019derrasiermesser, title = {Der Blockchain-Hype {\textendash} braucht es "Ockhams Rasiermesser"?}, year = {2019}, month = {Feb}, publisher = {Inside IT Switzerland}, url = {https://www.inside-it.ch/articles/53576}, author = {Miscione, G} } @conference {ziolkowski2019examiningsystems, title = {Examining Gentle Rivalry: Decision-Making in Blockchain Systems}, booktitle = {Proceedings of the 52nd Hawaii International Conference on System Sciences}, year = {2019}, publisher = {Hawaii International Conference on System Sciences}, organization = {Hawaii International Conference on System Sciences}, isbn = {9780998133126}, doi = {10.24251/hicss.2019.550}, author = {Ziolkowski, R and Parangi, G and Miscione, G and Schwabe, G} } @booklet {miscione2019fromtechnology, title = {From authentication to {\textquoteleft}Hanseatic governance{\textquoteright}: Blockchain as organizational technology}, year = {2019}, note = {London School of Economics and Political Science (LSE) seminar series organized by the Department of Management, London, UK}, month = {Jan}, abstract = {Blockchain technology provides a distributed ledger and is based on a logic of peer to peer authentication. It gained prominence with the rise of cryptocurrencies but provides a much broader field of possible application, including {\textendash} but not limited to {\textendash} land and other registries, global trade systems. While it has been originally closely linked to a libertarian, anarchic agenda, recent developments of commercial applications have illustrated that it can been dissociated from a particular ideological framing. The purpose of our paper is to identify and classify core properties of blockchain as an organizational technology and related modes of blockchain governance. We do this by looking at a number of case studies which highlight a number of governance design issues as well as unintended effects of the technology and related design choices. We are exploring the linkages between blockchain application properties and related design options and choices.}, author = {Miscione, G and Goerke, T and Klein, S} } @conference {miscione2019hanseatictechnology, title = {Hanseatic Governance: Understanding Blockchain as Organizational Technology}, year = {2019}, month = {Sep}, abstract = {Blockchain technology provides a distributed ledger and is based on a logic of peer to peer authentication. It gained prominence with the rise of cryptocurrencies but provides a much broader field of possible applications. While it has been originally closely linked to a libertarian agenda rejecting organizations, its developments have illustrated that this ideological framing is being reversed in practice. Based on contrastive empirical cases, the purpose of our paper is to discuss blockchain as an organizational technology. Its peculiar mode of governance, which we name {\textquoteleft}Hanseatic{\textquoteright}, needs to mediate between the fluidity typical of Free and Open Source Software development and the immutability that use organizations adopt blockchain for.}, author = {Miscione, G and Klein, S and Schwabe, G and Goerke, T and Ziolkowski, R} } @booklet {hargittai2019watchstreaming, title = {Watch Me Play: Twitch and the Rise of Game Live Streaming}, howpublished = {INTERNATIONAL JOURNAL OF COMMUNICATION}, volume = {13}, year = {2019}, month = {Jan}, pages = {2082{\textendash}2084}, publisher = {USC ANNENBERG PRESS}, issn = {1932-8036}, author = {Hargittai, E and Miscione, G} } @article {1354, title = {Advancing to the Next Level: Caring for Evaluative Metrics Monsters in Academia and Healthcare}, volume = {543}, year = {2018}, pages = {80-95}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_7}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Wallenburg, Iris and Kaltenbrunner, Wolfgang and Hammarfelt, Bj{\"o}rn and de Rijcke, Sarah and Bal, Roland}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @article {1351, title = {Algorithmic Pollution: Understanding and Responding to Negative Consequences of Algorithmic Decision-Making}, volume = {543}, year = {2018}, pages = {31-47}, publisher = {Springer International Publishing}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Marjanovic, Olivera and Cecez-Kecmanovic, Dubravka and Vidgen, Richard}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @article {1360, title = {A Bestiary of Digital Monsters}, volume = {543}, year = {2018}, pages = {177-190}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_13}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Douglas-Jones, Rachel and Burnett, John Mark and Cohn, Marisa and Gad, Christopher and Hockenhull, Michael and J{\o}rgensen, Bastian and Maguire, James and Ojala, Mace and Winthereik, Brit Ross}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @booklet {miscione2018blockchaincarnivalesque, title = {Blockchain infrastructures and their invisible carnivalesque}, year = {2018}, month = {Apr}, publisher = {University of Munster}, abstract = {At the European Research Center for Information Systems (ERCIS) workshop, Institut f{\"u}r Angewandte Informatik}, author = {Miscione, G} } @booklet {miscione2018codingsociety, title = {Coding Space / Organizing Society}, year = {2018}, month = {Feb}, publisher = {Dublin}, author = {Miscione, G} } @conference {ziolkowski2018consensussettings, title = {Consensus through blockchains: Exploring Governance across inter-organizational Settings}, booktitle = {International Conference on Information Systems 2018, ICIS 2018}, year = {2018}, month = {Jan}, abstract = {{\textcopyright} International Conference on Information Systems 2018, ICIS 2018.All rights reserved. The blockchain technology challenges the view on established modes of governance by offering distributed authentication without the need for a central authority, which is well-exemplified by Bitcoin. While the governance of and through Bitcoin is well-accentuated in research, we spotlight impacts on governance which blockchain-based systems bring to inter-organizational settings as well as their purpose. To build our arguments, we explore those impacts on two contrasting cases from the domains of automotive and public administration and relate them to cryptocurrencies. Relying on interviews with experts from said organizations utilizing blockchain technology, and a content analysis of related grey literature, we discuss established forms of governance as well as platforms and infrastructures against the impacts which blockchain-based systems cause. After referring those to the concepts of markets, hierarchies, networks, and tribes, we critically reflect on their purpose by utilizing the notions of infrastructures and platforms, and conclude blockchain-based systems to possibly alter the way established modes of governance are enacted.}, isbn = {9780996683173}, author = {Ziolkowski, R and Miscione, G and Schwabe, G} } @booklet {miscione2018everythingask, title = {Everything you always wished to know about Bitcoin but never dared to ask}, year = {2018}, month = {Apr}, publisher = {Goteborg}, author = {Miscione, G} } @article {1361, title = {Frankenstein{\textquoteright}s Monster as Mythical Mattering: Rethinking the Creator-Creation Technology Relationship}, volume = {543}, year = {2018}, pages = {191-197}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_14}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Hardwicke, Natalie}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @article {1349, title = {Frankenstein{\textquoteright}s Problem}, volume = {543}, year = {2018}, pages = {13-18}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_2}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Suchman, Lucy}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @booklet {miscione2018governanceblockchain, title = {Governance "of" vs. "by" blockchain}, year = {2018}, publisher = {University of Munster}, author = {Miscione, G} } @article {1355, title = {Hotspots and Blind Spots}, volume = {543}, year = {2018}, pages = {96-109}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_8}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Waardenburg, Lauren and Sergeeva, Anastasia and Huysman, Marleen}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @booklet {miscione2018informationpractice, title = {Information as practice}, year = {2018}, note = {Chaired Session}, month = {Jul}, publisher = {University of Warwick, UK}, author = {Miscione, G} } @article {1348, title = {Living with Monsters?}, volume = {543}, year = {2018}, pages = {3-12}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_1}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Aanestad, Margunn and MÓ“hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai and Schultze, Ulrike}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @article {1358, title = {Making a Difference in ICT Research: Feminist Theorization of Sociomateriality and the Diffraction Methodology}, volume = {543}, year = {2018}, pages = {140-155}, publisher = {Springer International Publishing}, edition = {1}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_11}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Elbanna, Amany}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @article {1356, title = {Objects, Metrics and Practices: An Inquiry into the Programmatic Advertising Ecosystem}, volume = {543}, year = {2018}, pages = {110-123}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_9}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Alaimo, Cristina and Kallinikos, Jannis}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @booklet {miscione2018practicescases, title = {Practices of digital visibility: Wikileaks and Snowden as global whistleblowing cases}, year = {2018}, note = {Invited Oral Presentation}, month = {Apr}, publisher = {Goteborg}, author = {Miscione, G} } @article {1352, title = {Quantifying Quality: Towards a Post-humanist Perspective on Sensemaking}, volume = {543}, year = {2018}, pages = {48-63}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_5}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Monteiro, Eric and {\O}sterlie, Thomas and Parmiggiani, Elena and Mikalsen, Marius}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @article {1357, title = {Re-figuring Gilbert the Drone}, volume = {543}, year = {2018}, pages = {127-139}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_10}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {B{\o}dker, Mads and Olofsson, Stefan Olavi and Clemmensen, Torkil}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @booklet {miscione2018subthemeleadership, title = {Sub-theme 61: Smart and Liveable Cities: Organizing Urban Governance and Leadership}, year = {2018}, note = {Chaired Session}, month = {Jul}, publisher = {Tallinn, Estonia}, abstract = {Contemporary narratives and discourses about managing, governing and developing cities could be divided into two competing streams. The first one (Smart Cities) is very prominent in mass media, tech companies and tech communities; whereas the second one (Liveable Cities) is mostly enacted on social media platforms, in cultural branding initiatives, social movements, grassroots initiatives, and (virtual) communities. Both streams struggle for getting a voice in the discourses as well as in mediascapes. Technology, planning and urban architecture have always been closely related in allowing and limiting both what can be controlled and what self-organizes and emerges in cities. Since the 1990s, urban and regional planning are enabled and constrained by information technologies and the narratives they become wrapped in. {\textquestiondown}Smart cities{\textquestiondown} and {\textquestiondown}liveable cities{\textquestiondown} make no exception since at least two distinct narratives polarize opinions and debates: one is derived from Spatial Data Infrastructures (top down, state led efforts); the other emerges from participation and user-generated content (social media, voluntary geographic information, e-governance systems, etc.). Smart cities seem to be leaning toward the former, but grass-root movements can be quite forceful in using alternative narratives and deploying technologies and open data accordingly. Cities can be analyzed as eco-systems that are emerging and developing in the context of global economy with new forms of organizing. In {\textquestiondown}city action nets{\textquestiondown}, organizing in general is an emergent property which illuminates new forms of connecting mechanisms (Czarniawska, 2002; 2014). Urban development is in this sense closely related to an understanding of leadership as social processes emerging through the interactions of multiple actors. {\textquestiondown}Relational leadership{\textquestiondown} (Uhl-Bien, 2006) and {\textquestiondown}distributed leadership{\textquestiondown} (Bolden, 2011) open up for self-organizing, thereby creating new opportunities in the way citizens are empowered when designing and co-creating their cities of today and tomorrow. In parallel, there is a search for new public governance approaches assembled by co-creative practices (Torfing \& Triantafillou, 2016). These approaches are often inspired by leadership concepts where leadership is seen as some kind of participatory democracy in democratic governance networks (S{\o}rensen \& Torfing, 2007). Urban research has also investigated avenues through which culture and creativity can raise the imaginative capability of citizens and harness opportunities tied to what can be called culture-driven growth. The success of co-creating urban strategies within and between the public sector, institutions, city administrations, political bodies, business, the civil society and not least the citizens seems very much dependent on a synthesis of bottom-up and top-down activities. This calls for a holistic approach that has the potential to foster involvement, to embrace both diversity and equality in communities and cities, and to cross institutional borders, e.g. by linking arts and other creative initiatives to co-creation (W{\r a}hlin et al., 2016). Our sub-theme is aiming at investigating the interrelation of the expected and the unexpected on the urban scale by looking at the sometimes surprising outcomes of the interplays of change and stability, innovation and technology, spaces and spacing, planning and creativity, organization and spontaneity. In order to broaden the predominant technological perspective on smart cities we invite theoretical as well as empirical papers investigating the role of all types of stakeholders when it comes to developing and enacting smart and livaeble cities. Papers may address, but are not limited to, research on the following themes and topics: Discursive construction of {\textquestiondown}Smart Cities{\textquestiondown}, {\textquestiondown}Agile Cities{\textquestiondown} and {\textquestiondown}Liveable Cities{\textquestiondown} Narrating and organizing the city in governance and organization Interplay between urban architecture, planning and organizing Interplay between urban governance, leadership and organizing Interplay between technology, communication and organizing The co-creative practices of new public governance The potential of creative, cultural and artistic interventions The (forgotten?) civil society and the (lost?) citizen References Bolden, R. (2011): {\textquestiondown}Distributed leadership in organizations: A review of theory and research.{\textquestiondown} International Journal of Management Reviews, 13, 251-269. Czarniawska, B. (2002): A Tale of Three Cities: Or the Glocalization of City Management. Oxford: Oxford University Press. Czarniawska, B. (2014): A theory of organizing. Cheltenham: Edward Elgar. S{\o}rensen, E., \& Torfing, J. (eds.) (2007): Theories of Democratic Network Novernance. Basingstoke: Palgrave MacMillan. Torfing, J., \& P. Triantafillou (eds.) (2016): Enhancing Public Innovation by Public Governance. Cambridge: Cambridge University Press. Uhl-Bien, M. (2006): {\textquestiondown}Relational leadership theory: exploring the social processes of leadership and organizing.{\textquestiondown} Leadership Quarterly, 17, 654{\textquestiondown}676. W{\r a}hlin, N., Kapsali, M., N{\"a}sholm, M.H., \& Blomquist, T. (2016): Urban Strategies for Culture-Driven Growth: Co-Creating a European Capital of Culture. Cheltenham: Edward Elgar.}, author = {Miscione, G and Pogner, K-H and W{\r a}hlin, N} } @article {1359, title = {Thinking with Monsters}, volume = {543}, year = {2018}, pages = {159-176}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_12}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Hovorka, Dirk S. and Peter, Sandra}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @conference {miscione2018tribalauthentication, title = {Tribal Governance: The Business of Blockchain Authentication}, year = {2018}, note = {Hawaii International Conference on System Sciences (HICSS-51), Waikoloa Village, Hawaii, 3-6 January 2018}, month = {Jan}, publisher = {Urban Centre for Computation and Data}, organization = {Urban Centre for Computation and Data}, abstract = {The blockchain technology offers a novel mode of distributed authentication, which does not depend on a central authority. We consider this novelty against established governance modes. We illustrate our argument by paying special attention to blockchain-based authentication functions in the empirical domain of land registries across the world. Based on interviews with representatives from organizations deploying blockchain, and content analysis of related grey literature, we discuss established governance idealtypes against what the rivalry that cryptocurrencies and blockchains bring to digital settings. After referring to market, hierarchy, network, and bazaar, we conclude outlining the prospects of a different, blockchain-related governance mode called {\textquoteleft}tribal{\textquoteright} that better captures the {\textquoteleft}togetherness{\textquoteright} which rivalry originates.}, author = {Miscione, G and Ziolkowski, R and Zavolokina, L and Schwabe, G} } @conference {miscione2018tribalstrategizingaspractice, title = {Tribal governance, the necessity of strategizing-as-practice}, year = {2018}, note = {Roundtable Participant}, month = {Jul}, publisher = {Tallinn, Estonia}, organization = {Tallinn, Estonia}, abstract = {Usual ideal-types of hierarchy and markets divide the modes of organizing into islands of planning or seas of market trades. Networks were proposed as a different ideal-type in which relations are not quantifiable and trust makes them sticky. Those ideal-types do not seem to work well to explain online practices. Contrary to the economy of scarcity, the Web, peer-to-peer, open source, Wikipedia derive from the economy of plenitude and originated the ideal-type of the bazaar. The last decade brought cryptocurrencies to the global audience. The underneath architecture (blockchain) offers a novel mode of distributed authentication, which guarantees scarcity (infinite money is not money) and avoids central authorities. None of the previous ideal-types seems to work here, so millions of actors, from small traders to central banks, are by necessity strategizing-as-practice. This mode of organizing can be called {\textquestiondown}tribal{\textquestiondown} because it captures the paradox of rivalry originating {\textquestiondown}togetherness{\textquestiondown}.}, author = {Miscione, G} } @article {1353, title = {Understanding the Impact of Transparency on Algorithmic Decision Making Legitimacy}, volume = {543}, year = {2018}, pages = {64-79}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_6}, url = {http://link.springer.com/content/pdf/10.1007/978-3-030-04091-8}, author = {Goad, David and Gal, Uri}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @booklet {miscione2018understandingscenes, title = {Understanding transformations as they happen: Blockchain and cryptocurrency as {\textquoteright}scenes{\textquoteright}}, year = {2018}, note = {Invited Oral Presentation}, month = {Apr}, publisher = {Goteborg}, author = {Miscione, G} } @article {1350, title = {We Have Been Assimilated: Some Principles for Thinking About Algorithmic Systems}, volume = {543}, year = {2018}, pages = {19-27}, publisher = {Springer International Publishing}, address = {San Francisco, CA}, isbn = {978-3-030-04090-1}, issn = {1868-4238}, doi = {10.1007/978-3-030-04091-8_3}, url = {http://link.springer.com/10.1007/978-3-030-04091-8}, author = {Edwards, Paul N.}, editor = {Schultze, Ulrike and Aanestad, Margunn and M{\"a}hring, Magnus and {\O}sterlund, Carsten and Riemer, Kai} } @inbook {martinez2017aconditions, title = {A Geographic and Mixed Methods Approach to Capture Unequal Quality-of-Life Conditions}, booktitle = {HANDBOOK OF COMMUNITY WELL-BEING RESEARCH}, series = {International Handbooks of Quality-of-Life}, year = {2017}, month = {Jan}, pages = {385{\textendash}402}, publisher = {SPRINGER}, organization = {SPRINGER}, isbn = {978-94-024-0876-8}, issn = {2468-7227}, doi = {10.1007/978-94-024-0878-2_20}, author = {Martinez, J and Verplanke, J and Miscione, G}, editor = {Phillips, R and Wong, C} } @conference {donncha2017infrastructures, title = {Infrastructures and their invisible carnivalesque}, booktitle = {33rd European Group of Organizational Studies (EGOS) Colloquium}, year = {2017}, author = {Donncha Kavanagh, Gianluca Miscione} } @conference {2017infrastructurescarnivalesque, title = {Infrastructures and their invisible carnivalesque}, year = {2017}, month = {Jul} } @article {miscione2017narratingdata, title = {Narrating the Stories of Leaked Data}, journal = {Discourse, Context \& Media}, year = {2017}, month = {Oct}, publisher = {Elsevier BV}, doi = {10.1016/j.dcm.2017.02.002}, author = {Miscione, G and Landert, D} } @article {landert2017narrating, title = {Narrating the stories of leaked data: The changing role of journalists after Wikileaks and Snowden}, journal = {Discourse, Context \& Media}, year = {2017}, publisher = {Elsevier}, author = {Landert, Daniela and Miscione, Gianluca} } @article {landert2017narratingsnowden, title = {Narrating the stories of leaked data: The changing role of journalists after Wikileaks and Snowden}, journal = {Discourse, Context and Media}, volume = {19}, year = {2017}, month = {Oct}, pages = {13{\textendash}21}, abstract = {{\textcopyright} 2017 Elsevier Ltd Traditionally, investigative journalists had a gatekeeping role between their confidential sources of information and the public sphere. Over the last two decades and with the arrival of new media, this role has been undergoing changes. Recent cases of whistleblowing, such as WikiLeaks and Snowden, illustrate how contemporary media allow individuals to release data directly to the global audience. This raises the question of how recent leaks affect how journalists operate. In this study we compare how The Guardian covered two cases of whistleblowing which are commonly referred to as WikiLeaks and Snowden. We analyze how access to leaked data is provided or facilitated on The Guardian website, how readers are invited to interact with these data and how journalists present their own activities. A qualitative analysis of the leading articles further shows how the stories are framed and how much prominence is given to the data and the various actors. The results show how the roles of journalists shift from gatekeeping to data management, interpretation, contextualisation and narration. Journalists may no longer be needed to publish leaked data but they are still needed to tell the stories of leaked data.}, issn = {2211-6958}, doi = {10.1016/j.dcm.2017.02.002}, author = {Landert, D and Miscione, G} } @booklet {keenan2017spatial, title = {Spatial Data: Market and Infrastructure.}, year = {2017}, author = {Keenan, Peter and Miscione, Gianluca} } @inbook {keenan2017spatialinfrastructure, title = {Spatial Data: Market and Infrastructure}, booktitle = {Encyclopedia of GIS}, year = {2017}, pages = {2003{\textendash}2010}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, isbn = {9783319178844}, doi = {10.1007/978-3-319-17885-1_755}, author = {Keenan, P and Miscione, G} } @article {miscione2017tribalauthentication, title = {Tribal Governance: The Business of Blockchain Authentication}, journal = {SSRN Electronic Journal}, year = {2017}, publisher = {Elsevier BV}, doi = {10.24251/HICSS.2018.566}, author = {Miscione, G and Ziolkowski, R and Zavolokina, L and Schwabe, G} } @article {1335, title = {Affordance Lost, Affordance Regained, and Affordance Surrendered}, year = {2016}, pages = {73{\textendash}89}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {Informed by the ontology of becoming, this study explores technological affordances in the context of use of social media technologies where multiple human and material agents interact without necessarily being co-present. In such scenarios, tracing the relational configuration of social and material agents becomes a challenge. So far, extant literature based on the ontology of becoming has only considered the actualization of affordances in the proximal co-presence of other people and objects. Extending this understanding of affordances by using actor-network theory (ANT) as a methodological and conceptual device, this research traces translations of the {\textquoteleft}{\textquoteleft}distant{\textquoteright}{\textquoteright} in the form of inscriptions that can travel across space and time. This study points towards the utility of using ANT, over other interpretive methods, as a tool to study complex technological phenomena. It shows that affordances are collective, ongoing accomplishments of diverse actors, some co-present physically and others, though distant, co-present through translated representations.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_5}, author = {Sharma, Divya and Saha, Biswatosh and Sarkar, Uttam K.}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @booklet {miscione2016blockchainenclosure, title = {Blockchain Authentication {\textendash} From Iron Cage to Silicon Enclosure?}, year = {2016}, month = {Mar}, publisher = {University of Oxford, United Kingdom}, author = {Miscione, G} } @booklet {2016chasingcryptocurrencies, title = {Chasing ghosts: Methodological challenges in tracking globally distributed organisational forms{\textquoteright}the case of cryptocurrencies}, year = {2016}, month = {Dec} } @booklet {miscione2016codingauthentication, title = {Coding Value and the Business of Authentication}, year = {2016}, month = {Feb}, address = {Oxford}, author = {Miscione, G} } @booklet {2016codingarchitecture, title = {Coding Value - The Emergence of a new Architecture}, year = {2016}, month = {Apr}, address = {University of Zurich} } @article {1334, title = {Critical Realism and Actor-Network Theory/Deleuzian Thinking: A Critical Comparison in the Area of Information Systems, Technology and Organizational Studies}, year = {2016}, pages = {58{\textendash}72}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {Much debate has encircled studies of information systems (IS), technology and organizations with regards to ideas of process, stability and change, performance and materiality. This encapsulates different ways of viewing dualities (e.g. subjective/objective, social/technical, local/global, macro/micro, structure/agency, reality/construction, being/becoming, etc.) as well as alternative ontological and epistemological commitments underlying particular approaches and research perspectives. This paper seeks to explore two specific approaches by focusing on a comparison of critical realism (CR) and actor-network theory (ANT)/Deleuze-inspired forms of inquiry. In particular, we focus on the notion of morphogenesis in order to explore in greater detail how this concept conjures up rather different images in relation to approaches centred around CR and ANT/Deleuze.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_4}, author = {McLean, Chris and Aroles, Jeremy}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1330, title = {A Developmental Perspective to Studying Objects in Robotic Surgery}, year = {2016}, pages = {229{\textendash}245}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {Drawing on interventionist activity theoretical approaches, this paper describes a method of self-confrontation as a way in which to study objects in technology-mediated practices. In addition to research interests, the aim of examining the objects is to develop the capacity of professionals and organizations to work and learn better in complex technology-mediated work. The method was applied in robotic surgery, in which instruments are tele-operated by a surgeon. The robot offers better, collective visualization of the area under surgical operation than previous techniques. In particular, the paper shows how objects were revealed and new objects emerged during the intervention. We suggest that activity theoretical developmental interventions such as self-confrontations may help understand the complexity and evolution of objects, and thus contribute to studies of technology and organizations.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_14}, author = {Sepp{\"a}nen, Laura and Kloetzer, Laure and Riikonen, Jarno and Wahlstr{\"o}m, Mikael}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1326, title = {Enactment or Performance? A Non-dualist Reading of Goffman}, year = {2016}, pages = {167{\textendash}181}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {This paper contributes to the sociomateriality research orientation with a critical examination of two concepts {\textendash} enactment and performance {\textendash} that have been associated with the notion of performativity. While a preference for the term enactment has been expressed in influential IS literature, we argue that sociomateriality will benefit from an engagement with the body of research that focuses on Goffman{\textquoteright}s notion of performance. We provide a critique of Mol{\textquoteright}s reading of Goffman{\textquoteright}s notions of {\textquoteleft}{\textquoteleft}persona{\textquoteright}{\textquoteright} and {\textquoteleft}{\textquoteleft}mask{\textquoteright}{\textquoteright}. We then show how a careful non-dualist reading of his work reveals his opus as relevant and useful for sociomateriality, because his notion of performance affords locating technology in differing roles within a performance. In doing so, we argue that Goffman{\textquoteright}s work, largely overlooked within this stream of research so far, contributes important concepts and terminology for making sociomateriality actionable for IS.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_10}, author = {Hafermalz, Ella and Riemer, Kai and Boell, Sebastian}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @booklet {miscione2016ethnoresonancebitcoin, title = {Ethno-resonance as method: The curious case of Bitcoin}, year = {2016}, month = {Nov}, publisher = {.}, author = {Miscione, G} } @article {1333, title = {From Substantialist to Process Metaphysics {\textendash} Exploring Shifts in IS Research}, year = {2016}, pages = {35{\textendash}57}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {This article examines the shifts in Information Systems (IS) research~from a positivist to interpretive to sociomaterial paradigm by demonstrating how the shifts reflected the move from substantialist towards process metaphysics. Such metaphysical grounding provides a foundation for deeper understanding of paradigm differences and the struggles when shifts occur. After a brief historical overview of substantialist and process metaphysics and a summary of their key assumptions, the article explores paradigm shifts in IS research and highlights the underlying metaphysical nature of surrounding difficulties and controversies.~The article advances the paradigm debate by drawing attention to the metaphysical nature of paradigmatic shifts in IS research and by opening up intellectual space for conceiving and understanding novel research approaches beyond~Burrell and Morgan{\textquoteright}s model [1].}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_3}, author = {Cecez-Kecmanovic, Dubravka}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1336, title = {Ideological Materiality at Work: A Lacanian Approach}, year = {2016}, pages = {93{\textendash}107}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {While recent theoretical debates have foregrounded sociomaterial studies and the interpenetration between the social and the material, practice-based studies have neglected, if not omitted, the place of affect and ideology in work practice. The use of the notion of materiality causes a conflation of different ontological claims, and a conceptual clarification is needed to grasp the polysemy of materiality. This paper provides some key notions for those interested in addressing the materiality of the affective register at work. By drawing on authors such as Lacan, Althusser, Butler and the Essex Lacanian School, this paper suggests that much is to be gained by addressing two difficult but crucial notions: the materiality of the signifier and ideological fantasy.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_6}, author = {Pignot, Edouard}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1337, title = {Inscribing Individuals into a Formalized System: The {\textquoteleft}{\textquoteleft}Labour{\textquoteright}{\textquoteright} Performed by Affective Spaces}, year = {2016}, pages = {108{\textendash}124}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {A substantial amount of ongoing work in organizations can be characterized as processes of formalization in which unique circumstances are rendered legible to organizational frameworks and inscribed into institutionalized ways of knowing and doing. Embedded in these processes is the need to manage, distance, and condition the affective and physical experience of the players involved. Using twelve months of ethnographic data gathered in the Family Law unit of the courts in a large county of California, we explore how formalization happens. We find that a dynamic combination of actants (technologies of formalization) engender affective spaces that serve as passage points in the process of formalization. These affective spaces condition the bodies and emotions of customers in a manner that generally mitigates unstable intensity and renders the customer ready to focus on the {\textquoteleft}{\textquoteleft}facts{\textquoteright}{\textquoteright} of the case. We suggest that by attending to the multiple actants in an environment we are able to interrogate both the origin and effects of {\textquoteleft}{\textquoteleft}affect{\textquoteright}{\textquoteright} as well as better understand how key passage points work in the service of formalization processes. In so doing we expand the conversation about the challenges of public service delivery and put forth the beginning of a theory of how affective spaces serve organizational and institutional goals.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_7}, author = {Toll, Alexandra and Mazmanian, Melissa}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @conference {miscioneac2016multinationaltiers, title = {Multinational and Indigenous IT Companies in Ireland: Exploring the Spatial Relationships between the Two Tiers}, year = {2016}, month = {Dec}, author = {Miscioneac, G and Carrolla, P and Dekkerb, S and Nedovic-Budicbc, Z and Shahumyanbd, H and Dublin, B} } @article {miscione2016myth, title = {Myth, management of the unknown}, journal = {Culture and Organization}, volume = {22}, number = {1}, year = {2016}, pages = {67{\textendash}87}, publisher = {Routledge}, author = {Miscione, Gianluca} } @article {miscione2016mythunknown, title = {Myth, management of the unknown}, journal = {Culture and Organization}, volume = {22}, number = {1}, year = {2016}, month = {Jan}, pages = {67{\textendash}87}, abstract = {{\textcopyright} 2015 Taylor \& Francis. Since centuries, myth, progress, and technology have been interwoven in ways that explain the past and anticipate the future. The relevance of myths is not in being true or false, but in contributing to orienting social praxes, and thus in acting as a regulator of human behaviour in front of unknown consequences of today{\textquoteright}s decisions and actions. This is particularly evident in settings where the desire for progress is imported with technologies. The argument is developed by relying on qualitative research based on extensive fieldwork in Peru and India.}, issn = {1475-9551}, doi = {10.1080/14759551.2015.1092971}, author = {Miscione, G} } @article {1327, title = {Performing Cyborgian Identity: Enacting Agential Cuts in Second Life}, year = {2016}, pages = {182{\textendash}197}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {As people live their lives online more and more, they increasingly rely on digital bodies to extend their senses and to perform identities. With this hybridization of physical and digital embodiments, they become cyborgs and are compelled to negotiate the dualistic space defined by the binary opposition of actual and virtual reality. Whereas actuality typically connotes concrete existence, virtuality signifies phenomena that are ideal, essential and unrealized but that have actual effects.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_11}, author = {Schultze, Ulrike}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1328, title = {Performing Research Validity: A {\textquoteleft}{\textquoteleft}Mangle of Practice{\textquoteright}{\textquoteright} Approach}, year = {2016}, pages = {201{\textendash}214}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {Mainstream discussions of research validity (truth, significance, objectivity) draw heavily on a certain {\textquoteleft}{\textquoteleft}representational idiom{\textquoteright}{\textquoteright} of science [1] that assumes a knowledge{\textendash}reality correspondence. However, for research on practices, rather than nature, such a knowledge-reality distinction is neither feasible nor desirable, as it is at odds with the very notion of a {\textquoteleft}{\textquoteleft}practice{\textquoteright}{\textquoteright}. Drawing on Pickering{\textquoteright}s alternative {\textquoteleft}{\textquoteleft}performative idiom{\textquoteright}{\textquoteright} for science, and extending it to participatory forms of social research, we propose alternative validity claims for practice-oriented research. Using the example of information infrastructuring practices, we show that the three aspects of validity thus reinterpreted become quite closely related to each other and also to the process of information infrastructuring itself. In so doing, we demonstrate the importance of extending the notion of {\textquoteleft}{\textquoteleft}material agency{\textquoteright}{\textquoteright} to embrace the dual agencies of the practice studied and the researcher{\textquoteright}s own disciplinary practice.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_12}, author = {Johnston, Robert B. and Reimers, Kai and Klein, Stefan}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1339, title = {A Relational Approach to Materiality and Organizing: The Case of a Creative Idea}, year = {2016}, pages = {143{\textendash}166}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {In this paper, we propose to go beyond the notion of entanglement that has been proposed in recent years to fill the so-called gap between {\textquoteleft}{\textquoteleft}the social{\textquoteright}{\textquoteright} and {\textquoteleft}{\textquoteleft}the material{\textquoteright}{\textquoteright}, especially in organizational studies. While this notion rightly invites us to reconsider the way we traditionally approach the question of materiality and organizing, we believe that its formulation tends to implicitly reproduce the gap it claims to fill. In contrast, we propose a view according to which sociality and materiality should, in fact, be considered aspects of everything that comes to be and exist. Throughout the analysis of an episode taken from fieldwork devoted to creative teams, we show that things as abstract as ideas, for instance, in order to emerge, exist, and continue to exist, have to materialize themselves in various identifiable beings. While the sociality of an idea is identified through the various relations that make it what it is, we show that its materiality comes from what precisely materializes these relations.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_9}, author = {Martine, Thomas and Cooren, Fran{\c c}ois}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @booklet {2016smartcontractsauthentication, title = {Smartcontracts and smartcities, displacing power through authentication?}, year = {2016}, month = {May}, address = {Maynooth} } @article {1329, title = {Synthetic Situations in the Internet of Things}, year = {2016}, pages = {215{\textendash}228}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {The proliferation of distributed digital technologies in contemporary enterprise challenges the understanding of situated action. This paper revisits this notion in the era of Big Data and the Internet of Things. Drawing upon longitudinal studies within the offshore oil and gas industry, we empirically expand upon Knorr Cetina{\textquoteright}s {\textquoteleft}{\textquoteleft}synthetic situation{\textquoteright}{\textquoteright} to encompass data-intensive work where people are not co-located with the physical objects and phenomena around which work is organized. By highlighting the performative nature of synthetic situations in the Internet of Things {\textendash} where phenomena are algorithmically enacted through digital technologies {\textendash} we elaborate upon the original formulation of synthetic situations by demonstrating that (i) algorithmic phenomena constitute the phenomena under inquiry, rather than standing in for physical referents; (ii) noise is irreducible in algorithmic phenomena; (iii) synthetic situations are productive rather than reductive. Finally, we draw brief methodological implications by proposing to focus on the material enactment of data in practice.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_13}, author = {Parmiggiani, Elena and Monteiro, Eric and {\O}sterlie, Thomas}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @conference {miscione2016business, title = {The{\textquoteright}Business{\textquoteright} of Authentication-From Iron Cage to Silicon Enclosure?}, booktitle = {OII{\textendash}University of Oxford, Oxford, United Kingdom, 2 February 2016}, year = {2016}, author = {Miscione, Gianluca} } @article {1332, title = {Thoughts on Movement, Growth and an Anthropologically-Sensitive IS/Organization Studies: An Imagined Correspondence with Tim Ingold}, year = {2016}, pages = {17{\textendash}32}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {In what follows, we present the outcome of an imagined dialogue with Tim Ingold on possible future directions for an anthropologically-sensitive approach to studying Information Systems (IS) and Organization Studies (OS). The aim is to try to convey some of the strangeness and freshness that we have found in his thought, with a view to stimulating IS/OS scholars to engage further with his work and ideas. The piece takes the form of an imagined Q{\&}A session with Tim, which we have synthesized from excerpts of previously published interviews and writings.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_2}, author = {Ingold, Tim and Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1331, title = {What if the Screens Went Black? The Coming of Software Agents}, year = {2016}, pages = {3{\textendash}16}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {Trading screens are not supposed to be black. In fact, when we see them on trading floors, on TV, or in media centres, they attract us with catching colours and blinking information. They project urgency, speed, and power {\textendash} the power of big money, the power of winning and losing. When we are near them, we feel their heat. We want to give in to their considerable attraction. We want to be players of the game and part of the action.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_1}, author = {Cetina, Karin Knorr}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @article {1338, title = {When Is an Affordance? Outlining Four Stances}, year = {2016}, pages = {125{\textendash}139}, publisher = {Springer International Publishing}, address = {Cham}, abstract = {Affordance has emerged as a core concept in information systems (IS) research during the last decade. This relational concept is applied to understand and theorize the relationship between the social and the technical. In the works of the concept originator James Gibson, the relation was mainly portrayed as an ever-existing fact between the natural environment and an animal. In contrast, IS research focuses on relationships in-the-making between artificial things and human beings. In the IS context, we have identified vagueness in temporal and relational ontology: when do affordances exist and between whom or what? In this paper, we delve into the temporal and relational questions that have been omitted in much of the IS literature. What kind of a relationship is an affordance and when does it occur? Based on our hermeneutic understanding, we identify four stances from the existing literature. We classify those stances as canonical affordance, designed affordance, potential affordance, and affordance as completed action. We further argue that each stance has its own assumptions, consequences, and thus strengths and weaknesses.}, isbn = {978-3-319-49733-4}, doi = {10.1007/978-3-319-49733-4_8}, author = {Lanam{\"a}ki, Arto and Thapa, Devinder and Stendal, Karen}, editor = {Introna, Lucas and Kavanagh, Donncha and Kelly, S{\'e}amas and Orlikowski, Wanda and Scott, Susan} } @booklet {2016zoomingscale, title = {Zooming In - Providing fine granularity of assessment at scale}, year = {2016}, month = {Mar}, publisher = {UCD EdTECx talks} } @conference {EMCIS 2015, title = {Analysing qualitative data from virtual worlds: using images and text mining}, booktitle = {European, Mediterranean \& Middle Eastern Conference on Information Systems}, year = {2015}, pages = {1-15}, type = {Conference Proceedings}, abstract = {There is an increasing interest within both organisational and social contexts in virtual worlds and virtual reality platforms. Virtual worlds are highly graphical systems in which avatars interact with each other, and almost every event and conversation is logged and recorded. This presents new challenges for qualitative researchers in information systems. This paper addresses the challenges of analyzing the huge amounts of qualitative data that can be obtained from virtual worlds (both images and text). It addresses how images might be used in qualitative studies in virtual worlds, and proposes a new way to analyze textual data using a qualitative software tool called Leximancer. This paper illustrates these methods using a study of a social movement in a virtual world.}, keywords = {images leximancer qualitative text virtual worlds}, author = {McKenna, Brad and Myers, Michael and Gardner, Lesley} } @article {miscione2015bitcoin, title = {Bitcoin and the Blockchain: A Coup D{\textquoteright}{\'E}tat in Digital Heterotopia?}, journal = {Available at SSRN 2624922}, year = {2015}, author = {Miscione, Gianluca and Kavanagh, Donncha} } @article {miscione2015bitcoin, title = {Bitcoin and the Blockchain: A Coup D{\textquoteright}{\'E}tat in Digital Heterotopia?}, journal = {Available at SSRN 2624922}, year = {2015}, author = {Miscione, Gianluca and Kavanagh, Donncha} } @conference {miscionebitcoinheterotopia, title = {Bitcoin and the Blockchain: A Coup D{\textquoteright}Etat in Digital Heterotopia?}, booktitle = {SSRN Electronic Journal}, year = {2015}, publisher = {Elsevier BV}, organization = {Elsevier BV}, doi = {10.2139/ssrn.2624922}, author = {Miscione, G and Kavanagh, D} } @booklet {miscionetheauthentication, title = {The {\textquoteright}Business{\textquoteright} of Authentication}, year = {2015}, publisher = {Elsevier BV}, doi = {10.2139/ssrn.2646859}, author = {Miscione, G} } @article {1222, title = {Design Ethnography in Information Systems}, journal = {Information Systems Journal}, volume = {25}, number = {1}, year = {2015}, pages = {23-46}, type = {Journal Article}, doi = {10.1111/isj.12055}, author = {Baskerville, Richard L and Myers, Michael David} } @booklet {miscione2015designingimpossible, title = {Designing the Impossible}, year = {2015}, month = {Apr}, publisher = {Trinity College Dublin}, url = {https://www.researchgate.net/profile/Gianluca_Miscione/publication/274370581_TCD/links/551bf11f0cf20d5fbde229b5.pdf}, author = {Miscione, G} } @conference {keenan2015desperately, title = {Desperately seeking the IS in GIS}, year = {2015}, publisher = {Pre-ICIS Workshop on Locational Analytics and Big Data Fort Worth USA}, organization = {Pre-ICIS Workshop on Locational Analytics and Big Data Fort Worth USA}, author = {Keenan, Peter and Miscione, Gianluca} } @conference {2015desperatelygis, title = {Desperately seeking the IS in GIS}, year = {2015}, month = {Dec}, abstract = {Geographical Information Systems (GIS) are now a widespread and important form of Information Technology (IT) use. In principle, Information Systems (IS) research is concerned with all forms of IT use. Yet despite this importance, GIS remains largely invisible in IS research. This paper illustrates this separation using bibliographic data drawn from both GIS and IS. It reviews discussion within IS as to the nature of the discipline and argues for a closer coupling between IS and GIS. It discusses Spatial Data Infrastructure (SDI), mobile computing and public participation GIS as examples of spatially related fields where further IS research would be beneficial.} } @conference {miscione2015digital, title = {Digital Currencies as Infrastructures}, booktitle = {Introduction to{\textquoteright}Gaming Money{\textquoteright}Workshop, University College Dublin, Dublin, Ireland, 18 May, 2015}, year = {2015}, author = {Miscione, Gianluca} } @article {1225, title = {Extending ICT4D Studies: The Value of Critical Research}, journal = {MIS Quarterly}, volume = {39}, year = {2015}, pages = {697-712}, type = {Journal Article}, keywords = {biochar appl bioenergy production forest biomass}, author = {Lin, Cecilia I and Kuo, Feng-Yang and Michael D. Myers} } @booklet {miscione2015howprospects, title = {How come geographic information systems are peripheral in information systems research? Problems and prospects}, year = {2015}, month = {Jun}, publisher = {M{\"u}nster University, Germany}, author = {Miscione, G} } @article {roy2015phoneahmedabad, title = {Phone call elasticity of city travel in Ahmedabad}, journal = {Travel Behaviour and Society}, volume = {2}, number = {1}, year = {2015}, month = {Jan}, pages = {15{\textendash}25}, abstract = {{\textcopyright} 2014 Hong Kong Society for Transportation Studies. The new era of Information and Communication Technologies ICT enables people to communicate and interact with each other in different manner, changing the way they conduct their lives. This change has significant implications on their physical travels. The relationship between ICTs and travel is complex and sometimes indirect. This paper aims to better understand this complex relationship by empirically analyzing the substitution versus additive effects of phone calls on physical distance traveled by individuals. This is done by analyzing the phone call elasticity of physical travel. The analysis also studies the relevance of social ties in Ahmedabad, India, as a source of explanation of social activity, thus travel, undertaken by individuals. Social Network Analysis (SNA) allows capturing social determinants that affect travel in a way socio-demographics do not capture. The phone call elasticities show a variation among different people which can be connected to the type of trips that are substituted. The substituted trips are related to the social networks of individuals. Decision makers can use this tool to designing their travel and ICT policies in a novel way.}, issn = {2214-367X}, doi = {10.1016/j.tbs.2014.07.001}, author = {Roy, P and Zuidgeest, MHP and Martinez, JA and Miscione, G and van Maarseveen, MFAM} } @article {berger2015postcode, title = {A Postcode not for Post}, year = {2015}, author = {Berger, Andrea and Keenan, Peter and Miscione, Gianluca} } @conference {keenan2015apost, title = {A postcode not for post}, booktitle = {2015 Americas Conference on Information Systems, AMCIS 2015}, year = {2015}, month = {Jan}, abstract = {Postcodes are some of the best established pieces of national spatial data infrastructures. Originally they were designed to facilitate postal delivery, but through the decades more and more organizational functions have been integrating postcodes as unique spatial identifiers. State organizations may use postcodes to classify areas under their jurisdictions for monitoring and service delivery purposes. Private organizations may rely on postcodes to integrate spatial analyses into their business functions. For several reasons, the Republic of Ireland does not have a full-fledged postcode and it is now in the process of implementing what is allegedly the most advanced postcode of the world. The postcode has an unheard of level of granularity: each letterbox will have its own unique identifier. The object of this study is the long process that is leading to this outcome, and it identifies the main stakeholders involved and their different interests in the process.}, isbn = {9780996683104}, author = {Keenan, P and Miscione, G and Berger, A} } @article {1223, title = {Research on information systems failures and successes: Status update and future directions}, journal = {Information Systems Frontiers}, volume = {17}, number = {1}, year = {2015}, pages = {143-157}, type = {Journal Article}, keywords = {change management is failure is implementation is success systems technochange work}, doi = {10.1007/s10796-014-9500-y}, author = {Yogesh K. Dwivedi and Wastell, David and Laumer, Sven and Henriksen, Helle Zinner and Michael D. Myers and Deborah Bunker and Elbanna, Amany and Ravishankar, M N and Srivastava, Shirish C.} } @inbook {keenan2015spatialinfrastructure, title = {Spatial Data: Market and Infrastructure}, booktitle = {Encyclopedia of GIS}, year = {2015}, pages = {1{\textendash}8}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, doi = {10.1007/978-3-319-23519-6_755-2}, author = {Keenan, P and Miscione, G} } @proceedings {1224, title = {Zuckerbergs or Luddites? The Use of Social Media by Senior Executives in the Banking Industry}, year = {2015}, pages = {Paper 205}, type = {Audiovisual Material}, address = {Singapore}, url = {http://aisel.aisnet.org/pacis2015/205}, author = {Leben, Alexander and Gardner, Lesley A and Michael D. Myers} } @article {1166, title = {Activities to Address Challenges in Digital Innovation}, volume = {446}, year = {2014}, pages = {115-131}, publisher = {Springer Berlin Heidelberg}, keywords = {digital innovation challenges, digital technology, e-newspaper, e-paper, innovation activities}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_8}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_8}, author = {Lund, Jesper}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {1160, title = {Adopt, Adapt, Enact or Use?}, volume = {446}, year = {2014}, pages = {8-29}, publisher = {Springer Berlin Heidelberg}, keywords = {adaptation processes, business value, change projects, constructivist stance, information systems, IT adoption, IT use process, mechanisms, positivist stance}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_2}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_2}, author = {Lauterbach, Jens and Mueller, Benjamin}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {1156, title = {ASTERIX and 2.0 Knowledge Management}, volume = {446}, year = {2014}, pages = {186-206}, publisher = {Springer Berlin Heidelberg}, keywords = {appropriation, knowledge management, knowledge management systems, myths, organization 2.0}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_12}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_12}, author = {Dudezert, Aur{\'e}lie and Fayard, Pierre and Oiry, Ewan}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {9999, title = {Collaboration through superposition: How the IT artifact as an object of collaboration affords technical interdependence without organizational interdependence}, journal = {MIS Quarterly}, volume = {38}, year = {2014}, month = {3/2104}, pages = {29-50}, abstract = {This paper develops a theory of collaboration through superposition: the process of depositing separate layers on top of each other over time. The theory is developed in a study of development of community-based Free and Open Source Software (FLOSS), through a research arc of discovery (participant observation), replication (two archival case studies) and formalization (a model of developer choices). The theory explains two key findings: 1) the overwhelming majority of work is accomplished with only a single programmer working on a task and 2) when tasks appear too large for an individual they are more likely to be deferred until they are easier, rather than being undertaken through structured teamwork. It is theorized that this way of organizing is key to successful open collaboration where the IT artifact is the object of collaboration, because it allows the co-production of technically interdependent artifacts through motivationally interdependent work. The affordances of software as an object of collaboration are used as a framework to analyze efforts to learn from FLOSS in other domains of work and in the IS function of for-profit organizations.}, keywords = {FLOSS}, url = {http://misq.org/collaboration-through-open-superposition.html}, author = {Howison, James and Kevin Crowston} } @article {1157, title = {Communication Roles in Public Events}, volume = {446}, year = {2014}, pages = {207-218}, publisher = {Springer Berlin Heidelberg}, keywords = {emergency service agencies (ESA), public events, social media analytics, Social Network Analysis, Twitter}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_13}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_13}, author = {Mirbabaie, Milad and Ehnis, Christian and Stieglitz, Stefan and Deborah Bunker}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @booklet {2014contestedproject, title = {Contested meanings of slum as urbanization mechanism: implications for RAY implementation - Report for the Chance to Sustain (C2S) project}, year = {2014}, month = {Jan}, publisher = {Brussels} } @article {1164, title = {Counter-Mapping as Assemblage}, volume = {446}, year = {2014}, pages = {79-94}, publisher = {Springer Berlin Heidelberg}, keywords = {assemblage, Canada, counter-mapping, Cree, indigeneity, meme}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_6}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_6}, author = {Eades, Gwilym and Zheng, Yingqin}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @conference {2014datagateidentification, title = {DataGate Plots Dramas of Institutional Identification}, year = {2014}, month = {Jul} } @conference {2014, title = {Design of an Active Learning System with Human Correction for Content Analysis}, booktitle = {Workshop on Interactive Language Learning, Visualization, and Interfaces, 52nd Annual Meeting of the Association for Computational Linguistics}, year = {2014}, month = {06/2014}, address = {Baltimore, MD}, abstract = {Our research investigation focuses on the role of humans in supplying corrected examples in active learning cycles, an important aspect of deploying active learning in practice. In this paper, we discuss sampling strategies and sampling sizes in setting up an active learning system for human experiments in the task of content analysis, which involves labeling concepts in large volumes of text. The cost of conducting comprehensive human subject studies to experimentally determine the effects of sampling sizes and sampling sizes is high. To reduce those costs, we first applied an active learning simulation approach to test the effect of different sampling strategies and sampling sizes on machine learning (ML) performance in order to select a smaller set of parameters to be evaluated in human subject studies.}, author = {Jasy Liew Suet Yan and McCracken, Nancy and Kevin Crowston} } @conference {1216, title = {Design of Organisational Ubiquitous Information Systems: A Framework for Digital Native and Digital Immigrant Users}, booktitle = {Pacific Asia Conference on Information Systems}, year = {2014}, pages = {1-14}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/pacis2014/132}, author = {Tilvawala, Khushbu and Michael D. Myers and Sundaram, David} } @article {1158, title = {Design Theory Projectability}, volume = {446}, year = {2014}, pages = {219-232}, publisher = {Springer Berlin Heidelberg}, keywords = {design science research, design theory, generalizability, research methodology, technological knowledge}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_14}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_14}, author = {Richard Baskerville and Jan Pries-Heje}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {1159, title = {Designing Artifacts for Systems of Information}, volume = {446}, year = {2014}, pages = {233-245}, publisher = {Springer Berlin Heidelberg}, keywords = {Design, information systems, Information Technology}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_15}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_15}, author = {Richard Baskerville and Davison, Robert and Kaul, Mala and Wong, Louie}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {9998, title = {Digital assemblages: Evidence and theorizing from the computerization of the U.S. residential real estate industry}, journal = {New Technology, Work and Employment}, volume = {29}, year = {2014}, month = {3/2014}, pages = {40-56}, abstract = {The contribution of this paper is to theorize on the roles information and communication technologies (ICT) play in reshaping work arrangements and specifically to advance the concept of a digital assemblage as a lens for this analysis. We pursue an alternative conceptualization of the role of ICT: computerization. The fundamental premise of computerization is that actors are embedded in transactions and that ICT are taken up and used to support this embedding rather than for purposes of strict economic rationality. This work draws on data from a study of the U.S. residential real estate industry, which serves here as a {\textquotedblleft}living laboratory{\textquotedblright} for studying information-intensive industries.}, doi = {10.1111/ntwe.12020}, author = {Steve Sawyer and Kevin Crowston and Wigand, Rolf} } @article {1154, title = {Digital Drugs}, volume = {446}, year = {2014}, pages = {149-162}, publisher = {Springer Berlin Heidelberg}, keywords = {assemblage, digital drugs, healthcare, individualized medicine, pharmaceutical preparations}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_10}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_10}, author = {Tony Cornford and Lichtner, Valentina}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @booklet {miscione2014digitalpublics, title = {Digital Publics}, year = {2014}, month = {Jun}, publisher = {National University of Ireland in Maynooth, Ireland}, author = {Miscione, G and Coleman, G} } @article {1163, title = {The Entwinement Logic of Practices}, volume = {446}, year = {2014}, pages = {66-78}, publisher = {Springer Berlin Heidelberg}, keywords = {entwinement, ethnography, fieldwork, Heidegger, practical rationality, research methods}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_5}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_5}, author = {Chughtai, Hameed and Myers, MichaelD.}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @inbook {1209, title = {The Entwinement Logic of Practices: Insights from an Ethnography of Young IT Professionals}, booktitle = {Information Systems and Global Assemblages: (Re)Configuring Actors, Artefacts, Organizations}, year = {2014}, pages = {66-78}, publisher = {Springer}, organization = {Springer}, type = {Case}, author = {Chughtai, Hameed and Michael D. Myers}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathali and McLeod, Laurie} } @conference {1210, title = {Ethnographic Field Research: Interpreting One{\textquoteright}s Entrance into the Field as Thrownness}, booktitle = {European Conference on Information Systems}, year = {2014}, pages = {1-12}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/ecis2014/proceedings/track19/4}, author = {Chughtai, Hameed and Myers, Michael David} } @proceedings {9999, title = {Exploring data quality in games with a purpose}, year = {2014}, month = {3/2014}, address = {Berlin, Germany}, abstract = {A key problem for crowd-sourcing systems is motivating contributions from participants and ensuring the quality of these contributions. Games have been suggested as a motivational approach to encourage contribution, but attracting participation through game play rather than scientific interest raises concerns about the quality of the data provided, which is particularly important when the data are to be used for scientific research. To assess whether these concerns are justified, we compare the quality of data obtained from two citizen science games, one a {\textquotedblleft}gamified{\textquotedblright} version of a species classification task and one a fantasy game that used the classification task only as a way to advance in the game play. Surprisingly, though we did observe cheating in the fantasy game, data quality (i.e., classification accuracy) from participants in the two games was not significantly different. As well, the quality of data from short-time contributors was at a usable level of accuracy. These findings suggest that various approaches to gamification can be useful for motivating contributions to citizen science projects.}, author = {Prestopnik, Nathan R. and Kevin Crowston and Wang, Jun} } @article {1155, title = {Exploring the Role of Social Media in Chronic Care Management}, volume = {446}, year = {2014}, pages = {163-185}, publisher = {Springer Berlin Heidelberg}, keywords = {community, social media, Sociomateriality}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_11}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_11}, author = {Pousti, Hamid and Cathy Urquhart and Linger, Henry}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {9998, title = {Group maintenance in technology-supported distributed teams}, journal = {Information \& Management}, volume = {51}, year = {2014}, month = {4/2014}, pages = {297-309}, abstract = {In this paper we investigate group maintenance behavior in community-based Free/Libre Open Source Software (FLOSS) development teams. Adopting a sociolinguistic perspective, we conceptualize group maintenance behavior as interpersonal communication tactics{\textemdash}specifically, social presence and politeness tactics{\textemdash}that help maintain relationships among group members. Developer email messages were collected from two FLOSS projects with different development status and content-analyzed to identify frequently-used group maintenance tactics. We then compared the two projects on the group maintenance tactics used, finding differences that reflect changes in the project work practices. Our work contributes theoretically to FLOSS research and has practical implications for FLOSS practitioners.}, doi = {10.1016/j.im.2014.02.001}, author = {Wei, Kangning and Kevin Crowston and Li, Na and Heckman, Robert} } @article {1153, title = {Information Systems and Assemblages}, volume = {446}, year = {2014}, pages = {1-7}, publisher = {Springer Berlin Heidelberg}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_1}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_1}, author = {Lamprou, Eleni and Mitev, Nathalie and Doolin, Bill}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @conference {1211, title = {A Ludic Perspective on Everyday Practices: Evidence from Ethnographic Fieldwork}, booktitle = {Americas Conference on Information Systems}, year = {2014}, pages = {1-8}, type = {Conference Proceedings}, author = {Chughtai, Hameed and Myers, Michael David} } @article {1167, title = {Materiality, Health Informatics and the Limits of Knowledge Production}, volume = {446}, year = {2014}, pages = {132-148}, publisher = {Springer Berlin Heidelberg}, keywords = {critical analysis, health informatics, knowledge production, materiality}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_9}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_9}, author = {Robertson, Hamish and Nicholas, Nick and Rosenfeld, Tuly and Travaglia, JoanneF.}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @booklet {2014opennessnarratives, title = {Openness and Surveillance on Global Infrastructures - Whose Narratives?}, year = {2014}, month = {Jul} } @conference {2014, title = {Optimizing Features in Active Machine Learning for Complex Qualitative Content Analysis}, booktitle = {Workshop on Language Technologies and Computational Social Science, 52nd Annual Meeting of the Association for Computational Linguistics}, year = {2014}, month = {06/2014}, address = {Baltimore, MD}, abstract = {We propose a semi-automatic approach for content analysis that leverages machine learning (ML) being initially trained on a small set of hand-coded data to perform a first pass in coding, and then have human annotators correct machine annotations in order to produce more examples to retrain the existing model incrementally for better performance. In this {\textquotedblleft}active learning{\textquotedblright} approach, it is equally important to optimize the creation of the initial ML model given less training data so that the model is able to capture most if not all positive examples, and filter out as many negative examples as possible for human annotators to correct. This paper reports our attempt to optimize the initial ML model through feature exploration in a complex content analysis project that uses a multidimensional coding scheme, and contains codes with sparse positive examples. While different codes respond optimally to different combinations of features, we show that it is possible to create an optimal initial ML model using only a single combination of features for codes with at least 100 positive examples in the gold standard corpus.}, author = {Jasy Liew Suet Yan and McCracken, Nancy and Shichun Zhou and Kevin Crowston} } @proceedings {9999, title = {Planet Hunters and Seafloor Explorers: Legitimate Peripheral Participation Through Practice Proxies in Online Citizen Science}, year = {2014}, month = {2/2014}, abstract = {Making the traces of user participation in primary activities visible in online crowdsourced initiatives has been shown to help new users understand the norms of participation but participants do not always have access to others{\textquoteright} work. Through a combination of virtual and trace ethnography we explore how new users in two online citizen science projects engage other traces of activity as a way of compensating. Merging the theory of legitimate peripheral participation with Erickson and Kellogg{\textquoteright}s theory of social translucence we introduce the concept of practice proxies; traces of user activities in online environment that act as resources to orient newcomers towards the norms of practice. Our findings suggest that newcomers seek out practice proxies in the social features of the projects that highlight contextualized and specific characteristics of primary work practice.}, author = {Gabriel Mugar and {\O}sterlund, Carsten and Katie DeVries Hassman and Kevin Crowston and Corey Brian Jackson} } @conference {1212, title = {Playing with IT: Ethnographic Research on the Technological Practices of Young Professionals}, booktitle = {Pacific Asia Conference on Information Systems}, year = {2014}, pages = {1-12}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/pacis2014/115}, author = {Chughtai, Hameed and Myers, Michael David} } @conference {miscione2014plotsidentification, title = {Plots of Intelligence Surveillance-Dramas of Institutional Identification}, year = {2014}, note = {Recent revelations of intelligence surveillance are an unprecedented breakdown of contemporary communication functioning, therefore offer novel insights about how it has worked normally. The contrastive description of the Wikileaks and Snowden{\textquoteright}s events show unexpected paths to address responsibility and enact performativity globally. In both cases, hundreds of thousands of highly sensitive documents make their management significant in terms of how practices unfold on and beyond information infrastructures. The two cases engender two approaches to information management, one more closely derived from the original culture of the internet, the other sensitive to more broadly accepted social models. In this context, unearthing the usually invisible role that information infrastructures play in contemporary social praxes helps in recognizing how narratives can play a role in understanding online information and related action-nets, therefore broader social and political implications.}, address = {Rotterdam, The Netherlands}, abstract = {Recent revelations of intelligence surveillance are an unprecedented breakdown of contemporary communication functioning, therefore offer novel insights about how it has worked normally. The contrastive description of the Wikileaks and Snowden{\textquoteright}s events show unexpected paths to address responsibility and enact performativity globally. In both cases, hundreds of thousands of highly sensitive documents make their management significant in terms of how practices unfold on and beyond information infrastructures. The two cases engender two approaches to information management, one more closely derived from the original culture of the internet, the other sensitive to more broadly accepted social models. In this context, unearthing the usually invisible role that information infrastructures play in contemporary social praxes helps in recognizing how narratives can play a role in understanding online information and related action-nets, therefore broader social and political implications.}, url = {http://researchrepository.ucd.ie/bitstream/handle/10197/5708/Intelligence-Plots.pdf?sequence=1}, author = {Miscione, G} } @article {1161, title = {Reconfiguring Early Childhood Education and Care}, volume = {446}, year = {2014}, pages = {30-47}, publisher = {Springer Berlin Heidelberg}, keywords = {early childhood, educators, Sociomateriality, technology appropriation}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_3}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_3}, author = {Plumb, Melinda and Karlheinz Kautz}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @conference {2014, title = {Semi-Automatic Content Analysis of Qualitative Data}, booktitle = {iConference}, year = {2014}, month = {03/2014}, address = {Berlin, Germany}, author = {Jasy Liew Suet Yan and McCracken, Nancy and Kevin Crowston} } @article {1214, title = {A Set of ethical principles for design science research in information systems}, journal = {Information \& Management}, volume = {51}, number = {6}, year = {2014}, pages = {801-809}, type = {Journal Article}, keywords = {design science research}, doi = {10.1016/j.im.2014.01.002}, author = {Michael D. Myers and Venable, John} } @mastersthesis {991, title = {Significance of autoomation systems: Comparative study between Malawi and South Africa}, year = {2014} } @article {1162, title = {Technology and Sociomaterial Performation}, volume = {446}, year = {2014}, pages = {48-65}, publisher = {Springer Berlin Heidelberg}, keywords = {assemblage, healthcare IT, performation, Sociomateriality}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_4}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_4}, author = {Yeow, Adrian and Faraj, Samer}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @article {1165, title = {Understanding the Emergent Structure of Competency Centers in Post-implementation Enterprise Systems}, volume = {446}, year = {2014}, pages = {95-114}, publisher = {Springer Berlin Heidelberg}, keywords = {assemblage theory, competency centers, enterprise systems, postimplementation}, isbn = {978-3-662-45707-8}, doi = {10.1007/978-3-662-45708-5_7}, url = {http://dx.doi.org/10.1007/978-3-662-45708-5_7}, author = {Aryal, Arun and El Amrani, Redouane and Truex, DuaneP.}, editor = {Doolin, Bill and Lamprou, Eleni and Mitev, Nathalie and McLeod, Laurie} } @conference {2013betweencategory, title = {Between word and place {\textquoteright} The power of an unclosed category}, year = {2013}, month = {Jul} } @proceedings {568, title = {Boundary-Spanning Documents in Online FLOSS Communities: Does One Size Fit All?}, year = {2013}, month = {1/2013}, address = {Wailea, HI}, author = {{\O}sterlund, Carsten and Kevin Crowston} } @inbook {1218, title = {Consumer Information Systems Development: Challenges for Cross- Disciplinary Research}, booktitle = {Consumer Information Systems and Relationship Management: Design, Implementation, and Use}, year = {2013}, pages = {1-13}, publisher = {IGI Global}, organization = {IGI Global}, type = {Book Section}, address = {Hershey, PA}, isbn = {978-1-4666-4082-5}, doi = {10.4018/978-1-4666-4082-5.ch001}, author = {Tuunanen, Tuure and Michael D. Myers and Cassab, Harold}, editor = {Lin, Angela and Foster, Jonathan and Scifleet, Paul} } @article {1220, title = {Digital Natives and Digital Immigrants}, journal = {Business \& Information Systems Engineering}, volume = {5}, number = {6}, year = {2013}, pages = {409-419}, type = {Journal Article}, doi = {10.1007/s12599-013-0296-y}, author = {Wang, Qian and Michael D. Myers and Sundaram, David} } @article {1221, title = {Digital Natives und Digital Immigrants}, journal = {Wirtschaftsinformatik}, volume = {55}, number = {6}, year = {2013}, pages = {409-420}, type = {Journal Article}, doi = {10.1007/s11576-013-0390-2}, author = {Wang, Qian and Michael D. Myers and Sundaram, David} } @article {hayes2013editorialeditorial, title = {Editorial}, journal = {Information Systems Journal}, volume = {23}, number = {4}, year = {2013}, month = {Jul}, pages = {281{\textendash}285}, issn = {1350-1917}, doi = {10.1111/isj.12014}, author = {Hayes, N and Miscione, G and Silva, L and Westrup, C} } @conference {2013engineeringautopoieses, title = {Engineering the Others {\textquoteright} The Iron Cages of Autopoieses}, year = {2013}, month = {Jul} } @conference {2013, title = {Forgotten island: A story-driven citizen science adventure}, booktitle = {CHI {\textquoteright}13 Extended Abstracts on Human Factors in Computing Systems}, year = {2013}, month = {4/2013}, pages = {2643{\textendash}2646}, publisher = {ACM Press}, organization = {ACM Press}, address = {Paris, France}, abstract = {Forgotten Island, a citizen science video game, is part of an NSF-funded design science research project, Citizen Sort. It is a mechanism to help life scientists classify photographs of living things and a research tool to help HCI and information science scholars explore storytelling, engagement, and the quality of citizenproduced data in the context of citizen science.}, isbn = {9781450319522}, doi = {10.1145/2468356.2479484}, url = {http://delivery.acm.org/10.1145/2480000/2479484/p2643-prestopnik.pdf}, author = {Prestopnik, Nathan and Souid, Dania} } @article {1215, title = {Information technology offshoring in India: a postcolonial perspective}, journal = {European Journal of Information Systems}, volume = {22}, number = {4}, year = {2013}, pages = {387-402}, type = {Journal Article}, keywords = {critical research ethnography india IT offshoring postcolonial theory}, doi = {10.1057/ejis.2012.32}, author = {Ravishankar, M N and Pan, Shan L and Michael D. Myers} } @conference {2013theby, title = {The Infrastructures we Practice by}, year = {2013}, month = {Jul} } @conference {harvey2013irreductionally, title = {Irreductionally real information infrastructures: practices beyond universals}, booktitle = {Geographic Information Forum 2013: Creating the GISociety, Salzburg, Austria, 2-5 July, 2013}, year = {2013}, pages = {349{\textendash}354}, publisher = {Wichmann-Verlag and Verlag der {\"O}sterreichischen Akademie der Wissenschaften}, organization = {Wichmann-Verlag and Verlag der {\"O}sterreichischen Akademie der Wissenschaften}, author = {Harvey, Francis and Miscione, Gianluca} } @conference {harvey2013irreductionallyuniversals, title = {Irreductionally Real Information Infrastructures: Practices beyond Universals}, booktitle = {GI_FORUM 2013: CREATING THE GISOCIETY}, year = {2013}, month = {Jan}, pages = {349{\textendash}354}, publisher = {Salzburg, AUSTRIA}, organization = {Salzburg, AUSTRIA}, doi = {10.1553/giscience2013s349}, author = {Harvey, F and Miscione, G}, editor = {Jekel, T and Car, A and Strobl, J and Griesebner, G} } @inbook {1219, title = {Major Issues in the Successful Implementation of Information Systems in Developing Countries}, booktitle = {Grand Successes and Failures in IT}, series = {IFIP Advances in Information and Communications Technology}, volume = {402}, year = {2013}, note = {IFIP WG 8.6 International Working Conference, Bangalore, India, June 27-29, 2013.}, pages = {151-163}, publisher = {Springer}, organization = {Springer}, type = {Book Section}, address = {New York}, isbn = {978-3-642-38861-3}, author = {Vaidya, Ranjan and Michael D. Myers and Gardner, Lesley}, editor = {Yogesh K. Dwivedi and Henriksen, Helle Zinner and Wastell, David and De{\textquoteright}, Rahul} } @conference {Crowston:2013, title = {Motivation and data quality in a citizen science game: A design science evaluation}, booktitle = {Forty-sixth Hawai{\textquoteright}i International Conference on System Sciences (HICSS-46)}, year = {2013}, month = {1/2013}, address = {Wailea, HI}, author = {Kevin Crowston and Prestopnik, Nathan R.} } @article {9999, title = {The motivational arc of massive virtual collaboration}, year = {2013}, keywords = {motivation}, author = {Kevin Crowston and Fagnot, Isabelle} } @proceedings {2013, title = {Open Source Software Adoption: A Technological Innovation Perspective}, year = {2013}, month = {5/2013}, address = {Lyon, France}, abstract = {This research-in-progress aims to indentify the salient factors explaining adoption of open source software (OSS), as a technological innovation. The theoretical background of the paper is based on the technological innovation literature. We choose to focus on the open ERP case, as it is considered as a promising innovation for firms {\textendash} especially medium firms - but open ERP also faces numerous challenges. The paper provides a framework and a method for investigation that has to be implemented.}, keywords = {open source}, url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2244222}, author = {Kevin Crowston and Fran{\c c}ois Deltour and Nicolas Jullien} } @conference {miscione2013opennessconsequences, title = {Openness may not Mean Democratization - e-Grievance Systems in their Consequences}, year = {2013}, publisher = {University of Twente}, organization = {University of Twente}, address = {Enschede}, author = {Miscione, G and Pfeffer, K and Martinez, J and De{\textquoteright}, R} } @article {hayes2013overflows, title = {Overflows of Technological Innovation in Emerging Economies: The Case of M-Pesa}, journal = {Available at SSRN 2617305}, year = {2013}, author = {Niall Hayes and Miscione, Gianluca and Chris Westrup} } @booklet {hayesoverflowsmpesa, title = {Overflows of Technological Innovation in Emerging Economies: The Case of M-Pesa}, year = {2013}, publisher = {Elsevier BV}, doi = {10.2139/ssrn.2617305}, author = {Hayes, N and Miscione, G and Westrup, C} } @book {1213, title = {Qualitative Research in Business \& Management}, year = {2013}, publisher = {Sage Publications}, organization = {Sage Publications}, type = {Book}, edition = {2nd}, address = {London}, abstract = {Description: What are the key issues that concern Qualitative Research in Business and Management? In this advanced textbook, the author brings a wealth of insight to the research process. Combining the abstract and theoretical considerations with those of a practical nature, like those involved with interviewing for data, or for the final stage of writing up, Myers establishes an expansive resource for those involved in qualitative research that will aid them from start to finish. In this book the reader will be provided with the resources to: - Understand the underlying philosophies of qualitative research in business and management. - Be aware of a variety of qualitative research methods - Gain insight into examples of the previous use of qualitative methods in Business and Management. - Analyse and critically evaluate research in, including discussion of using qualitative data analysis software. - Carry out their own research in business and management. - Write up their research for publication. This book will be an indispensable resource both to those just embarking on their research as well as existing researchers in business and management.}, isbn = {Paperback ISBN: 978-0-85702-974-4 Hardcover ISBN: 978-0-85702-973-7}, author = {Myers, Michael David} } @article {646, title = {Sustainability of Open Collaborative Communities: Analyzing Recruitment Efficiency}, journal = {Technology Innovation Management Review}, year = {2013}, month = {01/2013}, pages = {20{\textendash}26}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Extensive research has been conducted over the past years to improve our understanding of sustainability conditions for large-scale collaborative projects, especially from an economic and governance perspective. However, the influence of recruitment and retention of participants in these projects has received comparatively less attention from researchers. Nevertheless, these concerns are significant for practitioners, especially regarding the apparently decreasing ability of the main open online projects to attract and retain new contributors. A possible explanation for this decrease is that those projects have simply reached a mature state of development. Marwell and Oliver (1993) and Oliver, Marwell, and Teixeira (1985) note that, at the initial stage in collective projects, participants are few and efforts are costly; in the diffusion phase, the number of participants grows, as their efforts are rewarding; and in the mature phase, some inefficiency may appear as the number of contributors is greater than required for the work. In this article, we examine this possibility. We use original data from 36 Wikipedias in different languages to compare their efficiency in recruiting participants. We chose Wikipedia because the different language projects are at different states of development, but are quite comparable on the other aspects, providing a test of the impact of development on efficiency. Results confirm that most of the largest Wikipedias seem to be characterized by a reduced return to scale. As a result, we can draw interesting conclusions that can be useful for practitioners, facilitators, and managers of collaborative projects in order to identify key factors potentially influencing the adequate development of their communities over the medium-to-long term.}, keywords = {DEA modeling, efficiency, recruitment, Wikipedia}, issn = {1927-0321}, url = {http://timreview.ca/article/646}, author = {Kevin Crowston and Nicolas Jullien and Felipe Ortega} } @article {miscione2013theorising, title = {Theorising development and technological change}, journal = {Info Systems J (2013)}, volume = {23}, year = {2013}, pages = {281{\textendash}285}, author = {Miscione, Gianluca and Niall Hayes and Chris Westrup} } @proceedings {438, title = {Is Wikipedia Inefficient? Modelling Effort and Participation in Wikipedia}, year = {2013}, month = {1/2013}, address = {Wailea, HI}, url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1960696}, author = {Kevin Crowston and Nicolas Jullien and Felipe Ortega} } @article {1086, title = {Action Design Ethnographic Research (ADER): Vested Interest Networks and ICT Networks in Service Delivery of Land Records in Bangladesh}, volume = {389}, year = {2012}, pages = {51-67}, publisher = {Springer Berlin Heidelberg}, keywords = {Action Design Ethnographic Research, Action Design Research, action research, Bangladesh, Design Research, land records management}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_4}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_4}, author = {Alam, M.Shahanoor and Laurence Brooks and Khan, N.I.}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {1082, title = {Amazon Mechanical Turk: A Research Tool for Organizations and Information Systems Scholars}, volume = {389}, year = {2012}, pages = {210-221}, publisher = {Springer Berlin Heidelberg}, keywords = {Amazon Mechanical Turk, crowd sourcing, research methods}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_14}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_14}, author = {Kevin Crowston}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @proceedings {crowston2012, title = {Amazon Mechanical Turk: A research tool for organizations and information systems scholars}, volume = {389}, year = {2012}, month = {12/2012}, pages = {210-221}, publisher = {Springer}, address = {Tampa, FL}, isbn = {978-3-642-35141-9}, issn = {1868-4238}, doi = {10.1007/978-3-642-35141-9}, author = {Kevin Crowston}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {miscione2012book, title = {Book Review: Cyberfactories{\textendash}How News Agencies Produce News, by Barbara Czarniawska}, year = {2012}, publisher = {Emerald}, author = {Miscione, Gianluca} } @proceedings {9999, title = {Citizen science system assemblages: Understanding the technologies that support crowdsourced science}, year = {2012}, month = {2/2012}, address = {Toronto, Ontario}, abstract = {We explore the nature of technologies to support citizen science, a method of inquiry that leverages the power of crowds to collect and analyze scientific data. We evaluate these technologies as system assemblages, collections of interrelated functionalities that support specific activities in pursuit of overall project goals. The notion of system assemblages helps us to explain how different citizen science platforms may be comprised of widely varying functionalities, yet still support relatively similar goals. Related concepts of build vs. buy and web satisfiers vs. web motivators are used to explore how different citizen science functionalities may lead to successful project outcomes. Four detailed case studies of current citizen science projects encompassing a cross-section of varying project sizes, resource levels, technologies, and approaches to inquiry help us to answer the following research questions: 1) What do typical system assemblages for citizen science look like? 2) What factors influence the composition of a system assemblage for citizen science? 3) What effect does the assemblage composition have on scientific goals, participant support, motivation, and satisfaction? and 4) What are the design implications for the system assemblage perspective on citizen science technologies?}, author = {Prestopnik, Nathan R. and Kevin Crowston} } @conference {1204, title = {The Co-Evolution of the {\textquotedblleft}Social{\textquotedblright} and the {\textquotedblleft}Technology{\textquotedblright}: A Netnographic Study of Social Movements in Virtual Worlds}, booktitle = {International Conference on Information Systems}, year = {2012}, pages = {1-12}, publisher = {Association for Information Systems E-library}, organization = {Association for Information Systems E-library}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/icis2012/proceedings/ResearchInProgress/20/}, author = {McKenna, Brad and Gardner, Lesley and Michael D. Myers} } @article {1090, title = {Co-materialization: Digital Innovation Dynamics in the Offshore Petroleum Industry}, volume = {389}, year = {2012}, pages = {108-122}, publisher = {Springer Berlin Heidelberg}, keywords = {digital innovation, industrial transformation, materiality, performativity}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_8}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_8}, author = {Thomas {\O}sterlie}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {1080, title = {Cultural Challenges in Information Systems Innovation: The Need for Differentiation Studies}, volume = {389}, year = {2012}, pages = {177-192}, publisher = {Springer Berlin Heidelberg}, keywords = {comprehension, culture, differentiation, innovation, methods}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_12}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_12}, author = {Lawrence, Carl and Oivo, Markku}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {1083, title = {Customization of Product Software: Insight from an Extensive IS Literature Review}, volume = {389}, year = {2012}, pages = {222-236}, publisher = {Springer Berlin Heidelberg}, keywords = {Customization, Customizing, information systems, Literature Review, Value Co-Creation}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_15}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_15}, author = {Bertram, Matthias and Schaarschmidt, Mario and von Kortzfleisch, HaraldF.O.}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @booklet {miscione2012cyberfactoriesnews, title = {Cyberfactories - How News Agencies Produce News}, howpublished = {Information Technology \& People}, volume = {25}, number = {4}, year = {2012}, month = {Nov}, pages = {438{\textendash}440}, issn = {0959-3845}, doi = {10.1108/09593841211278811}, author = {Miscione, G} } @article {1081, title = {Digital Artifacts as Institutional Attractors: A Systems Biology Perspective on Change in Organizational Routines}, volume = {389}, year = {2012}, pages = {195-209}, publisher = {Springer Berlin Heidelberg}, keywords = {Digital Artifact, Institutional attractor, Institutional change, Systems biology}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_13}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_13}, author = {Um, SungYong and Yoo, Youngjin and Berente, Nicholas and Kalle Lyytinen}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @conference {1207, title = {Digital Natives And Digital Immigrants: Towards A Model Of Digital Fluency}, booktitle = {European Conference on Information Systems}, volume = {Paper 39}, year = {2012}, pages = {1-12}, publisher = {Association for Information Systems E-library}, organization = {Association for Information Systems E-library}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/ecis2012/39}, author = {Wang, Qian and Michael D. Myers and Sundaram, David} } @article {1206, title = {Digital Natives: Rise of the Social Networking Generation}, journal = {University of Auckland Business Review}, volume = {15}, number = {1}, year = {2012}, pages = {28-37}, type = {Journal Article}, url = {http://www.uabr.auckland.ac.nz/}, author = {Michael D. Myers and Sundaram, David} } @inbook {1205, title = {Foreword}, booktitle = {Information Systems Theory: Explaining and Predicting Our Digital Society, Vol. 2}, volume = {2}, year = {2012}, pages = {vii-viii}, publisher = {Springer}, organization = {Springer}, type = {Book Section}, address = {New York}, author = {Michael D. Myers}, editor = {Yogesh K. Dwivedi and Wade, Michael R and Schneberger, Scott L} } @article {Crowston:2009, title = {Free/Libre Open Source Software Development: What we know and what we do not know}, journal = {ACM Computing Surveys}, volume = {44}, year = {2012}, month = {02/2012}, edition = {2}, abstract = {We review the empirical research on Free/Libre and Open Source Software (FLOSS) development and assess the state of the literature. We develop a framework for organizing the literature based on the input-mediator-output- input (IMOI) model from the small groups literature. We present a quantitative summary of articles selected for the review and then discuss findings of this literature categorized into issues pertaining to inputs (e.g., member characteristics, technology use and project characteristics), processes (software development and social processes), emergent states (e.g., trust and task related states) and outputs (e.g. team performance, FLOSS implementation and project evolution). Based on this review, we suggest topics for future research, as well as identifying methodological and theoretical issues for future inquiry in this area, including issues relating to sampling and the need for more longitudinal studies.}, keywords = {FLOSS}, doi = {10.1145/2089125.2089127}, author = {Kevin Crowston and Wei, Kangning and Howison, James and Wiggins, Andrea} } @article {2012, title = {The future of citizen science: emerging technologies and shifting paradigms}, journal = {Frontiers in Ecology and the Environment}, volume = {10}, year = {2012}, month = {08/2012}, pages = {298{\textendash}304}, abstract = {Citizen science creates a nexus between science and education that, when coupled with emerging technologies, expands the frontiers of ecological research and public engagement. Using representative technologies and other examples, we examine the future of citizen science in terms of its research processes, program and participant cultures, and scientific communities. Future citizen-science projects will likely be influenced by sociocultural issues related to new technologies and will continue to face practical programmatic challenges. We foresee networked, open science and the use of online computer/video gaming as important tools to engage non-traditional audiences, and offer recommendations to help prepare project managers for impending challenges. A more formalized citizen-science enterprise, complete with networked organizations, associations, journals, and cyberinfrastructure, will advance scientific research, including ecology, and further public education.}, issn = {1540-9295}, doi = {10.1890/110294}, url = {http://www.esajournals.org/doi/pdf/10.1890/110294}, author = {Newman, Greg and Wiggins, Andrea and Crall, Alycia and Graham, Eric and Newman, Sarah and Kevin Crowston} } @proceedings {2012, title = {Goals and tasks: Two typologies of citizen science projects}, year = {2012}, month = {1/2012}, address = {Wailea, HI}, abstract = {Citizen science is a form of research collaboration involving members of the public in scientific research projects to address real-world problems. Often organized as a virtual collaboration, these projects are a type of open movement, with collective goals addressed through open participation in research tasks. We conducted a survey of citizen science projects to elicit multiple aspects of project design and operation. We then clustered projects based on the tasks performed by participants and on the project{\textquoteright}s stated goals. The clustering results group projects that show similarities along other dimensions, suggesting useful divisions of the projects.}, author = {Wiggins, Andrea and Kevin Crowston} } @article {1087, title = {Grounded Analytic Research: Building Theory from a Body of Research}, volume = {389}, year = {2012}, pages = {68-78}, publisher = {Springer Berlin Heidelberg}, keywords = {analytical research, demand, digital divide, grounded theory, ICT for development, sustainability, Theory building}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_5}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_5}, author = {Furuholt, Bj{\o}rn and Sein, MaungKyaw}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @conference {Watson-Manheim:2012, title = {Innovation in academic-industry partnerships: Measuring the challenges to effective performance}, booktitle = {Academy of Management Conference, Technology and Innovation Management Division}, year = {2012}, month = {8/2012}, address = {Boston, MA}, author = {Watson-Manheim, Mary-Beth and Chudoba, Katherine M. and Kevin Crowston} } @proceedings {440, title = {Knowledge Portals: Components, Functionalities, and Deployment Challenges}, year = {2012}, month = {12/2012}, address = {Orlando, FL}, author = {Kevin Crowston and Claudia L{\"o}bbecke} } @article {1089, title = {Living in a Sociomaterial World}, volume = {389}, year = {2012}, pages = {91-107}, publisher = {Springer Berlin Heidelberg}, keywords = {performativity, representation, Sociomateriality}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_7}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_7}, author = {Eric Monteiro and Almklov, Petter and Heps{\o}, Vidar}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {miscione2012making, title = {Making Sustainable Open Source Software Infrastructures by Federating and Learning in the Global Context}, journal = {{\textquotedblleft}Free and Open Source Software and Technology for Sustainable Development{\textquotedblright} United Nations University (UNU) Press, ISBN-13}, year = {2012}, pages = {978{\textendash}92}, author = {Miscione, Gianluca} } @inbook {miscione2012makingcontext, title = {Making sustainable open source software infrastructures by federating and learning in the global context}, year = {2012}, month = {Dec}, publisher = {United Nations Publications}, organization = {United Nations Publications}, doi = {10.18356/fa0eb4e5-en}, author = {Miscione, G} } @article {miscionemakingcontext, title = {Making Sustainable Open Source Software Infrastructures by Federating and Learning in the Global Context}, journal = {SSRN Electronic Journal}, year = {2012}, publisher = {Elsevier BV}, doi = {10.2139/ssrn.2617245}, author = {Miscione, G} } @article {1078, title = {Moderating Effect of Environmental Factors on eHealth Development and Health Outcomes: A Country-Level Analysis}, volume = {389}, year = {2012}, pages = {143-159}, publisher = {Springer Berlin Heidelberg}, keywords = {eHealth, Infant Survival Rate, resource complementary perspective}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_10}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_10}, author = {Ahangama, Supunmali and Poo, DannyChiangChoon}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {1091, title = {Mutability and Becoming: Materializing of Public Sector Adoption of Open Source Software}, volume = {389}, year = {2012}, pages = {123-140}, publisher = {Springer Berlin Heidelberg}, keywords = {becoming, materiality, mutability, open source, public sector procurement}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_9}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_9}, author = {Shaikh, Maha}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @booklet {2012mytechnology, title = {My perspective on global information technology}, year = {2012}, month = {Dec}, address = {UCD, School of Business, Dublin}, abstract = {This is a visualization on the world map of my three main research foci:knowledge and organizational differencesinformation infrastructures and global scaleinfrastructures, people and placeReferences to related publications can be found zooming in on different areas.} } @article {miscioneopenness, title = {OPENNESS MAY NOT MEAN DEMOCRATIZATION}, year = {2012}, author = {Miscione, G and Pfeffer, K and Martinez, J and De, R} } @article {9998, title = {Perceived discontinuities and constructed continuities in virtual work}, journal = {Information Systems Journal}, volume = {22}, year = {2012}, month = {01/2012}, pages = {29-52}, doi = {10.1111/j.1365-2575.2011.00371.x}, author = {Watson-Manheim, Mary Beth and Chudoba, Katherine M. and Kevin Crowston} } @unpublished {2012, title = {Poster: Socially intelligent computing for coding of qualitative data}, year = {2012}, month = {6/2012}, publisher = {Syracuse University School of Information Studies}, type = {Unpublished poster, presented at the SOCS PIs meeting}, address = {Syracuse, NY}, author = {Kevin Crowston and McCracken, Nancy} } @unpublished {2012, title = {Poster: Socially intelligent computing to support citizen science}, year = {2012}, month = {6/2012}, publisher = {Syracuse University School of Information Studies}, type = {Unpublished poster, presented at the SOCS PIs meeting}, address = {Syracuse, NY}, author = {Kevin Crowston} } @article {1085, title = {Product Semantics in Design Research Practice}, volume = {389}, year = {2012}, pages = {35-48}, publisher = {Springer Berlin Heidelberg}, keywords = {artifact, Design, meaning, practice, research}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_3}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_3}, author = {Sj{\"o}str{\"o}m, Jonas and Brian Donnellan and Helfert, Markus}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @conference {Prestopnik:2012a, title = {Purposeful gaming \& socio-computational systems: A citizen science design case}, booktitle = {Group {\textquoteright}12 Conference}, year = {2012}, month = {10/2012}, address = {Sanibel Island, FL, USA}, author = {Prestopnik, Nathan and Kevin Crowston} } @booklet {miscione2012relocatingsouth, title = {Relocating Science and Technology - Global Knowledge, Traveling Technologies and Postcolonialism. Perspectives on Science and Technology Studies in the Global South}, year = {2012}, month = {Jul}, author = {Miscione, G} } @article {1077, title = {Resolving Name Conflicts for Mobile Apps in Twitter Posts}, volume = {389}, year = {2012}, pages = {3-17}, publisher = {Springer Berlin Heidelberg}, keywords = {Affinity, Filter, Microblogs, Mobile Apps, Twitter}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_1}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_1}, author = {Kajanan, Sangaralingam and Bin Mohd Shariff, AhmedShafeeq and Dutta, Kaushik and Datta, Anindya}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @booklet {2012reviewcaribe, title = {Review of Galperin H. and Mariscal J. (2009) - Pobreza Digital - Perspectivas de America Latina y el Caribe}, howpublished = {Tecnoscienza}, year = {2012}, month = {Feb} } @conference {1203, title = {Rigor-Mortis: The knowing-doing gap in research methods and what we should do about it}, booktitle = {International Conference on Information Systems}, year = {2012}, pages = {1-6}, publisher = {Association for Information Systems E-library}, organization = {Association for Information Systems E-library}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/icis2012/proceedings/Panels/2/}, author = {Carte, Traci A. and Marcoulides, George A. and Chin, Wynne W. and Leidner, Dorrothy E. and Michael D. Myers} } @article {1079, title = {Social Networks and Communication Media for Generating Creative Ideas}, volume = {389}, year = {2012}, pages = {160-176}, publisher = {Springer Berlin Heidelberg}, keywords = {communication media mix, generating creative ideas, Simmelian advice tie, Simmelian friendship tie}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_11}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_11}, author = {Wu, Yi and Chang, Klarissa}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @booklet {miscione2012spatialdublin, title = {Spatial Data Infrastructure and Human Sensor Web (University College Dublin)}, year = {2012}, month = {Feb}, author = {Miscione, G} } @conference {2012, title = {Team dynamics in long-standing technology-supported virtual teams}, booktitle = {Academy of Management Annual Meeting, Organizational Behaviour Division}, year = {2012}, month = {8/2012}, address = {Boston, MA}, author = {Misiolek, Nora and Kevin Crowston and Joshua Seymour} } @article {1208, title = {To share or not to share: a critical research perspective on knowledge management systems}, journal = {European Journal of Information Systems}, volume = {21}, number = {5}, year = {2012}, pages = {496-511}, type = {Journal Article}, keywords = {critical research face foucault gaze knowledge management systems}, doi = {10.1057/ejis.2012.10}, author = {Young, Mei-Lien and Kuo, Feng-Yang and Michael D. Myers} } @inbook {devries2012thegeodata, title = {The tool that has to build itself: The case of Dutch geo-data}, volume = {7443 LNCS}, year = {2012}, month = {Sep}, pages = {137{\textendash}148}, abstract = {Standardisation is one of tools of Electronic Government (EGov). It refers to the development where individuals and organizations develop and/or adhere to standard IT solutions and associated work processes. Studies on standardization in information technology (IT) emphasize either only the technical side of standard construction (the {\textquoteright}what{\textquoteright} and {\textquoteright}how{\textquoteright}), or the socio-organizational side of the contextual processes in which standards emerge (the {\textquoteright}who{\textquoteright} and {\textquoteright}when{\textquoteright}). Our article has an alternative, socio-technical, approach, which emphasizes {\textquoteright}where{\textquoteright} standards crystallize. Our empirical field to find where crystallization occurs concerns the geoIT sector. Through a qualitative approach, the data show that standard crystallization occurs at the hubs of inter-organizational relations, rather than at the top or the bottom of formal organizations. This claim is important because it contradicts the common strategy of standardization, which is largely centralized. Even though government has centralized the creation and distribution of geoIT standards, their actual creation and crystallization occurs at a more decentralized level: across municipalities. The conclusion is that bringing the standardization discussion to a point of where standardization actually happens, provides a better understanding of the socio-technical dynamic of governance of inter-organizational IT. {\textcopyright} 2012 IFIP International Federation for Information Processing.}, isbn = {9783642334887}, issn = {0302-9743}, doi = {10.1007/978-3-642-33489-4_12}, author = {De Vries, WT and Miscione, G} } @article {1084, title = {Using Adjective Features from User Reviews to Generate Higher Quality and Explainable Recommendations}, volume = {389}, year = {2012}, pages = {18-34}, publisher = {Springer Berlin Heidelberg}, keywords = {Adjective Features, Recommender systems, Sparsity, Transparency, User reviews}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_2}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_2}, author = {Xu, Xiaoying and Datta, Anindya and Dutta, Kaushik}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {9999, title = {Using natural language processing for qualitative data analysis}, journal = {International Journal of Social Research Methodology}, volume = {15}, year = {2012}, month = {2012}, chapter = {523-543}, abstract = {Social researchers often apply qualitative research methods to study groups and their communications artefacts. The use of computer-mediated communications has dramatically increased the volume of text available, but coding such text requires considerable manual effort. We discuss how systems that process text in human languages (i.e., natural language processing, NLP) might partially automate content analysis by extracting theoretical evidence. We present a case study of the use of NLP for qualitative analysis in which the NLP rules showed good performance on a number of codes. With the current level of performance, use of an NLP system could reduce the amount of text to be examined by a human coder by an order of magnitude or more, potentially increasing the speed of coding by a comparable degree. The paper is significant as it is one of the first to demonstrate the use of high-level NLP techniques for qualitative data analysis.}, keywords = {FLOSS, NLP}, doi = {10.1080/13645579.2011.625764}, author = {Kevin Crowston and Allen, Eileen E. and Heckman, Robert} } @article {1088, title = {Using Photo-Diary Interviews to Study Cyborgian Identity Performance in Virtual Worlds}, volume = {389}, year = {2012}, pages = {79-88}, publisher = {Springer Berlin Heidelberg}, keywords = {cyborg, material and discursive practices, performative identity, photo-diary method}, isbn = {978-3-642-35141-9}, doi = {10.1007/978-3-642-35142-6_6}, url = {http://dx.doi.org/10.1007/978-3-642-35142-6_6}, author = {Ulrike Schultze}, editor = {Bhattacherjee, Anol and Brian Fitzgerald} } @article {roy2012using, title = {Using social network analysis to profile people based on their e-communication and travel balance}, journal = {Journal of Transport Geography}, volume = {24}, year = {2012}, pages = {111{\textendash}122}, publisher = {Pergamon}, author = {Roy, P and Mart{\'{\i}nez, AJ and Miscione, G and Zuidgeest, MHP and van Maarseveen, MFAM} } @article {roy2012usingbalance, title = {Using Social Network Analysis to profile people based on their e-communication and travel balance}, journal = {Journal of Transport Geography}, volume = {24}, year = {2012}, month = {Sep}, pages = {111{\textendash}122}, abstract = {The new era of Information and Communication Technologies (ICT) enables people to communicate and interact with each other in new and different manners, changing the way they conduct their daily lives. This change inevitably has significant implications for physical travel in the age of electronic communication (e-communication). This paper aims to provide greater insight into people{\textquoteright}s travel behavior based on their e-Communication to Travel balance (C/. T balance). This balance represents the ratio between an individual{\textquoteright}s e-communication and physical travel. The analysis studies the relevance of social ties in Ahmedabad, India, as a source of explanation of social activity, thus travel, undertaken by individuals. It is hypothesized that the C/. T balance emerges from an individual{\textquoteright}s social network characteristics. The ability of an individual to engage in social activities not only depends on the individual{\textquoteright}s socioeconomic and lifestyle attributes, but also on the {\textquoteright}modality{\textquoteright} of such interactions (e.g. physical travel or e-communication). The different modalities create different social networks. Each network represents a particular flow of potential activity travel generated by interaction between the individuals. These networks have been clustered on the basis of their C/. T balance to get distinct people{\textquoteright}s profiles that can be used to target transport and ICT policies better. {\textcopyright} 2011 Elsevier Ltd.}, issn = {0966-6923}, doi = {10.1016/j.jtrangeo.2011.09.005}, author = {Roy, P and Mart{\'\i}nez, AJ and Miscione, G and Zuidgeest, MHP and van Maarseveen, MFAM} } @booklet {miscione2012wavesresearch, title = {Waves of Infrastructure Making: Winds of Change and Streams of Research}, year = {2012}, month = {Oct}, publisher = {University of Edinburgh, United Kingdom}, abstract = {Innovation in Information Infrastructures}, doi = {10.13140/2.1.1113.7923}, author = {Miscione, G} } @article {1193, title = {An analysis of the AIS basket of top journals}, journal = {Journal of Systems and Information Technology}, volume = {13}, number = {1}, year = {2011}, pages = {5-24}, type = {Journal Article}, abstract = {Purpose {\textendash} The purpose of this paper is to analyze the types of research published in the Association for Information Systems (AIS) basket of top journals. Design/methodology/approach {\textendash} This paper uses bibliographic analysis to analyze all the articles that were published in the AIS basket of top journals over a ten-year period, from 1998 to 2007. Articles were classified based on their paradigmatic and methodological approach. Findings {\textendash} Although there is a common perception within the information systems (IS) research community that European IS research is mostly qualitative and interpretive, the bibliographic analysis reveals that the two European IS journals are not significantly different from their US counterparts. All six journals in the AIS basket are remarkably similar in terms of the types of research published. Originality/value {\textendash} This article is one of the first to provide a comprehensive overview of the types of research published within the AIS basket of top journals. It provides a picture of how the two European IS journals differ from their US counterparts.}, doi = {10.1108/13287261111118322}, author = {Liu, Franklin and Michael D. Myers} } @article {2011bookreviews, title = {Book reviews}, journal = {Science and Public Policy}, volume = {38}, number = {4}, year = {2011}, month = {May}, pages = {332{\textendash}335}, publisher = {Oxford University Press (OUP)}, issn = {0302-3427}, doi = {10.3152/030234211x12960315268173} } @conference {368, title = {Boundary-spanning documents in online communities (Research-in-Progress)}, booktitle = {International Conference on Information Systems (ICIS)}, year = {2011}, month = {12/2011}, address = {Shanghai, China}, abstract = {Online communities bring together people with varied access to and understanding of the work at hand, who must collaborate through documents of various kinds. We develop a framework articulating the characteristics of documents supporting collaborators with asymmetric access to knowledge versus those with symmetric knowledge. Drawing on theories about document genre, boundary objects and provenance, we hypothesize that documents supporting asymmetric groups are likely to articulate or prescribe their own 1) purpose, 2) context of use and 3) content and form and 4) provenance in greater detail than documents used by people with symmetric access to knowledge. We are testing these hypotheses through content analysis of documents and instructions from a variety of free/libre open source projects. We present preliminary findings consistent with the hypotheses developed. The completed study will suggest new directions for research on communications in online communities, as well as advice for those supporting such communities.}, keywords = {boundary objects, Documents, Genre, Online communities, provenance}, author = {{\O}sterlund, Carsten and Kevin Crowston} } @proceedings {418, title = {A capability maturity model for scientific data management: Evidence from the literature}, year = {2011}, month = {10/2011}, address = {New Orleans, LA}, author = {Kevin Crowston and Qin, Jian} } @article {192, title = {Citizen Science System Assemblages: Toward Greater Understanding of Technologies to Support Crowdsourced Science}, year = {2011}, month = {6/2011}, keywords = {Citizen Science, system assemblages}, author = {Prestopnik, Nathan and Kevin Crowston} } @article {374, title = {Citizen science system assemblages: Toward greater understanding of technologies to support crowdsourced science}, year = {2011}, month = {06/2011}, publisher = {Syracuse University School of Information Studies}, type = {Unpublished working paper}, abstract = {We explore the nature of technologies to support citizen science, a method of inquiry that leverages the power of crowds to collect and analyze scientific data. We evaluate these technologies as system assemblages, collections of interrelated functionalities that support specific activities in pursuit of overall project goals. The notion of system assemblages helps us to explain how different citizen science platforms may be comprised of widely varying functionalities, yet still support relatively similar goals. Related concepts of build vs. buy, support for science vs. support for participants, and web satisfiers vs. web motivators are used to explore how different citizen science functionalities may lead to successful project outcomes. Four detailed case studies of current citizen science projects encompassing a cross-section of varying project sizes, resource levels, technologies, and approaches to inquiry help us to answer the following research questions: 1) What factors influence the composition of a system assemblage for citizen science? 2) What do typical system assemblages for citizen science look like? 3) What effect does the assemblage composition have on scientific goals, participant support, motivation, and satisfaction? and 4) What are the design implications for the system assemblage perspective on citizen science technologies?}, keywords = {Citizen Science, Design Science, system assemblages}, author = {Prestopnik, Nathan and Kevin Crowston} } @conference {roy2011clusteringcharacteristics, title = {Clustering people based on their social network, locational and socio-demographic characteristics}, year = {2011}, author = {Roy, P and Mart{\'\i}nez, AJ and Miscione, G and Zuidgeest, MHP} } @article {1196, title = {Commentary on Davison and Martinsons: is there a methodological crisis?}, journal = {Journal of Information Technology}, volume = {26}, number = {4}, year = {2011}, pages = {294-295}, type = {Journal Article}, doi = {10.1057/jit.2011.26}, url = {http://www.palgrave-journals.com/doifinder/10.1057/jit.2011.26 file:///C:/Users/mmye002/Documents/Mendeley Desktop/Myers 2011 JIT.pdf}, author = {Michael D. Myers} } @conference {2011communityintervention, title = {Community exclusions in governance of slum upgradation programs in India : empowerment through Judicial intervention}, year = {2011}, month = {Jan} } @article {1075, title = {Conceptualizing Consumer Perceptions of Making M-Payments Using Smart Phones in Ireland}, volume = {356}, year = {2011}, pages = {109-129}, publisher = {Springer Berlin Heidelberg}, keywords = {consumer perceptions, pm-payment adoption, Smart phones, trust}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_8}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_8}, author = {Andreev, Pavel and Duane, Aidan and O{\textquoteright}Reilly, Philip}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {1064, title = {Critical Realist Information Systems Research in Action}, volume = {356}, year = {2011}, pages = {269-284}, publisher = {Springer Berlin Heidelberg}, keywords = {critical realism, design science research, empirical research, evaluation research, theory development, theory testing}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_17}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_17}, author = {Carlsson, SvenA.}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @unpublished {9999, title = {Decision-making processes and team performance in self-organizing virtual teams: The case of Free/Libre Open Source Software development teams}, year = {2011}, abstract = {Effective decision making is critical to team effectiveness. We examine decision making in the setting of self-organizing virtual teams, a setting that we expect to pose particular problems for effective decision making. A self-organizing team must develop effective practices in the absence of a formal organizational structure that guides the practices. A virtual team{\textquoteright}s reliance on technological support to span temporal and organizational discontinuities makes an effective decision-making process more difficult to achieve. We examine decision-making processes and their relation to team performance in Free/Libre Open Source Software (FLOSS) teams, chosen as extreme examples of self-organizing virtual teams. We identified six paths that describe the decision-making process. Further analysis revealed that diversity in decision-making paths appeared to be related to differences in task types and group performance. The study provides insight into decision making in FLOSS teams and has implications for decision making in self-organizing virtual teams more generally.}, author = {Wei, Kangning and Kevin Crowston and Heckman, Robert and Li, Qing} } @article {9999, title = {Describing public participation in scientific research}, year = {2011}, publisher = {Syracuse University School of Information Studies}, abstract = {We report the results of a descriptive survey of citizen science projects, a form of scientific collaboration engaging members of the public with professional researchers. This phenomenon has seen explosive growth in recent years and is garnering interest from a broadening variety of research domains. However, the lack of adequate description of this diverse population hinders useful research. To address this gap, we conducted a survey of citizen science projects. We present a description of the phenomenon to establish a basis for sampling and evaluation of research on citizen science, including details on project resources, participation, technologies, goals, and outcomes. We then reflect on several points of potential development, including technologies to support participation, potential for expanding engagement, and data policies. The diverse organizational and functional arrangements in citizen science projects suggest a variety of areas for future research.}, keywords = {Citizen Science}, author = {Wiggins, Andrea and Kevin Crowston} } @article {2011, title = {Design for Citizen Science Workshop Report}, year = {2011}, month = {12/2011}, publisher = {Syracuse University School of Information Studies}, type = {Workshop Report}, address = {Syracuse, NY}, author = {Wiggins, Andrea} } @conference {1200, title = {Design Of Ubiquitous Information Systems For Digital Natives}, booktitle = {Pacific Asia Conference on Information Systems}, year = {2011}, pages = {1-13}, type = {Conference Proceedings}, isbn = {9781864356441}, author = {Tilvawala, Khushbu and Myers, Michael and Sundaram, David} } @inbook {1201, title = {The design {\textendash} reality gap: The impact of stakeholder strategies on IS implementation in developing countries}, booktitle = {Governance and Sustainability in Information Systems. Managing the Transfer and Diffusion of IT}, series = {IFIP Advances in Information and Communications Technology}, volume = {366}, year = {2011}, note = {IFIP WG 8.6 International Working Conference, Hamburg, Germany, September 22-24, 2011.}, pages = {119-134}, publisher = {Springer}, organization = {Springer}, type = {Book Section}, address = {New York}, author = {Vaidya, Ranjan and Michael D. Myers and Gardner, Lesley}, editor = {N{\"u}ttgens, Markus and Gadatsch, Andreas and Karlheinz Kautz and Schirmer, Ingrid and Blinn, Nadine} } @unpublished {9999, title = {Digital assemblages: Evidence and theorizing from the computerization of the U.S. residential real estate industry}, year = {2011}, abstract = {We theorize on industry-level computerization by drawing data from on-going empirical study of the United States{\textquoteright} residential real estate industry begun in 1997. Real estate serves us here as a "living laboratory" for studying information-intensive economic activity. In lieu of standard economic analyses, we advance computerization as the analytic framework for this study because it focuses attention to the take up and uses of information and communication technologies (ICT) in conjunction with related socio-economic changes. We find, as might be expected, that with the increased use of ICT real estate agents are less involved as information intermediaries and yet are more deeply embedded into the processes of buying and selling of houses: they are more socially embedded. We find, as expected, that uses of ICT are now pervasive in this industry. However, the ways in which these ICT are used help agents to embed themselves more deeply into the transacting of real estate rather than serving as vehicles for disintermediation. Building from these findings we theorize on the ways in which social embedding supports economic transactions. And, we theorize the ways in which ICT are brought together and used can more coherently understood as a {\textquoteright}digital assemblage{\textquoteright} than as some sort of formal information system or particular technology. Our conceptualization of a digital assemblage is characterized by distinct patterns of ICT collections that, in use, are functionally equivalent and structurally similar, relying on standardized and commodified ICT.}, author = {Steve Sawyer and Kevin Crowston and Rolf T. Wigand} } @article {miscione2011egovernanceindia, title = {E-governance for Development: A Focus on Rural India}, journal = {PROGRESS IN DEVELOPMENT STUDIES}, volume = {11}, number = {1}, year = {2011}, month = {Jan}, pages = {81{\textendash}82}, publisher = {SAGE PUBLICATIONS INC}, issn = {1464-9934}, doi = {10.1177/146499341001100108}, author = {Miscione, G} } @booklet {georgiadou2011enewsletterenewsletter, title = {e-Newsletter}, year = {2011}, author = {Georgiadou, Y and Miscione, G} } @inbook {richter2011enlistingdeclaration, title = {Enlisting SDI for urban planning in India: Local practices in the case of slum declaration}, booktitle = {Spatial Data Infrastructures in Context: North and South}, year = {2011}, month = {Jan}, pages = {157{\textendash}179}, abstract = {{\textcopyright} 2011 by Taylor and Francis Group, LLC. Initiatives to develop spatial data infrastructures (SDIs) have been taken up since the early 1990s in many countries around the world, including India. However, the spirit of global SDI convergence that dominated the 2009 GSDI conference is more of an aim for the future than an empirically grounded phenomenon. Whether or how {\textquotedblleft}the walls of SDI are coming down{\textquotedblright} (Van Loenen, Besemer, and Zevenbergen 2009, pp. 1-2) remains to be seen. It is also too soon to conclude that these initiatives automatically and unequivocally lead to wider societal benefits.}, isbn = {9781138077669}, author = {Richter, C and Miscione, G and De{\textquoteright}, R and Pfeffer, K} } @unpublished {9999, title = {Exploring Collective Intelligence Games With Design Science: A Citizen Science Design Case}, year = {2011}, abstract = {Citizen science is a form of collective intelligence where members of the public are recruited to contribute to scientific investigations. Citizen science projects often use web-based systems to support collaborative scientific activities, but finding ways to attract participants and confirm the veracity of the data produced by non-scientists are key research questions. We describe a series of web-based tools and games currently under development to support taxonomic classification of organisms in photographs collected by citizen science projects. In the design science tradition, the systems are purpose-built to test hypotheses about participant motivation and techniques for ensuring data quality. Findings from preliminary evaluation and the design process itself are discussed.}, keywords = {Citizen Science, Design Science, Games}, author = {Prestopnik, Nathan and Kevin Crowston} } @conference {2011, title = {From Conservation to Crowdsourcing: A Typology of Citizen Science}, booktitle = {Proceedings of the Forty-fourth Hawai{\textquoteright}i International Conference on System Science (HICSS-44)}, year = {2011}, month = {1/2011}, address = {Koloa, HI}, abstract = {Citizen science is a form of research collaboration involving members of the public in scientific research projects to address real-world problems. Often organized as a virtual collaboration, these projects are a type of open movement, with collective goals addressed through open participation in research tasks. Existing typologies of citizen science projects focus primarily on the structure of participation, paying little attention to the organizational and macrostructural properties that are important to designing and managing effective projects and technologies. By examining a variety of project characteristics, we identified five types{\textemdash}Action, Conservation, Investigation, Virtual, and Education{\textemdash}that differ in primary project goals and the importance of physical environment to participation.}, keywords = {Citizen Science}, author = {Wiggins, Andrea and Kevin Crowston} } @article {1060, title = {From Forestry Machines to Sociotechnical Hybrids: Investigating the Use of Digitally Enabled Forestry Machines}, volume = {356}, year = {2011}, pages = {199-214}, publisher = {Springer Berlin Heidelberg}, keywords = {forestry industry, materiality, Open innovation, value constellations}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_13}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_13}, author = {Nyl{\'e}n, Daniel and Holmstr{\"o}m, Jonny}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @conference {2011, title = {Gaming for (citizen) science: Exploring motivation and data quality in the context of crowdsourced science through the design and evaluation of a social-computational system}, booktitle = {{\textquotedblleft}Computing for Citizen Science{\textquotedblright} workshop at the IEEE eScience Conference}, year = {2011}, month = {12/2011}, address = {Stockholm, Sweden}, abstract = {In this paper, an ongoing design research project is described. Citizen Sort, currently under development, is a web-based social-computational system designed to support a citizen science task, the taxonomic classification of various insect, animal, and plant species. In addition to supporting this natural science objective, the Citizen Sort platform will also support information science research goals on the nature of motivation for social-computation and citizen science. In particular, this research program addresses the use of games to motivate participation in social-computational citizen science, and explores the effects of system design on motivation and data quality. A design science approach, where IT artifacts are developed to solve problems and answer research questions is described. Research questions, progress on Citizen Sort planning and implementation, and key challenges are discussed.}, keywords = {Citizen Science, data quality, Design, Design Science, Games, Gaming, motivation, Participation, Social Computational Systems}, url = {http://itee.uq.edu.au/~eresearch/workshops/compcitsci2011/index.html}, author = {Prestopnik, Nathan R. and Kevin Crowston} } @booklet {miscione2011globalsensors, title = {Global Visibility and Local Accountability - Making Sense Out of (Human) Sensors}, year = {2011}, month = {Jan}, publisher = {ETH Zurich}, address = {Switzerland}, author = {Miscione, G} } @article {1076, title = {The Impact of Instant Messaging Tools on Knowledge Management and Team Performance}, volume = {356}, year = {2011}, pages = {131-148}, publisher = {Springer Berlin Heidelberg}, keywords = {computer-mediated communication (CMC), Instant messaging (IM), knowledge generation, knowledge transfer, work performance}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_9}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_9}, author = {Ou, CarolX.J. and Leung, DarrenW.L. and Davison, RobertM.}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {miscione2011information, title = {Information infrastructures and understanding of global warming}, journal = {Science and Public Policy}, volume = {38}, number = {4}, year = {2011}, pages = {332{\textendash}333}, publisher = {Oxford University Press}, author = {Miscione, Gianluca} } @article {1070, title = {Information Systems Innovation Research: Between Novel Futures and Durable Presents}, volume = {356}, year = {2011}, pages = {27-41}, publisher = {Springer Berlin Heidelberg}, keywords = {infrastructural inversion, Innovations, installed base, maintenance}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_3}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_3}, author = {Margunn Aanestad}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @conference {1191, title = {Information Technology Multisourcing at Fonterra: A Case Study of The World{\textquoteright}s Largest Exporter of Dairy Ingredients}, booktitle = {European Conference on Information Systems}, volume = {Paper 44}, year = {2011}, pages = {1-14}, publisher = {AIS}, organization = {AIS}, type = {Conference Proceedings}, abstract = {Organizations have used numerous sourcing strategies to lower IT costs and improve IT service levels. However, a number of these sourcing strategies have failed to deliver on their expected outcomes. Multisourcing has been advanced as a form of sourcing which addresses the deficiencies of other failed strategies. Through our case study of Fonterra, the world.s largest exporter of dairy ingredients, we seek to explore whether multisourcing is a viable IT sourcing strategy. From the Fonterra case, we found that the benefits of multisourcing IT infrastructure stemmed from an ability to lower IT costs, improve IT service levels and enable access to specialist vendors and emerging technologies. The costs and risks of IT multisourcing were centered on the ongoing management of vendors and the underlying importance of a service management layer in organizations.}, keywords = {Fonterra, Multisourcing, Outsourcing Strategies}, url = {http://aisel.aisnet.org/ecis2011/44}, author = {Barboza, Mark and Myers, Michael David and Gardner, Lesley} } @conference {369, title = {Integrated Customer-Focused Knowledge Portals: Design Challenges and Empirical Approaches}, booktitle = {Academy of Management Conference, OCIS Division}, year = {2011}, month = {8/2011}, address = {San Antonio, TX}, abstract = {Knowledge Portals (KPs) are highly integrative Knowledge Management Systems (KMS) that promise to synthesize widely dispersed knowledge and to interconnect individuals by functioning as a {\textquoteright}one-stop knowledge shop{\textquoteright}. Yet, in practice, KPs face major challenges, which are for the most part due to the intricacies of knowledge exchange being subjected to multi-faceted individual and social factors. At the same time, growing anecdotal evidence from case studies indicates KPs{\textquoteright} enormous potential. This paper makes an effort to more distinctly conceptualize KPs and emphasize a KP{\textquoteright}s role to unify networking and repository KMS features. The paper develops three major challenges to successful KP deployment, namely (1) knowledge integration, (2) sufficient participation, and (3) favorable organizational culture and validates these as applicable to KP through a review of 42 empirical papers. The paper concludes with suggestions towards a set of design principles for KP.}, author = {Claudia L{\"o}bbecke and Kevin Crowston and Nicolas Friederici} } @article {1062, title = {Investigating Open Innovation and Interorganizational Networks in the IT Industry: The Case of Standard Software Customization}, volume = {356}, year = {2011}, pages = {231-246}, publisher = {Springer Berlin Heidelberg}, keywords = {interorganizational networks, Open innovation, software customization}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_15}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_15}, author = {Karlheinz Kautz and Deborah Bunker and Rab, SameenM. and Sinnet, Michael}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @conference {1194, title = {Issues in the Study of Virtual World Social Movements}, booktitle = {Pacific Asia Conference on Information Systems}, volume = {Paper 129}, year = {2011}, pages = {1-13}, publisher = {AIS}, organization = {AIS}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/pacis2011/129}, author = {McKenna, Brad and Gardner, Lesley and Michael D. Myers} } @article {1057, title = {Journey to DOR: A Retro Science-Fiction Story on Researching ePrescribing}, volume = {356}, year = {2011}, pages = {151-161}, publisher = {Springer Berlin Heidelberg}, keywords = {fiction, Future, reflexivity, research methods, systems for electronic transmission of prescriptions, technology}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_10}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_10}, author = {Lichtner, Valentina and Venters, Will}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {1199, title = {Knowledge Management Challenges for Nongovernment Organizations: The Health and Disability Sector in New Zealand}, journal = {VINE: The journal of information and knowledge management systems}, volume = {41}, number = {2}, year = {2011}, pages = {212-228}, type = {Journal Article}, author = {Soakell-Ho, Michelle and Michael D. Myers} } @article {1061, title = {Lessons from Volunteering and Free/Libre Open Source Software Development for the Future of Work}, volume = {356}, year = {2011}, pages = {215-229}, publisher = {Springer Berlin Heidelberg}, keywords = {coordination, Free/libre open source software, motivation, visibility of work, volunteering}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_14}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_14}, author = {Kevin Crowston}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @proceedings {9999, title = {Lessons from volunteering and free/libre open source software development for the future of work}, year = {2011}, month = {6/2011}, publisher = {Springer}, address = {Turku, Finland}, author = {Kevin Crowston} } @article {miscione2011madon9780230201576, title = {Madon, S. 2009: E-governance for Development: A Focus on Rural India. Basingstoke, UK: Palgrave Macmillan. {\textsterling}55 cloth. ISBN 9780230201576}, journal = {Progress in Development Studies}, volume = {11}, number = {1}, year = {2011}, month = {Jan}, pages = {81{\textendash}82}, issn = {1464-9934}, doi = {10.1177/146499341001100108}, author = {Miscione, G} } @conference {2011, title = {Mechanisms for Data Quality and Validation in Citizen Science}, booktitle = {"Computing for Citizen Science" workshop at the IEEE eScience Conference}, year = {2011}, month = {12/2011}, address = {Stockholm, Sweden}, abstract = {Data quality is a primary concern for researchers employing public participation in scientific research, or {\textquotedblleft}citizen science,{\textquotedblright} to accomplish data collection and analysis tasks. This mode of scientific collaboration relies on contributions from a large, often unknown population of volunteers with widely variable expertise. In this paper, we review the commonly employed mechanisms for ensuring data quality. We also discuss results of a survey of citizen science projects that reports on the use of some of these mechanisms, noting that it is most common for projects to employ multiple mechanisms to ensure data quality and appropriate levels of validation.}, keywords = {Citizen Science, data quality, data validation}, url = {http://itee.uq.edu.au/~eresearch/workshops/compcitsci2011/index.html}, author = {Wiggins, Andrea and Newman, Greg and Stevenson, Robert D. and Kevin Crowston} } @article {1069, title = {Methods for Studying the Information Systems Future}, volume = {356}, year = {2011}, pages = {299-316}, publisher = {Springer Berlin Heidelberg}, keywords = {Delphi, environmental scanning, Modeling the future, role of futures in academic research, scenarios}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_21}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_21}, author = {Paul Gray and Hovav, Anat}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {9998, title = {Participation in ICT-Enabled Meetings}, journal = {Journal of Organizational and End User Computing}, volume = {23}, year = {2011}, chapter = {15{\textendash}36}, abstract = {Meetings are a common occurrence in contemporary organizations, and almost everyone shares an understanding of what a meeting is and what participation in a meeting looks like. Yet our exploratory study at Intel, an innovative global technology company, suggests that meetings are evolving beyond this familiar perspective as the pervasive use of information and communication technologies (ICTs) changes work practices associated with meetings. Drawing on data gathered from interviews prompted by entries in the employees{\textquoteright} electronic calendar system, we examine the multiple ways in which meetings build and reflect work in the organization and derive propositions to guide future research. Specifically, we identified four aspects of meetings that reflect work in the 21st century: meetings are integral to work in team-centered organizations, tension between group and personal objectives, discontinuities, and ICT support for fragmented work environment.}, keywords = {Computer-Mediated Communication, Information Technology}, doi = {10.4018/joeuc.2011040102}, author = {Chudoba, Katherine M. and Watson-Manheim, Mary Beth and Kevin Crowston and Lee, Chei Sian} } @article {martinezparticipatorytransformation, title = {Participatory geographic information systems and land planning life experiences for people empowerment and community transformation}, year = {2011}, url = {https://www.researchgate.net/publication/318542995_PGIS_Participatory_geographic_information_systems_and_land_planning_life_experiences_for_people_empowerment_and_community_transformation}, author = {Martinez, MMC and Miscione, G and Olivarez, E} } @article {1071, title = {The Present as Future: The Problem of Translation in Corporate Science Projects}, volume = {356}, year = {2011}, pages = {43-56}, publisher = {Springer Berlin Heidelberg}, keywords = {3D user interface, Corporate research, desktop information management, innovation, machine learning, virtual teams}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_4}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_4}, author = {Eleanor Wynn}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {1073, title = {Rationality and Foolishness: Alternative Forecasting Systems in a Manufacturing Firm}, volume = {356}, year = {2011}, pages = {77-92}, publisher = {Springer Berlin Heidelberg}, keywords = {Forecasting, forecasting support systems, organizations, rationality}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_6}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_6}, author = {Brown, Charlotte}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {de2011relationality, title = {Relationality in geoIT software development: How data structures and organization perform together}, journal = {Computers, Environment and Urban Systems}, volume = {35}, number = {2}, year = {2011}, pages = {173{\textendash}182}, publisher = {Pergamon}, author = {De Paoli, Stefano and Miscione, Gianluca} } @article {de2011relationality, title = {Relationality in geoIT software development: How data structures and organization perform together}, journal = {Computers, Environment and Urban Systems}, volume = {35}, number = {2}, year = {2011}, pages = {173{\textendash}182}, publisher = {Pergamon}, author = {De Paoli, Stefano and Miscione, Gianluca} } @article {depaoli2011relationalitytogether, title = {Relationality in geoIT software development: How data structures and organization perform together}, journal = {Computers, Environment and Urban Systems}, volume = {35}, number = {2}, year = {2011}, month = {Mar}, pages = {173{\textendash}182}, abstract = {Constructivism in geo-information science has emphasized what happens to geo-information technologies (geoIT) after the design stage, when systems and applications are used in real life. Current constructivist views, however, have focused less on other aspects such as software development practices. This paper adopts a similar constructivist epistemology, but looks at how geoIT and people are entangled in the development stages. We discuss the case of the migration of GIS software to Free and Open Source license. This case provides clear empirical evidence of the entanglement of humans and artifacts during the development of GIS technologies. Through an analysis of archived material (such as mailing lists), and of the software code, the paper describes how the integration of a new software (the library Fast Fourier Transformation in the West) was hindered by the different data structures of the original GIS and the new software. The case study we propose shows how actual software development practices may contrast with the well-established rhetoric of technical efficiency of the algorithms. In addition this choice also illustrates the organizational aspects of developing GIS and the different weights that are given to computational resources and organizational resources. {\textcopyright} 2010 Elsevier Ltd.}, issn = {0198-9715}, doi = {10.1016/j.compenvurbsys.2010.09.003}, author = {De Paoli, S and Miscione, G} } @article {1056, title = {Researching the Future: The Information Systems Discipline{\textquoteright}s Futures Infrastructure}, volume = {356}, year = {2011}, pages = {1-7}, publisher = {Springer Berlin Heidelberg}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_1}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_1}, author = {Chiasson, Mike and Ola Henfridsson}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @booklet {duncombe2011reviewernorway, title = {Reviewer Institution Irwin Brown University of Cape Town, South Africa Robert Davison City University of Hong Kong Marisa D{\textquoteright}Mello University of Oslo, Norway}, howpublished = {Information Technology for Development}, volume = {17}, number = {1}, year = {2011}, pages = {89{\textendash}89}, author = {Duncombe, R and Grimson, J and Harindranath, G and Hayes, N and Heeks, R and Jolliffe, B and Lotriet, H and Miscione, G and Stanforth, CM and Staring, K} } @article {1059, title = {The Role of Technology in Shaping the Professional Future of Community Pharmacists: The Case of the Electronic Prescription Service in the English National Health Service}, volume = {356}, year = {2011}, pages = {179-195}, publisher = {Springer Berlin Heidelberg}, keywords = {community pharmacy, electronic prescriptions, Professionals, technology}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_12}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_12}, author = {Petrakaki, Dimitra and Tony Cornford and Hibberd, Ralph and Lichtner, Valentina and Barber, Nick}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @booklet {miscione2011sdiyet, title = {SDI in North and South-a full circle yet?}, year = {2011}, month = {Jan}, pages = {221{\textendash}232}, abstract = {{\textcopyright} 2011 by Taylor and Francis Group, LLC. Since the beginning of the 1990s, the notion of spatial data infrastructure (SDI) has inspired different organizations to share geospatial data and achieve seamless integration. After nearly two decades, incidentally overlapping with the Internet age, this vision has gained global acceptance (Homburg and Georgiadou 2009; Masser 2010) and is confirmed by the growing participation in the Global SDI Association{\textquoteright}s conferences. However, the meaning of SDI in terms of implementation and use has become more fragmented. In spite of a general understanding of SDIs as ways to facilitate access to and use of geospatial data, it is difficult to find wide agreement on a more precise definition of SDI (Grus, Crompvoets, and Bregt 2010).}, isbn = {9781138077669}, author = {Miscione, G and Vandenbroucke, D} } @inbook {miscione2011sdi, title = {SDI in North and South{\textemdash}A Full Circle Yet?}, booktitle = {Spatial data infrastructures in context: North and South}, year = {2011}, publisher = {CRC Press}, organization = {CRC Press}, author = {Miscione, Gianluca and Vandenbroucke, Danny} } @article {georgiadou2011sensors, title = {Sensors, empowerment, and accountability: a Digital Earth view from East Africa}, journal = {International Journal of Digital Earth}, volume = {4}, number = {4}, year = {2011}, pages = {285{\textendash}304}, publisher = {Taylor \& Francis Group}, author = {Georgiadou, Yola and Bana, Benson and Becht, Robert and Hoppe, Robert and Ikingura, Justinian and Kraak, Menno-Jan and Lance, Kate and Lemmens, Rob and Lungo, Juma Hemed and McCall, Michael and others} } @article {georgiadou2011sensorsafrica, title = {Sensors, empowerment, and accountability: A digital earth view from East Africa}, journal = {International Journal of Digital Earth}, volume = {4}, number = {4}, year = {2011}, month = {Jul}, pages = {285{\textendash}304}, abstract = {Several innovative {\textquoteright}participatory sensing{\textquoteright} initiatives are under way in East Africa. They can be seen as local manifestations of the global notion of Digital Earth. The initiatives aim to amplify the voice of ordinary citizens, improve citizens{\textquoteright} capacity to directly influence public service delivery and hold local government accountable. The popularity of these innovations is, among other things, a local reaction to the partial failure of the millennium development goals (MDGs) to deliver accurate statistics on public services in Africa. Empowered citizens, with access to standard mobile phones, can {\textquoteright}sense{\textquoteright} via text messages and report failures in the delivery of local government services. The public disclosure of these reports on the web and other mass media may pressure local authorities to take remedial action. In this paper, we outline the potential and research challenges of a {\textquoteright}participatory sensing{\textquoteright} platform, which we call a {\textquoteright}human sensor web.{\textquoteright} Digital Africa{\textquoteright}s first priority could be to harness continent-wide and national data as well as local information resources, collected by citizens, in order to monitor, measure and forecast MDGs. {\textcopyright} 2011 Taylor \&Francis.}, issn = {1753-8947}, doi = {10.1080/17538947.2011.585184}, author = {Georgiadou, Y and Bana, B and Becht, R and Hoppe, R and Ikingura, J and Kraak, MJ and Lance, K and Lemmens, R and Lungo, JH and Mccall, M and Miscione, G and Verplanke, J} } @article {1198, title = {A Set of Principles for Conducting Critical Research in Information Systems}, journal = {MIS Quarterly}, volume = {35}, number = {1}, year = {2011}, pages = {17-36}, type = {Journal Article}, abstract = {While criteria or principles for conducting positivist and interpretive research have been widely discussed in the IS research literature, criteria or principles for critical research are lacking. Therefore, the purpose of this paper is to propose a set of principles for the conduct of critical research in information systems. We examine the nature of the critical research perspective, clarify its significance, and review its major discourses, recognizing that its mission and methods cannot be captured by a fixed set of criteria once and for all, particularly as multiple approaches are still in the process of defining their identity. However, we suggest it is possible to formulate a set of principles capturing some of the commonalities of those approaches that have so far become most visible in the IS research literature. The usefulness of the principles is illustrated by analyzing three critical field studies in information systems. We hope that this paper will further reflection and debate on the important subject of grounding critical research methodology.}, keywords = {critical perspective, critical research, ethics, interpretive perspective, research methods, values}, author = {Michael D. Myers and Heinz K. Klein} } @article {1197, title = {Setting our Research Agendas: Institutional Ecology, Informing Sciences, or Management Fashion Theory?}, journal = {Communications of the AIS}, volume = {28}, number = {1}, year = {2011}, pages = {357-372}, type = {Journal Article}, author = {Michael D. Myers and Baskerville, Richard L and Gill, Grandon and Ramiller, Neil} } @inbook {miscione2011shiftinggrowth, title = {Shifting Legitimation along Information Infrastructures Growth}, booktitle = {Knowledge Development and Social Change through Technology}, year = {2011}, pages = {195{\textendash}205}, publisher = {IGI Global}, organization = {IGI Global}, abstract = {This chapter addresses the institutional dimension of scaling of information systems through the interplay of globally distributed software development with organizational processes. Through examining various phases of a long term project to implement information systems for the public health care sector in global South countries, I highlight changing sources of acceptance and legitimation. The analysis centers on the balance between local and global levels, from pilot sites, through an emerging broader organizational field, to increasingly involving national level institutional settings. In parallel to the established view of the scaling of ICT implementations as relating to complexity and risk in the form of unintended side-effects of the growth of a system, the chapter highlights the qualitative switch between regulatory contexts. Shifting relations to local institutions means that scalability requires actors to interact with quite different organizational cultures, accountabilities and communicative practices.}, isbn = {9781609605070}, doi = {10.4018/978-1-60960-507-0.ch015}, author = {Miscione, G} } @article {1065, title = {The Social Design of Information Systems}, volume = {356}, year = {2011}, pages = {287-290}, publisher = {Springer Berlin Heidelberg}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_18}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_18}, author = {Steve Sawyer and Venkatesh, Murali and Juhani Iivari and Cathy Urquhart and Light, Ben}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @conference {1195, title = {Social Movements in World of Warcraft}, booktitle = {Americas Conference on Information Systems}, volume = {Paper 83}, year = {2011}, pages = {1-8}, publisher = {AIS}, organization = {AIS}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/amcis2011_submissions/83}, author = {McKenna, Brad and Gardner, Lesley and Michael D. Myers} } @booklet {zorica2011spatial, title = {Spatial data infrastructures in context: North and South}, year = {2011}, publisher = {CRC Press (https://www.crcpress.com/Spatial-Data-Infrastructures-in-Context-North-and-South/Nedovic-Budic-Crompvoets-Georgiadou/p/book/9781439828021)}, author = {Zorica Nedovic-Budic, Joep Crompvoets, Yola Georgiadou} } @article {1192, title = {Special issue on the Kleinian approach to information system research - foreword}, journal = {European Journal of Information Systems}, volume = {20}, number = {4}, year = {2011}, pages = {418-421}, type = {Journal Article}, issn = {0960-085X}, url = {http://dx.doi.org/10.1057/ejis.2011.15}, author = {Rudy Hirschheim and Kalle Lyytinen and Michael D. Myers} } @article {1058, title = {The Standardized Nurse: Mission Impossible?}, volume = {356}, year = {2011}, pages = {163-178}, publisher = {Springer Berlin Heidelberg}, keywords = {dependency, efficiency, nursing work, quality, Standardization}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_11}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_11}, author = {Pedersen, Rune and Gunnar Ellingsen and Eric Monteiro}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @unpublished {439, title = {Stigmergy and Implicit Coordination in Software Development}, year = {2011}, author = {Howison, James and {\O}sterlund, Carsten and Kevin Crowston and Bolici, Francesco} } @booklet {miscione2011angeoit, title = {AN STS VIEW ON GEO-IT}, year = {2011}, author = {Miscione, G} } @article {1063, title = {Systems of Innovation, Multidisciplinarity, and Methodological Pluralism: A Realist Approach to Guide the Future of Information Systems Research and Practice}, volume = {356}, year = {2011}, pages = {249-268}, publisher = {Springer Berlin Heidelberg}, keywords = {critical realism, information systems, Information systems research and practice, methodological pluralism, multidisciplinarity, SME policies, systems of innovation approach}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_16}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_16}, author = {Vega, Arturo and Brown, David}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {1066, title = {Teaching Foresight and the Future}, volume = {356}, year = {2011}, pages = {291-293}, publisher = {Springer Berlin Heidelberg}, keywords = {curriculum development, Futures studies, prospective thinking, strategic foresight, teaching information systems}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_19}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_19}, author = {Carmel, Erran and Avital, Michel and Paul Gray and Kallinikos, Jannis and John Leslie King}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @proceedings {417, title = {Technology adoption and use: Theory review for studying scientists{\textquoteright} continued use of cyber-infrastructure}, year = {2011}, month = {10/2011}, address = {New Orleans, LA}, abstract = {In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber-infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post-adoption (continued use) research. In addition, we review studies specifically regarding cyber-infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists{\textquoteright} adoption and continued use of cyber-infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists{\textquoteright} adoption and use of cyber-infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.}, author = {Kim, Youngseek and Kevin Crowston} } @inbook {miscione2011telemedicineamazon, title = {Telemedicine and development: Situating information technologies in the Amazon}, volume = {3}, number = {4}, year = {2011}, month = {Oct}, pages = {15{\textendash}26}, abstract = {This study is based on an ethnographic study of a telemedicine system implemented in Northeastern Peru. This system connects a hospital in the Upper Amazon with health care facilities scattered throughout that area of the jungle. Patients{\textquoteright} transport through the physical nodes of the public health care system relied on rivers and wooden boats, but voice and data can now flow directly through channels apart from the existing health care organization. The time required to reach a doctor might previously have been the travel distance for different medicines served as a justification for people not to follow new ways to recovery. After the implementation of telemedicine, the effectiveness of medical talks depends on the ability to understand each other. Locally there is no single health care practice that is believed to be the right one: patients follow different paths for recovery through traditional and biomedical treatments. Thus, the diverse social environment affects both directly and indirectly the use of the telemedicine system, which evolves accordingly with how public healthcare service is perceived and used. Copyright {\textcopyright} 2011, IGI Global.}, issn = {1941-6253}, doi = {10.4018/jskd.2011100102}, author = {Miscione, G} } @article {1067, title = {Toward an Approach to Generate Forward-Looking Theories Using Systems Concepts}, volume = {356}, year = {2011}, pages = {11-26}, publisher = {Springer Berlin Heidelberg}, keywords = {project management, research, Systems thinking}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_2}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_2}, author = {Sewchurran, Kosheek and Brown, Irwin}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @conference {1202, title = {Tracing {\textquoteleft}Reality{\textquoteright} in the Design {\textendash} Reality Gap: A Stakeholder Practice Based Model for IS Implementation in Developing Countries}, booktitle = {11th International Conference on Social Implications of Computers in Developing Countries}, year = {2011}, pages = {181-194}, publisher = {International Federation of Information Processing}, organization = {International Federation of Information Processing}, type = {Conference Proceedings}, url = {http://www.ifipwg94.org/}, author = {Vaidya, Ranjan and Michael D. Myers and Gardner, Lesley} } @article {9999, title = {Validity issues in the use of social network analysis with digital trace data}, journal = {Journal of the Association for Information Systems}, volume = {12}, year = {2011}, month = {12/2011}, chapter = {Article 2}, abstract = {There is an exciting natural match between social network analysis methods and the growth of data sources produced by social interactions via information technologies, from online communities to corporate information systems. Information Systems researchers have not been slow to embrace this combination of method and data. Such systems increasingly provide "digital trace data" that provide new research opportunities. Yet digital trace data are substantively different from the survey and interview data for which network analysis measures and interpretations were originally developed. This paper examines ten validity issues associated with the combination of data digital trace data and social network analysis methods, with examples from the IS literature, to provide recommendations for improving the validity of research using this combination.}, keywords = {Information System, Social Network Analysis, Virtuality}, url = {http://aisel.aisnet.org/jais/vol12/iss12/2/}, author = {Howison, James and Kevin Crowston and Wiggins, Andrea} } @article {miscione2011awarming, title = {A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming}, journal = {SCIENCE AND PUBLIC POLICY}, volume = {38}, number = {4}, year = {2011}, month = {May}, pages = {332{\textendash}333}, publisher = {OXFORD UNIV PRESS}, issn = {0302-3427}, author = {Miscione, G} } @proceedings {2011, title = {What characterizes documents that bridge boundaries compared to documents that do not? An exploratory study of documentation in FLOSS teams}, year = {2011}, month = {1/2011}, edition = {44th}, keywords = {Documents, FLOSS, Genre}, author = {{\O}sterlund, Carsten and Kevin Crowston} } @article {1072, title = {What Does the Future Hold? A Critical View of Emerging Information and Communication Technologies and Their Social Consequences}, volume = {356}, year = {2011}, pages = {59-76}, publisher = {Springer Berlin Heidelberg}, keywords = {Emerging ICT, methodology, social consequences}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_5}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_5}, author = {Bernd Carsten Stahl}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {1074, title = {What Future? Which Technology? On the Problem of Describing Relevant Futures}, volume = {356}, year = {2011}, pages = {95-108}, publisher = {Springer Berlin Heidelberg}, keywords = {Emerging ICT, epistemology, ontology, participative technology assessment}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_7}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_7}, author = {Bernd Carsten Stahl}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @article {1068, title = {Will Current Trends in Information Systems Development Lead to More Visible Usage of Socio-technical Approaches?}, volume = {356}, year = {2011}, pages = {295-297}, publisher = {Springer Berlin Heidelberg}, isbn = {978-3-642-21363-2}, doi = {10.1007/978-3-642-21364-9_20}, url = {http://dx.doi.org/10.1007/978-3-642-21364-9_20}, author = {Alter, Steven and Mikko Korpela and Petkov, Doncho and Nancy Russo}, editor = {Chiasson, Mike and Ola Henfridsson and Helena Karsten and DeGross, JaniceI.} } @conference {2011, title = {Work as coordination and coordination as work: A process perspective on FLOSS development projects}, booktitle = {Third International Symposium on Process Organization Studies}, year = {2011}, month = {6/2011}, address = {Corfu, Greece}, url = {http://www.process-symposium.com/}, author = {Kevin Crowston and {\O}sterlund, Carsten and Howison, James and Bolici, Francesco} } @article {IFIP AICT03180179, title = {An Adoption Diffusion Model of RFID-Based Livestock Management System in Australia}, volume = {318}, year = {2010}, pages = {179{\textendash}191}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Mohammad Alamgir Hossain and Mohammed Quaddus}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {923, title = {A Brief History of IFIIP WG 8.2 Research: The People, the Places, the Methods, and the Issues}, year = {2010}, note = {IFIP Working Group 8.2/8.6 Working Conference in Perth, Australia, March/April 2010 Proceedings}, pages = {345}, publisher = {Springer}, address = {New York}, author = {Nancy L. Russo and Michael D. Myers}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180345, title = {A Brief History of IFIP WG 8.2 Research: The People, the Places, the Methods, and the Issues}, volume = {318}, year = {2010}, pages = {345{\textendash}345}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Nancy L. Russo and Michael D. Myers}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180089, title = {A Case Study of Improving Information Technology Governance in a University Context}, volume = {318}, year = {2010}, pages = {89{\textendash}107}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Michael Hicks and Graham Pervan and Brian Perrin}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @conference {1184, title = {Chaotic Worlds: An Analysis of World of Warcraft}, booktitle = {Americas Conference on Information Systems}, volume = {Paper 174}, year = {2010}, pages = {1-7}, publisher = {AIS}, organization = {AIS}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/amcis2010/174}, author = {McKenna, Brad and Gardner, Lesley and Michael D. Myers} } @conference {georgiadou2010citizen, title = {The citizen edge: using virtual globes to improve participation in setting policy agendas}, booktitle = {2nd Crossroad Workshop, Samos, Greece}, year = {2010}, author = {Georgiadou, Yola and Verplanke, Jeroen and Miscione, Gianluca and Martinez, Javier} } @booklet {georgiadou2010theagendas, title = {The Citizen Edge: using Virtual Globes to Improve Participation in Setting Policy Agendas}, year = {2010}, publisher = {.}, author = {Georgiadou, Y and Verplanke, J and Miscione, G and Martinez, J} } @article {verplanke2010citizen, title = {Citizen Surveillance of the State: A mirror for eGovernment?}, journal = {What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience}, year = {2010}, pages = {185{\textendash}201}, publisher = {Springer Boston}, author = {Verplanke, Jeroen and Martinez, Javier and Miscione, Gianluca and Georgiadou, Yola and Coleman, David and Hassan, Abdishakur} } @inbook {verplanke2010citizenegovernment, title = {Citizen surveillance of the state: A mirror for egovernment?}, volume = {328}, year = {2010}, month = {Jan}, pages = {185{\textendash}201}, abstract = {{\textcopyright} IFIP International Federation for Information Processing 2010. This paper discusses, conceptually and empirically, the role of geographic ICT (geoICT) and virtual globes (e.g. Google Earth) at the interface of public policy and citizens. Our preliminary findings from on-going field work in an Indian city and in Zanzibar suggest that virtual globe technology can potentially transfer to citizens surveillance power, traditionally held by the government. Starting from the traditional electronic government framework, where bureaucracy acts as a filter between policy makers and citizens with grievances, we outline an emerging framework where commercial virtual globes act as mediators between policy-makers and citizens. We show that the emerging framework holds the potential of allowing citizens concerned, in our case, about the quality of water services, to influence policy makers directly. The virtual globe acts as a mirror to the traditional eGovernment framework and lends a different societal visibility both to public services provision, and to localized citizens{\textquoteright} needs.}, isbn = {9783642154782}, issn = {1868-4238}, doi = {10.1007/978-3-642-15479-9_19}, author = {Verplanke, J and Martinez, J and Miscione, G and Georgiadou, Y and Coleman, D and Hassan, AA} } @article {verplankecitizenegovernment, title = {Citizen Surveillance of the State: A Mirror for eGovernment?}, journal = {SSRN Electronic Journal}, year = {2010}, publisher = {Elsevier BV}, doi = {10.2139/ssrn.2617208}, author = {Verplanke, J and Martinez, J and Miscione, G and Georgiadou, Y and Coleman, D and Hassan, AA} } @conference {2010classifyingdiscourse, title = {Classifying the City : a Look behind the Word Slum in Indian Urban Planning Practice and Discourse}, year = {2010}, month = {Jan} } @article {RePEc:wsi:jikmxx:v:09:y:2010:i:01:p:81-92, title = {Comparison of Matrix Dimensionality Reduction Methods in Uncovering Latent Structures in the Data}, journal = {Journal of Information \& Knowledge Management (JIKM)}, volume = {09}, number = {01}, year = {2010}, pages = {81-92}, abstract = {Matrix decomposition methods: Singular Value Decomposition (SVD) and Semi Discrete Decomposition (SDD) are proved to be successful in dimensionality reduction. However, to the best of our knowledge, no empirical results are presented and no comparison between these methods is done to uncover latent structures in the data. In this paper, we present how these methods can be used to identify and visualise latent structures in the time series data. Results on a high dimensional dataset demonstrate that SVD is more successful in uncovering the latent structures.}, keywords = {Data mining, dimensionality reduction, principal component analysis, Semi Discrete Decomposition, Singular Value Decomposition}, url = {http://econpapers.repec.org/RePEc:wsi:jikmxx:v:09:y:2010:i:01:p:81-92}, author = {Kumar, Ch. Aswani and Palanisamy, Ramaraj} } @article {1188, title = {A Conceptual Framework for Consumer Information Systems Development}, journal = {Pacific Asia Journal of the AIS}, volume = {2}, number = {1}, year = {2010}, pages = {47-66}, type = {Journal Article}, abstract = {Consumer information systems (CIS) are an emerging area of inquiry for information systems researchers. IS researchers have traditionally emphasized efficiency and effectiveness of organizational processes and system use. However, design for consumer information systems requires more attention to be paid to processes of value creation embedded in the consumer experience. This shift in focus demands a reconsideration of current information systems development approaches. In this paper we propose a conceptual framework for consumer information systems development. The framework includes six elements of co-creation of consumer value. The framework is illustrated by reviewing the findings from three case studies.}, author = {Tuunanen, Tuure and Michael D. Myers and Cassab, Harold} } @article {richter2010conceptualizing, title = {Conceptualizing people in SDI literature: Implications for SDI research and development.}, journal = {IJSDIR}, volume = {5}, year = {2010}, pages = {286{\textendash}325}, author = {Richter, Christine and Miscione, Gianluca and Georgiadou, Yola} } @article {richter2010conceptualizingdevelopment, title = {Conceptualizing people in SDI literature: Implications for SDI research and development.}, journal = {Int. J. Spatial Data Infrastructures Res.}, volume = {5}, year = {2010}, pages = {286{\textendash}325}, author = {Richter, C and Miscione, G and Georgiadou, Y} } @article {IFIP AICT03180001, title = {Creation, Transfer, and Diffusion of Innovation in Organizations and Society: Information Systems Design Science Research for Human Benefit}, volume = {318}, year = {2010}, pages = {1{\textendash}10}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {John R. Venable and Jan Pries-Heje and Deborah Bunker and Nancy L. Russo}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @conference {1186, title = {Cross-Cultural Research in Information Systems}, booktitle = {Pacific Asia Conference on Information Systems}, year = {2010}, pages = {1-8}, type = {Conference Proceedings}, author = {Myers, Michael David and Hu, Qing and Gregor, Shirley and Shan Ling Pan} } @article {IFIP AICT03180028, title = {The Design and Engineering of Mobile Data Services: Developing an Ontology Based on Business Model Thinking}, volume = {318}, year = {2010}, pages = {28{\textendash}51}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Mutaz M. Al-Debei and Guy Fitzgerald}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180159, title = {Design Science Research for Business Process Design: Organizational Transition at Intersport Sweden}, volume = {318}, year = {2010}, pages = {159{\textendash}176}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Mikael Lind and Daniel Rudmark and Ulf Seigerroth}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @conference {2010desperatelyprice, title = {Desperately Seeking the Anchoring Mechanism for Geoinformation Price}, year = {2010}, month = {May} } @article {IFIP AICT03180192, title = {Developing a Broadband Adoption Model in the UK Context}, volume = {318}, year = {2010}, pages = {192{\textendash}208}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Yogesh K. Dwivedi and Navonil Mustafee and Michael D. Williams and Banita Lal}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {1190, title = {Digital Natives and Ubiquitous Information Systems}, journal = {Information Systems Research}, volume = {21}, number = {4}, year = {2010}, pages = {711{\textendash}723}, type = {Journal Article}, author = {Vodanovich, Shahper and Sundaram, David and Myers, Michael David} } @article {miscione2010experimentingprices, title = {Experimenting GeoInformation Prices}, journal = {Workshop Proceedings}, year = {2010}, pages = {63{\textendash}63}, author = {Miscione, G and de Vries, W and Zevenbergen, J and van Loenen, B} } @article {869, title = {Extending Design Science Research Methodology for a Multicultural World}, year = {2010}, note = {IFIP Working Group 8.2/8.6 Working Conference in Perth, Australia, March/April 2010 Proceedings}, pages = {108-121}, publisher = {Springer}, address = {New York}, author = {Lawrence, Carl and Tuunanen, Tuure and Michael D. Myers}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180108, title = {Extending Design Science Research Methodology for a Multicultural World}, volume = {318}, year = {2010}, pages = {108{\textendash}121}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Lawrence, Carl and Tuunanen, Tuure and Michael D. Myers}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @inbook {miscione2010acontexts, title = {A FEDERATIVE VIEW FOR INFORMATION INFRASTRUCTURES IN DEVELOPING CONTEXTS}, booktitle = {.}, year = {2010}, publisher = {.}, organization = {.}, address = {.}, author = {Miscione, G and Georgiadou, Y and Staring, K} } @article {miscione2010free, title = {Free and Open Source Software in developing contexts: From open in principle to open in the consequences}, journal = {Journal of information, communication and ethics in society}, volume = {8}, number = {1}, year = {2010}, pages = {42{\textendash}56}, publisher = {Emerald Group Publishing Limited}, author = {Miscione, Gianluca and Johnston, Kevin} } @article {kimppa2010freeconsequences, title = {Free and Open Source Software in developing contexts: From open in principle to open in the consequences}, journal = {Journal of Information, Communication and Ethics in Society}, volume = {8}, number = {1}, year = {2010}, month = {Mar}, pages = {42{\textendash}56}, abstract = {Purpose {\textendash} Originating in the USA and Northern Europe, Free and Open Source Software (FOSS) found on the internet its fertile environment. In more recent years, FOSS is becoming an increasingly important element in strategies for development and implementation of information and communication technologies also in developing countries. Mainstream research on FOSS has catered to the underlying principles or freedom, open organizational forms, and on its economical aspects. The purpose of this paper is to shed new light on the actual consequences of FOSS, often left in the background. Design/methodology/approach {\textendash} The paper examines where FOSS principles{\textquoteright} assumptions are likely to be more evident: in contexts of developing countries, which are geographically and organizationally far from the original environment of FOSS. A mixed methodology characterizes this work: quantitative and qualitative methods bring readers{\textquoteright} attention to unusual empirical settings and downplayed organizational processes of information technology (IT) implementation and adoption. Findings {\textendash} The consequences of FOSS on IT implementation and actual use are ambivalent. It is argued that FOSS adoption does not happen spontaneously, neither by decree, and that the relevance of open technologies as public goods remains in the different role of local actual technical and organizational capabilities, and environment conditions. Originality/value {\textendash} Such a focus complements existing studies on the economical relevance of FOSS, which are not the focus of this paper. {\textcopyright} 2010, Emerald Group Publishing Limited}, issn = {1477-996X}, doi = {10.1108/14779961011024800}, author = {Kimppa, K and Miscione, G and Johnston, K} } @article {IFIP AICT03180245, title = {Functional Service Domain Architecture Management: Building the Foundation for Situational Method Engineering}, volume = {318}, year = {2010}, pages = {245{\textendash}262}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Daniel Stock and Winter, Robert and J{\"o}rg H. Mayer}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {kandwal2010geospatial, title = {Geospatial analysis of HIV-Related social stigma: a study of tested females across mandals of Andhra Pradesh in India}, journal = {International journal of health geographics}, volume = {9}, number = {1}, year = {2010}, pages = {18}, publisher = {BioMed Central}, author = {Kandwal, Rashmi and Augustijn, Ellen-Wien and Stein, Alfred and Miscione, Gianluca and Garg, Pradeep Kumar and Garg, Rahul Dev} } @article {kandwal2010geospatialindia, title = {Geospatial analysis of HIV-Related social stigma: A study of tested females across mandals of Andhra Pradesh in India}, journal = {International Journal of Health Geographics}, volume = {9}, year = {2010}, month = {Apr}, abstract = {Background: In Geographical Information Systems issues of scale are of an increasing interest in storing health data and using these in policy support. National and international policies on treating HIV (Human Immunodeficiency Virus) positive women in India are based on case counts at Voluntary Counseling and Testing Centers (VCTCs). In this study, carried out in the Indian state of Andhra Pradesh, these centers are located in subdistricts called mandals, serving for both registration and health facility policies. This study hypothesizes that people may move to a mandal different than their place of residence for being tested for reasons of stigma. Counts of a single mandal therefore may include cases from inside and outside a mandal. HIV counts were analyzed on the presence of outside cases and the most likely explanations for movement. Counts of women being tested on a practitioners{\textquoteright} referral (REFs) and those directly walking-in at testing centers (DWs) were compared and with counts of pregnant women.Results: At the mandal level incidence among REFs is on the average higher than among DWs. For both groups incidence is higher in the South-Eastern coastal zones, being an area with a dense highway network and active port business. A pattern on the incidence maps was statistically confirmed by a cluster analysis. A spatial regression analysis to explain the differences in incidence among pregnant women and REFs shows a negative relation with the number of facilities and a positive relation with the number of roads in a mandal. Differences in incidence among pregnant women and DWs are explained by the same variables, and by a negative relation with the number of neighboring mandals. Based on the assumption that pregnant women are tested in their home mandal, this provides a clear indication that women move for testing as well as clues for explanations why.Conclusions: The spatial analysis shows that women in India move towards a different mandal for getting tested on HIV. Given the scale of study and different types of movements involved, it is difficult to say where they move to and what the precise effect is on HIV registration. Better recording the addresses of tested women may help to relate HIV incidence to population present within a mandal. This in turn may lead to a better incidence count and therefore add to more reliable policy making, e.g. for locating or expanding health facilities. {\textcopyright} 2010 Kandwal et al; licensee BioMed Central Ltd.}, doi = {10.1186/1476-072X-9-18}, author = {Kandwal, R and Augustijn, EW and Stein, A and Miscione, G and Garg, PK and Garg, RD} } @article {miscione2010globetrotting, title = {Globetrotting health information systems}, journal = {Journal of Health Informatics in Developing Countries}, volume = {4}, number = {1}, year = {2010}, author = {Miscione, Gianluca and Damtew, Zufan and Molla, Selamawit and {\O}stmo, Inger Elise and Staring, Knut and S{\ae}bo, Johan and Sun, Violeta} } @article {miscione2010globetrottingsystems, title = {Globetrotting Health Information Systems}, journal = {Journal of Health Informatics in Developing Countries}, volume = {4}, number = {1}, year = {2010}, author = {Miscione, G and Damtew, Z and Molla, S and {\O}stmo, IE and Staring, K and S{\ae}bo, J and Sun, V} } @booklet {2010h20webs, title = {H2.0 Inform and Empower Initiative - HSW Final Report: Empowering Communities in East Africa in Water Service Provision through Information from Human Sensor Webs}, year = {2010}, month = {Jan}, publisher = {New York Geneva} } @article {IFIP AICT03180013, title = {Incommensurability and Multi-paradigm Grounding in Design Science Research: Implications for Creating Knowledge}, volume = {318}, year = {2010}, pages = {13{\textendash}27}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Dirk S. Hovorka}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @conference {2010informationafrica, title = {Information and Communication Technology for Development, Research Voices from Africa}, year = {2010}, month = {Jan} } @conference {1187, title = {Knowledge Management Challenges for Nongovernment Organizations: The Health and Disability Sector in New Zealand}, booktitle = {Proceedings of Australasian Conference on Information Systems}, volume = {94}, year = {2010}, note = {This paper won the Emerald Publishing Award for the Best Knowledge Management paper at ACIS 2010}, pages = {1-12}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/acis2010/94}, author = {Soakell-Ho, Michelle and Michael D. Myers} } @article {IFIP AICT03180263, title = {Management Design Theories}, volume = {318}, year = {2010}, pages = {263{\textendash}281}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Jan Pries-Heje and Baskerville, Richard L}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180327, title = {Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports}, volume = {318}, year = {2010}, pages = {327{\textendash}342}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Thomas {\O}sterlie and Ole Martin Asak and Ole Georg Pettersen and H{\aa}vard Tronhus}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @booklet {miscione2010misqarchivist, title = {MISQ Archivist}, year = {2010}, author = {Miscione, G} } @article {IFIP AICT03180282, title = {Modeling Forensic Evidence Systems Using Design Science}, volume = {318}, year = {2010}, pages = {282{\textendash}300}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Colin Armstrong and Helen Armstrong}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @conference {2010theby, title = {The Narratives we Infrastructure By}, year = {2010}, month = {Sep} } @article {519, title = {Open sourcing regulation: the development of the Creative Commons licences as a form of commons based peer production}, year = {2010}, url = {https://www.researchgate.net/publication/46277557_Open_sourcing_regulation_the_development_of_the_Creative_Commons_licences_as_a_form_of_commons_based_peer_production}, author = {Prodromos Tsiavos and Edgar A. Whitley} } @article {IFIP AICT03180348, title = {Opening up the Agile Innovation Process}, volume = {318}, year = {2010}, pages = {348{\textendash}349}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Conboy, Kieran and Brian Donnellan and Lorraine Morgan and Wang, Xiaofeng}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180317, title = {Participation in Living Lab: Designing Systems with Users}, volume = {318}, year = {2010}, pages = {317{\textendash}326}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Birgitta Bergvall-K{\aa}reborn and Debra Howcroft and Anna St{\aa}hlbr{\"o}st and Anita Melander Wikman}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180303, title = {Participatory Design Activities and Agile Software Development}, volume = {318}, year = {2010}, pages = {303{\textendash}316}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Karlheinz Kautz}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @booklet {miscione2010prospectivasmonedas, title = {Prospectivas y consecuencias de la progresiva desvinculaci{\'o}n de estados y monedas}, year = {2010}, abstract = {Las monedas son intr{\'\i}nseca a los modos de la organizaci{\'o}n. De hecho, los mercados basados ​​en transacciones monetarias, son una de las formas ideal-t{\'\i}picas de organizaci{\'o}n que Powell (1990) analiza junto con las jerarqu{\'\i}as y redes. Como no todas las relaciones sociales est{\'a}n regulados por el dinero, la econom{\'\i}a puede ser vista como el aglomerado de lo que medie dinero. Por lo tanto, cuando el dinero cambia, las relaciones sociales son susceptibles de cambiar. Como el soci{\'o}logo de dinero, Nigel Dodd, lo ha dicho, "Todo el dinero que tiene un orden imaginario social" (Dodd 2015), una idea que se basa en la afirmaci{\'o}n de Simmel que el dinero es un "claim upon society". Com{\'u}nmente eso se entiende como una demanda sobre el estado, aunque monedas como el Euro y Bitcoin no se refieren a un estado particular. Nuevas formas de dinero son relativamente raras, y por lo tanto estas dos nuevas monedas ofrecen una oportunidad {\'u}nica para estudiar y analizar nuevas formas de relaci{\'o}n social. Empezando con el estado, hay cinco aspectos relevantes: i) el monopolio de la violencia, ii) el principio de no interferencia, iii) dinero de F{\'\i}at, iv) la burocracia, v) estad{\'\i}sticas. Usare{\textquoteright} estas para discutir las nuevas monedas con los estudiantes.}, author = {Miscione, G} } @article {1189, title = {Putting the Theory back into Grounded Theory: Guidelines for Grounded Theory Studies in Information Systems}, journal = {Information Systems Journal}, volume = {20}, number = {4}, year = {2010}, pages = {357-381}, type = {Journal Article}, author = {Cathy Urquhart and Lehmann, Hans and Myers, Michael David} } @article {IFIP AICT03180125, title = {The Reality of Rhetoric in Information Systems Adoption: A Case Study Investigation of the Uk National Health Service}, volume = {318}, year = {2010}, pages = {125{\textendash}142}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Imran Khan and Elaine Ferneley}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {de2010relationality, title = {Relationality in Geo-Information value. Price as product of socio-technical networks.}, journal = {IJSDIR}, volume = {5}, year = {2010}, pages = {77{\textendash}95}, author = {de Vries, Walter T and Miscione, Gianluca} } @article {de2010relationality, title = {Relationality in Geo-Information value. Price as product of socio-technical networks.}, journal = {IJSDIR}, volume = {5}, year = {2010}, pages = {77{\textendash}95}, author = {de Vries, Walter T and Miscione, Gianluca} } @article {vries2010relationalitynetworks, title = {Relationality in Geo-Information value. Price as product of socio-technical networks.}, journal = {Int. J. Spatial Data Infrastructures Res.}, volume = {5}, year = {2010}, pages = {77{\textendash}95}, author = {Vries, WTD and Miscione, G} } @article {IFIP AICT03180346, title = {The Role of Public Policy in Enhancing the Design and Diffusion of Information Systems and Technology for Human Benefit}, volume = {318}, year = {2010}, pages = {346{\textendash}347}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Venable, John and Peter Newman and Nick Letch and Sue Ash}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180052, title = {The Role of Social Networks in Early Adoption of Mobile Devices}, volume = {318}, year = {2010}, pages = {52{\textendash}70}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Heidi Tscherning and Lars Mathiassen}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {IFIP AICT03180073, title = {Roles in Innovative Software Teams: A Design Experiment}, volume = {318}, year = {2010}, pages = {73{\textendash}88}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Ivan Aaen}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @conference {1185, title = {Setting our Research Agendas: Institutional Ecology, Informing Sciences, or Management Fashion Theory?}, booktitle = {International Conference on Information Systems}, year = {2010}, pages = {1-5}, publisher = {AIS}, organization = {AIS}, type = {Conference Proceedings}, url = {http://aisel.aisnet.org/icis2010_submissions/4}, author = {Michael D. Myers and Baskerville, Richard L and Gill, Grandon and Ramiller, Neil} } @article {1663845, title = {Short Communication: Concept lattice reduction using fuzzy K-Means clustering}, journal = {Expert Syst. Appl.}, volume = {37}, number = {3}, year = {2010}, pages = {2696{\textendash}2704}, publisher = {Pergamon Press, Inc.}, address = {Tarrytown, NY, USA}, issn = {0957-4174}, doi = {http://dx.doi.org/10.1016/j.eswa.2009.09.026}, author = {Kumar, Ch. Aswani and Srinivas, S.} } @article {IFIP AICT03180143, title = {Social Consequences of Nomadic Working: A Case Study in an Organization}, volume = {318}, year = {2010}, pages = {143{\textendash}158}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Ramanjit Singh and Trevor Wood-Harper}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @booklet {miscione2010technologyinstitute, title = {Technology as Rorschach: Stage and Backstage of the Making of an Information Infrastructure (Max Planck Institute)}, year = {2010}, month = {Nov}, author = {Miscione, G} } @article {IFIP AICT03180225, title = {Toward an Understanding of the Evolution of IFIP WG 8.6 Research}, volume = {318}, year = {2010}, pages = {225{\textendash}242}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Yogesh K. Dwivedi and Levine, Linda and Michael D. Williams and Mohini Singh and David G. Wastell and Deborah Bunker}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @inbook {morawczynski2010trustworthykenya, title = {Trustworthy mobile transactions: A longitudinal study of M-PESA in Kenya}, booktitle = {Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives}, year = {2010}, month = {Dec}, pages = {160{\textendash}173}, abstract = {This chapter will focus on one vital determinant of m-banking adoption and use-trust relations. It presents the case of M-PESA, an m-banking application that quickly achieved a remarkable local embeddedness in large segments of Kenyan society. Data for this case was gathered during a fourteen month ethnographic study that took place in two locations-one urban and one rural. The chapter identifies four categories of trust (interpersonal, extended, presumptive, institutional) that were a prerequisite for mobile banking, and a lubricant for its sustainability and growth. It shows that institutional trust relations were strong during the early stages of adoption whilst the interpersonal ones were weak. This means that customers trusted Safaricom, the mobile service provider offering M-PESA. They did not, however, trust the agents that facilitated cash in and cash out. The chapter also gives attention to the changing nature of these relations through time. For example, it shows that interpersonal trust relations between customers and agents strengthened with increased interaction. The chapter concludes by identifying areas for future research and delineating recommendations for managers. {\textcopyright} 2010, IGI Global.}, isbn = {9781615209019}, doi = {10.4018/978-1-61520-901-9.ch010}, author = {Morawczynski, O and Miscione, G} } @article {morawczynski2010trustworthy, title = {Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya}, journal = {Latusek, \& Gerbasi (Eds.), Trust and Technology}, year = {2010}, pages = {160{\textendash}173}, author = {Morawczynski, Olga and Miscione, Gianluca} } @article {IFIP AICT03180209, title = {The Uneven Diffusion of Collaborative Technology in a Large Organization}, volume = {318}, year = {2010}, pages = {209{\textendash}224}, publisher = {Springer}, isbn = {978-3-642-12112-8}, author = {Gasparas Jarulaitis}, editor = {Jan Pries-Heje and Venable, John and Deborah Bunker and Nancy L. Russo and Janice I. DeGross} } @article {1183, title = {What do we like about the IS field?}, journal = {Communications of the AIS}, volume = {26}, number = {20}, year = {2010}, pages = {441-450}, type = {Journal Article}, url = {http://aisel.aisnet.org/}, author = {John L. King and Michael D. Myers and Suzanne Rivard and Carol Saunders and Ron Weber} } @booklet {2010wheresituated, title = {Where are Information and Communication Technologies for Development Situated?}, year = {2010}, month = {Jan} } @booklet {2010whereschool, title = {Where to Ground Information Infrastructures? (Warwick Business School)}, year = {2010}, month = {Jun} } @article {794, title = {An Action Research on Open Knowledge and Technology Transfer}, volume = {301/2009}, year = {2009}, pages = {211 - 223}, publisher = {Springer}, chapter = {15}, abstract = {R\&D has always been considered a strategic asset of companies. Traditionally, companies that have their own R\&D function are better prepared to compete in the globalized economy because they are able to produce the knowledge and technology required to advance products and services. SMEs also need to become highly innovative and competitive in order to be successful. Nevertheless, their ability to have an internal R\&D function that effectively meets their innovation needs is usually very weak. Open innovation provides access to a vast amount of new ideas and technologies at lower costs than closed innovation. This paper presents an action research study being carried out at University of Minho to develop a business model and technology platform for an innovation brokering service connecting ideas and technologies being developed at Universities with the specific innovation needs of SMEs. The expected contributions of the study include the empirical investigation of the effectiveness and risks of crowdsourcing innovation when applied in the socio-economic context of a European developing country where SMEs represent 99,6\% of the businesses. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_15}, author = {Ramos, Isabel and Cardoso, Margarida and Jo{\~a}o Carvalho and Gra{\c c}a, Jos{\'e}} } @article {943, title = {Analysis of unsupervised dimensionality reduction techniques}, journal = {Computer Science and Information Systems}, volume = {6}, number = {2}, year = {2009}, pages = {217-227}, publisher = {ComSIS Consortium .}, issn = {1820-0214}, doi = {http://10.2298/csis0902217K}, author = {Aswani Kumar, Ch} } @article {796, title = {Architecture for a Creative Information System}, volume = {301/2009}, year = {2009}, pages = {113 - 121}, publisher = {Springer}, chapter = {8}, abstract = {Considering that the capacity to innovate is increasingly becoming a decisive factor in the competition between organisations, the study and conception of systems that help the birth of new ideas, products and solutions is rising in importance. In this article, the authors consider the concept of Creative Information Systems and present a proposal for the development of architecture for such a system based on the creative technique of brute thinking. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_8}, author = {Mamede, Henrique and Santos, Vitor} } @article {947, title = {Automatic Selection of Intrinsic Dimensionality of Data}, journal = {International Journal of Information Processing}, volume = {3}, number = {2}, year = {2009}, pages = {8-16}, publisher = {IK Publishers, India .}, issn = {0973-8215}, author = {Aswani Kumar, Ch. Srinivas, S.} } @conference {georgiadou2009bigger, title = {A bigger picture: information systems and spatial data infrastructure research perspectives}, booktitle = {Global Spatial Data Infrastructure 11 World Conference: SDI Convergence: Building SDI Bridges to Address Global Challenges, Rotterdam, The Netherlands, 15-19 June, 2009}, year = {2009}, author = {Georgiadou, Yola and Harvey, Francis and Miscione, Gianluca} } @conference {georgiadou2009aperspectives, title = {A bigger picture: information systems and spatial data infrastructure research perspectives}, booktitle = {Proceedings of the 11th AGILE international conference on geographic information science: Spatial Data Infrastructure Convergence: Building SDI Bridges to Address Global Challenges}, year = {2009}, url = {http://www.gsdi.orgwww.gsdi.org/gsdiconf/gsdi11/papers/pdf/266.pdf}, author = {Georgiadou, Y and Harvey, F and Miscione, G} } @article {808, title = {The Chiasmus of Design: Paradoxical Outcomes in the e-Government Reform of UK Children{\textquoteright}s Services}, volume = {301/2009}, year = {2009}, pages = {257 - 272}, publisher = {Springer}, chapter = {18}, abstract = {This paper describes a detailed ethnographic study of the design problems of a major national IT system in the UK- The Integrated Children{\textquoteright}s System (ICS). The implementation of the ICS has disrupted social work practice and engendered growing professional resistance, prompting a fundamental review of its design. Marshall McLuhan{\textquoteright}s concept of chiasmus is a central feature of our analysis of the vicissitudes of ICS. Chiasmus refers to the tendency of any system, when pushed too far, to produce unintended contradictory effects, and is an intrinsic feature of the behaviour of complex, socio-technical systems. The dysfunctions of the ICS provide a pertinent, large-scale example. The ICS constitutes an attempt, via technological means, to re-organize child welfare services in the UK. Whilst aimed at improving child safety, the ICS has had the opposite effect of increasing the potential for error. This chiasmus has been exposed through the multi-site ethnography reported here, which shows how rigidly designed processes, enforced by IT systems, force social work professionals into unsafe investigative and recording practices which increase the risk of errors. The paper ends by proposing an alternative approach to design, based on socio-technical precepts, emphasizing the principles of minimum critical specification, user-centeredness and local autonomy. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_18}, author = {Wastell, David and White, Sue and Broadhurst, Karen} } @article {901, title = {Commentary on Gill and Bhattacherjee: Is there an informing crisis?}, journal = {MIS Quarterly}, volume = {33}, number = {4}, year = {2009}, pages = {663-665}, author = {Michael D. Myers and Baskerville, Richard L} } @article {797, title = {Conducting Creativity Brainstorming Sessions in Small and Medium-Sized Enterprises Using Computer-Mediated Communication Tools}, volume = {301/2009}, year = {2009}, pages = {42 - 59}, publisher = {Springer}, chapter = {4}, abstract = {A variety of Web-based low cost computer-mediated communication (CMC) tools are now available for use by small and medium-sized enterprises (SME). These tools invariably incorporate chat systems that facilitate simultaneous input in synchronous electronic meeting environments, allowing what is referred to as {\textquotedblleft}electronic brainstorming.{\textquotedblright} Although prior research in information systems (IS) has established that electronic brainstorming can be superior to face-to-face brainstorming, there is a lack of detailed guidance regarding how CMC tools should be optimally configured to foster creativity in SMEs. This paper discusses factors to be considered in using CMC tools for creativity brainstorming and proposes recommendations for optimally configuring CMC tools to enhance creativity in SMEs. The recommendations are based on lessons learned from several recent experimental studies on the use of CMC tools for rich brainstorming tasks that require participants to invoke domain-specific knowledge. Based on a consideration of the advantages and disadvantages of the various configuration options, the recommendations provided can form the basis for selecting a CMC tool for creativity brainstorming or for creating an in-house CMC tool for the purpose. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_4}, author = {Murthy, Uday} } @article {792, title = {Creativity and Intelligence in Small and Medium Sized Enterprises: The role of Information Systems}, volume = {301/2009}, year = {2009}, publisher = {Springer}, chapter = {1}, abstract = {The work in this volume examines the real-world confluence of several concepts that are too often studied in isolation from each other. Research into creativity too rarely considers the presumed ability of smaller organisations to contribute a large proportion of the innovations introduced into the practical information systems field. There is also far too little research that addresses the notion that smaller organisations more intelligently manage their creativity and innovation, not only in the organisational signal products, but also in structures and processes found in smaller organisations. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_1}, author = {Dhillon, Gurpreet and Stahl, Bernd and Richard Baskerville} } @article {798, title = {Creativity in Agile Systems Development: A Literature Review}, volume = {301/2009}, year = {2009}, pages = {122 - 134}, publisher = {Springer}, chapter = {9}, abstract = {Proponents of agile methods claim that enabling, fostering and driving creativity is the key motivation that differentiates agile methods from their more traditional, beauraucratic counterparts. However, there is very little rigorous research to support this claim. Like most of their predecessors, the development and promotion of these methods has been almost entirely driven by practitioners and consultants, with little objective validation from the research community. This lack of validation is particularly relevant for SMEs, given that many of their project teams typify the environment to which agile methods are most suited i.e. small, co-located teams with diverse, blended skills in unstructured, sometimes even chaotic surroundings. This paper uses creativity theory as a lens to review the current agile method literature to understand exactly how much we know about the extent to which creativity actually occurs in these agile environments. The study reveals many gaps and conflict of opinion in the body of knowledge in its current state and identifies many avenues for further research. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_9}, author = {Conboy, Kieran and Wang, Xiaofeng and Brian Fitzgerald} } @article {512, title = {Critically classifying: UK E-government website benchmarking and the recasting of the citizen as customer}, journal = {Information Systems Journal}, volume = {19}, number = {2}, year = {2009}, pages = {149-173}, isbn = {1350-1917}, url = {ISJ2009.pdf}, author = {Benjamin Mosse and Edgar A. Whitley} } @article {541, title = {Developing the information and knowledge agenda in information systems: Insights from philosophy}, journal = {The Information Society}, volume = {25}, number = {3}, year = {2009}, pages = {190-197}, isbn = {0197-2243}, url = {TIS2009.pdf}, author = {Leslie P. Willcocks and Edgar A. Whitley} } @article {809, title = {The Emergence of {\textquoteleft}Power with{\textquoteright}: The Case of a Born Global Organization}, volume = {301/2009}, year = {2009}, pages = {239 - 256}, publisher = {Springer}, chapter = {17}, abstract = {Thanks to the advancement of Information and Communications Technologies, the past decade has seen the rise of Born Global organizations (Rennie, 1993; Oviatt and McDougall, 1994; Karra and Philips, 2004; Zahra, 2005). Broadly defined as {\textquoteleft}business organizations that, right from inception, seek to derive significant competitive advantages from the use of resources and the sales of outputs in multiple countries{\textquoteright} (Oviatt and McDougall, 1994: 49), Born Global organizations are small, young, and internationally dispersed. While sharing the characteristics of {\textquoteleft}smallness{\textquoteright} and {\textquoteleft}newness{\textquoteright} of Small- and Medium-sized Enterprises (SMEs), Born Global organizations also bear {\textquoteleft}foreignness{\textquoteright}, similar to that of Multinational Corporations (Zahra, 2005). Born Globals therefore need to strike a balance between {\textquoteleft}global reach{\textquoteright} and {\textquoteleft}local touch{\textquoteright} as in Multinational Corporations (Bartlett and Ghoshal, 1989); yet they have to do so with scare resources and organizational uncertainty similar to SMEs, and with {\textquoteleft}lean{\textquoteright} and {\textquoteleft}mean{\textquoteright} communications afforded by ICT (e.g. Sproull and Kiesler, 1986). This study is an initial attempt to untangle the combined challenges in Born Globals{\textquoteright} innovative way of management. Through a longitudinal case study, we aim to explore the issue of power in a Born Global{\textquoteright}s endeavour to manage its global knowledge via technology mediation. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_17}, author = {Yan, Lin and Niki Panteli} } @article {795, title = {An Examination of the Disruptive Innovation Paradox: The Application of the Innovators Dilemma to SME{\textquoteright}s}, volume = {301/2009}, year = {2009}, pages = {60 - 72}, publisher = {Springer}, chapter = {5}, abstract = {Managing strategic contradiction and paradoxical situations has been gaining importance in technological, innovation and management domains. As a result, more and more paradoxical instances and types have been documented in literature. The innovators dilemma is such an instance that gives a detailed description of how disruptive innovations affect firms. However, the innovators dilemma has only been applied to large organisations and more specifically industry incumbents. Through a multiple case study of six eLearning SME{\textquoteright}s, this paper investigates the applicability of the innovators dilemma as well as the disruptive effects of Web 2.0 on the organisations. Analysing the data collected over 18 months, it was found that the innovators dilemma did indeed apply to SME{\textquoteright}s. However, inline with the original thesis the dilemma only applied to the SME{\textquoteright}s established (pre-2002) before the development of Web 2.0 technologies began. Furthermore, the study highlights that the post-2002 firms were also partly vulnerable to the dilemma but were able to avoid any negative effects though technological visionary leadership. In contrast, the pre-2002 firms were lacking this visionary ability and were also constrained by low risk profiles. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_5}, author = {Nagle, Tadhg and Golden, William} } @article {840, title = {Fashion waves in information systems research and practice}, journal = {MIS Quarterly}, volume = {33}, number = {4}, year = {2009}, pages = {647-662}, abstract = {Building on neo-institutional theory and theories of innovation and diffusion, recent work in the field of management has suggested that management research and practice is characterized by fashions. A management fashion is a relatively transitory belief that a certain management technique leads rational management progress. Using bibliographic research, we apply Abrahamson{\textquoteright}s management fashion theory to information systems research and practice. Our findings reveal that information systems research and practice, like management research and practice, is indeed characterized by fashions. These {\textquotedblleft}IS fashion waves{\textquotedblright} are relatively transitory and represent a burst of interest in particular topics by IS researchers and practitioners. However, while our findings show that IS research closely parallels practice, we suggest that a more proactive engagement of IS academics is needed in the IS fashion setting process.}, author = {Baskerville, Richard L and Michael D. Myers} } @article {georgiadou2009framing, title = {Framing the use of geo-information in government: a tale of two perspectives}, journal = {Earth science informatics}, volume = {2}, number = {4}, year = {2009}, pages = {271{\textendash}282}, publisher = {Springer}, author = {Georgiadou, Yola and Miscione, Gianluca and Lance, Kate and de Vries, Walter} } @article {georgiadou2009framingperspectives, title = {Framing the use of geo-information in government: A tale of two perspectives}, journal = {Earth Science Informatics}, volume = {2}, number = {4}, year = {2009}, month = {Dec}, pages = {271{\textendash}282}, abstract = {While commercial virtual globes (e. g. Google Earth) and global scientific cyber-infrastructures (e. g. Digital Earth) are revolutionizing the way we use and produce geo-information, we still lack a rich conceptual understanding of how genuine human actors use geo-information and associated technologies in real work settings. In this paper, we conceptualize the use of geo-information as encompassing people{\textquoteright}s actual use practices, the values to which people aspire through geo-information use, and the rules that either legally prescribe or just encourage optimal use. Values, practices and rules can be illuminated from two perspectives (or lenses), the market and the polis, resulting in radically different insights on the use of geo-information as a social phenomenon. We argue that with a polis lens we stand a chance to explain how authentic human actors, groups and communities with different values, interests and motivations use geo-information, and how societal benefits materialize or not as a result. Seen from a polis lens, values are not easily measurable standards of goodness, dominant public management ideas can be the source of technical-organizational change in government while policies can be fruitfully examined as persuasive arguments to target audiences. With a polis lens, we are more likely to understand the emergence of new practices, value contests and global rules underpinning commercial virtual globes and scientific cyber-infrastructures. {\textcopyright} Springer-Verlag 2009.}, issn = {1865-0473}, doi = {10.1007/s12145-009-0036-5}, author = {Georgiadou, Y and Miscione, G and Lance, K and de Vries, W} } @article {587, title = {From Generative Fit to Generative Capacity: Exploring an Emerging Dimension of Information Systems Design and Task Performance}, journal = {Information Systems Journal}, volume = {4}, year = {2009}, pages = {345-367}, url = {http://www3.interscience.wiley.com/journal/120174765/abstract}, author = {Avital, M and Te{\textquoteright}eni, D} } @booklet {georgiadou2009geoictgovernance, title = {Geo-ICT in public governance}, year = {2009}, month = {Aug}, author = {Georgiadou, Y and Miscione, G} } @book {436, title = {Global challenges for identity policies}, year = {2009}, publisher = {Palgrave Macmillan}, organization = {Palgrave Macmillan}, address = {Basingstoke}, author = {Edgar A. Whitley and Ian R Hosein} } @article {miscione2009hegemonies, title = {Hegemonies in classification: an introduction}, year = {2009}, publisher = {Research Committee 25 of the International Sociological Association}, author = {Miscione, Gianluca and Landert, Daniela} } @article {miscione2009hegemoniesprocesses, title = {Hegemonies in Classification Processes}, journal = {Special Issue of the International Sociological Association publication, Research Committee on Language and Society}, volume = {6}, number = {2}, year = {2009}, author = {Miscione, G and Landert, D} } @article {miscione2009hegemonies, title = {Hegemonies in classification processes: introduction}, journal = {In: ISA-RC 25 Newsletter: Language and Society}, year = {2009}, author = {Miscione, G and Landert, D} } @article {799, title = {How and Why Do IT Entrepreneurs Leave Their Salaried Employment to Start a SME? A Mixed Methods Research Design}, volume = {301/2009}, year = {2009}, pages = {273 - 286}, publisher = {Springer}, chapter = {19}, abstract = {This method paper addresses an untapped but important type of IT turnover: IT entrepreneurship. We seek to develop a mixed methods research (MMR) design to understand the factors and processes that influence turnover behavior of prospective (nascent) IT entrepreneurs. To do this, we review two prior streams of research: the entrepreneurship literature and IT employee turnover. We incorporate the results of this literature review into a conceptual framework describing how the relevant factors leading to entrepreneurial and turnover behavior change over time, either gradually or suddenly, in response to specific events. In addition, we also contribute to the research by arguing that mixed methods research (MMR) is appropriate to bridge the gap between entrepreneurial literature and the IT turnover literature. A third important contribution is the design of the MMR, combining a longitudinal approach with a retrospective approach; a qualitative with a quantitative approach and, the exploratory design with the triangulation design [1]. Finally, we discuss practical implications for IT managers and IT entrepreneurs. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_19}, author = {Mourmant, Ga{\"e}tan} } @proceedings {876, title = {ICT for Development: Two Contradictory Stories of an ICT Initiative}, volume = {759}, year = {2009}, month = {6-9 August}, pages = {1-9}, address = {San Francisco, California}, abstract = {In this study we have explored two different perspectives of one ICT project. The mainstream perceives that an educational ICT project for the aboriginal as successful, while the local aboriginals and teachers are not satisfied with the ICT project. By adopting the postcolonial theory and ethnography method, this study enables us to compare and contrast these two viewpoints. It appears that the paternalistic nature of the ICT project as well as the belief of technological supremacy contribute to the disparity between the mainstream and the locals.}, keywords = {ICT Development, Postcolonial Theory, Paternalistic, Technological Supremacy}, url = {http://aisel.aisnet.org/amcis2009/759}, author = {Lin, Cecilia I and Kuo, Feng-Yang and Michael D. Myers} } @article {800, title = {Identifying and Addressing Stakeholder Interests in Design Science Research: An Analysis Using Critical Systems Heuristics}, volume = {301/2009}, year = {2009}, pages = {93 - 112}, publisher = {Springer}, chapter = {7}, abstract = {This paper utilises the Critical Systems Heuristics (CSH) framework developed by Werner Ulrich to critically consider the stakeholders and design goals that should be considered as relevant by researchers conducing Design Science Research (DSR). CSH provides a philosophically and theoretically grounded framework and means for critical consideration of the choices of stakeholders considered to be relevant to any system under design consideration. The paper recommends that legitimately undertaken DSR should include witnesses to represent the interests of the future consumers of the outcomes of DSR, i.e., the future clients, decision makers, professionals, and other non-included stakeholders in the future use of the solution technologies to be invented in DSR. The paper further discusses options for how witnesses might be included, who should be witnessed for and obstacles to implementing the recommendations. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_7}, author = {Venable, John} } @article {494, title = {Identity Project Resources}, year = {2009}, url = {http://identityproject.lse.ac.uk}, author = {LSE Identity Project,} } @article {sun2009information, title = {Information infrastructure governance and windows of opportunity}, year = {2009}, author = {Sun, Violeta and Margunn Aanestad and Skorve, Espen and Miscione, Gianluca} } @conference {sun2009informationopportunity, title = {Information infrastructure governance and windows of opportunity}, booktitle = {17th European Conference on Information Systems, ECIS 2009}, year = {2009}, month = {Dec}, abstract = {In this paper we discuss the challenges of managing large-scale information infrastructures. Various management models, such as the IT governance model, propose structured approaches for management of an organization{\textquoteright}s infrastructure. This paper argues both theoretically and empirically that such an approach to information infrastructure governance has its limitations. The paper is based on empirical material from three change processes in information infrastructures in the context of health care. We present case vignettes that illustrate how these processes evolved along unexpected trajectories, subject to factors beyond the control of management. To conceptualize these phenomena we draw on literature that conceptualize change as emerging from the meeting between multiple parallel streams of activities. The interactions between the various streams open up windows of opportunities that affect the information infrastructure development. We argue that such conceptualizations more realistically depict how large-scale information infrastructures evolve, and hence how they can be (or not be) managed.}, isbn = {9788861293915}, author = {Sun, V and Aanestad, M and Skorve, E and Miscione, G} } @article {927, title = {Information Literacy in Kenya}, journal = {The Electronic Journal of Information Systems in Developing Countries}, volume = {39}, number = {1}, year = {2009}, pages = {1-11}, abstract = {There are a growing number of information and communications technologies (ICT)initiatives in developing countries. These initiatives are usually undertaken on the basis thatthey are important for social and economic development. However, one barrier to theefficient utilisation of ICT in developing countries is the relatively low level of informationliteracy. Without the ability to manipulate and use information effectively, investments inICT-for-development projects may be unsuccessful. In this research project, three ICTinitiatives in Kenya are analysed in the light of the dimensions of information literacy.Implications for other developing countries are discussed.}, author = {Tilvawala, Khushbu and Myers, Michael David and Andrade, Antonio Diaz} } @article {801, title = {IT Governance in SMEs: Trust or Control?}, volume = {301/2009}, year = {2009}, pages = {135 - 149}, publisher = {Springer}, chapter = {10}, abstract = {It is believed by many scholars that a small and medium-sized enterprise (SME) cannot be seen through the lens of a large firm. Theories which explain IT governance in large organizations and methodologies used by practitioners can therefore not be extrapolated to SMEs, which have a completely different economic, cultural and managerial environment. SMEs suffer from resource poverty, have less IS experience and need more external support. SMEs largely contribute to the failure of many IS projects. We define an outsourced information system failure (OISF) as a failure of IT governance in an SME environment and propose a structure for stating propositions derived from both agency theory and theory of trust. The theoretical question addressed in this paper is: how and why do OISFs occur in SMEs? We have chosen a qualitative and positivistic IS case study research strategy based on multiple cases. Eight cases of IS projects were selected. We found that trust is more important than control issues like output-based contracts and structured controls for eliminating opportunistic behaviour in SMEs. We conclude that the world of SMEs is significantly different from that of large companies. This necessitates extra care to be taken on the part of researchers and practitioners when designing artefacts for SMEs. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_10}, author = {Devos, Jan and Van Landeghem, Hendrik and Deschoolmeester, Dirk} } @article {802, title = {IT Governance Practices in Small and Medium-Sized Enterprises: Recommendations from an Empirical Study}, volume = {301/2009}, year = {2009}, pages = {158 - 179}, publisher = {Springer}, chapter = {12}, abstract = {Much has been learned through IT governance research about the nature of IT-related decisions, the location of decision rights for these decisions, and governance mechanisms applied to facilitate associated decision processes in large organisations. Our knowledge about IT governance structures in small and medium-sized enterprises (SME), on the other hand, is quite limited. Adopting a qualitative and inductive approach, this study examines the nature and influence of IT governance in SMEs through interviews with executives from three SMEs. Our results demonstrate that IT decision authority was centralized in all three SMEs but that senior management involvement in governance procedures and communication practices about governance policies were observed to explain differences in these organisations{\textquoteright} IT use. We propose recommendations based on the findings of this study. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_12}, author = {Huang, Rui and Zmud, Robert and Price, R.} } @article {803, title = {Knowledge Management in Small Firms}, volume = {301/2009}, year = {2009}, pages = {192 - 210}, publisher = {Springer}, chapter = {14}, abstract = {This paper explores knowledge management in small and medium-sized firms (SMEs). It investigates the use of Lotus Notes in SMEs of a developing country as a counterpoint to the large firm, developed country emphasis of existing research. It develops taxonomy of Lotus Notes use within the context of different knowledge management processes; notably communicating, co-ordinating and collaborating. The study employs an interpretive approach using three case studies. The key findings suggest that publishing, searching, sharing and retrieving are the user modes for enabling sharing and storing information. Evidence of knowledge creation is found at the departmental level but not at the organizational level. Further, small firms may explore more groupware potential than large organizations and this reflects their different context. Finally, implications for further research are identified. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_14}, author = {Panyasorn, Jessada and Niki Panteli and Powell, Philip} } @article {804, title = {Life Cycle Model for IT Performance Measurement: A Reference Model for Small and Medium Enterprises (SME)}, volume = {301/2009}, year = {2009}, pages = {180 - 191}, publisher = {Springer}, chapter = {13}, abstract = {IT performance measurement is often associated by chief executive officers with IT cost cutting although IT protects business processes from increasing IT costs. IT cost cutting only endangers the company{\textquoteright}s efficiency. This opinion discriminates those who do IT performance measurement in companies as a bean-counter. The present paper describes an integrated reference model for IT performance measurement based on a life cycle model and a performance oriented framework. The presented model was created from a practical point of view. It is designed lank compared with other known concepts and is very appropriate for small and medium enterprises (SME). }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_13}, author = {Albayrak, Can and Gadatsch, Andreas and Olufs, Dirk} } @article {822, title = {Making Enterprise Systems Work: The Role of Organizational Defensive Routines }, journal = {Pacific Asia Journal of the AIS}, volume = {1}, number = {2}, year = {2009}, pages = {1-19}, abstract = {This paper discusses some of the challenges that organizations face when trying to make enterprise systems work. Using critical ethnography, we studied the implementation of an enterprise system in a small-medium sized enterprise within a large conglomerate in Australasia. We found that organizational learning around strategically important issues failed to occur. This failure to learn negatively impacted the implementation of the enterprise system. We use the theory of organizational defensive routines to help explain this failure.}, keywords = {Enterprise Systems Failure, ERP, Defensive Routines, Organizational Learning, Ethnography}, author = {Lee, David J C and Michael D. Myers} } @proceedings {430, title = {Managing Risk in a Failing IT Project: A Social Constructionist View}, year = {2009}, address = {Chicago, USA}, author = {Lim, W.K. and Sia, S.K. and Yeow, A.} } @article {vries2009measuringgeoinformation, title = {Measuring the Unmeasured-The Value of Geo-Information}, journal = {International Journal of Spatial Data Infrastructures Research}, year = {2009}, author = {Vries, WTD and Miscione, G} } @article {793, title = {A Methodology for Electronic Business Initiatives Implementation in SME}, volume = {301/2009}, year = {2009}, pages = {150 - 157}, publisher = {Springer}, chapter = {11}, abstract = {The World Wide Web technology, supported on Internet, is transforming all business activities into information-based activities. As a result, one can see a radical change in the traditional theoretical models and organisation. The small and medium enterprises (SME) are the type of enterprises that can reap more advantages with the usage of Internet for electronic business. We found that current methodologies present gaps which make them inadequate and unable to help the small and medium enterprises define an effective strategy and follow an plausible implementation path. This being so, we propose a methodology to support the complete implementation lifecycle of electronic business in small and medium enterprises. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_11}, author = {Mamede, Henrique and Amaral, Lu{\'\i}s} } @article {944, title = {A note on the effect of term weighting on selecting intrinsic dimensionality of data}, journal = {Cybernetics and Information Technologies}, volume = {9}, number = {1}, year = {2009}, pages = {5-12}, publisher = {Institute of Information Technologies - BAS}, issn = {1311-9702}, author = {Kumar, Ch. Aswani and Srinivas, S.} } @inbook {440, title = {Object lessons and invisible technologies}, booktitle = {Bricolage, Care and Information Systems}, year = {2009}, pages = {Forthcoming}, publisher = {Palgrave}, organization = {Palgrave}, address = {Basingstoke}, author = {Edgar A. Whitley and Mary L Darking}, editor = {Chrisanthi Avgerou and Willcocks, Leslie and Giovan Francesc Lanzara} } @article {588, title = {Open Access Publishing to Nurture the Sprouts of Knowledge and the Future of Information Systems Research}, journal = {Communications of the Association for Information Systems}, volume = {24}, year = {2009}, pages = {509-522}, keywords = {academic journals, ePrints, mass collaboration, online repositories, Open Access, scholarly publishing, Sprouts, working papers}, url = {http://aisel.aisnet.org/cais/vol24/iss1/30/}, author = {Majchrzak, Ann and Avital, M and Lyytinen, K and Bj{\"o}rk, B-C and Boland, R and Kevin Crowston} } @booklet {miscione2009openeconomics, title = {Open Source Development and Innovation (London School of Economics)}, year = {2009}, month = {Apr}, author = {Miscione, G} } @booklet {sun2009panelproduction, title = {Panel: Regulation and governance in commons-based peer (social) production}, year = {2009}, author = {Sun, V and Aanestad, M and Skorve, E and Miscione, G} } @inbook {439, title = {Perceptions of government technology, surveillance and privacy: the UK identity cards scheme}, booktitle = {New Directions in Privacy and Surveillance}, year = {2009}, pages = {133-156}, publisher = {Willan}, organization = {Willan}, address = {Cullompton}, isbn = {978-1-84392-363-3}, url = {Willan2009.pdf}, author = {Edgar A. Whitley}, editor = {Daniel Neyland and Benjamin Goold} } @article {942, title = {On the Performance of Latent Semantic Indexing based Information Retrieval}, journal = {Journal of Computing and Information Technology}, volume = {17}, number = {3}, year = {2009}, pages = {259-264}, publisher = {University Computing Centre, University of Zagreb.}, issn = {1330-1136}, doi = {http://10.2498/cit.1001268}, author = {Kumar, Ch. Aswani and Srinivas, S.} } @conference {kolte2009aindia, title = {A Proposal for studying Decision-making and Spatial Data Infrastructures in the Public Sector in India}, year = {2009}, author = {Kolte, P and Boerboom, L and Miscione, G and Georgiadou, Y} } @book {899, title = {Qualitative Research in Business \& Management}, year = {2009}, publisher = {Sage Publications}, organization = {Sage Publications}, address = {London}, abstract = {Description: What are the key issues that concern Qualitative Research in Business and Management? In this advanced textbook, the author brings a wealth of insight to the research process. Combining the abstract and theoretical considerations with those of a practical nature, like those involved with interviewing for data, or for the final stage of writing up, Myers establishes an expansive resource for those involved in qualitative research that will aid them from start to finish. In this book the reader will be provided with the resources to:- Understand the underlying philosophies of qualitative research in business and management.- Be aware of a variety of qualitative research methods- Gain insight into examples of the previous use of qualitative methods in Business and Management.- Analyse and critically evaluate research in, including discussion of using qualitative data analysis software.- Carry out their own research in business and management.- Write up their research for publication.This book will be an indispensable resource both to those just embarking on their research as well as existing researchers in business and management. }, isbn = {Paperback ISBN: 9781412921664Hardcover ISBN: 9781412921657}, author = {Myers, Michael David} } @inbook {880, title = {Qualitative Research in Information Systems: Current Status and Future Trends}, booktitle = {Information Systems Research: Issues and Latest Development}, year = {2009}, pages = {3-19}, publisher = {Tsinghua University Press}, organization = {Tsinghua University Press}, address = {Beijing}, author = {Myers, Michael}, editor = {Huang, Wayne Wei and Wang, Kanliang} } @article {805, title = {Services Supporting Knowledge Maturing in Small and Medium-Sized Enterprises}, volume = {301/2009}, year = {2009}, pages = {224 - 238}, publisher = {Springer}, chapter = {16}, abstract = {The hype around Web 2.0 has again sparked tremendous interest in IT-supported knowledge management and technology-enhanced learning in organizations. Although there has been abundant evidence of how to benefit from Web 2.0 technologies, information on how to go about deploying these in small and medium-sized enterprises in a coordinated manner are scarce. Based on the findings of an empirical study and an ethnographically informed study on knowledge maturing, this paper suggests a set of knowledge services to support a series of knowledge actions chained with the help of the knowledge maturing model. This set of services can be used by small and medium-sized enterprises for analyzing IT tools and systems which currently support their employees{\textquoteright} knowledge maturing activities, to foster knowledge cooperation with customers, suppliers and partners in their business environment and to find gaps which can be filled particularly by consuming services over the Web. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_16}, author = {Maier, Ronald} } @article {miscione2009shifting, title = {Shifting Ground for Health Information Systems: Local Embeddedness, Global Fields, and Legitimation}, journal = {International Journal of Sociotechnology and Knowledge Development (IJSKD)}, volume = {1}, number = {4}, year = {2009}, pages = {1{\textendash}12}, publisher = {IGI Global}, author = {Miscione, Gianluca and Staring, Knut} } @article {miscione2009shiftinglegitimation, title = {Shifting ground for health information systems: Local Embeddedness, Global Fields, and Legitimation}, journal = {International Journal of Sociotechnology and Knowledge Development}, volume = {1}, number = {4}, year = {2009}, month = {Oct}, pages = {1{\textendash}12}, abstract = {This article addresses the institutional scaling of information systems through the interplay of globally distributed free and open source software development with organizational processes. Through examining various phases of a long term project to implement information systems for the public health care sector in resource-poor countries, we highlight changing sources of acceptance and legitimation. The analysis centers on the balance between local and global levels, from pilot sites, through an emerging broader organizational field, to increasingly involving national level institutional settings. In parallel to the established view of the scaling of ICT implementations as relating to complexity and risk in the form of unintended side-effects of the growth of a system, the authors highlight the qualitative switch between regulatory contexts. Shifting relations to local institutions means that scalability requires actors to interact with quite different organizational cultures, accountabilities and communicative practices. Copyright {\textcopyright} 2009, IGI Global.}, issn = {1941-6253}, doi = {10.4018/jskd.2009062601}, author = {Miscione, G and Staring, K} } @article {806, title = {SME 2.0: Roadmap towards Web 2.0-Based Open Innovation in SME-Networks {\textendash} A Case Study Based Research Framework}, volume = {301/2009}, year = {2009}, pages = {28 - 41}, publisher = {Springer}, chapter = {3}, abstract = {Small- and medium sized enterprises (SMEs) are of high social and economic importance since they represent 99\% of European enterprises. With regard to their restricted resources, SMEs are facing a limited capacity for innovation to compete with new challenges in a complex and dynamic competitive environment. Given this context, SMEs need to increasingly cooperate to generate innovations on an extended resource base. Our research project focuses on the aspect of open innovation in SME-networks enabled by Web 2.0 applications and referring to innovative solutions of non-competitive daily life problems. Examples are industrial safety, work-life balance issues or pollution control. The project raises the question whether the use of Web 2.0 applications can foster the exchange of creativity and innovative ideas within a network of SMEs and hence catalyze new forms of innovation processes among its participants. Using Web 2.0 applications within SMEs implies consequently breaking down innovation processes to employees{\textquoteright} level and thus systematically opening up a heterogeneous and broader knowledge base to idea generation. In this paper we address first steps on a roadmap towards Web 2.0-based open innovation processes within SME-networks. It presents a general framework for interaction activities leading to open innovation and recommends a regional marketplace as a viable, trust-building driver for further collaborative activities. These findings are based on field research within a specific SME-network in Rhineland-Palatinate Germany, the {\textquotedblleft}WirtschaftsForum Neuwied e.V.{\textquotedblright}, which consists of roughly 100 heterogeneous SMEs employing about 8,000 workers. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_3}, author = {Lindermann, Nadine and Valc{\'a}rcel, Sylvia and Schaarschmidt, Mario and von Kortzfleisch, Harald} } @article {807, title = {SMEs, IT, and the Third Space: Colonization and Creativity in the Theatre Industry}, volume = {301/2009}, year = {2009}, pages = {10 - 27}, publisher = {Springer}, chapter = {2}, abstract = {We examine how small and medium-sized, professional, nonprofit performing arts theatres in the US can improve the strategic use of information technology (IT), as well as other aspects of theatre management for large, commercial theatre productions in the West End of London and on Broadway in New York City. In this article we use the epistemology of the third space developed by Bhabha (1994) and extended by Frenkel (2008). Although both authors were discussing knowledge transfer, we use their conceptualizations to characterize and explore more deeply the transfer process of culture (and thereby useful practices and worthwhile lessons) from small and medium-sized professional, nonprofit theaters to large-scale commercial theatres. We include a discussion of Nonaka{\textquoteright}s (1991) concept of ba, and how it relates to the third space. We specifically employ the metaphor of the third space developed by Bhabha (1994) to critique and understand the verbal and nonverbal cultural transmissions between small and large theatres. One of our contributions is to use the conceptualization and metaphor of the third space to understand the complex exchanges and relationships between small to medium-sized nonprofit professional theatres and large commercial theatres, and to identify what large commercial productions can learn from nonprofit theatres from these exchanges. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_2}, author = {Julie Kendall and Kenneth Kendall} } @article {810, title = {Towards a Model of Technology Adoption: A Conceptual Model Proposition}, volume = {301/2009}, year = {2009}, pages = {287 - 305}, publisher = {Springer}, chapter = {20}, abstract = {A conceptual model for Information Communication Technology (ICT) adoption by Small Medium Enterprises (SMEs) is proposed. The research uses several ICT adoption models as its basis with theoretical underpinning provided by the Diffusion of Innovation theory and the Technology Acceptance Model (TAM). Taking an exploratory research approach the model was investigated amongst 200 SMEs whose core business is ICT. Evidence from this study demonstrates that these SMEs face the same issues as all other industry sectors. This work points out weaknesses in SMEs environments regarding ICT adoption and suggests what they may need to do to increase the success rate of any proposed adoption. The methodology for development of the framework is described and recommendations made for improved Government-led ICT adoption initiatives. Application of the general methodology has resulted in new opportunities to embed the ethos and culture surrounding the issues into the framework of new projects developed as a result of Government intervention. A conceptual model is proposed that may lead to a deeper understanding of the issues under consideration. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_20}, author = {Costello, Pat and Moreton, Rob} } @article {811, title = {Two Paths for Innovation: Parvenu or Pariah}, volume = {301/2009}, year = {2009}, pages = {73 - 92}, publisher = {Springer}, chapter = {6}, abstract = {In recent years the innovator has invariably been seen as an entrepreneur, wedded to a market philosophy that extends beyond any narrow confines of business or commerce, becoming all pervasive. With regard to the public and third sectors, there was some justification for this as a useful corrective to an over-centralized concept of government which almost by definition precluded genuine innovation and enterprise. On the other hand, there was always the concomitant danger that the balance sheet would gradually efface any concerns with issues such as social justice and inequality. Recent state interventions resulting from the credit crunch and general concerns with financial liquidity, have dramatically altered the focus on the relationship and balance between the private, public, and third sectors. This in turn, requires a revised understanding of innovation and entrepreneurship across all sectors of society, as well as highlighting the role played by ICT. }, issn = {978-3-642-02387-3}, doi = {http://dx.doi.org/10.1007/978-3-642-02388-0_6}, author = {Bryant, Antony} } @booklet {371, title = {Virtual Collaboration Readiness Measurement a Case Study in the Automobile Industry}, howpublished = {Advances in Computer Science and Engineering}, year = {2009}, month = {2009///}, pages = {913 - 916}, abstract = {In end of the last century information and communication technology caused a veritable evolution in the world of business and commerce. Globalization has changed all the commerce equations and business plans. Old companies have to change their strategies if they want to survive after this technological revolution. A new form of collaboration between the distributed and networked organizations has emerged as the {\textquotedblleft}Virtual Organization{\textquotedblright} paradigm. A company can not join a virtual organization before obtaining a virtual maturity. This maturity shows the readiness of the company to begin a virtual collaboration. In this paper, based on the coherent and formal definition of virtual organizations, the criteria for measuring the readiness of companies are proposed. Our criteria are confirmed, modified or combined by using the factor analysis method on a sufficient number of virtual companies in the automobile manufacturing industry.}, url = {http://dx.doi.org/10.1007/978-3-540-89985-3_132}, author = {Ziarati, Koorush and Khayami, Raouf and Parvinnia, Elham and Afroozi Milani, Ghazal} } @proceedings {859, title = {What do we like about the IS field?}, year = {2009}, pages = {1-3}, address = {Phoenix, AZ}, url = {http://aisel.aisnet.org/}, author = {John L. King and Michael D. Myers and Suzanne Rivard and Carol Saunders and Ron Weber} } @proceedings {877, title = {What does the best IS research look like? An analysis of the AIS basket of top journals}, year = {2009}, month = {July 10-12}, pages = {61/1-12}, address = {Hyderabad, India}, author = {Liu, Franklin and Michael D. Myers} } @booklet {313, title = {Aligning Goals, Virtuality and Capability: A Virtual Alignment Model}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {11 - 21}, abstract = {Given the many forms that a virtual organization might take, a critical first step in becoming virtual is to understand the form of virtual organization that is desired or envisaged. Once the desired form is defined, it is necessary to find out how close to, or distant from, that form the organization currently is, and to develop a strategy for moving from the current to the envisioned form. But, a strategy will only work if the organization has the capabilities necessary for transformation.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_2}, author = {Jackson, Paul and Klobas, Jane} } @inbook {2008amazonianamazon, title = {Amazonian Medical Accountabilities and Global Development Discourse: a Case of Telemedicine Introduction in the Peruvian Amazon}, booktitle = {Telemedicine: Concepts and Applications}, series = {Telemedicine: Concepts and Applications}, year = {2008}, month = {Jan}, pages = {168{\textendash}195}, publisher = {Institute Of Chartered Financial Analysts Of India University Press}, organization = {Institute Of Chartered Financial Analysts Of India University Press}, address = {Delhi}, isbn = {9788131420898} } @article {757, title = {Analyzing Public Open Source Policy: The Case Study of Venezuela}, year = {2008}, month = {2008}, pages = {249 - 257}, abstract = {This research examines public open source software (OSS) adoption policies using a framework built upon the analysis of information and communication technology (ICT) policies. The legislative and objective framework is used to picture the formal public OSS policies applied in Venezuela. Preliminary results indicate negligence for the inclusion of the private sector in the migration plan. Future research looks for an analysis in situ of the activities carried out in the country, and the validation of the framework. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_17}, author = {Maldonado, Edgar and Tapia, Andrea} } @article {758, title = {Bandwithing Together: Municipalities as Service Providers in a Policy Environment}, year = {2008}, month = {2008}, pages = {229 - 248}, abstract = {In this paper we have highlighted three things. First, that public organizations are engaged in a technologically driven servitization of their traditional service products. Second, that public organizations must approach this servitization differently because of the decision-making role of citizens in the process. Third, it is essential to study the influence citizens have on this process through studying the public policy process around decisions concerning the delivery of technology and technologically driven services. In this paper we provide an overview of four constituencies and their relationships involved in municipal wireless broadband policy. The idea that the growth of information technology-dependent services and activities (education, healthcare, and Web 2.0, for instance) are dependent on wide-scale availability of broadband access, and that local governments are jumping into this market to establish the necessary infrastructures for such services, makes this a very hotly contested space. While national and international political issues are debated on the Internet daily, new avenues for very local, political speech and action on the Internet seem to go hand-in-hand with municipal wireless broadband issues. The creation of public policy, while normally seen as a top-down process, has always drawn varying input from the outside through avenues such as lobbying, town meetings, referendums, and public action. We claim that in the case of municipal wireless broadband policy, policy efforts have been turned upside-down, with the majority of policy making now happens at the local level. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_16}, author = {Tapia, Andrea and Ortiz, Julio} } @article {759, title = {Bazaar by Design: Managing Interfirm Exchanges in an Open Source Service Network}, year = {2008}, month = {2008}, pages = {173 - 188}, abstract = {As in many other sectors, competitive necessities are driving open source software companies to participate in cooperative business networks in order to offer the complete product and service offerings demanded by customers. This paper examines one such emerging business network archetype: an open source service network (OSSN). This type of business network is of particular interest as it not only addresses key challenges vis-{\`a}-vis OSS commercialization, but operates in a manner that overcomes exchange problems among participants by relying primarily on social mechanisms. The paper reveals the manifestation of social mechanisms in OSSNs and how these are used for coordinating and safeguarding exchanges between firms. Specifically, we illustrate the importance of (1) restricted access, (2) assessing the reputation of others, (3) a shared macroculture (goals and norms), and (4) collective sanctions for punishing firms who violate these goals and norms. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_12}, author = {Joseph Feller and Finnegan, Patrick and Brian Fitzgerald and Hayes, Jeremy} } @proceedings {446, title = {A break from the routine: Studying strategising practices at a small e-commerce retailer with Actor-Network theory}, year = {2008}, address = {Amsterdam}, author = {Peter Erdelyi and Edgar A. Whitley} } @article {754, title = {A Case Study Approach to Examining Service Information Requirements}, year = {2008}, month = {2008}, pages = {383 - 385}, abstract = {In this paper, we propose a case study approach to examine and assess the information required to underpin services for particular industrial service offerings. The focus of this paper is on the means by which service information requirements may be extracted and understood, as opposed to on how service information requirements are subsequently used. The termservice information requirements refers to a set of information needed to support the delivery of a service to a customer. The area of service information requirements is a new, and a less researched, area compared with product information requirements. Service is important for both product and service delivering organizations as companies move toward the provision of integrated solutions. Within manufacturing, one of the most significant trends is toward servitization, in particular for high-value, complex goods, where the focus of the product and service providers is on the associated service delivered. Informationis important in service as a means of enhancing decisions. The information has no direct value, but the impact of improved information quality can reduce costs or enhance service decisions. In the context of product servicing, the information can provide details about the condition and usage of the product. In a service delivery context, information provides the specification of the customer to enable service delivery decisions to be made. This research proposes a process of obtaining service information requirements in order to determine the needs of the customer and to determine the information required for the supplier to deliver this service to the customer. To achieve this approach, we propose a service information model (see Figure 1). The first stage of this approach is to identify the specification process or the information needed to translate the customer need into requirements in the form of a performance-based contract. Having gained an understanding of the requirements of the service, the actual process for the delivery of the service is mapped to identify the information needed to deliver the service. The evaluation stage determines the information needed to assess the service provided against that specified, and the means by which the measurements of service delivery are achieved. Analysis of the approach should assess the role of information and its impact on the performance of the service delivery process as well as an understanding of the consequences of a variation in information quality throughout the requirements, delivery, and evaluation processes. From this analysis, two questions need to be answered. (1)\  What is the impact of the information on the service performance? (2)\  What is the current quality of the information? The proposed approach to service information requirements collection, detailed in the paper, will test the effectiveness in determining the information requirements for service provision. This will be achieved through a series of cross-sector case studies. A further extension to this could assess the industry status of information requirements. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_34}, author = {Cuthbert, Rachel and Pennesi, Paris and McFarlane, Duncan} } @booklet {353, title = {The Challenge of Becoming Virtual}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {35 - 52}, abstract = {On a cold and damp late autumn afternoon, Peter Fischer looked out from his sixth floor window to the city a few kilometers to the south. He was thinking about what he had just heard. A research group had just presented him with their preliminary observations on the preparedness of his organization to deal with the challenges of working as a virtual organization. Two months earlier, Fischer had shared his vision of the organization as a {\textquotedblleft}Global Network Organization (GNO){\textquotedblright} with his staff: There will be an increase in the dispersal and distribution of all permanent, contract and retainer staff. In this environment, a coherent and consistent view of the organization will be maintained, manifested in shared methods, values and work practices. This way of working will be facilitated by information and communications tools, such as the Internet, VOIP1 and intranets. New forms of workflow and management will evolve to meet new needs, and the organization will continue to be an attractive place to work and participate. Virtualization needs to be cost effective, and might even be a new form of service offering to clients.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_4}, author = {Klobas, Jane and Renzi, Stefano} } @booklet {354, title = {The Challenge of Becoming Virtual, Part 2}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {171 - 179}, abstract = {On a sunny afternoon in June 2006, the research team looked out to the city that Peter Fischer had looked out on 18 months before. They had come to present the results of their research to Unit 2, but the mood did not match the weather. There was despondency in the air, staff stayed mostly in their offices rather than wandering out to discuss the results displayed on posters near the coffee room, and the researchers learnt that business had not picked up as hoped. No-one knew it at the time, but the Unit would largely disappear six months later in a major corporate reorganization.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_11}, author = {Klobas, Jane} } @inbook {928, title = {Challenges of Consumer Information Systems Development: The Case of Interactive Television Services}, booktitle = {Advances in Information Systems Research, Education and Practice}, series = {IFIP 20th World Congress , TC8, Information Systems, September 7-10, 2008, Milan, Italy}, year = {2008}, pages = {89-100}, publisher = {Springer}, organization = {Springer}, address = {New York}, author = {Tuunanen, Tuure and Michael D. Myers and Cassab, Harold}, editor = {Avison, David and Kasper, George M and Pernici, Barbara and Ramos, Isabel and Dewald Roode} } @article {761, title = {Compliance-as-a-Service in Information Technology Manufacturing Organizations: An Exploratory Case Study}, year = {2008}, month = {2008}, pages = {43 - 59}, abstract = {In recent years, environmental concerns have led to a significant increase in the number and scope of compliance imperatives across all global regulatory environments. The complexity and geographical diversity of these environments has caused considerable problems for organizations, particularly those in high-technology industries. This paper first employs institutional theory to help understand the challenges for information technology manufacturing organizations that emanate from global institutional environments. While cultural{\textemdash}cognitive and normative influences from society-at-large and industry-based bodies have stimulated environment-oriented corporate social responsibility initiatives, it is undoubtedly regulatory influences that have generated the deepest responses in terms of the adoption of new compliance-oriented procedures and protocols. This paper first describes the general response from the organizational field in which high-technology firms operate and notes the extent of the response, with environmental compliance management systems being one of the institutional arrangements that organizations have adopted. The findings of empirical research based on Compliance \& Risks Ltd.{\textquoteright}s compliance-to-product application and its deployment in Napa Inc., a Silicon Valley-based Fortune 500 company, are then offered and analyzed to illustrate the scale and scope of information systems support required to institute adequate compliance-oriented protocols and procedures in response to global regulatory influences, while also answering concerns raised by normative and cultural{\textemdash}cognitive sources. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_4}, author = {Butler, Tom and Emerson, Bill and McGovern, Damien} } @article {762, title = {Complicating Utopian and Dystopian Views of Automation: An Investigation of the Work and Knowledge Involved in the Call Center Offshoring Industry in India}, year = {2008}, month = {2008}, pages = {331 - 339}, abstract = {Offshoring is motivated by the relocation and standardization of organizational services to remote locations{\textemdash}typically the so-called developing nations{\textemdash}in order to achieve substantial cost efficiencies. Standardized business practices, aided by information technologies, are assumed to mobilize and recover the service practices in these new contexts. In this paper, we examine the boundary objects and boundary work involved in call center work. Data from several interviews with managers, industry consultants, and agents in the call center industry reveal that the recovery of call center practices in India involves substantial managerial and employee work, in order to manage and stitch together the diverse cultural and practical interests of the various groups. As a result, beneath the automated and simplified appearance of call center work is an underlying complexity of boundary work and boundary objects involved in linking the various participants{\textemdash}both human and nonhuman{\textemdash}into a temporarily stable industry. The result is a complication to both utopian and dystopian views of call center work. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_24}, author = {Devadoss, Paul and Chiasson, Mike} } @article {778, title = {The Computerization of Service: Evidence of Information and Communication Technologies in Real Estate}, year = {2008}, month = {2008}, pages = {199 - 209}, abstract = {We explore the overlap between service and computerization using macro-level industrial data on the U.S. real estate market and five comparison industries (hospitals, financial services, legal services, machinery manufacturing, and fabricated metals). The macro-level data comes from the U.S. Bureau of Economic Analysis and the U.S. Census Bureau and we use it to develop insights on computerization and service relative to contributions to the U.S. gross domestic product. This analysis shows that while information and communication technology investments in real estate lagged comparison industries from 1969 to 1997, since then ICT investments in real estate have increased rapidly. At the same time, there has been a growth in the number workers even as the industry{\textquoteright}s contribution to GDP has grown. We identify two implications of these findings. First, ICTs are not being used are not as a substitute for labor. Second, the rapid growth in ICT investments has been absorbed into real estate quickly and well. Still, computerization in real estate continues, suggesting that process studies and more micro-analyses are critical next steps. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_14}, author = {Steve Sawyer and Yi, Fuyu} } @proceedings {922, title = {A Conceptual Framework of an Adaptive and Innovative Recommender Generating Online Learning System}, year = {2008}, month = {November 22-25}, pages = {11011-11016}, address = {Baltimore, Maryland}, abstract = {Most Online Learning Systems lack multi-stakeholder focus and their design complexity requires vast resources and varied skills. A conceptual framework based on decision support and recommender systems models within a moderate-constructivist educational environment is presented to address the above issues and to deliver an innovative pedagogy while generating educational intelligence.}, keywords = {Decision Support Systems, Recommender Systems, Online Learning Systems, Intelligent Tutoring Systems, and Knowledge Management}, url = {http://www.decisionsciences.org/Proceedings/DSI2008/index.html}, author = {Peiris, K. Dharini Amitha and Sheridan, Donald P and Gallupe, R. Brent and Michael D. Myers} } @article {760, title = {Co-Orienting the Object: An Activity-Theoretical Analysis of the UK{\textquoteright}s National Program for Information Technology}, year = {2008}, month = {2008}, pages = {259 - 270}, abstract = {This paper contributes to research on the success and failure of information and communication technologies (ICT) by focusing on the learning processes associated with the development of new ICT projects and the way they challenge and extend familiar organizational limits. Drawing on recent developments in activity theory, we provide an analysis of oral and written evidence taken before a House of Commons Committee in relation to the UK{\textquoteright}s National Program for IT (NPfIT). Our preliminary findings point to the ways in which new objects of activity such as the NPfIT can emerge from the meeting of contrasting forms of discursive activity, as well as how new policy insights can be translated into new organizational practices. We conclude with some implications for further research. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_18}, author = {Constantinides, Panos and Blackler, Frank} } @article {2008crossout, title = {Cross Countries Health Information Infrastructure: Sorting Things Out?}, journal = {Applicazioni Informatiche e Telematiche in Medicina}, volume = {8}, number = {1}, year = {2008}, month = {Jan} } @article {532, title = {Departmental influences on policy design: How the UK is confusing identity fraud with other policy agendas}, journal = {Communications of the ACM}, volume = {51}, number = {5}, year = {2008}, pages = {98-100}, isbn = {0001-0782}, url = {CACM2008.pdf}, author = {Edgar A. Whitley and Ian R Hosein} } @conference {richter2008designdevelopment, title = {Design of an unbounded ethnography of spatial information infrastructure development}, year = {2008}, author = {Richter, C and Miscione, G and Pfeffer, K and Georgiadou, Y} } @article {533, title = {Doing the politics of technological decision making: Due process and the debate about identity cards in the UK}, journal = {European Journal of Information Systems}, volume = {17}, number = {6}, year = {2008}, pages = {668-677}, isbn = {0960-085X}, url = {EJIS2008DueProcess.pdf}, author = {Edgar A. Whitley and Ian R Hosein} } @article {763, title = {E-Government and Changes in the Public Sector: The Case of Greece}, year = {2008}, month = {2008}, pages = {213 - 227}, abstract = {During the past few decades, many governments around the globe have orchestrated e-government projects in order to improve the way they operate and provide public services to citizens. Apart from the opportunities they open up, e-government projects bring about changes in the well-established practices of the public sector. This paper illustrates some of these changes by exploring a Greek e-government initiative. As the case illustrates, e-government requires an output orientation and business-like behavior from officials, enables constant electronic control, and leads to the standardization of official{\textquoteright}s knowledge. Drawing upon these changes, we propose a framework of the transformations that e-government brings about in the work roles, nature of work, forms of knowledge, modes of control, and source of accountability of officials. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_15}, author = {Petrakaki, Dimitra} } @article {764, title = {eHealth: Redefining Health Care in the Light of Technology}, year = {2008}, month = {2008}, pages = {357 - 362}, abstract = {Information and communication technology is now the major enabler for healthcare organizations on many levels{\textemdash} national, regional and local{\textemdash}hoping to achieve structural and cultural change in healthcare provision; for example, the UK{\textquoteright}s NPfIT (National Program for IT) and the National Health Information Initiative in the United States. Final NPfIT costs are variously estimated from {\textsterling}12billion to {\textsterling}31 billion. Major initiatives are also underway in other developed as well as developing economies to address healthcare issues with eHealth technologies. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_28}, author = {Chiasson, Mike and Flynn, Donal and Bonnie Kaplan and Lehoux, Pascale and LeRouge, Cynthia} } @article {765, title = {Emerging Technologies in the Service Sector: An Early Exploration of Item-Level RFID on the Fashion Sales Floor}, year = {2008}, month = {2008}, pages = {189 - 198}, abstract = {This paper describes the early weeks of a live pilot of item-level RFID by METRO Group{\textquoteright}s German department store, Kaufhof. The RFID-Enabled Sales Floor utilizes UHF Gen2 RFID tags on fashion items, combined with RFID-enabled dressing rooms, intelligent displays, and smart mirrors. The pilot represents a pioneering attempt to conduct end-to-end UHF item-level tracking of items through the point-of-sale. Based on an exploratory case study, we reflect on the implications of ubiquitous item-level RFID technology and offer suggestions for further research on the socio-technical implications of this important product and process innovation. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_13}, author = {Claudia Loebbecke and Huyskens, Claudio and Gogan, Janis} } @booklet {330, title = {Envisioning and Monitoring the Process of Becoming Virtual}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {23 - 34}, abstract = {In Chap. 1, we introduced the virtual alignment model and described its three elements: goals, status, and capability, and how they work together. In this chapter, we examine how an organization might establish a vision, identify indicators to monitor status and progress toward the vision, and measure progress and capability.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_3}, author = {Jackson, Paul and Klobas, Jane} } @article {756, title = {An Epistemology of Organizational Emergence: The Tripartite Domains of Organizational Discourse and the Servitization of IBM}, year = {2008}, month = {2008}, pages = {367 - 370}, abstract = {This paper draws from 21 years of discourse to examine a narrative about IBM{\textquoteright}s transition to a service-oriented company. Covering three leadership eras during a period of sweeping change for IBM and the information technology industry, this discourse, found in the IBM Corporation{\textquoteright}s annual reports, in illustrates the emergence of policy, technology, and business models in one of the largest and most influential IT companies in the world. Our purpose in drawing from these texts is twofold: (1) to provide a more thorough discussion of the notion of {\textquotedblleft}emergence{\textquotedblright} in IT organizational settings, and (2) to introduce a fuller process model of how emergence is manifest in organizational discourse than is currently present. In much of the information systems literature, the term emergence has been informally used in describing organizational contexts and the process of IS development (Markus and Robey 1988; Orlikowski 1996; Pfeffer and Leblebici, 1977). In three papers, Truex and his colleagues formally describe and situate a theory of emergence in the discourse on ISD methods (Truex and Baskerville 1998, Truex, Baskerville, and Klein 1999; Truex, Baskerville, and Travis 2000). They liken ISD to {\textquotedblleft}emergent grammars{\textquotedblright} in a linguistic system. However, they stop short of developing a full epistemology of the notion and provide little more than analogical and descriptive examples grounded in linguist Paul Hopper{\textquoteright}s (1987, 1988) emergent grammar hypothesis. The incomplete development of the epistemology and an ontology of the emergence construct has proven problematic for scholars attempting to apply emergence theory in practice (Bello et al. 2002). While researchers or practitioners might find the idea of emergent organizations inviting, without descriptive and explanatory models, the concept is difficult to use in the practice or study of information systems. Accordingly, this paper seeks to contribute to the development of a theory of emergence. We draw from the organizational communication and organizational discourse literature. In a subset of this community, scholars have advanced theories on the nature of organization as a discursive construction. For them, discourse is the very foundation on which {\textquotedblleft}organization{\textquotedblright} is built (Fairhurst and Putnam 2004; Heracleous 2006; Heracleous and Barrett 2001; Taylor and Robichaud 2004; Taylor and Van Every 2000). Using this meta-theoretical framework, we explore how emergence arises through an examination of IBM{\textquoteright}s annual reports and industry-level discourses, which were, in turn, influenced in part by the IBM declarations and subsequent behavioral changes. We introduce a new process model of organizational emergence by extending and addressing shortcomings in a set of current perspectives in the literature. The tripartite domain model identifies three domains{\textemdash}context, task, and negotiation-at-hand{\textemdash}as integral components of any concrete occurrence of discourse. To test its efficacy, we apply the tripartite domain model post hoc to a longitudinal set of IBM Corporation data. The tripartite domain model provides a lens to examine the servitization of IBM and, in the process, illustrates the emergent discourse on the notion of {\textquotedblleft}service{\textquotedblright} and on the evolution of the meaning of {\textquotedblleft}customer{\textquotedblright} in the IBM dataset. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_30}, author = {Carter, Michelle and Takeda, Hirotoshi and Truex, Duane} } @inbook {morawczynski2008examining, title = {Examining trust in mobile banking transactions: The case of M-PESA in Kenya}, booktitle = {IFIP International Conference on Human Choice and Computers}, year = {2008}, pages = {287{\textendash}298}, publisher = {Springer, Boston, MA}, organization = {Springer, Boston, MA}, author = {Morawczynski, Olga and Miscione, Gianluca} } @inbook {morawczynski2008examiningkenya, title = {Examining trust in mobile banking transactions: The case of M-PESA in Kenya}, volume = {282}, year = {2008}, month = {Sep}, pages = {287{\textendash}298}, abstract = {This chapter examines how trust can emerge and be sustained in the context of mobile transactions. It focuses on M-PESA, a mobile banking system in Kenya, using data from an ethnographic study that was deployed in Kibera - one of Africa{\textquoteright}s largest slums. We present research in progress and discuss two main findings. Firstly, interpersonal trust relations between the customers and agents are weak. Customers do not trust the agents with their money. Secondly, the institutional trust relations between the customer and Safaricom, the mobile service provider offering M-PESA, are strong. This means that customers use the M-PESA service because they believe that their money will be kept safe by Safaricom. After providing empirical evidence to substantiate these claims, this study concludes by suggesting questions for future research. {\textcopyright} 2008 International Federation for Information Processing.}, isbn = {9780387848211}, issn = {1571-5736}, doi = {10.1007/978-0-387-84822-8_19}, author = {Morawczynski, O and Miscione, G} } @article {766, title = {Exploring the Diversity of Service Worlds in the Service Economy}, year = {2008}, month = {2008}, pages = {1 - 10}, abstract = {The transformation of modern economies into predominantly service-based economies is happening on a global scale. While services are not new, the scale and complexity of globally dispersed services are growing rapidly. These transformations are enabled by{\textemdash}and often dependent on{\textemdash}information technologies and are fueled by processes of globalization. Transformational change provides opportunities for innovation in business models, collaborations, and work practices but also presents challenges to established practices within industries and organizations. The aims of the IFIP Working Group 8.2 Conference on IT in the Service Economy were to better understand the possibilities and challenges of these transformations and to examine key implications for organizations, their employees, and IT professionals in the 21st century service economy. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_1}, author = {Michael Barrett and Elizabeth Davidson} } @article {767, title = {Exploring the Influence of Socio-Emotional Factors on Knowledge Management Practices: A Case Study}, year = {2008}, month = {2008}, pages = {27 - 41}, abstract = {The objective of this empirical study is to explore the influence of socio-emotional factors, with a focus on shyness, on knowledge management practices in a Thai organization. The research adopts an interpretive stance and employs a case study approach involving multiple data collection methods. The paper is based on one author{\textquoteright}s personal expertise and close involvement, for over a decade, in the selected case study organization for over a decade. Using a grounded theory research approach, the study indicates that while shyness is overall perceived as a positive Thai cultural feature, it critically influences (1) the social network ties and relationship between employees within and across teams, (2) the resulting level of trust, including with management and senior staff, and (3) the ability to share and create knowledge effectively in the organizational socio-cultural environment. The study is limited to a Thai organization, but can be generalized to other organizations that exhibit similar characteristics. This empirical study provides a foundation to further the research and the validation of the summary of themes that emerged from this empirical study. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_3}, author = {Vorakulpipat, Chalee and Rezgui, Yacine} } @conference {miscione2008federative, title = {A federative view for information infrastructures in developing contexts}, booktitle = {Proceedings of the 10th international conference on social implications of computers in developing countries: assessing the contribution of ICT to development goals}, year = {2008}, author = {Miscione, Gianluca and Staring, K and Georgiadou, PYA} } @booklet {355, title = {The Forensics of a Challenged Initiative}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {197 - 213}, abstract = {In this chapter, we analyze Unit 2{\textquoteright}s virtualization initiative, drawing on information gathered throughout the research study and from the perspective of all the points of view that our research team brought together. We begin with the overview of the initiative that we sent to Louise Kjaer at the end of the study. The rest of the chapter describes the method and results of a workshop in which the research team sought to explain the observations described in the overview.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_13}, author = {Jackson, Paul and Klobas, Jane and Bernini, Gaela and Jensen, Ivan and Renzi, Stefano} } @inbook {miscione2008freeproperties, title = {Free and Open Source Software in low-income countries: Emergent properties?}, volume = {282}, year = {2008}, month = {Sep}, pages = {351{\textendash}355}, abstract = {Free and Open Source Software (FOSS) is becoming an increasingly important element in strategies for development and implementation of information and communication technologies (ICT) in low-income countries (LICs). Such initiatives often have strong public sector orientation, as government ICT policies are expected to shape and support further socio-economical development. The usual mismatch between bureaucracies and trajectories of development initiatives (mostly run by international agencies) provides a promising field for empirical research. {\textcopyright} 2008 International Federation for Information Processing.}, isbn = {9780387848211}, issn = {1571-5736}, doi = {10.1007/978-0-387-84822-8_24}, author = {Miscione, G and Gordon, D and Johnston, K} } @article {948, title = {Fuzzy based approach for capturing user perception in information retrieval}, year = {2008}, pages = {39-47}, publisher = {L.M. Patnaik and Venugopal (EDs.), IK Publishers, India .}, author = {Ch. Aswani Kumar, R. Agarwal, S. Bhattacharya, B. Dinakaran} } @article {950, title = {Fuzzy based approach for capturing user perception in information retrieval}, year = {2008}, pages = {39-47}, publisher = {L.M. Patnaik and Venugopal (EDs.), IK Publishers, India .}, author = {Ch. Aswani Kumar, R. Agarwal, S. Bhattacharya, B. Dinakaran} } @article {499, title = {Governing Diversity in the Digital Ecosystem}, journal = {Communications of the ACM}, volume = {51}, number = {10}, year = {2008}, pages = {137-140}, isbn = {0001-0782}, author = {Mary L Darking and Edgar A. Whitley and Dini, Paolo} } @article {768, title = {How Information Systems Providers Develop and Manage Expertise and Leverage Their Client Relationships for Competitive Advantage}, year = {2008}, month = {2008}, pages = {311 - 319}, abstract = {Information technology vendors are continuously growing into global service providers. To reap the benefits of the changing global economy and gain a competitive advantage, providers need to see their client relationships as strategic assets and leverage them for expertise development and knowledge integration. How do IS service providers absorb knowledge from client relationships over multiple projects at multiple levels? How do IS service providers transfer and disseminate knowledge internally at and across multiple levels and integrate it to generate value-creating competencies? These questions are investigated in a longitudinal qualitative study employing interpretive case-study methods. The case included in the analysis is a 4-year IS outsourcing project between a large European bank and one of the largest Asian service providers. Services were delivered through a global virtual team, including offshore and onshore locations, and a particular strategy was employed to transfer knowledge cross-functionally, integrate this knowledge internally within the organization, and utilize it effectively in the global service delivery system. However, our initial analysis of the first interviews reveals that there was a discrepancy between the expected and actual performance of the service provider. Accordingly, the knowledge transfer and management processes need to be analyzed in more detail. With this research study, we aim at contributing to the domain of IS offshore outsourcing and services science as well as to the theory on vendor capabilities and knowledge management. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_22}, author = {Gregory, Robert and Prifling, Michael} } @article {530, title = {How international postgraduate students tackle writing assignments: An empirical study}, journal = {International journal of applied linguistics}, volume = {156}, number = {1}, year = {2008}, pages = {329-330}, isbn = {0019-0810}, url = {http://dx.doi.org/10.2143/ITL.156.0.2034443}, author = {Edgar A. Whitley and Alexander Grous} } @article {769, title = {ICTs and Global Working in a Non-Flat World}, year = {2008}, month = {2008}, pages = {13 - 25}, abstract = {This paper rejects the hypothesis of Thomas Friedman that ICT-enabled globalization is driving us toward a flat world. Instead, it is argued that the world remains uneven, full of seams, culturally heterogeneous, locally specific, inequitable, not well-integrated and constantly changing. This argument is supported by an analysis of three areas of ICT-enabled global working, namely global software outsourcing, global IS roll-out, and global virtual teams. The paper then builds on these analyses to put forward an agenda for future IS research on ICTs and global working based on three research themes: identity and cross-cultural working; globalization, localization and standardization; and power, knowledge, and control. The paper concludes that the area of ICTs and global working offers the IS field a major research opportunity to make a significant contribution to our understanding of a set of crucial issues in our more globalized world. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_2}, author = {Geoff Walsham} } @article {779, title = {The Influence of Subgroup Dynamics on Knowledge Coordination in Distributed Software Development Teams: A Transactive Memory System and Group Faultline Perspective}, year = {2008}, month = {2008}, pages = {103 - 116}, abstract = {With the globalization of the software industry, distributed software teams (DSTs) have become increasingly common. Among the various social aspects that are essential to the success of distributed software projects, the focus of this research is the impact of inter-subgroup dynamics on knowledge coordination. To address this research question, we extend and apply theory from two primary sources: transactive memory systems theory and the faultline model. We describe afield survey study that is in progress. The findings from this study will inform managers on how DSTs develop capabilities to perform successfully across temporal, geographic and cultural boundaries. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_7}, author = {Shen, Yide and Michael Gallivan} } @article {780, title = {The Information Services View}, year = {2008}, month = {2008}, pages = {365 - 366}, abstract = {The information services view engenders a conceptual shift from the provision of defined and predetermined services to an environment that enables users to select and integrate information services in the ongoing creation and recreation of unique information systems. The information services view (ISV) conceptualizes technology as an ensemble of facilities that perform an action or function on the users{\textquoteright} behalf. The vision of ISV is the realization of user-enabled, real-time production of ad hoc information systems. The ISV specifies that users of services are intelligent actors who are able to compute seamlessly across contexts and recognizes that services developers may not know how their services are going to be used but instead develop a reflective environment where users{\textquoteright} thinking and redesign is supported. The ISV represents a dramatic shift in design from provision of a fixed, externally controlled service set to design of {\textquotedblleft}a space of potential for human concern and action{\textquotedblright} (Winograd and Flores 1986, p. 37). The ISV is a supplementary view of technology (Orlikowski and Iacono 2001) which focuses on the realization of flexible service development that engages users as secondary developers for which the technology bar was previously unacceptably high. Although new configurations for information systems can result from versioning or specific design changes, the evolutionary trajectory and evolving nature of systems is commonly the result of user-initiated mutability (Gregor and Jones 2007) or tailoring (Germonprez et al. 2007). The ISV embraces processes by which developers/providers expose information and allow user-initiated selection and configuration of services that fit {\textquotedblleft}the idea of the arising of something from out of itself, or emergent properties, and behavior{\textquotedblright} (Gregor and Jones 2007, p. 326). The ISV distinguishes between the initial design and the ways of doing design and requires that attention be paid to the different experiences, perceptions, intentions, and goals that the user will use to recreate the design of the information system. It also aims to create a phenomenological potentital for action in which the user tailors the information system and develops uses in new contexts or for new tasks (Germonprez et al. 2007). The ISV moves away from a dominant approach in systems design to over-engineer the information technology artifact through a restricted set of data structures, interfaces, and reporting systems, so that a limited range of work practices are allowed. By standardizing information gathering and presentation, many approaches produce and reproduce error by restricting the ability of users to reflexively and skillfully adjust their practices and computing systems to support changing goals, use patterns, and tasks. The ISV requires the support of classes of tasks, use patterns, recognizable conventions and components, and metaphors that the end user reflects on and engages during use. The ISV suggests that it is incumbent on designers to build a flexible, holistic picture of what services are and how they can create novel recombinant information systems. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_29}, author = {Germonprez, Matt and Hovorka, Dirk} } @article {770, title = {Information Systems and the Service Economy: A Multidimensional Perspective}, year = {2008}, month = {2008}, pages = {349 - 352}, abstract = {This panel will examine the impact of the growth of the service economy on organizations and information systems from four perspectives: (1) internal changes in organizations, both service providers and service clients, in terms of their structures, processes, and competencies; (2) redefinition of interorganizational relationships and redrawing of organizational boundaries and identities; (3) the role of IS in enabling these new collaborative relationships; and (4) the possibility of designing better applications to enhance organizations{\textquoteright} capacity to engage in service exchanges. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_26}, author = {Alter, Steven and Gal, Uri and Lipien, David and Kalle Lyytinen and Nancy Russo} } @article {771, title = {Information Technology Outsourcing in the Service Economy: Client Maturity and Knowledge/Power Asymmetries}, year = {2008}, month = {2008}, pages = {301 - 310}, abstract = {The service economy calls for a new, interdisciplinary methodology for defining and valuing information technology services outsourcing needs. Parameters such as ill-informed provider selection and poor contract management have hitherto dominated the IT consulting literature, yet have offered inadequate explanations to the high failure rates in global outsourcing arrangements. This paper takes a different approach in examining the causes of the problem; we discuss the knowledge and power asymmetries that appear to prevent both parties from realizing potential benefits in the market. The concept of self-knowledge as opposed to relationship management is suggested. We posit that knowledge/power asymmetries can be better comprehended when the two parties are considered as interacting entities that influence each other in a dynamic way. Under this spectrum, we discuss the value of a client-focused maturity assessment in realizing potential outsourcing benefits. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_21}, author = {Komporozos-Athanasiou, Aris} } @proceedings {929, title = {Integration of Different ERP Systems {\textendash} The Case of Mergers and Acquisitions}, year = {2008}, pages = {504-515}, address = {Suzhou, China}, author = {Von Vangerow, Andreas and Myers, Michael David}, editor = {Huang, Wayne and Teo, Hock Hai} } @booklet {338, title = {Introduction}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {1 - 8}, abstract = {The past two decades have seen a growing diversity of organizational form as organizations use new technologies to reconfigure work, distributing it more than ever across distant locations, different time zones and even diverse organizations. Companies have been able to place their staff with customers. Production and service work can be moved to low cost countries or people{\textquoteright}s homes, or subcontracted to more qualified firms or individuals. Teams of empowered and motivated specialists can be drawn from around the world, using information and communications technologies (ICT) to communicate and share knowledge. A shirt can be designed in Italy, made in China and sold in Australia. The world is said to be increasingly {\textquotedblleft}virtual{\textquotedblright}, a condition in which organizational solidity is only apparent: the reality is one of high performing, dynamic networks which connect staff, enterprises, processes and expertise, where the drive to produce or compete has displaced the need for permanency and structure.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_1}, author = {Klobas, Jane and Jackson, Paul} } @booklet {340, title = {Knowledge Management for Industrial Heritage}, howpublished = {Methods and Tools for Effective Knowledge Life-Cycle-Management}, year = {2008}, month = {2008///}, pages = {307 - 330}, abstract = {All along history, humans have always invented, created to improve their standard of living. Many machines have been built, sometimes simple and others very complex. In order to achieve the best results for customers, machines, industrial plants and humans are moved, displaced and replaced. It is the global humanity technical knowledge that disappears. Indeed, there is a lack in the actually conservation methods: sciences and technologies have to be considered and not only architecture. Our heritage research focuses on the mechanical and technical point of view. For instance, in a factory, there is the building but also actuators, motors and machines that produce product: taking into account the technical point of view can reach to a better understanding of the past. That{\textquoteright}s why preserving the national technical patrimony has now become the priority of governments and world organizations. Our approach proposes a new kind of finality: as saving and maintaining physical object cost a lot for museums, and sometimes dismantling is impossible as the machine falls in ruin, we propose to preserve it as a numerical object. The aim of this research is to define the global process and technologies used for implementing a numerical model of old machines. The final aim is to constitute a new reference for museologic actors, using actual techniques and methods for putting old machines and technical means in {\textquotedblleft}virtual use{\textquotedblright}, taking into account the working situation including human being at work. This process is illustrated by an example we performed: a steam engine.}, url = {http://dx.doi.org/10.1007/978-3-540-78431-9_17}, author = {Laroche, Florent and Bernard, Alain and Cotte, Michel} } @article {772, title = {Legitimacy Management and Trust in Offshoring Information Technology Services}, year = {2008}, month = {2008}, pages = {283 - 299}, abstract = {Our study examines the evolution of offshoring of information technology services between a multinational telecommunications firm and Indian vendors. The firm{\textquoteright}s strategy sought to access critical resources of talented software professionals at low cost and to facilitate growth in a highly competitive telecommunications sector. Legitimacy management proved critical in explaining the evolution of this offshoring arrangement between a client firm and its four Indian vendors. Our findings surface the strategies and activities adopted by proponents in their challenge of gaining, maintaining, building, and repairing legitimacy. We examine how the subsequent reactions and interactions of other audiences iteratively influenced the legitimacy dynamics of offshoring. We also contribute an understanding of the role of trust in the challenges of managing legitimacy, and conclude with practical implications for institutionalizing offshoring arrangements. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_20}, author = {Michael Barrett and Hinings, C. and Oborn, Eivor} } @article {568, title = {Media and public perceptions of identity cards, privacy and surveillance: Public opinion and policy}, volume = {Forthcoming}, year = {2008}, url = {http://www.knowledgepolitics.org.uk/KP_Whitley.pdf}, author = {Edgar A. Whitley} } @article {773, title = {Mind the Gap! Understanding Knowledge in Global Software Teams}, year = {2008}, month = {2008}, pages = {321 - 330}, abstract = {This paper presents a conceptual framework and preliminary empirical analysis of knowledge gaps between global software team members in the UK and India. Drawing on episodes from rich case study evidence of a UK software firm based in the UK and software development sites in India, the conceptual framework is used to explore the data and to understand the knowledge gaps encountered. These are in relation to the level of knowledge, educational background, and experience of members. This study unpacks the notion of knowledge of software development into domain, technical, and application knowledge and considers the implications of prior knowledge, experience, and education background. It is anticipated from the preliminary findings that a practical and theoretical contribution will improve our understanding of the complexities of knowledge in such global arrangements. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_23}, author = {Aini Aman and Brian Nicholson} } @article {755, title = {A Multivocal and Multilevel Institutionalist Perspective to Analyze Information Technology-Enabled Change in the Public Service in Africa}, year = {2008}, month = {2008}, pages = {271 - 280}, abstract = {The research adopts a multivocal and multilevel institutionalist perspective to analyze information technology-enabled change into the structures of the public service in Africa as reflected in changes of practices around information processing. Information systems scripts and guidelines are considered as vocal to new logics of public service (e.g., new public management) imported into the local setting through international public sector reforms. The research will focus on the micro or agent level as the locus of institutional change. Here, formal structures planned at the policy (macro) and organizational level (meso) are modified through sensemaking as users change there is and information processing practices in order to seek realignment between competing logics embedded in new and old public administration models. The analysis will be undertaken based on a case study of the Ministry of Health in Kenya. The research will provide new insights into the implications of institutional mechanisms for the integration of new IT-enabled service models in the public sector of developing countries.}, doi = {10.1007/978-0-387-09768-8_19}, author = {Bernardi, Roberta} } @article {432, title = {Negotiating "Best Practices" in Package Software Implementation}, journal = {Information \& Organization}, volume = {18}, number = {1}, year = {2008}, pages = {1-28}, author = {Yeow, A. and Sia, S.K.} } @conference {miscione2008networksfederations, title = {Networks of Action and Health Information Infrastructure: enabling Federations}, booktitle = {Theme: Towards an ICT Research Agenda for African Development}, year = {2008}, pages = {36{\textendash}36}, author = {Miscione, G and Staring, K and Kanjo, C} } @article {774, title = {Organizational Learning in Health Care: Situating Free and Open Source Software}, year = {2008}, month = {2008}, pages = {372 - 373}, abstract = {Free and open source software (FOSS) has been attracting the interest of organizations involved in the development and implementation of information and communication technologies (ICTs) in developing countries foryears. ICTs for development initiatives often have public sector orientations, as governments{\textquoteright} ICT policies are expected to shape and support socio-economical development. The usual mismatch between formal bureaucracies{\textquoteright} functioning, the usual top-down software development schemes, and the actual trajectories of development initiatives (mostly run by international agencies) provides a promising empirical field. This paper intends to discuss the connection between FOSS and organizational learning in contexts where the usual assumptions about them cannot be taken for granted. It is argued that the relevance of open technologies as public goods is in allowing organizational learning in public administration. Such a focus on the organizational aspects would complement existing studies on the economical relevance of FOSS. The argument is built by addressing FOSS-related emphatic expectations for emancipation in the {\textquotedblleft}knowledge society{\textquotedblright} on one side (Government of Kerala 2002), and implementation and use, on the other. Then, a meso-level between global trends and local specificities is identified as crucial in situating FOSS for development potentialities. Empirically, this level is between the two usual poles in information systems studies: decision makers (public administrators and software developers, both oriented by a top-down approach to systems design) and the ground of implementation (usually sensitive to a variety of contexts). As it is unusual in developing contexts to have spontaneous voluntary participation, the software development process needs to be designed and carried out in a way that allows local organizations to {\textquotedblleft}indigenize{\textquotedblright} FOSS.1 Its fluidity allows inscribing a variety of context-bound socio-technical arrangements (De Laet and Mol 2000), and also can cause avoidance of path-dependencies and vendor lock-ins (Weerawarana and Weeratunge 2004). The case of a health information system being implemented in Kerala, as part of an international initiative, is presented. We describe, on one side, the principles and views supporting the network and local politics and, on the other side, aspects of the implementation dynamic, which is underestimated in the common approach to ICT for development (Avgerou 2007). The project presented in the paper has significant links both at the global level (participating in a broad and heterogeneous network of trend-setting organizations like universities and research centers, international donors, ministries of different countries) and local levels (where systems are piloted and implemented, capacity building is carried out, requirements for further developments are collected). Empirical exploration showed that the (formal and informal) institutional constraints, which FOSS implies and relies on, are fragmented or absent, whereas others can be relevant. Nevertheless, FOSS narrative proves to be present and effective both in negotiations between stakeholders, and in facilitating local participation to information system development.2 The meso-level position of this initiative shows the distance between the two ends, descriptively. Prescriptively, it suggests how possible bridges can allow interorganizational relations across a variety of actors rarely involved in the same FOSS initiative. The interactions around local technical skills improvement and the increased ability for organizations to formulate, express, negotiate, and inscribe their needs in technology is proposed as a chance for organizational learning. In contexts of multiple accountabilities (Suchman 2002), we claim that the relevance of FOSS emerges from negotiating alliances, and does not inhere in FOSS itself. FOSS facilitates learning as far as its openness is allowed by software development processes, and enacted by brokering activities to relate dispersed practices (Gherardi and Nicolini 2002). }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_31}, author = {Miscione, Gianluca and Margunn Aanestad} } @inbook {miscione2008organizationalsoftware, title = {Organizational learning in health care: Situating free and open source software}, volume = {267}, year = {2008}, month = {Jan}, pages = {372{\textendash}373}, abstract = {Free and open source software (FOSS) has been attracting the interest of organizations involved in the development and implementation of information and communication technologies (ICTs) in developing countries for years. ICTs for development initiatives often have public sector orientations, as governments{\textquoteright} ICT policies are expected to shape and support socio-economical development. The usual mismatch between formal bureaucracies{\textquoteright} functioning, the usual top-down software development schemes, and the actual trajectories of development initiatives (mostly run by international agencies) provides a promising empirical field. This paper intends to discuss the connection between FOSS and organizational learning in contexts where the usual assumptions about them cannot be taken for granted. It is argued that the relevance of open technologies as public goods is in allowing organizational learning in public administration. Such a focus on the organizational aspects would complement existing studies on the economical relevance of FOSS. {\textcopyright} 2008 by International Federation for Information Processing.}, isbn = {9780387097671}, issn = {1868-4238}, doi = {10.1007/978-0-387-09768-8_31}, author = {Miscione, G and Aanestad, M} } @booklet {344, title = {Overcoming Location Boundaries: Telecooperation and Virtual Enterprises}, howpublished = {Information, Organization and Management}, year = {2008}, month = {2008///}, pages = {317 - 367}, abstract = {Large areas of business applications are increasingly contradicting the traditional picture of the enterprise as an integrated, methodically organized, and relatively stable product of the production of tangible assets and services: Strict hierarchies dissolve themselves into flat, modular structures (chapter 5). Traditional organizational boundaries blur in symbiotic, network-like entrepreneurial relationships (chapter 6). Technical infrastructures revolutionize markets (chapter 7) through the step-wise dissolution of spatial and temporal restriction. The increasing dissolution of locations, as well as the conditions for and implications of this for actual and future organizational forms, is the focal point of this chapter. Virtual organizations are an outgrowth of these developments. They therefore function more like spider-webs than networks. They are opposites of organizations that, with regard to ownership and contracts, have relatively well-defined boundaries, have a steady location, relatively permanent resource assignments, and controlled process structures. According to Aristotelian philosophy, virtuality may be regarded as an idealized goal of a boundless organization (Legrand 1972, p. 269). It may also be regarded as an organizational form that considers virtuality in the same sense as information systems researchers might, i.e. as a concept of performance improvement. This perspective also regards concrete locations where the actual work is carried out as systematic and dynamic (Mowshowitz 1991; Szyperski / Klein 1993). We will next address fundamental aspects of the dissolution of the work location, as well as questions pertaining to the drivers and organizational manifestations of dispersed work locations. The virtual organization as a specific result of telecooperative work forms is presented later.}, url = {http://dx.doi.org/10.1007/978-3-540-71395-1_8}, author = {Picot, Arnold and Reichwald, Ralf and Wigand, Rolf} } @article {775, title = {Possibilities and Challenges of Transition to Ambulant Health Service Delivery with ICT Support in Psychiatry}, year = {2008}, month = {2008}, pages = {129 - 141}, abstract = {Transformations of established institutional orders are to be expected along-side the appearance of novel ICT-enabled models of service delivery. Such transformations are neither simple nor short-term, but involve complex and fundamental changes in normative, regulative, and technical aspects. In this paper we describe the initial stages of a project redesigning psychiatric services for children and adolescents. New collaboration models, supported by new ICT applications, were introduced into the ordinary structures of health care services in Finnmark, the northernmost county of Norway. Our aim is to contribute to the understanding of how the preexisting technical and organizational systems and models, the installed base, impact radical change. We address the potential for user-driven innovations, and focus our analysis on the quality of generativity in the existing information infrastructure. The salient challenges in our case were related to the existing technical information infrastructure in the health sector. The new solution was pushed outside the established information infrastructure. While this may be only a temporary situation, we argue that, as a result of this process, the new solution emerged with a greater potential for future generativity than it would have had it been more linked to the existing information infrastructure. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_9}, author = {Andersen, Synn{\o}ve and Margunn Aanestad} } @proceedings {865, title = {Publishing in the ERA era}, year = {2008}, month = {3-5 December}, pages = {2}, address = {Christchurch}, abstract = {Internationally, there is a move by governments to assess research outputs according to quality. Central to this is the ranking of journals. The most ambitious exercise is the Australian Research Council{\textquoteright}s current exercise to rank over 19,500 academic journals. This exercise is being keenly observed by a number of governments, and most academics. These changes have the potential for major change in the way academics will choose a publication outlet for their research. The consequences of those decisions could be far reaching for individual journals, especially unranked journals, and for conferences. Responding to this new assessment regime can either be fragmented and driven by market forces, or driven by a strategic understanding of the new regime and ensuring that changes improve publishing opportunities and rankings. This panel session brings together Australian and New Zealand publishers and members of editorial boards of large and small IS journals, and researchers in this field to develop some strategic perspectives.}, author = {John W Lamp and Michael D. Myers and Julie Fisher and David Wilson and Felix B. Tan and Deborah Bunker} } @article {540, title = {The ranking of top IS journals: The perspective from the London School of Economics}, journal = {European Journal of Information Systems}, volume = {17}, number = {2}, year = {2008}, pages = {163-168}, isbn = {0960-085X}, url = {EJIS2008.pdf}, author = {Leslie P. Willcocks and Chrisanthi Avgerou and Edgar A. Whitley} } @article {776, title = {Rhizomatic Informatics: The Case of Ivy University}, year = {2008}, month = {2008}, pages = {81 - 101}, abstract = {While the debate over information systems and their role in society persists, the discipline continues to seek approaches to better understand IS, and its complex interactions with organizations and people. This paper draws ideas from Deleuze and Guattari{\textquoteright}s work on rhizomes (a nonhierarchical network) and its opposing tree (arboreal structure), to develop better insights (Deleuze and Guattari 2004). The paper specifically revisits the case of Ivy University, in which a major introduction of an ERP application was attempted by the powerful central administration. When this centralized and arboreal structure collapses, it is eventually replaced by a much more organic system, which emerged from the localized and ad hoc software developments that had already taken place. The rhizomic interpretation of this case enables both a conceptualization of information systems within social and organizational settings and offers a set of principles on which the concept of a {\textquotedblleft}rhizomatic informatics{\textquotedblright} may be based and IS case studies interpreted. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_6}, author = {Atkinson, Chris and Laurence Brooks} } @article {560, title = {Security Briefing}, year = {2008}, institution = {London School of Economics and Political Science}, url = {http://identityproject.lse.ac.uk/securitybriefing.pdf}, author = {LSE Identity Project,} } @article {781, title = {The Service Behind the Service: Sensegiving in the Service Economy}, year = {2008}, month = {2008}, pages = {117 - 126}, abstract = {In this modest essay, we reflect on the crucial role of sensegiving, and hence sensemaking, in the creation of IT-enabled service encounters. {\textquotedblleft}Creation{\textquotedblright} has two meanings here: (1) the design of repeatable (reproducible) IT-enabled services, and (2) the on-going coproduction of IT-enabled service events by service providers and recipients. Indeed, we will argue that the sense given by diverse and role-differentiated actors constitutes in its own way a crucial and pervasive service that enables services in the more familiar sense. Sense-giving, as a {\textquotedblleft}service behind the service,{\textquotedblright} is of particular salience when it comes to novel IT-enabled services, because of the challenges posed by their innovative character. As a practical matter, we are especially interested in how failures in the delivery of innovative services can be caused by shortfalls in sensemaking and sensegiving, and how the difference between successful and failed service outcomes commonly turns on choices made during the design of IT-enabled service systems. These designs either recognize and embrace, or marginalize and ignore, the required and novel sensemaking and sensegiving of employees and customers. We also recognize that system designs are rarely determinative (as constraining as they might prove to be), and that service outcomes will still depend on the variable appropriation of information technology in real situations of practice. We conclude our essay by outlining some research directions in IT-enabled service delivery, arising from these issues. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_8}, author = {Ramiller, Neil and Chiasson, Mike} } @article {777, title = {Service System Innovation}, year = {2008}, month = {2008}, pages = {61 - 80}, abstract = {Service innovation has been discussed by many authors, but usually not from a system perspective. Recent literature about service systems and service innovation stresses multi-partner commercial offerings, ecosystems of interacting suppliers and consumers, globalization, and the changing nature of advanced economies. Interesting as these large-scale topics are, discussions at that level tend to overlook operational and organizational issues that service innovators must address in order to create or improve specific, localized systems that deliver services to internal and/or external customers. This paper builds on three interrelated frameworks that describe fundamental aspects of service systems at the level at which they are designed, operated, and improved: {\textbullet}\  The work system framework identifies nine elements that should be included in even a rudimentary understanding of any work system. (Service systems are work systems.) {\textbullet}\  The service value chain framework incorporates characteristics often associated with services, such as coproduction by providers and customers. {\textbullet}\  The work system life cycle model treats the system{\textquoteright}s life cycle as a set of iterations involving planned and unplanned change. This paper shows how each of those three frameworks provides insights that apply to service innovation across a wide range of service systems. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_5}, author = {Alter, Steven} } @article {782, title = {The Servicitization of Peer Production: Reflections on the Open Source Software Experience}, year = {2008}, month = {2008}, pages = {353 - 355}, abstract = {The concept of what Yochai Benkler called {\textquotedblleft}peer production{\textquotedblright} as an alternative mechanism to traditional hierarchies and markets has captured the imagination of numerous communities in contexts ranging from t-shirt design to software to gold mining. While some question the suitability and potential longevity of this mode of production, others are focused on determining ways in which peer-produced products and services can be suitably packaged to meet the requirements of consumers. In particular, the mature peer production phenomenon known as open source software has emerged as a credible alternative to its proprietary counterpart and presents a compelling challenge to both industry and academia as we seek to understand how firms and other organizations can build sustainable business models leveraging the public commons of open source products and the collaborative engine that created them. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_27}, author = {Joseph Feller and Finnegan, Patrick and Bj{\"o}rn Lundell and Nilsson, Olof} } @article {miscione2008thescale, title = {The Shifting Legitimation of an Information System: Local, Global and Large Scale}, journal = {GlobDev 2008}, year = {2008}, pages = {7{\textendash}7}, author = {Miscione, G and Staring, K and {\O}stmo, L and Fossum, K} } @proceedings {489, title = {A Symmetric Analysis of the Border Control Information Systems for People and Trade}, year = {2008}, pages = {1117-1128}, address = {Galway}, isbn = {978-0-9553159-2-3}, url = {ECIS2008.pdf}, author = {Edgar A. Whitley and Boriana Rukanova}, editor = {Golden W. and Acton T. and Conboy K. and van der Heijden H. and Tuunainen V. K.} } @conference {846, title = {To Be Seen, Or Not To Be Seen: A Study of Blackberrys in the Context of Organizational Surveillance}, booktitle = {24th European Group for Organizational Studies (EGOS) Colloquium}, year = {2008}, month = {10-12 July}, address = {Amsterdam}, abstract = {Described as an invaluable asset by some and an addictive invasion by others, the BlackBerry (or CrackBerry) has taken a firm hold on the workplace and is having a significant impact on the corporate environment. Much of the current debate focuses on the addictive, invasive nature of this technology versus the efficiencies of increases connectivity and mobility. There is no doubt that the constant connectivity enabled by the BlackBerry is the aspect most valued by organizations, suggesting that the surveillance aspects of the BlackBerry are worthy of attention as a source of interesting insights into the nature of organizations. This research draws on the work of Mann, Nolan and Wellman (2003) who identified the concept of sousveillance to account for the impact of mobile technology on the panoptic view of technology. Their work identifies that users deploy mobile technology to create a two-way vision, or reflection, to manipulate the impression that the organization has of their activities. Evidence collected from two large Australian financial services firms is used to explore sousveillance through the exploration of the way BlackBerrys are used.The research literature on surveillance in organizations has tended to assume that the view is one way: i.e. the organization is viewing the activities of its employees to make judgments on productivity, manage and modify behavior, and exercise elements of control and power. Scholars have used Foucault{\textquoteright}s (1977) concept of the panoptican to illustrate the influence of technology to monitor, record and constantly observe the activities of employees. With the growth of mobile technologies this theoretical framework becomes more alluring as we are able to increasingly communicate, connect and monitor activity in real time. However, a series of recent case studies on the impact of BlackBerrys on the workplace reveals that this one-way panoptic view is too limiting and that the technology may be providing a reflective window through which the employee is able to manipulate the view that the organization sees. Thus a two-way view is created and the notion of sousveillance ( or under view) provides us with more valuable insights. Evidence from our study of two large Australian financial service firms suggests that the use of BlackBerrys provides interesting insights into this two-way view. The BlackBerry enables the firm to be constantly connected to the user anywhere and at anytime. Email and internet access is integrated with the mobile phone creating a single tool that connects the user to the organization, customers and suppliers thus changing the expectations of response times and user availability. Interviews and ethnographic observations in two large, global financial services firms indicate that while some users feel that the BlackBerry has blurred the boundaries between work and personal space, others use the technology more proactively to manage their work to fit with personal requirements or to enhance their personal image with their management and their customers. This would indicate some parallels with the Gary Marx{\textquoteright}s (2003) proposal that it is possible to resist surveillance through interference that blocks or distorts views or information. It would appear that the BlackBerry is not always intruding on personal space but rather is being deployed as a personal space protector as users take advantage of the mobility of the technology to disguise their location and activity. Thus the user may appear to be working ie: responding to email, phone calls and accessing files while actually engaged in personal leisure activities. In addition to disguising the user{\textquoteright}s location and activities there is significant evidence to suggest that the users in the organizations studied deployed their Blackberrys to create an impression that they were constantly {\textquotedblleft}on the job{\textquotedblright} and thus enhanced their reputation as diligent employees. This was particularly evident in the context of the two global organizations studied where Australian employees were often operating across timezones. The intense competition for position and promotion meant that BlackBerrys were used to generate email response anytime, anywhere, giving the impression that the user was constantly at work.Thus this paper challenges the traditional view of the panoptican in the context of mobile technology and suggests that users deploy an additional reflective lens which ensures that they have some control over their activities. We find that the sousveillance perspective offers useful insights into the subject of organizational surveillance.References: Foucault, M. (1977). Discipline and Punish, trans. A. Sheridan. New York: Vintage.Mann, Nolan and Wellman (2003) {\textquotedblleft}Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments{\textquotedblright}, Surveillance and Society 1 (3), pp331-355Marx, G. (2003) A Tack in the shoe: neutralizing and resisting the new surveillance. Journal of Social Issues 59(1).}, author = {Dery, Kristine F and MacCormick, Judith S and Michael D. Myers} } @booklet {367, title = {Tools and Capabilities for Becoming Virtual}, howpublished = {Becoming Virtual}, year = {2008}, month = {2008///}, pages = {215 - 225}, abstract = {In this book, we have introduced a framework for conceptualizing the process of virtualization and used it to study knowledge processes and virtualization in a single organization. In this chapter, we consider what we have learned from studying Unit 2 that can be of value to other organizations that are considering becoming virtual. Unit 2 did not achieve its goal of virtualization. But, as is often the case, breakdown reveals more about what is required for success than smooth traveling. The specific aspects of virtualization that the research team studied during the project provide additional insight into the risks of virtualization and the conditions and processes that might be adopted by successful virtualizing and virtual organization. We conclude this research by reviewing the lessons learnt from the individual research projects. We then draw on these, along with the analysis presented in Chap. 12, to summarize lessons for organizations planning to take advantage of network technologies to improve their ability to operate effectively across space, time and structure. Finally, we comment on the potential value for managers and researchers of the virtual alignment model (VAM) and the methods developed to track virtuality and capabilities in the study.}, url = {http://dx.doi.org/10.1007/978-3-7908-1958-8_14}, author = {Jackson, Paul and Klobas, Jane} } @article {783, title = {Toward Understanding the Capability Cycle of Software Process Improvement: A Case Study of a Software Service Company}, year = {2008}, month = {2008}, pages = {379 - 381}, abstract = {The emergence of a service economy facilitates proliferation of software service companies (SSCs), small firms offering various software services such as software maintenance, testing, and customization. Given the unique characteristics of SSCs (i.e., small-scale projects, limited resources, strong customer dependency, etc.), software process improvement (SPI) in SSCs faces additional challenges. Based on Helfat and Peteraf{\textquoteright}s framework of a dynamic capability lifecycle, this study aims to understand how dynamic capabilities are developed to facilitate SPI implementation, and how these capabilities can be maintained and transformed in a changing context. An in-depth interpretive case study was conducted in a SSC, namely SGSC, which is the an offshore software service center of a leading U.S. document management company, Xerox Corporation. Drawing insights from the framework, this study demonstrates the evolution of key resources and dynamic capabilities as well as their impacts on the success of the SPI project. Responding to the ownership transfer from Xerox to Fuji Xerox group in 2005, the center decided to implement new SPI process. As shown in Figure 1, three capabilities (i.e., capability to strategize, capability to be flexible, and capability to integrate and engender trust) were built up during the first two phases (i.e., establishing direction and implementing SPI). Development of each capability was accomplished through some actions with the support of various resources. After development, capabilities can evolve over time (Zollo and Winter 2002). Two capabilities (capability to strategize and capability of integrate and engender trust) were maintained through regular exercise, which helps to refresh the company{\textquoteright}s memory and facilitate the creation of embedded knowledge. Besides being maintained, capabilities may also branch into different forms when external factors have a strong impact to alter the current development trajectory. At SGSC, ownership transfer resulted in a dramatic change in terms of external relationships and internal structure. With changes in the supporting resources, capabilities built up in previous phases were further transformed into different branches. Capability to be flexible was renewed because of better communication and sharing resources with external partners. Capability to strategize was also renewed after obtaining a long-term view from the new parent company. Figure 2 summarizes the life cycle of three capabilities in this study. By integrating theoretical perspective with empirical evidence, this paper contributes to both researchers and practitioners. For researchers, it constitutes one of the first empirical studies to extend Helfat and Peteraf{\textquoteright}s general framework of the capability life cycle by demonstrating how capabilities can be transformed through altered resources over time. Moreover, this study advances the SPI literature by suggesting a conceptual framework for SPI implementation in a small-scale, service-oriented company. Practically, this study provides invaluable suggestions to managers on how firms can successfully implement SPI strategy when facing dramatic changes in the external environment or internal structure. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_33}, author = {Tong, Yu and Xu, Lingling and Shan Ling Pan} } @article {784, title = {Transforming Work Practices in a Complex Environment}, year = {2008}, month = {2008}, pages = {143 - 157}, abstract = {Nursing work is intertwined with a number of technologies. This paper explores the work practices in a pediatric intensive care unit, and discusses some possible directions for introducing new technologies. Work in intensive care is approached as a set of complex and networked practices that are characterized by dynamism and reflexivity of situated action. We observed how, in the intensive care unit, the emerging issues and complexity of organizational action are anticipated with situational adaptability and self-ordering of action. Although the nurses are capable of adapting to rapidly changing situations, at the same time, the nursing practices are bounded by the situational rationalities, such as the information available on the patient. With new technologies, we see several opportunities for change in time-place arrangements, in coordination and communication practices, and in information sharing practices. The roles and tasks of the various actants may reformulate, and thereby possibly their skills and professional identities as well. All of this will take place when work practices, new technologies, and care processes are negotiated and made irreversible through the actions of the participants. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_10}, author = {Vuokko, Riikka and Helena Karsten} } @article {785, title = {Turning Products into Services and Services into Products: Contradictory Implications of Information Technology in the Service Economy}, year = {2008}, month = {2008}, pages = {343 - 348}, abstract = {Service industry sectors of modern economies are growing rapidly, in absolute size and in comparison to the manufacturing, agriculture, and other economic sectors. Implicit in the dramatic proclamations that have accompanied this worldwide shift to the service economy is a subtext about the displacement and subordination of products. The notion of displacement speaks, in a straightforward way, to the diminishing relative importance that material products play in production and consumption and, hence, in providing opportunities for employment. That information and communication technology (ICT) enabled innovation has played a crucial role in the emerging dominance of services is well known, for example, in all aspects of financial service sectors. Subordination is more interesting because it has to do with the changing and unsettled relationship between products and services and, indeed, ambiguity in the very definition of {\textquotedblleft}service{\textquotedblright} itself. This subordination has taken a variety of forms: {\textbullet}\  Producers and purveyors of products add information-intensive service dimensions in order to enhance relationships with customers and, in some cases, to generate network effects among the customers themselves (e.g., Amazon.com{\textquoteright}s online customer reviews of books and data-based book recommendations). {\textbullet}\  Products themselves have become servicitized in the sense that a product comes with a service component that is crucial in fully constituting the product as a meaningful {\textquotedblleft}solution{\textquotedblright} for the purchaser (Vandermerwe and Rada 1988). The delivery of these components is often ICT-enabled (e.g., call centers in support of consumer electronic products). {\textbullet}\  We witness the servicitization of products in an alternative sense, where the purchaser never takes possession of the material product but rather subscribes to the service that the product provides, with the purveyor maintaining ownership of the physical asset (e.g., ASP models of computer or software use and outsourcing of certain other kinds). }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_25}, author = {Ramiller, Neil and Elizabeth Davidson and Wagner, Erica and Steve Sawyer} } @article {786, title = {Understanding the Exchange Intention of an Individual Blogger}, year = {2008}, month = {2008}, pages = {375 - 378}, abstract = {This research explores the issue of how ablogring, a circle/community of blogs with a common theme (Xanga 2008; Chua and Xu 2007), could be utilized to form a loosely distributed exchange of products for monetary and nonmonetary returns. Specifically, we present a research model that identifies factors influencing a blogger{\textquoteright}s intention to participate in a commercial exchange, a commercial activity involving a blogger and a reader within a blogring. A blogring is conceptualized as a natural segmentation of user-alike whereby members (i.e., bloggers and readers) converge toward common interests reflected in the blog contents (Kumar et al. 2004; Gumbrecht 2004). The formation of this social network provides bloggers with the social capital to engage in collaboration and cooperation with other members (Putnam 2000; Peece 2002). Economizing on this social capital, bloggers could engage in product, service, and/or money exchanges. We term this process the economic leverage of personal blog (Balasubramanian and Mahajan 2001). Such an economic leverage includes selling, barter trading, and outright giving away items that can be identified or associated with the shared interests of the blogring. In other words, any exchange between bloggers and readers need not necessarily be for monetary returns but could also involve an exchange of knowledge or expertise in return for approval-related utility (Balasubramanian and Mahajan 2001). With this understanding, we next present our research model. The research model (Figure 1) draws from three streams of literature. First, we reference the similarity attraction theory (Byrne 1971), which posits that people prefer to interact with like-minded others. For instance, salespeople generally prefer to sell to prospects sharing characteristics (e.g., gender and age) with themselves (Dwyer et al. 1998). Hence, we conjecture that bloggers could be more inclined to commercial exchange with readers who have similar interests. We term this blogger-reader similarity. Second, the general premise of the social network dictates that members could place higher priority on relationships and ties with other members within a blogring compared with individuals{\textquoteright} personality attributes. Hence, we could posit that the stronger the tie (Frenzen and Davis 1990; Marsden and Campbell 1984) between a buyer and a seller, the higher the likelihood for purchase (Frenzen and Davis). Additionally, the closer a reader is to the blogger, the greater the ease of engaging in an exchange due to greater influence exerted by the blogger over the reader (Burkhardt 1994). Third, building on the decision-making framework proposed by Luce, Bettman, and Payne (2001), we hypothesize that the decision of whether to engage in an exchange depends on the appraisal of the exchange situation, which in turn is influenced by blogger-reader similarity and social network. A positive appraisal should lead to a higher exchange intention from the blogger. However, any negative peer pressure against commercialism exerted by other blogring members could negatively moderate the appraisal (Luce et al. 2001), thus leading to lower exchange intention. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_32}, author = {Tan, Wee-Kek and Tan, Chuan-Hoo and Teo, Hock-Hai} } @article {374, title = {Virtuality and Non-Virtuality in Remote Stock Trading}, year = {2008}, month = {2008///}, pages = {159 - 172}, abstract = {Advances in information technology allow for remote working, leading to suggestions that remote individuals can operate in virtual instead of face-to-face teams. This paper considers the continuation of face-to-face communication in a European group of stock traders, despite the capabilities of information technology to individuate the work. The case illustrates that traders prefer and need to work in face-to-face settings for various reasons. Short-term reasons arise from a need for instant and effortless communication in their manipulation of market prices and for instant knowledge sharing, leading to both higher individual and collective profits. Long-term reasons arise from a need for continuous learning by novices and experts, as stock markets and stock prices settle into behavioral patterns over longer periods of time. The implications for computing and work are discussed.}, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_11}, author = {Fuente, Roger and Chiasson, Mike and Devadoss, Paul} } @article {787, title = {Virtuality and Non-Virtuality in Remote Stock Trading}, year = {2008}, month = {2008}, pages = {159 - 172}, abstract = {Advances in information technology allow for remote working, leading to suggestions that remote individuals can operate in virtual instead of face-to-face teams. This paper considers the continuation of face-to-face communication in a European group of stock traders, despite the capabilities of information technology to individuate the work. The case illustrates that traders prefer and need to work in face-to-face settings for various reasons. Short-term reasons arise from a need for instant and effortless communication in their manipulation of market prices and for instant knowledge sharing, leading to both higher individual and collective profits. Long-term reasons arise from a need for continuous learning by novices and experts, as stock markets and stock prices settle into behavioral patterns over longer periods of time. The implications for computing and work are discussed. }, url = {http://dx.doi.org/10.1007/978-0-387-09768-8_11}, author = {Fuente, Roger and Chiasson, Mike and Devadoss, Paul} } @article {311, title = {Abstraction in Computer Science}, journal = {Minds and Machines}, volume = {17}, year = {2007}, month = {2007/07/01/}, pages = {169 - 184}, abstract = {We characterize abstraction in computer science by first comparing the fundamental nature of computer science with that of its cousin mathematics. We consider their primary products, use of formalism, and abstraction objectives, and find that the two disciplines are sharply distinguished. Mathematics, being primarily concerned with developing inference structures, has information neglect as its abstraction objective. Computer science, being primarily concerned with developing interaction patterns, has information hiding as its abstraction objective. We show that abstraction through information hiding is a primary factor in computer science progress and success through an examination of the ubiquitous role of information hiding in programming languages, operating systems, network architecture, and design patterns.}, url = {http://dx.doi.org/10.1007/s11023-007-9061-7}, author = {Colburn, Timothy and Shute, Gary} } @article {529, title = {An alternative perspective on citation classics: Evidence from the first ten years of the European Conference on Information Systems}, journal = {Information and Management}, volume = {44}, number = {5}, year = {2007}, pages = {441-455}, isbn = {0378-7206}, url = {iandm2007.pdf}, author = {Edgar A. Whitley and Robert D. Galliers} } @article {381, title = {Ambassadorial Leadership}, year = {2007}, pages = {169 - 182}, abstract = {Existing models of leadership have been built on the assumption of face-to-face interaction, cultural homogeneity, and hierarchical organizational structures. We introduce a new model, Ambassadorial Leadership, which recognizes that different behaviors are needed for leading globally distributed virtual teams. The behaviors include those that are characteristic of an Ambassador who must be culturally sensitive, able to span boundaries created by geography and functional background, and able to help build a collective identity for the virtual team. We conducted a pilot study to examine the model and to compare our model to the transformational leadership factors. The results showed good discriminant and convergent validity as well as some indication that the new model adds some complementary dimensions to the transformational leadership model.}, doi = {10.1007/978-0-387-73025-7_13}, author = {Ryan, Michael and Reilly, Richard} } @article {501, title = {Balance, scrutiny and identity cards in the UK}, journal = {Criminal Justice Matters}, volume = {68}, number = {Summer}, year = {2007}, note = {http://personal.lse.ac.uk/whitley/allpubs/CJM2007.pdf}, pages = {29-30}, isbn = {0962 7251}, url = {CJM2007.pdf}, author = {Cheryl A Edwardes and Ian R Hosein and Edgar A. Whitley} } @article {315, title = {Beyond Distributed Cognition}, year = {2007}, pages = {11 - 12}, abstract = {American social science since World War II has been centrally shaped by the {\textquotedblleft}cognitive revolution.{\textquotedblright} Fields as disparate as behavioral economics and cognitive anthropology have exploited a shared core of ideas about the workings and limitations of human cognition, such short-term memory and judgment heuristics. This cognitive toolkit has been a principal asset in the efforts to understand and better support the requirements of newly emerging forms of virtual organization. This keynote address examines two other human faculties, habit and emotion. Across western intellectual history these have often been understood as equally important determinants of organized action, and this was the case in the period before World War II. However, since then habit and emotion have not been tightly integrated dimensions of our analyses of social life, including virtual organizing. Rather they have served, if present at all, as labels for clusters of exceptions, cases that involved issues not well handled by the default cognitive approach. Both habit and emotion are rising in psychology as topics of inquiry. These two additional human faculties are notable for being significantly less available to direct introspection, but powerful new measurement techniques{\textemdash}most notably various forms of scanning{\textemdash}are bringing into focus their large role in determining our actions. The keynote provides an overview of these developments and some suggestions some of their implications for the understanding and supporting virtual organizing with concepts that make habit and emotion more central to the primary analysis.}, doi = {10.1007/978-0-387-73025-7_2}, author = {Cohen, Michael} } @booklet {miscione2007buildingsector, title = {Building Europe-Africa collaborative Network for IST in Health sector}, year = {2007}, month = {May}, publisher = {Maputo, Mozambique}, abstract = {Government of Mozambique and European Commission (Information Society Technologies of EU 6th Framework Programme)}, author = {Miscione, G} } @article {317, title = {Building Virtual Spaces}, year = {2007}, pages = {317 - 334}, abstract = {The percentage of young women choosing educational paths leading to science and technology-based employment has been dropping for several years [1, 2]. In our view, the core cause for this phenomenon is a lack of interest and social support on the part of the girls and their families and not a lack of ability. The specific aim of this paper is to evaluate the utility of building virtual environments in influencing girls{\textquoteright} interest in computer-related educational paths and careers. This is evaluated through an intervention, or action-research, in the form of a class named Gaming for Girls. This class was offered to middle and high school girls three times over the years 2005{\textendash}2006. We assert playing and developing computer games can lead to the acquisition of tangible IT skills and a higher sense of self-efficacy in terms of computer use. In particular, we discuss intervention methods that aim at changing socialization patterns by bringing girls into an all-girl classroom, reducing game violence by altering the forms of game action, and removing potentially negative character designs by allowing girls to design characters and game interaction themselves. We assert that within the information economy, playing video games is an advantage.}, doi = {10.1007/978-0-387-73025-7_22}, author = {Tapia, Andrea and El-Nasr, Magy and Yucel, Ibrahim and Zupko, Joseph and Maldonado, Edgard} } @article {384, title = {Competency Rallying Processes in Virtual Organizations}, year = {2007}, pages = {67 - 83}, abstract = {Firms face an environment changing at an increasingly rapid pace. Unfortunately, the speed at which organizations can adapt their strategies and competencies to exploit such opportunities remains limited. In this paper we weave together an external perspective on market-facing with an internal perspective on competency development and marshalling to describe the organizational activities necessary for firms to cooperate within a virtual organization. We argue that firms can address their individual limitations through a systematic process that we call {\textquotedblleft}competence rallying,{\textquotedblright} with which they can access market opportunities and additional needed competencies. Specifically, we present a local process theory of how one network of firms reliably engineers and delivers manufacturing projects using an inter-organizational process that works to meet short-term market opportunities. Our theory is grounded in the experiences of the Virtuelle Fabrik project, an organized network for regional cooperation in the manufacturing industry around the Bodensee in Europe. The success of manufacturing projects in a virtual organization is predicated on specific organizational activities in four phases of the competence rallying process: 1) identification and development of competencies, 2) identification and facing of market opportunities, 3) marshalling of competencies, and 4) a short-term cooperative effort.}, doi = {10.1007/978-0-387-73025-7_7}, author = {Katzy, Bernard and Kevin Crowston} } @article {320, title = {Conceptualizing Virtual Collaborative Work}, year = {2007}, pages = {21 - 34}, abstract = {The purpose of this paper is to define the phenomena associated with virtual collaborative work from both a cognitive and social cognitive perspective. The authors put forth an approach that assumes all people are natural sense-makers, sense-givers and organizers. The authors posit that the collaborative work we observe within both informal (ad hoc teams or communities) and formal (organizational) environments derives from fundamental, ubiquitous cognitive and social behavior intimately tied to context-specific problems or situations. The paper begins by challenging the need to re-define terms like {\textquotedblleft}virtual{\textquotedblright} and {\textquotedblleft}team{\textquotedblright} in a manner which works to subtly shift the focus of study from {\textquotedblleft}proximal vs. distributed{\textquotedblright} to the more fruitful {\textquotedblleft}fundamental behavior vs. technological constraints.{\textquotedblright} The paper then presents a framework for virtual collaborative work and discusses its implications on issues related to teams, leadership, creativity, and the design and use of information technology.}, doi = {10.1007/978-0-387-73025-7_4}, author = {D{\textquoteright}Eredita, Michael and Nilan, Michael} } @article {321, title = {Conditions Enabling Effective Multiple Team Membership}, year = {2007}, pages = {215 - 228}, abstract = {There is a long tradition of research on work in teams and their increasingly important use as an approach to organizational design. While the implicit assumption has been that individuals work on one team at a time, many individuals are now being asked to juggle several projects and their associated multiple team memberships (MTM) simultaneously. This creates a set of interesting opportunities and challenges for organizations that choose to structure work in this way. In this paper, we review the limited existing research on MTM work. We then present the results of a survey documenting the prevalence of MTM work and the findings from a pilot interview study suggesting a number of challenges, benefits, and enabling conditions associated with MTM work. We discuss the implications for managers working in MTM environments as well as for scholars of teams and, in doing so we describe what we see as key items on the agenda for future research on this topic.}, doi = {10.1007/978-0-387-73025-7_16}, author = {Mortensen, Mark and Woolley, Anita and O{\textquoteright}Leary, Michael} } @article {322, title = {Conduct, Performance, and Dilemmas of Inter-organizational Virtual Organizing}, year = {2007}, pages = {35 - 50}, abstract = {Firms are increasingly embedded in networks of relationships with other organizations that are of strategic importance. An organization{\textquoteright}s participation in a network may provide access to information, resources, markets, and technologies, or it may lock it in unproductive relationships from which it may be difficult to extricate. Therefore, it is no longer adequate to analyze firms{\textquoteright} conduct and performance by examining firms in isolation from their network partners. Strategy research has investigated inter-organizational alliances for some time. However, the primary focus of this research has been to examine the antecedents of network formation and relatively lesser attention has been paid to the implications of alliances and networks on a firm{\textquoteright}s performance. Since virtual organizations are conceptualized as strategic networks and alliances among organizations, we examined literature on virtual organizations to understand what has been done in inter-organizational context. We found 34 papers out of a total of 117 papers on virtual organization that examined virtual organizing at inter-organizational level. We classified each of the short-listed papers by virtual organizing type (network membership, network structure, tie modality, and time-frame), performance, and dilemmas of virtual organizing. Our analyses showed that inter-organization virtual organizing strategy varied with the goals of virtual organizing. Across the short-listed papers we found a pattern of organizing that depended on whether organizing was for abstract resources (knowledge, skills, competencies, etc.) or for specific goals (outsourcing key components). Virtual organizing for abstract resources tended to exhibit decentralized network structure and collaborative ties with partners, while virtual organizing for specific goals tended to exhibit centralized network structure and opportunistic ties. We found a lack of empirical literature examining the process of inter-organization virtual organizing strategy and its consequences.}, doi = {10.1007/978-0-387-73025-7_5}, author = {Jha, Sanjeev and Watson-Manheim, Mary} } @booklet {323, title = {Connecting Lifelong Learning}, howpublished = {Lifelong Learning {\textendash} Signs, Discourses, Practices}, year = {2007}, month = {2007///}, pages = {147 - 164}, url = {http://dx.doi.org/10.1007/1-4020-5579-X_8}, author = {Usher, Robin and Edwards, Richard} } @article {324, title = {Coordinating Global Software Development Activities}, year = {2007}, pages = {99 - 117}, abstract = {In this paper, I explain how globally distributed software development subunits can coordinate their activities with information systems (IS). The basis of this explanation lies in the contemporary proliferation of global software development (GSD) activities that suggests an unexplained reality: organizations practicing GSD are somehow regulating their IS to cope with increasing and varied uncertainties. Through an empirical example of an organization{\textquoteright}s subunit{\textquoteright}s regulating and coping, I make the case that requisite variety in a subunit{\textquoteright}s information systems is a dependent variable for managing uncertainties leading to optimal coordination. In this example, I show varied uncertainties that faced the subunit, and I explain how variety in its information system was requisite for managing the uncertainties satisfactorily. Based on these explanations, I suggest four characteristics of variety in IS that will be requisite for managing uncertainties in GSD: developers{\textquoteright} agility; developers{\textquoteright} continuity and traveling; high frequency of communications; and varied communication modes and technologies.}, doi = {10.1007/978-0-387-73025-7_9}, author = {Wiredu, Gambel} } @booklet {325, title = {DEALING WITH DILEMMAS IN CONTEMPORARY HIGHER EDUCATION}, howpublished = {The Challenges of Educating People to Lead in a Challenging World}, year = {2007}, month = {2007///}, pages = {73 - 93}, abstract = {Contemporary Higher Education Institutions (HEI) are confronted with several dilemmas. In this chapter we will discuss two of these dilemmas.}, url = {http://dx.doi.org/10.1007/978-1-4020-5612-3_4}, author = {De Jonghe, Anne-Marie} } @conference {2007desperatelyimplementation, title = {Desperately Seeking for the Regulatory Artefact: Looking for Native and Tacit Regulatory Forms in the Case of a Kerala Government Free and Open Source Software Implementation}, year = {2007}, month = {Nov} } @article {327, title = {Dig the Dirt}, year = {2007}, pages = {13 - 18}, abstract = {It seems kind of strange that eating parasitic worms causes a cure rather than a disease. Yet, this fact is no stranger than many other man-bites-dog stories about {\textquotedblleft}real life{\textquotedblright} in contemporary times.1 Such stories arise at moments of changing equilibria in the processes of the social construction of reality. They are especially evident during periods of intense dialectic in which long held theses are being upended by powerful antitheses, and the glimmer of an eventual synthesis is still occluded by ignorance and confusion about what is at stake. The emergent dialectic among the {\textquotedblleft}real{\textquotedblright} and the {\textquotedblleft}virtual{\textquotedblright} provides a particularly interesting opportunity to explore the mechanisms of such dialectics. The opening quote from Laurie Anderson is a device to explicate the tension between the real and the virtual, and the mechanics of reconciliation by which a new equilibrium might be forged.}, doi = {10.1007/978-0-387-73025-7_3}, author = {John Leslie King} } @article {515, title = {The effects of national culture on ERP implementation: A study of Colombia and Switzerland}, journal = {Enterprise Information Systems}, volume = {1}, number = {3}, year = {2007}, pages = {301-325}, isbn = {1751{\textendash}7575}, url = {eis2007.pdf}, author = {Polomino Murcia, Mary Andrea and Edgar A. Whitley} } @article {503, title = {The European Information Systems Academy}, journal = {European Journal of Information Systems}, volume = {16}, number = {1}, year = {2007}, pages = {3-4}, isbn = {0197-2243}, url = {EJIS2007Editorial.pdf}, author = {Robert D. Galliers and Edgar A. Whitley and Ray J. Paul} } @article {331, title = {Expertise Management in a Distributed Context}, year = {2007}, pages = {295 - 313}, abstract = {This paper explores the management of expertise in offshore outsourcing projects. While the study of expertise development and coordination gained some attention in recent years, much of this research has been on co-located teams. Little is known about the way expertise is managed in distributed contexts and the challenges distributed teams face when attempting to develop and share expertise. To address this gap this paper discusses the notion of expertise management and concludes that it consists of three key processes; namely, development, coordination, and integration. To illustrate the challenges involved in expertise management processes, an in-depth case study of an ABN AMRO {\textemdash} TCS outsourcing project is outlined. In this case study onsite and offshore teams developed, coordinated, and integrated expertise despite geographical distance, time-zone differences, and different local contexts. Evidence from this case suggests that this outsourcing project jointly developed expertise while coordinating and integrating expertise in a distributed manner. Finally, conclusions are made and implications for research are discussed.}, doi = {10.1007/978-0-387-73025-7_21}, author = {Oshri, Ilan and Kotlarsky, Julia and Willcocks, Leslie and van Fenema, Paul} } @article {332, title = {Exploring the Nature of Virtuality}, year = {2007}, pages = {373 - 377}, abstract = {There has been considerable interest in the topic of virtuality over the last few years among both academics and practitioners. The focus of attention has generally been on how to improve collaboration and knowledge sharing, how to develop trust and cohesiveness within virtual organizations, virtual teams and virtual communities, and how to best support virtual interactions. Underlying this research area is the assumption that we possess sufficient understanding about the nature of virtuality and that we know how to distinguish {\textquoteleft}what is virtual{\textquoteright} to {\textquoteleft}what is not virtual{\textquoteright}. Even though several of us have attempted on various occasions to make a contribution in this field, we increasingly recognize that the nature of virtuality has not been well conceptualized in the literature. Part of the reason for this is that researchers, including us, often have the tendency to compare the virtual (distributed and CMC-based) to the traditional (collocated, and face-to-face) environment. We question this purely technological distinction, but recognize that virtuality, as an IT-enabled phenomenon, is increasingly extending its reach, becoming more global and more pervasive across all spheres of society. The theme of this panel is to examine, appreciate, and debate the multi-dimensional nature of what virtuality has been, is, and may become-specifically, its global and local dimensions, including the different interpretations that are and should be given to these dimensions.}, doi = {10.1007/978-0-387-73025-7_26}, author = {Niki Panteli and Chiasson, Mike and Yan, Lin and Angeliki Poulymenakou and Papargyris, Anthony} } @article {898, title = {The field of IS has always been about relationships, not things in themselves}, journal = {International Journal of Teaching and Case Studies}, volume = {1}, number = {1/2}, year = {2007}, pages = {15-22}, author = {Michael D. Myers} } @article {335, title = {From Senses to Sensors}, year = {2007}, pages = {281 - 293}, abstract = {One key dimension of the virtualization of the workplace is the formation of new types of partnerships where organizations let internal functions be handled by an external partner, the so-called outsourcing of services. The formation of an outsourcing partnership imposes the risk of knowledge-drainage on the client organization as specific internal competence decreases when the service provider takes over the technological knowledge and has a significant impact on the business processes in general. The aim of this paper is to address the issue of partnership outsourcing and to explore strategies that are used to keep the competence within the client organization even as it opens itself up to the partnership. Based on the framework of Four Outsourcing Relationship Types provided by Kishore et al. [1], this paper investigates the relationship between a large minerals group, Alpha Corp. and its remote service provider, RDC. Alpha has three different strategies for maintaining competence within the organization while engaging in the outsourcing relationship. The first is exploiting the full potential of its partnership with RDC, the second is heavy investment in information technology, and the third is structured and systematic maintenance. The findings of the study show that the relationship between Alpha and RDC can be characterized as an alliance type relationship and that the only way for Alpha to preserve competence is to maintain an inspired and engaged workforce and fully embrace the partnership in order to create a win-win situation.}, doi = {10.1007/978-0-387-73025-7_20}, author = {Westergren, Ulrika} } @article {336, title = {Game Architecture and Virtual Teamwork}, year = {2007}, pages = {387 - 389}, abstract = {The panel will provide some variety to the general conference content in the sense that it represents technology solutions and experiences that are socially aware. At this point, technologies and capabilities have advanced to the point that many previous socially-oriented issues have been overcome without this necessarily being widely known. This is the point for a good conjuncture of social informatics perspectives and technological developments. The audience is strongly encouraged to pose questions from their own frameworks for the enlightenment of all, bringing together some disparate disciplines in a common conversation.}, doi = {10.1007/978-0-387-73025-7_29}, author = {Baldwin, Esther and Pickering, Cynthia and Smith, David and Abecassis, David and Molenaur, Aaron} } @article {946, title = {Implementing secure group communications using key graphs}, journal = {Defence Science Journal}, volume = {57}, number = {2}, year = {2007}, publisher = {DRDO, DESIDOC}, issn = {0011-748X}, author = {AswaniKumar Ch, Sri Lakshmi. R, Preethi, M.} } @article {339, title = {Introduction: Deleuze and the Semiotics of law}, journal = {International Journal for the Semiotics of Law}, volume = {20}, year = {2007}, month = {2007/03/13/}, pages = {1 - 6}, abstract = {Without Abstract}, url = {http://dx.doi.org/10.1007/s11196-006-9042-9}, author = {Lippens, Ronnie and Murray, Jamie} } @article {356, title = {The IT Artifact and Telecommuting}, year = {2007}, pages = {391 - 395}, abstract = {Research on the concept of telecommuting or telework, as it is known in various areas of the world, has appeared in information systems (IS) and non-IS publications for more than 20 years. Research areas with respect to telecommuting are quite varied, from Information and Communication Technologies (ICT) use, to transportation, managerial control, work-life issues, and more. A significant number of these studies have taken into account the role of technology in enabling telecommuting. However, recent awareness of the IT artifact issue [1] has raised concerns for some authors, reviewers, and editors as to when the technology component is significant enough to consider some of the telecommuting research as IS research. Others, meanwhile, believe that by definition telecommuting addresses the IT artifact issue, and that this should not be a concern. In this panel, we explore the question of whether the IT artifact is an issue in IS-related telecommuting research by examining topics from multiple and sometimes competing perspectives.}, doi = {10.1007/978-0-387-73025-7_30}, author = {B{\'e}langer, France and Watson-Manheim, Mary and Harrington, Susan and Johnson, Nancy and Neufeld, Derrick} } @article {341, title = {Learning Triggers in Virtual Groups}, year = {2007}, pages = {231 - 249}, abstract = {Learning is a critical capability for virtual group effectiveness. The objective of this study is to understand when learning occurs. Once we understand when learning occurs we are better able to stimulate learning to enhance the effectiveness of virtual groups. Additionally, understanding the nature of learning triggers and the results they produce informs how we may achieve desired learning outcomes. This study develops a framework to explain, and empirically studies, when learning occurs in virtual groups. The study employed a single, embedded, qualitative case study designed to study learning triggers in an Open Source Software project. Findings suggest that learning occurs ensuing learning triggers. Learning triggers vary in type and source. The type and source of learning triggers effects whether learning occurs in the group and the type of learning outcomes the trigger produces.}, doi = {10.1007/978-0-387-73025-7_17}, author = {Annabi, Hala} } @article {510, title = {Managing expectations of technological systems: A case study of a problematic government project}, journal = {Spontaneous Generations}, volume = {1}, number = {1}, year = {2007}, note = {https://jps.library.utoronto.ca/index.php/SpontaneousGenerations/article/view/2973/1117}, pages = {67-77}, isbn = {1913-0465}, url = {SG2007.pdf}, author = {Aaron K Martin and Edgar A. Whitley} } @proceedings {485, title = {Policy Engagement as Rigourous and Relevant Information Systems Research: The Case of the LSE Identity Project}, year = {2007}, note = {http://personal.lse.ac.uk/whitley/allpubs/ecis2007.pdf}, pages = {1301-1312}, publisher = {University of St. Gallen}, address = {St. Gallen}, url = {ECIS2007.pdf}, author = {Edgar A. Whitley and Ian R Hosein}, editor = {Hubert {\"O}sterle and Schelp, Joachim and Winter, Robert} } @article {360, title = {The Practice of e-Science and e-Social Science}, year = {2007}, pages = {267 - 279}, abstract = {Grid technologies are widely regarded as important innovations for drawing together distributed knowledge workers into virtual communities. After reviewing the developments in e-science, we examine the emergence of e-social science and the potential impact on scientific discovery. Grids are currently in a key developmental phase during which the field of information systems can bring significant insight. We consider what is new about the Grid phenomena and discuss the issues raised by this particular approach to the virtualization of research practices. Our analysis is organized into three subsections that focus on: developments in e-social science research methods; the theoretical issues involved in pursuing an e-social science agenda; as well as the status and nature of the research materials that it gives rise to in information systems.}, doi = {10.1007/978-0-387-73025-7_19}, author = {Scott, Susan and Venters, Will} } @article {361, title = {The Presentation of Self in a Virtual but Work-related Environment}, year = {2007}, pages = {183 - 199}, abstract = {More and more people take part in virtual environments in which they present a {\textquotedblleft}virtual self{\textquotedblright}{\textemdash}an online profile that indicates key information about them to other participants and viewers. This research investigates how people present themselves in the virtual yet work-related environments of occupational online forums. To do so, the research analyzes the profiles of more than 300 registered users of an online forum dedicated to issues of interest to bankers. These profiles are interpreted in relation to Goffman{\textquoteright}s (1959) seminal ideas of mystification (allowed by the separation between backstage and public action) and presentation of self and of Turkle{\textquoteright}s (1995) ideas of multiple, interrelated, online and offline selves. This research builds a grounded categorization of profiles. The four categories of profiles that emerged from the data correspond to clearly distinct ways participants in the online forums present themselves. Over time, two categories have become dominant while another has dwindled. This research holds implications for the understanding of the presentation of self in virtual but work-related environments. It shows how participants in online forums build their virtual self by playing with the mystification inherent of the virtual environment. It also shows an interplay between the virtual and the offline when some participants {\textquotedblleft}de-mystify{\textquotedblright} their profile. Finally, the increasing prevalence of two categories of profiles suggests that, over time, social norms of presentation of self emerge and condition socially accepted virtual selves in occupational online forums.}, doi = {10.1007/978-0-387-73025-7_14}, author = {Vaast, Emmanuelle} } @article {309, title = {A Process Maturity Model for Geographically Dispersed Software Sustenance Operations}, year = {2007}, pages = {133 - 148}, abstract = {An increase in demand for software services has led to development of software from different dispersed locations. This has brought in complexities to managing software projects. This research work focuses on the development of a process maturity model that balances different perspectives in one organization that is carrying out software sustenance work from geographically dispersed locations.}, doi = {10.1007/978-0-387-73025-7_11}, author = {Sharma, Rajeev and Krishna, S.} } @article {909, title = {The qualitative interview in IS research: Examining the craft}, journal = {Information and Organization}, volume = {17}, number = {1}, year = {2007}, pages = {2-26}, author = {Michael D. Myers and Michael Newman} } @article {534, title = {Reflections on the academic policy analysis process and the UK Identity Cards Scheme}, journal = {The information society}, volume = {23}, number = {1}, year = {2007}, pages = {51-58}, isbn = {0197-2243}, url = {TIS2007.pdf}, author = {Edgar A. Whitley and Ian R Hosein and Ian O. Angell and Simon Davies} } @article {347, title = {Reframing Online Games}, year = {2007}, pages = {335 - 351}, abstract = {Massively-multiplayer online games, or {\textquotedblleft}synthetic worlds,{\textquotedblright} represent a rapidly-growing industry with far-reaching social, technical, and economic implications. In this position paper, we draw on literature from anthropology, sociology, and film to challenge long-standing misconceptions of {\textquotedblleft}games{\textquotedblright} and {\textquotedblleft}work{\textquotedblright} and of {\textquotedblleft}virtuality{\textquotedblright} and {\textquotedblleft}reality{\textquotedblright} as dualisms that have obscured synthetic worlds from serious consideration by IS scholars. Building on this work and recent reports of businesses, nonprofits, entrepreneurs, and educational institutions incorporating synthetic worlds into their day-to-day practices, we argue that synthetic worlds represent a legitimate arena for IS research. We begin by offering a framework for characterizing the nature and structure of the social activity occurring in the diverse array of synthetic worlds currently available. Then we illustrate our position by considering synthetic worlds from the perspective of organizational communication, a substantive area with a rich tradition in IS research. Employing a genre lens as an illustrative example, we identify phenomena and raise research questions the IS community is uniquely positioned to explore.}, doi = {10.1007/978-0-387-73025-7_23}, author = {Ulrike Schultze and Rennecker, Julie} } @article {558, title = {Response to second s.37 cost report}, year = {2007}, month = {27 June}, url = {http://identityproject.lse.ac.uk/s37Response2.pdf}, author = {LSE Identity Project,} } @article {546, title = {Rhetorical confidence and technological certainty in technology led policy initiatives}, year = {2007}, url = {PSE2007.pdf}, author = {Edgar A. Whitley} } @article {362, title = {The Role of Shapers in Knowledge-Sharing}, year = {2007}, pages = {383 - 386}, abstract = {Wikis are a collaborative technology that allows for new ways of working and sharing knowledge. While most firms today have been experimenting with wikis, an important element of the use of wikis that has generally been ignored is the role of the people who shape the wiki pages. Shapers ensure the sustainability of a wiki community by helping to ensure that new ideas and contributions are made and organized. This panel consists of four practitioners who play critical shaping roles in their wiki communities, and two academics who will begin, moderate, and summarize the session. The panel of practitioners will share their thoughts on why they shape, how they shape, and how other communities can help to encourage participants to adopt the shaping role.}, doi = {10.1007/978-0-387-73025-7_28}, author = {Majchrzak, Ann and Wagner, Chris and Riehle, Dirk and Thoeny, Peter and Shah, Sunir and Cunningham, Ward} } @conference {miscione2007scalabilityorganization, title = {Scalability as Institutionalization - Practicing District Health Information System in an Indian State Health Organization}, year = {2007}, address = {Sao Paulo, Brazil}, author = {Miscione, G and Sahay, S} } @article {348, title = {Sharing Knowledge in Global Virtual Teams}, year = {2007}, pages = {251 - 265}, abstract = {Virtual teams have been seen as a promising way of organizing work for organizations to cope with the current rapidly changing business environment. Issues concerning virtual teams have received considerable attention in both the academic and practical world. In this paper, a case study approach was used to explore Chinese perceptions of the impact of national cultural difference (China vs. U.S.) on knowledge sharing activities in global virtual teams. Four cultural dimensions (language, education, technology and material culture, and attitudes and values) were identified. The final results show that language has the most salient impact on an individual{\textquoteright}s knowledge sharing activities, followed by education, attitudes and values, and technology and material culture. Individual characteristics, organizational culture, time zone problems and leadership style all have a mediated impact on knowledge sharing activities.}, doi = {10.1007/978-0-387-73025-7_18}, author = {Wei, Kangning} } @article {848, title = {Social Activism in Information Systems Research: Making the World a Better Place}, journal = {Communications of the AIS}, volume = {19}, year = {2007}, pages = {261-277}, address = {Milwaukee, WI}, author = {Kevin Desouza and Ein-Dor, Phillip and Donald J. McCubbrey and Robert D. Galliers and Michael D. Myers and Richard T. Watson} } @article {363, title = {The Social in the Virtual}, year = {2007}, pages = {379 - 382}, abstract = {Virtuality is often defined solely as that which lacks or is not material reality, and as such, much of the social order that is uniquely engendered within technologically-mediated realities has been inadequately described. This panel attempts to define virtuality on its own terms, instead of as reality-negative, by showcasing four perspectives of social interaction in virtual space. Panelists Elizabeth Churchill, Thomas Erickson, Cliff Lampe, and Rosanne Siino will share insights into the social orders in the virtualities of their interests. Presentations will be followed by a discussion among panelists and panel participants.}, doi = {10.1007/978-0-387-73025-7_27}, author = {Chong, Jan and Erickson, Ingrid and Lee, Kathy and Siino, Rosanne} } @conference {349, title = {Some Usability Issues of Augmented and Mixed Reality for e-Health Applications in the Medical Domain}, booktitle = {HCI and Usability for Medicine and Health Care}, year = {2007}, pages = {255 - 266}, abstract = {Augmented and Mixed Reality technology provides to the medical field the possibility for seamless visualization of text-based physiological data and various graphical 3D data onto the patient{\textquoteright}s body. This allows improvements in diagnosis and treatment of patients. For the patient, this technology offers benefits and further potential in therapy, rehabilitation and diagnosis, and explanation. Applications across the whole range of functions that affect the health sector from the physician, the medical student, to the patients are possible. However, the quality of the work of medical professionals is considerably influenced by both usefulness and usability of technology. Consequently, key issues in developing such applications are the tracking methodology, the display technology and most of all ensuring good usability. There have been several research groups who extended the state of the art in employing these technologies in the medical domain. However, only a few are addressing issues of Human-Computer Interaction, Interaction Design, and Usability Engineering. This paper provides a brief overview over the history and the most recent developments in this domain with a special focus on issues of user-centered development.}, doi = {10.1007/978-3-540-76805-0_21}, author = {Behringer, Reinhold and Christian, Johannes and Holzinger, Andreas and Wilkinson, Steve} } @article {350, title = {Spatial and Temporal Boundaries in Global Teams}, year = {2007}, pages = {85 - 98}, abstract = {While spatial boundaries include the geographic differences among team members (different cities), temporal boundaries include the workday differences among team members (different time zones). In global teams members have to deal with both spatial and temporal boundaries since their co-workers are often located in cities within and across time zones. For global team members with high spatial boundaries and low temporal boundaries (those in different cities in the same time zone), synchronous communication technologies such as the telephone and instant messenger provide a means for real-time interaction. However, for global team members with high spatial boundaries and high temporal boundaries (those in different cities in different time zones), asynchronous communication technologies, such as e-mail and web software, provide a way to interact intermittently. Using social network data from 625 team members (representing 5986 pairs) across 137 global teams in a multi-national semiconductor firm, we explore the impact of spatial and temporal boundaries on coordination delay. We also illustrate how member awareness can reduce coordination delay, thus increasing the likelihood of better global team performance.}, doi = {10.1007/978-0-387-73025-7_8}, author = {Cummings, Jonathon and Espinosa, J. and Pickering, Cynthia} } @article {310, title = {A Structurational Perspective on Leadership in Virtual Teams}, year = {2007}, pages = {151 - 168}, abstract = {Building on behavioural leadership theory and structuration theory, we present a two-order theory of leadership. It describes four classes of first-order leadership behaviours (task coordination, substantive task contribution, group maintenance and boundary spanning) and defines second-order leadership as behaviour that influences changes in the structure that guides group action. We argue that second-order leadership is enabled by first-order leadership and is therefore action embedded and grounded in processes that define the social identity of the group. We propose that effective virtual teams will exhibit a paradoxical combination of shared, distributed first-order leadership complemented by strong, concentrated, and centralized second-order leadership. We conclude by suggesting future research that might be conducted to test and further elaborate our theory.}, doi = {10.1007/978-0-387-73025-7_12}, author = {Heckman, Robert and Kevin Crowston and Misiolek, Nora} } @inbook {838, title = {The Structure of Power in Action Research Projects}, booktitle = {Information Systems Action Research: An Applied View of Emerging Concepts and Methods}, year = {2007}, pages = {19-42}, publisher = {Springer}, organization = {Springer}, author = {Baskerville, Richard L and Avison, David and Michael D. Myers}, editor = {Kock, Ned} } @article {398, title = {Structuring Virtuality}, year = {2007}, pages = {53 - 66}, abstract = {The purpose of this paper is to provide an example of an empirical procedure for generating user-based cognitive and social cognitive models of tasks/problems/contexts that can be employed to create readily navigable link structures for virtuality-mediated communication and collaboration purposes. Employing a natural language, user-based method, this study describes patterns found across 128 interviews where respondents were describing their cognitive movement in the form of steps taken during an interactive E-Commerce situation. Employing these patterns, we analytically develop a model of E-Commerce as a series of logically necessary steps over time. The resulting model illustrates the utility of individual cognitive and social cognitive patterns to structure virtuality as a series of interactive links associated with particular tasks/problems/contexts. Logical structures derived in this manner have the additional strength of requiring no {\textquotedblleft}training{\textquotedblright} of users because they already recognize the inherent linguistic, temporal and functional relationships. As an added benefit, the model of E-Commerce generated in this study has concrete practical implications for web site design and evaluation.}, doi = {10.1007/978-0-387-73025-7_6}, author = {Nilan, Michael and Mundkur, Anuradha} } @article {566, title = {Submission to the House of Commons Home Affairs Committee inquiry into "A surveillance society?" by the London School of Economics and Political Science Identity Project}, year = {2007}, author = {Edgar A. Whitley} } @article {565, title = {Submission to the House of Lords Constitution Committee inquiry into the "Impact of Surveillance \& Data Collection" by the London School of Economics and Political Science Identity Project}, year = {2007}, author = {Edgar A. Whitley} } @article {miscione2007telemedicine, title = {Telemedicine in the Upper Amazon: Interplay with local health care practices}, journal = {MIS quarterly}, year = {2007}, pages = {403{\textendash}425}, publisher = {JSTOR}, author = {Miscione, Gianluca} } @article {miscione2007telemedicinepractices, title = {Telemedicine in the upper Amazon: Interplay with local health care practices}, journal = {MIS Quarterly: Management Information Systems}, volume = {31}, number = {2}, year = {2007}, month = {Jan}, pages = {403{\textendash}425}, abstract = {This article is based on the introduction of a telemedicine system in the jungles of northeastern Peru. The system was designed by a European consortium led by a Spanish polytechnic in cooperation with two universities in Lima and the Peruvian Ministry of Health. The purpose of the system was to improve health conditions by extending science-based medicine into a region with well-established traditional healing practices. The central analytical focus of this article is on the interplay between the public health care system, which used the telemedicine system, and local health care practices. The manner in which scientific medicine was delivered through information technology and public health care services is analyzed in terms of the health personnel{\textquoteright}s activity, the local population {\textquoteright}s conceptions of health, and the trajectories followed by patients seeking recovery. The author participated in the design of the second evaluation of the telemedicine system and acted as a participant observer in the regional hospital and peripheral clinics. In addition to interviewing health care staff from the study area, the author also met with traditional healers, and patients in the districts whether or not they were involved in the telemedicine project. New institutional theory provided the analytical framework for the interpretation of the observed behavior of the public health care staff, traditional healers, and potential patients. Empirically, this study describes the informal aspects of the functioning of the telemedicine system, and its partial mismatch with the definitions of health and illness employed by local communities and healers. An argument is made that people{\textquoteright}s construction of their health, which is embedded in their normal patterns of action, should be identified, and then considered in the design, implementation, and evaluation of future telemedicine projects. This article problematizes an approach to telemedicine-based health development that is weakly accountable to local social contexts and their diversity.}, issn = {0276-7783}, doi = {10.2307/25148797}, author = {Miscione, G} } @article {365, title = {The Tension Between Expectations of Availability and the Reality of Availability in Hybrid Teams}, year = {2007}, pages = {119 - 131}, abstract = {The demands of the global world increasingly dictate that people travel in order to conduct work. Oftentimes, this means that team members are neither strictly here nor there. Teams such as these are hybrids, where members alternate between co-located and distributed contexts. The pervasive nature of information and communication technologies, however, continues to impose an expectation of availability on the team members even as they travel. In this paper, we take a reflexive research stance to inform our understanding of the complexities of accomplishing knowledge work within a hybrid team configuration. An illustrative case highlights issues and outcomes associated with member availability that arose during the writing of a research paper. Categorical reasons for member unavailability are identified and contrasted with the expectation of availability. We suggest that the issues and conflict we experienced may be traced to the ambiguous nature of the task and the early project phase requiring problem for mulation.}, doi = {10.1007/978-0-387-73025-7_10}, author = {Ocker, Rosalie and Huang, Haiyan and Trauth, Eileen and Purao, Sandeep} } @booklet {368, title = {Toward a Framework for Global Communication: Durkheim, Phenomenology, Postmodernism, and the {\textquotedblleft}Construction{\textquotedblright} of Place and Space}, howpublished = {Frontiers of Globalization Research}, year = {2007}, month = {2007///}, pages = {333 - 350}, abstract = {The chapters in this volume have documented contrasting dimensions of contemporary globalization: we have an an unprecedented cross-national interaction in terms of trade and circulation of financial capital (see Chapter 7 by Chase- Dunn and Jorgenson); on the other hand, we witness a severely curtailed migration of labor, unevenness of global development (see Chapter 8 by Arrighi) and economic marginalization of many nations because, among other reasons, of the superiority of Western technology (see Chapter 9 by Schaeffer). Digital interconnectedness accelerates the speed and magnifies the positive and negative impact of globalization. In fact, digital communication facilitates the financialization of the economy, the restructuring of production and distribution systems, the spreading of ideologies, and the intensification of global awareness. We have also seen that digital communication produces an instantaneous confrontation of geographically distant and socioculturally different societies; this confrontation accentuates old and recent conflicts and produces further distance and alienation among competing nations and civilizations. At the end of my essay on {\textquotedblleft}Globalization as an Historical and a Dialectic Process{\textquotedblright} (Chapter 1) I pointed out that human agency can greatly contribute to a heightening of global awareness and to forging positive solutions to world affairs. Because human agency is heavily immersed in and formed through patterns of digitized interaction, I discuss in this chapter the nature of digital communication and the role of human agency in a digitally connected world.}, url = {http://dx.doi.org/10.1007/978-0-387-33596-4_16}, author = {Rossi, Ino} } @article {498, title = {Towards an Understanding of FLOSS: Infrastructures, Materiality and the Digital Business Ecosystem}, journal = {Science Studies}, volume = {20}, number = {2}, year = {2007}, note = {http://opensource.mit.edu/papers/Darking_Whitley.pdf}, pages = {13-33}, isbn = {0786-3012}, url = {SciStudies2007.pdf}, author = {Mary L Darking and Edgar A. Whitley} } @article {369, title = {Understanding Virtuality}, year = {2007}, pages = {201 - 213}, abstract = {Although virtual interactions are often assumed to be separate and distinct from the {\textquotedblleft}real world,{\textquotedblright} they are ultimately situated in material reality. In this paper I propose that a situated approach to understanding virtuality can be drawn from Goffman{\textquoteright}s Frame Analysis (1974/1986). I explain how Goffman{\textquoteright}s terminology and concepts afford a powerful way of integrating the study of virtual action and interaction with the study of social action and interaction more generally. His frame analysis provides language and concepts for distinguishing virtual worlds from each other and from real worlds in a way that is consonant with significant aspects of human-computer interaction. It helps to account for the phenomenon of immersion in virtual worlds, while at the same time, it is better suited for understanding both co-present and mediated social interaction. I conclude by discussing some limitations of this approach and suggestions for further research.}, doi = {10.1007/978-0-387-73025-7_15}, author = {Brooks, JoAnn} } @article {567, title = {U-turns in the National Identity Scheme: Implications for industry: Report for Enterprise Privacy Group}, year = {2007}, author = {Edgar A. Whitley} } @article {372, title = {Virtual Patients}, year = {2007}, pages = {397 - 401}, abstract = {In medical education and clinical care, representations of the patient help health care teams in planning and coordinating patient care, sometimes over geographic distances. This takes forms ranging from telemedicine consultations to using simulations and information and communication technology representations to plan, and at times, perform clinical procedures such as are done in intensive care units or in surgery. The increasing reliance on computer-mediated interaction in health care generally is considered the means to more efficient, equitable, and cost-effective care with reduced errors. Clinical work, then, may be carried out with simulated images and processes rather than through such physical processes as examining the patient directly. Instead of treating the actual person, one result may be that clinicians are treating computer-mediated representations of that person. This session explores virtuality in health care environments, with a particular focus on the virtual patient. Panelists discuss treating representations of patients by addressing how: (1) usability studies reveal the extent to which physicians may pay more attention to representations of the patient condition rather than to the actual patient, (2) images may be considered as more real than the patient, (3) different graphic representations of patient data have different consequences, and (4) virtuality affects quality of care in virtual intensive care units. From different research and theoretical perspectives and studies in these different environments with different technologies, panelists discuss repercussions of virtuality on teamwork and service delivery in health care. Their presentations of developments leading towards virtual patients point towards significant issues of virtuality in other environments.}, doi = {10.1007/978-0-387-73025-7_31}, author = {Bonnie Kaplan and Elkin, Peter and Gorman, Paul and Koppel, Ross and Sites, Frank and Talmon, Jan} } @article {375, title = {Virtuality and Virtualization}, year = {2007}, pages = {1 - 7}, abstract = {In today{\textquoteright}s rapidly changing global work environment, all workers directly experience increased organizational complexity. Companies are functionally distributed, many across the globe. Intense competition for markets and margins makes adaptiveness and innovation imperative. Information and communication technologies (ICT) are pervasive and fundamental infrastructures, their use deeply integrated into work processes. Workers collaborate electronically with co-workers they may never meet face-to-face or with employees of other companies. New boundaries of time, space, business unit, culture, company partnerships, and software tools are driving the adoption of a variety of novel organizational forms. On a macro-level, these changes have started to reshape society, leading some to speak of the {\textquotedblleft}Network Society{\textquotedblright} and the {\textquotedblleft}Information Age.{\textquotedblright}}, doi = {10.1007/978-0-387-73025-7_1}, author = {Kevin Crowston and Sandra Sieber} } @article {377, title = {Virtualization and Institutions}, year = {2007}, pages = {369 - 372}, abstract = {This panel explores the value of institutional theory in understanding {\textquoteleft}virtualization (in its varieties of meanings) and the impact on work practices, organizations and society.{\textquoteright} In 2001, Orlikowski and Barley made an initial appeal in this direction suggesting that IS research could benefit from institutional theory and that organization theory could also learn from IS research in taking the materiality of technology seriously. Since this earlier call, there have been significant developments in institutional theory from within organizational theory, particularly at the micro-level of analysis. However, apart from some notable exceptions at the macro-level, IS research is yet to explore the value of institutional theory for understanding virtualization of work practices. A particular focus of this panel, therefore, is to explore the potential of micro and macro level developments in institutional theory, and the value of a multilevel approach for the virtualization of work.}, doi = {10.1007/978-0-387-73025-7_25}, author = {Michael Barrett and Elizabeth Davidson and Leiser Silva and Geoff Walsham} } @article {378, title = {Virtualizing the Virtual}, year = {2007}, pages = {353 - 366}, abstract = {This essay advances a supplementary definition of {\textquotedblleft}the virtual{\textquotedblright} that is aimed at helping our research community speak more clearly to the organizational changes and the place-time reinventions taking place in connection with the virtual in the more customary sense(s) of that term. The intent in linking the issue of definition to organizational transformation is not to make proposals about the specific forms, functions, and reinventions that might, or ought to, appear, but rather to reflect on the processes through which such changes, whatever their character, come about. Adapting Deleuze{\textquoteright}s conceptualization of the virtual, I extend virtuality to include the imaginary and fictitious. The focus, in particular, is on the kind of fiction that, in Latour{\textquoteright}s phrasing, is {\textquotedblleft}seeking to come true{\textquotedblright}; thus, our interest is in the fictionalizations in which real actors engage as they struggle discursively to construct their future realities. This calls for attention to the social and political context and, more specifically, to the manner in which the privileges of {\textquotedblleft}author-ity,{\textquotedblright} for fictionalization, impact what is actualized as organizational structure and practice. The paper concludes with a consideration of the implications for research practice of viewing IT-enabled change, like that which is producing virtual work and virtual organizations, as a form of authorship.}, doi = {10.1007/978-0-387-73025-7_24}, author = {Ramiller, Neil} } @article {502, title = {Vive les differences?}, journal = {European Journal of Information Systems}, volume = {16}, number = {1}, year = {2007}, pages = {20-35}, isbn = {0197-2243}, url = {EJIS2007.pdf}, author = {Robert D. Galliers and Edgar A. Whitley} } @article {559, title = {Web resources}, year = {2007}, url = {http://identityproject.lse.ac.uk/}, author = {LSE Identity Project,} } @article {555, title = {All Party Briefing for Report Stage: Voluntary v. compulsory regimes}, year = {2006}, month = {23 January}, url = {http://identityproject.lse.ac.uk/voluntarybriefing.pdf}, author = {LSE Identity Project,} } @article {563, title = {All party briefing: On mechanisms to report on the costs of the scheme.}, year = {2006}, author = {Edgar A. Whitley} } @article {561, title = {All party briefing: On the differences between a compulsory and voluntary regime}, year = {2006}, author = {Edgar A. Whitley} } @article {562, title = {All party briefing: On the new identity fraud figures from the Home Office.}, year = {2006}, author = {Edgar A. Whitley} } @article {564, title = {All party briefing: On the proposed amendment concerning designated document powers}, year = {2006}, author = {Edgar A. Whitley} } @article {679, title = {American Discourses of the Digital Divide and Economic Development: A Sisyphean Order to Catch Up?}, year = {2006}, pages = {51 - 65}, abstract = {Discourses about technology and its role in development have been constant themes within IFIP Working Group 8.2 (see the Barcelona proceedings{\textemdash}Wynn et al. 2002). In this paper, we examine how strands of discourse{\textemdash}institutionalized ways of thinking and speaking{\textemdash}shape debate about the digital divide and urban poverty in America. As research is widely esteemed as a wellspring of new ideas, we are especially interested in how discourses inform scholarly inquiry into urgent social problems. As information and communication technologies (ICTs) are increasingly hailed as drivers of industry and commerce, we believe that it will be instructive to examine economic development discourse, which strongly informs the case for bridging the digital divide. First, using Fairclough{\textquoteright}s three-level framework for critical discourse analysis (CDA), we reveal that the discursive hegemony of economic development alarmingly constrains approaches to urban revitalization. Linking economic development to the digital divide, we show how the ongoing evolution of ICTs has become tightly linked to economic development. Both are discourses of equality in which those who lack money and technology are cast as needy problem sectors that will be left behind, failing to reap a host of benefits. Hence, there is an urgent call for these {\textquotedblleft}have-nots{\textquotedblright} to catch up to models of prosperity embodied by the wealthy or technology savvy. We find fault with this discourse because it narrowly privileges money and technology, and raises alarm at their mere absence, while obscuring substantive needs{\textemdash}hunger, homelessness, ill health{\textemdash}of actual consequence. We propose that, in order truly to realize the potential of ICT, we must first reinvent discourse{\textemdash}discarding the mantra of catching up{\textemdash}and set in motion efforts to address self-determined needs, supported by ICT. }, doi = {10.1007/0-387-34588-4_4}, author = {Tu, Leslie and Lynette Kvasny} } @booklet {miscione2006theschool, title = {The Boundaries of Medical Knowledge. The case of Telemedicine in Upper Amazon (Warwick Business School)}, year = {2006}, month = {Mar}, author = {Miscione, G} } @proceedings {445, title = {The challenge of building public technology infrastructure: issues of governance and sustainability in a digital business ecosystem}, year = {2006}, pages = {2030-2038}, address = {Goteborg}, url = {ECIS2006Mary.pdf}, author = {Mary L Darking and Edgar A. Whitley and Dini, Paolo}, editor = {Ljunberg, Jan and Andersson, Magnus} } @article {678, title = {A Comparison of Factors Impacting ICT Growth Rates in Developing and Industrialized Countries}, year = {2006}, pages = {37 - 50}, abstract = {In this paper we investigate the factors that impact ICT growth rates in developing countries and compare those with factors affecting industrialized countries. Four categories of factors, human development, social structure, institutional factors, and national infrastructure, were considered with respect to their impact on three ICTs: cell phones, PCs, and the Internet. ICT infrastructure influenced ICT growth rates in all nations, but the impacts of human development, institutional index, and urbanization varied between industrialized countries and developing countries. }, doi = {10.1007/0-387-34588-4_3}, author = {Bagchi, Kallol and Kirs, Peeter and Udo, Godwin} } @article {698, title = {The Corporate Digital Divide Between Smaller and Larger Firms}, year = {2006}, pages = {413 - 417}, doi = {10.1007/0-387-34588-4_27}, author = {Pliskin, Nava and Levy, Margi and Heart, Tsipi and O{\textquoteright}Flaherty, Brian and O{\textquoteright}Dea, Paul} } @article {680, title = {Cybersolidarity: Internet-Based Campaigning and Trade Union Internationalism}, year = {2006}, pages = {123 - 135}, abstract = {E-mail campaigns are one form of cyber solidarity{\textemdash}action at a distance mediated by use of the Internet in support of trade unions or groups of workers. This paper, taking the example of a campaign in support of imprisoned Eritrean trade unionists, examines the social organization and information flows underlying such campaigns. These are discussed in the light of the effectiveness of such actions, their capacity to overcome the global digital divide, current debates on the role of the Internet in the remaking of trade unionism, and labor{\textquoteright}s capacity to remake the spatial relations of capitalism. }, doi = {10.1007/0-387-34588-4_9}, author = {Bruce Robinson} } @article {681, title = {Developing Open Source Software: A Community-Based Analysis of Research}, year = {2006}, pages = {261 - 278}, abstract = {Open source software (OSS) creates the potential for the inclusion of large and diverse communities in every aspect of the software development and consumption life cycle. However, despite 6 years of effort by an ever growing research community, we still don{\textquoteright}t know exactly what we do and don{\textquoteright}t know about OSS, nor do we have a clear idea about the basis for our knowledge. This paper presents an analysis of 155 research artefacts in the area of open source software. The purpose of the study is to identify the kinds of open source project communities that have been researched, the kinds of research questions that have been asked, and the methodologies used by researchers. Emerging from the study is a clearer understanding of what we do and don{\textquoteright}t know about open source software, and recommendations for future research efforts }, doi = {10.1007/0-387-34588-4_18}, author = {Joseph Feller and Finnegan, Patrick and Kelly, David and MacNamara, Maurice} } @article {682, title = {Digital Inclusion Projects in Developing Countries: Value, Sustainability, and Scalability}, year = {2006}, pages = {67 - 70}, doi = {10.1007/0-387-34588-4_5}, author = {Shirin Madon and Reinhard, Nicolau and Dewald Roode and Geoff Walsham} } @booklet {328, title = {Downtime on the Net: The Rise of Virtual Leisure Industries}, howpublished = {The International Handbook of Virtual Learning Environments}, year = {2006}, month = {2006///}, pages = {961 - 998}, abstract = {When Manuel Castells in 2001 came to focus on the culture of the internet, attempting to describe its curious amalgam of origins and influences, and their persistence in the values present in its manifold operations, he suggested that it was in many ways a culturally schizoid medium. On the one hand, as maintained for instance in the many myths of its APARNET military foundation, it presents as a scientific, pragmatic, rational, communicative instrument; a standardized, and so regulatory set of operations to facilitate and accelerate data flows. But at the same time, given its long conception in a largely informal and highly collegial set of laboratory backrooms and University graduate-assistant work zones, it has inbuilt elements of the sorts of libertarianism or radical communitarianism identified by Bauman (2000). It retains a playfulness, a feisty independence, and an innovative edge, among the enduring marks of its operations. Perhaps then it should come as less of a surprise that we have come to see leisure pursuits: pastimes popularly conceived as belonging in the personal domain of self-expressiveness, private recreation or {\textquotedblleft}downtime{\textquotedblright} sociability; as prominent agents of the Net{\textquoteright}s development. In some cases, whether desired or not as part of any {\textquotedblleft}official{\textquotedblright} history of this currently central cultural medium, online recreation or {\textquotedblleft}virtual leisure{\textquotedblright} has been positioned among the dominant elements within the internet{\textquoteright}s development. Consider for instance persistent suggestions that the technologization of online pornography has contributed new forms of interactivity to webcam and online video use (Slater, 1998; Williams, 1990); innovations introduced at least as early as those for scientized telemedicine for instance, and rather more widely used. In some of the very earliest academic analyses of online content and services-often published in screen journals, before the rise of more specialized publishing sources- analysts and researchers were already aware of powerful online communities working around such {\textquotedblleft}unrespectable{\textquotedblright}, unproductive or even illicit activities as sex, game play, or just plain sociability.}, url = {http://dx.doi.org/10.1007/978-1-4020-3803-7_36}, author = {Cook, Jackie} } @article {683, title = {Engaging Youths Via E-Participation Initiatives: An Investigation into the Context of Online Policy Discussion Forums}, year = {2006}, pages = {105 - 121}, abstract = {Advances in information and communication technologies (ICTs) have offered governments new opportunities to enhance citizen participation in democratic processes. The participation opportunities afforded by ICT may be particularly pertinent for youths, who are more likely to be ICT-savvy and yet are reported to show declining participation in politics. The currently increasing exclusion of youths from democratic processes has been attributed to their apathy toward politics and a lack of participation channels for them. ICT as a familiar tool for this specific age group may present an opportunity to elicit youths{\textquoteright} participation in democratic processes. In this study we examine an e-participation initiative targeted at youths and seek to investigate the factors contributing to their participation in an online discussion forum employed for policy deliberation. We build upon theoretical bases from the political science and information systems literature to construct a research model of participation in online policy discussion forums. As an initial study of youths{\textquoteright} e-participation, our survey indicates that collective and selective incentives may positively impact youths {\textquoteright}participation intention. In addition, civic skills and political efficacy of individuals may also contribute to their participation. Connectivity with an online policy discussion forum can enhance youths {\textquoteright} perceptions of selective process incentives while communality negatively impacts their intention to participate. Overall, our study aims to inform theory by showing that existing participation theories may be applicable to youth{\textquoteright}s participation in the electronic context. Further, ICT features (connectivity and communality) are found to have both positive and negative effects on participation. The findings may provide insights to practitioners for promoting inclusion of youths in democratic processes via e-participation initiatives. }, doi = {10.1007/0-387-34588-4_8}, author = {Phang, Chee and Kankanhalli, Atreyi} } @article {553, title = {Home Office Accounting Report}, year = {2006}, url = {http://identityproject.lse.ac.uk/accountingreport.pdf}, author = {LSE Identity Project,} } @article {554, title = {Home Office Accounting Report}, year = {2006}, month = {March}, url = {http://identityproject.lse.ac.uk/accountingreport.pdf}, author = {LSE Identity Project,} } @article {684, title = {How (Can) Nonusers Engage with Technology: Bringing in the Digitally Excluded}, year = {2006}, pages = {347 - 364}, abstract = {This paper describes findings from the Penceil Project, which aims to explore the experiences of nonusers and minimal users of ICTs, how nonuse affects their inclusion or exclusion from society, and how they can learn to use ICTs to meet their personal goals. The paper considers the applicability of the technology adoption model (TAM) to understanding the experiences of this group of people. By looking at theories of social exclusion and the project research findings, the paper argues that TAM is limited in the range of social conditions it anticipates and, thus, presumes a facility in formulating aspirations for use that people excluded from the use of ICTs cannot have. We argue that we need to consider engagement with technology rather than just adoption. We consider the implications of these findings for designing a revised basic ICT curriculum and describe the piloting of a new curriculum. We argue that, as ICTs in general{\textemdash}and Internet use in particular{\textemdash}are experienced technologies, perceived usefulness and perceived ease of use need to be reformulated to recognize limitations on people{\textquoteright}s ability to construct plans for future action since an actor{\textquoteright}s world is disclosed through action not given in advance. }, doi = {10.1007/0-387-34588-4_23}, author = {Cushman, Mike and Klecun, Ela} } @article {685, title = {ICT Policies as a Means to Inhibit Social Exclusion: The South African Case}, year = {2006}, pages = {137 - 150}, abstract = {Social exclusion is a multi dimensional phenomenon that manifests itself in the exclusion of an individual from one or more of the four following activities: production of goods and services, consumption, civil engagement, and social interaction. Information and communication technologies (ICTs) have been argued to have the potential to reduce these forms of social exclusion. However, the extent to which they deal with these different forms of social exclusion remains unknown. Therefore, in this study we examine how ICT policies in South Africa are being employed to reduce social exclusion. In particular, we analyze which dimensions of social exclusion are targeted in telecommunication laws and one of the ICT initiatives of the South African government, Multi-Purpose Community Centers (MPCCs). Using a framework that portrays the four forms of social exclusion within the discourses used in phenomenon debates (redistributionist, moral underclass, and social integrationist) for analysis, we find that ICT policies in South Africa address two of the four forms of social exclusion: production of goods and services and civil engagement, spanning both the redistributionist and social integrationist discourses of social exclusion. }, doi = {10.1007/0-387-34588-4_10}, author = {Maldonado, Edgar and Pogrebnyakov, Nicolai and van Gorp, Annemijn} } @inbook {868, title = {The Identity and Dynamics of MIS}, booktitle = {IFIP International Federation for Information Processing, Volume 214, The Past and Future of Information Systems: 1976-2006 and Beyond}, year = {2006}, note = {WCC Santiago, Chile}, pages = {101-105}, publisher = {Springer}, organization = {Springer}, address = {New York}, author = {Larsen, Tor J and Land, Frank and Michael D. Myers and Zmud, Robert W and Levine, Linda}, editor = {Avison, David and Elliot, Steve and Krogstie, John and Jan Pries-Heje} } @article {686, title = {Inclusion Through the Ages? Gender, ICT Workplaces, and Life Stage Experiences in England}, year = {2006}, pages = {153 - 168}, abstract = {This exploratory paper examines the various challenges that women working in information and communications technology (ICT) in England face in relation to their age, their life stage, and their career stage, with these three aspects being at least partially related. We first examine the literature currently available in relation to women, age and ICT work, arguing that age tends to be the forgotten variable in research on women in ICT. Using eight case studies of individual female ICT professionals in their twenties, thirties, forties, and fifties, we explore the nuances of experience these women have in relation to their career and their caring responsibilities. We consider the possibility that women in ICT may have heterogeneous experiences of working in what are often {\textquotedblleft}masculinized{\textquotedblright} environments related to, but not determined by, their age. Based on our interpretations of our empirical data, we adapt Super{\textquoteright}s career-stage theory to better frame our subsequent theoretical assertions. To conclude, we suggest that exploring age, life stage, and/or career stage in relation to female ICT professionals{\textquoteright} circumstances and experiences means that we can better theorize gender in the field of information systems, and hence develop more relevant gender inclusion strategies. }, doi = {10.1007/0-387-34588-4_11}, author = {Griffiths, Marie and Keogh, Claire and Moore, Karenza and Helen Richardson and Tattersall, Angela} } @article {687, title = {Information Systems Practice for Development in Africa: Results from Indehela}, year = {2006}, pages = {15 - 35}, abstract = {In this paper we search for answers to the question: Can information systems development (ISD) in Africa by African IS practitioners contribute to human development in Africa? More specifically, we ask if everyday ISD practice in Nigeria can contribute to people{\textquoteright}s health in Nigeria. We summarize the results of European-African research collaboration spanning more than 15 years. A spectrum of research methods was used from 1998 through 2001, including a survey on software industry (N = 103), a survey on IS education in universities (N = 26), five case studies in industry, and reflection on action in a university-based project. An industry profile of software companies and their ISD practice is presented and contrasted with the education available. Implications are drawn for ISD practitioners and methodological lessons identified for IS research in general. In the discussion, the view is expanded from Nigeria to other African and developing countries. }, doi = {10.1007/0-387-34588-4_2}, author = {Mikko Korpela and Anja Mursu and Soriyan, H. and de la Harpe, Retha and Esselina Macome} } @article {688, title = {Institutions, Community, and People: An Evaluation of a Longitudinal Digital Divide Experience}, year = {2006}, pages = {333 - 346}, abstract = {A community computing center was established in late 2001 in a city council high-rise apartment block in Wellington, New Zealand{\textquoteright}s capital city. The center was one of five computing hubs (centers) of the Smart Newtown Project, established with economic and social inclusion objectives, in the lower socio-economic suburb of Newtown. The project aim was to reduce inequalities of access to information and communications technology (ICT). A partnership approach was adopted that included multiple stakeholders: city council employees and councillors, a communications trust, universities, staff of a computer corporation, and some apartment residents. After 4 years of operation, the center was closed and remains so at the time of writing. Using a theoretical framework that includes Warschauer{\textquoteright}s (2003) model of ICT for social inclusion, the concept of social capital, and Oldenburg{\textquoteright}s (1991) third place, this paper examines reasons for the center{\textquoteright}s closure. The main findings reveal that low social capital and the inadequate support of social resources in the form of the community and an institution were key factors in the closure of this initiative. Recommendations are made for implementing future projects. }, doi = {10.1007/0-387-34588-4_22}, author = {Crump, Barbara} } @article {689, title = {Internet Voting: A Conceptual Challenge to Democracy}, year = {2006}, month = {2006///}, pages = {89 - 103}, abstract = {In this paper, we discuss the implications for social inclusion of the advent of Internet voting. Although the issue of social exclusion or social inclusion with regard to technological developments in the voting process is often approached as a matter of either security or turnout, we will take a broader view. Using the philosophical concept of technological mediation, as developed by Don Ihde and Peter-Paul Verbeek, we claim that Internet voting may change our experience of democracy, and transform the way we act as citizens in the democratic system. We argue that the mediating role of voting technology requires reconstruction of concepts used in discussing democracy. Our approach of reconstruction departs from the political philosophy of John Dewey. Based on his work, we can describe the political process in a democracy in terms of intellectual reconstruction and institutional recon-struction. Combining the concept of technological mediation and Dewey{\textquoteright}s political philosophy, we use the mediating role of online voting technology as input to the intellectual reconstruction of the discussion on voting and democracy. Based on the developments in the Netherlands, we present some challenges that the mediating role of online voting technology offers to existing concepts in democracy, and evaluate the benefits for social inclusion of reconstructing these concepts with respect to the new possibilities. }, url = {http://dx.doi.org/10.1007/0-387-34588-4_7}, author = {Pieters, Wolter} } @inbook {437, title = {Interpretative flexibility and hosted ERP systems}, booktitle = {Agile information systems: Conceptualization, construction and management}, year = {2006}, pages = {188-206}, publisher = {Elsevier}, organization = {Elsevier}, address = {Amsterdam}, isbn = {0-07506-8235-3}, url = {Agile2006.pdf}, author = {Sarah Cadili and Edgar A. Whitley}, editor = {Kevin C. Desouza} } @article {945, title = {Latent Semantic Indexing based Intelligent Information Retrieval System for Digital Libraries}, journal = {Journal of Computing and Information Technology}, volume = {14}, number = {3}, year = {2006}, pages = {5-12}, publisher = {University of Zagreb - University Computing Centre}, issn = {1330-1136}, author = {AswaniKumar Ch, Ankush Gupta, Shagun Trehan, Mahmooda Batool} } @booklet {Kumar_latentsemantic, title = {LATENT SEMANTIC INDEXING USING EIGENVALUE ANALYSIS FOR EFFICIENT INFORMATION RETRIEVAL}, year = {2006}, author = {Cherukuri Aswani Kumar and Suripeddi Srinivas} } @booklet {357, title = {The Matrix, or, the Two Sides of Perversion}, howpublished = {The International Handbook of Virtual Learning Environments}, year = {2006}, month = {2006///}, pages = {1549 - 1569}, url = {http://dx.doi.org/10.1007/978-1-4020-3803-7_62}, author = {{\v Z}i{\v z}ek, Slavoj} } @article {690, title = {Methods as Theories: Evidence and Arguments for Theorizing on Software Development}, year = {2006}, pages = {397 - 411}, abstract = {In this paper we argue that software development methods represent theories on how best to engage the impressively complex and inherently socio-technical activity of making software. To help illustrate our points we draw on examples of three software methods: the waterfall approach, packaged software development, and free/libre and open source software development, In doing this, we highlight that software development methods reflect{\textemdash}too often implicitly{\textemdash}theories of (1) how people should behave, (2) how groups of people should interact, (3) the tasks that people should do, (4) the order of these tasks, (5) the tools needed to achieve these tasks, (6) the proper outcomes of these tasks, (7) the means to make this all happen, and (8) that these relations among concepts are further set in specific social, cultural, economic, and industrial contexts. We conclude by highlighting three trends in conceptualizing these eight elements. }, doi = {10.1007/0-387-34588-4_26}, author = {Steve Sawyer and Annabi, Hala} } @article {308, title = {A model of (en)action to approach embodiment: a cornerstone for the design of virtual environments for learning}, journal = {Virtual Reality}, volume = {10}, year = {2006}, month = {2006/12/01/}, pages = {253 - 269}, abstract = {This paper presents a model of (en)action from a conceptual and theoretical point of view. This model is used to provide solid bases to overcome the complexity of designing virtual environments for learning (VEL). It provides a common grounding for trans-disciplinary collaborations where embodiment can be perceived as the cornerstone of the project. Where virtual environments are concerned, both computer scientists and educationalists have to deal with the learner/user{\textquoteright}s body; therefore the model provides tools with which to approach both human actions and learning processes within a threefold model. It is mainly based on neuroscientific research, including enaction and the neurophysiology of action.}, url = {http://dx.doi.org/10.1007/s10055-006-0038-2}, author = {Mellet-d{\textquoteright}Huart, Daniel} } @inbook {858, title = {OASIS in the Mirror: Reflections on the Impacts and Research of IFIP WG 8.2}, booktitle = {IFIP International Federation for Information Processing, Volume 214, The Past and Future of Information Systems: 1976-2006 and Beyond}, year = {2006}, note = {WCC Santiago, Chile}, pages = {63-66}, publisher = {Springer}, organization = {Springer}, address = {New York}, author = {Kenneth E. Kendall and Avison, David and Davis, Gordon and Julie E. Kendall and Land, Frank and Michael D. Myers}, editor = {Avison, David and Elliot, Steve and Krogstie, John and Jan Pries-Heje} } @article {527, title = {Object lessons and invisible technologies}, journal = {Journal of information technology}, volume = {21}, number = {3}, year = {2006}, pages = {176-184}, isbn = {0268-3962}, url = {JIT2006.pdf}, author = {Edgar A. Whitley and Mary L Darking} } @article {miscione2006open, title = {Open philosophies for associative autopoietic digital ecosystems: community networks and digital ecosystems-sociological Aspects: powerpoint}, year = {2006}, author = {Miscione, G} } @booklet {miscione2006openscience, title = {Open Philosophies for Associative Autopoietic Digital Ecosystems: Community Networks and Digital Ecosystems - Sociological Aspects (London School of Economics and Political Science)}, year = {2006}, month = {Jun}, author = {Miscione, G} } @article {DBLP:journals/jikm/SrinivasA06, title = {Optimising the Heuristics in Latent Semantic Indexing for Effective Information Retrieval}, journal = {JIKM}, volume = {5}, number = {2}, year = {2006}, pages = {97-105}, author = {Srinivas, S. and Kumar, Ch. Aswani} } @proceedings {443, title = {Panel: Determining the Profile of the ECIS Community a Bibliometrics Approach}, year = {2006}, pages = {2392-2393}, address = {Goteborg}, url = {ECIS2006panel.pdf}, author = {Clemmensen, Torkil and Robert D. Galliers and Richard T. Vidgen and Edgar A. Whitley}, editor = {Ljunberg, Jan and Andersson, Magnus} } @article {545, title = {Policy or politics? One year on for the LSE Identity Project}, year = {2006}, author = {Edgar A. Whitley} } @proceedings {451, title = {Power, knowledge and management information systems education: The case of the Indian learner}, year = {2006}, pages = {1723-1736}, address = {Milwaukee, WI}, url = {ICIS2006.pdf}, author = {Niall Hayes and Edgar A. Whitley and Lucas D. Introna}, editor = {Straub, Detmar and Stefan Klein} } @article {691, title = {Privacy, Security, and Transparency: ICT-Related Ethical Perspectives and Contrasts in Contemporary Firms}, year = {2006}, pages = {245 - 258}, abstract = {This paper analyzes the ethical perspectives associated with the introduction and use of information and communication technologies in contemporary firms. It presents a three-dimensional ethical model that introduces the transparency concern, and its related impact on the digital divide question, as the new ethical perspective of contemporary business organizations. }, doi = {10.1007/0-387-34588-4_17}, author = {Vaccaro, Antonino} } @article {556, title = {Research Status Report}, year = {2006}, month = {15 January}, url = {http://identityproject.lse.ac.uk/statusreport.pdf}, author = {LSE Identity Project,} } @article {692, title = {Responsible Management of Digital Divides: An Oxymoronic Endeavor?}, year = {2006}, pages = {231 - 243}, abstract = {This paper critiques the notion of responsible management of information systems by pointing out the intrinsic contradiction inherent in the idea of managing morality and ethics in information systems. The paper, being part of the tradition of critical research in IS, uses the example of managing digital divides to argue that a traditional view of management (here called heroic management) leads to conceptual problems. It will develop two basic arguments that undermine the possibility of responsible heroic management of digital divides: (1) Normative issues related to digital divides cannot be managed because management is part of the construction of the problem and therefore lacks the detached and objective viewpoint required for rational management. (2) The very concept of responsibility, if taken seriously and applied responsibly (here called reflective responsibility) requires a participative approach that contradicts the traditional top-down approach of heroic management. The paper will conclude with a discussion of what form management of IS needs to take if it wants to be responsible. }, doi = {10.1007/0-387-34588-4_16}, author = {Stahl, Bernd} } @article {693, title = {Right on Time: Understanding eGovernment in Developing Countries}, year = {2006}, pages = {73 - 87}, abstract = {Many, if not most, developing countries today engage in electronic government (eGovernment) projects. There are big hopes, not just for modernizing government and making it more effective and efficient; eGovernment is also expected to drive the general development toward the information society, both by examples of good practice and by major investment. However, many sources claim that the project failure rate is high. Reasons are found in many places, but it is reasonable to summarize them by saying that project goals are too ambitious given existing production capacity. Hence there is need to find ways of choosing and defining projects so that they meet the conditions in the country and sector where they are going to be implemented. To do so, this paper presents two tools, a checklist and a maturity model, for assessing the preconditions for eGovernment projects in developing countries. The under-lying data sources are threefold: eGovernment readiness indexes, project experiences, and assessments of social and political conditions. The checklist matches requirements for successful eGovernment against supply and demand side factors, hence providing a guide in choosing which projects to initiate and which to avoid. The maturity model supports mapping projects on a wider development agenda, hence helping avoiding dead ends such as investing in unused technology, or supporting dysfunctional processes with ICT (information and communication technology) instead of first redesigning them and then putting in ICT that support the new and better processes. In particular, the tools show the close relation between eGovernment and other development agendas, for example education, investment policies, or telecom (de)regulation. Without alignment with such programs, eGovernment is likely to fail. The two tools help make factors pertinent to success and failure more explicit and hence improve decision making. }, doi = {10.1007/0-387-34588-4_6}, author = {Gr{\"o}nlund, {\r A}ke and Andersson, Annika and Karin Hedstr{\"o}m} } @proceedings {847, title = {Social Activism in IS Research: Making the World a Better Place}, year = {2006}, month = {10-13 December}, address = {Milwaukee, WI}, author = {Kevin Desouza and Ein-Dor, Phillip and Donald J. McCubbrey and Robert D. Galliers and Michael D. Myers and Richard T. Watson} } @article {694, title = {Social Inclusion and the Information Systems Field: Why Now?}, year = {2006}, pages = {3 - 12}, abstract = {This conference, with its theme of social inclusion, builds upon the debates that have taken place within the IFIP 8.2 community over the past several years. As information and communications technology, and the information systems based upon them, become ever more pervasive, the human impacts{\textemdash}both positive and negative{\textemdash}and the associated societal disparities will continue to arise. It is our hope that the topics discussed at this conference will be considered mainstream in the future. }, doi = {10.1007/0-387-34588-4_1}, author = {Trauth, Eileen and Debra Howcroft} } @article {695, title = {Social Inclusion and the Shifting Role of Technology: Is Age the New Gender in Mobile Access?}, year = {2006}, pages = {203 - 215}, abstract = {Information and communication technologies (ICT) are at the heart of government social inclusion policy. However, the {\textquotedblleft}digital divide{\textquotedblright} remains and social inclusion and technology are closely linked: Not having access to technology is often seen both as part of the inclusion/exclusion problem and part of the solution by enabling access to information resources through different channels. Yet, we argue that by using technology to address an inclusion/exclusion problem, it will also result in moving the problem from one area to another. The arguments in this paper have been informed by two empirical studies around a ubiquitous technology, the mobile phone. One study is primarily based on the 18 to 25 year old age groups; the other mostly on retired people. The studies show clear differences between age groups and gender in adoption and use of the mobile telephone. Social inclusion is multifaceted; it is not an either/or measure and many attributes are subjective and depend on context. Social inclusion for mobile access is also closely linked to deeply embedded structures within society, such as those traditionally associated with gender. Technology may be changing these structures; indeed, age may be the new gender. The family or social unit may also be a useful entity to consider in the exclusion debate. Technology is being used to address social exclusion; however, we suggest that while some leveling may result, there may also be different social exclusion fronts emerging. }, doi = {10.1007/0-387-34588-4_14}, author = {Adams, Carl and Fitch, Tineke} } @article {696, title = {Space Invaders{\textemdash}Time Raiders: Gendered Technologies in Gendered UK Households}, year = {2006}, pages = {169 - 184}, abstract = {This paper discusses the domestication of ICTs in the UK, using a critical lens to focus in on ICT use by families and households drawing on a 5 year longitudinal study. Analysis concentrates on how ICTs are embedded into gendered households, how issues of gendered technologies are manifested in the everyday experiences of women, enmeshing ICT use for work, study, and leisure into domestic family life. The social, political, economic, and historical context is that of versions of inclusion in the so-called information society{\textemdash}a debate that wavers between a somber and shining vision. }, doi = {10.1007/0-387-34588-4_12}, author = {Helen Richardson} } @article {557, title = {Submission to House of Commons Science and Technology Select Committee Inquiry into {\textquotedblleft}Scientific advice, risk and evidence: how government handles them{\textquotedblright} with particular reference to the technologies supporting the Government{\textquoteright}s proposals for identity cards}, year = {2006}, institution = {London School of Economics and Political Science}, url = {http://is2.lse.ac.uk/IDcard/LSE_HoC_Submission.pdf}, author = {LSE Identity Project,} } @article {697, title = {Taking People out of the Network: A Deconstruction of {\textquotedblleft}Your Next IT Strategy{\textquotedblright}}, year = {2006}, pages = {317 - 332}, abstract = {Web services are frequently discussed as {\textquotedblleft}the next big thing{\textquotedblright} in information technology architecture. The picture painted by pundits, practitioners, IT vendors, and academics is appealing technically: Web service applications {\textquotedblleft}exposed{\textquotedblright} to one another through standard protocols, navigating through an open infrastructure to search out counterparts over the Internet, with {\textquotedblleft}seamless{\textquotedblright} integration across business processes and enterprises, without human intervention. However, the vision of a computing architecture that takes {\textquotedblleft}people out of the network{\textquotedblright} has troubling social implications. In this paper, we utilize deconstruction as an analytic approach to examine a paper that promotes Web services, entitled {\textquotedblleft}Your Next IT Strategy{\textquotedblright} (Hagel and Brown 2001). Our analytic purpose is to generate interpretations of the text that surface assumptions about how this IT innovation may influence the social organization of IT-related work. Our interpretation suggests that the Web services architecture could contribute to reproduction and consolidation of control among already powerful socio-economic actors, while restructuring and automating the work of IT professionals and other knowledge workers. We conclude with a discussion of deconstruction as a research approach to investigate issues of social inclusion and IT innovation. }, doi = {10.1007/0-387-34588-4_21}, author = {Elizabeth Davidson and Chiasson, Mike and Ruikar, Sachin} } @mastersthesis {miscione2006telemedicinapractices, title = {{\textquotedblleft}Telemedicina in Alta Amazzonia - Una Prospettiva di Sviluppo Sanitario fra Diverse Pratiche di Cura{\textquotedblright} [{\textquotedblleft}Telemedicine in the Upper Amazon {\textendash} A Case Study of Health Development between Diverse Healing Practices{\textquotedblright}]}, year = {2006}, month = {Feb}, type = {phd}, abstract = {This research is based on the case of implementation of telemedicine services within the public health care system of a North-eastern area of Peru, in the Amazon (Ch. 1). Three years before this study started, a consortium comprising of Spanish and Peruvian universities {\textendash}supported by a non-governmental organization- established radio connections for voice and data communication between the local hospital and health facilities of the area, in order to provide telemedicine services. This initiative was aimed at the improvement of the health care system organization, therefore of the local health conditions. It was not secondary the intention to define a model for ICT-based health development interventions in rural areas of Latin America (Ch. 2). My study, centered on the telemedicine system, is based on the participant observation within the consortium in Spain and Peru, both in the partner universities and in the Amazonian part of the public health care system (Ch. 3, with a special attention for reflexive issues). The focus of the research has been on the organizational relevance of the interplay between designers{\textquoteright} perspectives and expectations, on one side (Ch. 4), and local process of telemedicine system accommodation in the context of implementation, on the other. Particular attention is given to telemedicine system use, and to the mutual interrelation with local constructions of health and illness (Ch. 5). It has been found a divergence between planned and observed use of the system, the former being accountable to the context of origin of the project and to the funding agencies, the latter being indirectly affected by unexpected health-seeking behaviors of the target population ({\textquotedblleft}Telemedicine And Knowledge Between Medical And Development Discourses{\textquotedblright} CMS4). A rationalist conception of telemedicine -and of organizational changes it is expected to produce- sees local healing practices as obstacles to health development, and this hinders organizational learning ("Organizational Learning in Health Care - Situating Information Technologies in the Amazon" under review process for Social Theory \& Health). I noted how people{\textquoteright}s perception and construction of their health (also outside formal health organization and scientific definitions of health and sickness) plays an important role as social regulator, as far as they are embedded in normal patterns of action ({\textquotedblleft}Telemedicine in the Upper Amazon: Interplay with Local Health Care Practices{\textquotedblright} MISQ). This needs to be understood and considered in evaluation, design and implementation of future initiatives of ICT-based health development efforts (Ch 6 and {\textquotedblleft}Policies on Health Development and Information and Communication Technologies - A Bottom-up Perspective on Policy Making about Telemedicine Services in Cross-cultural Settings{\textquotedblright} eHDC). MAIN CONTRIBUTIONS: - Focus on telemedicine through a micro-level lens of Neoinstitutionalism (in ethnomethodological terms), which is not well-developed in IS studies - Critique of diffusionism and of reified conceptions of medical knowledge, which cannot be made easily available though IT solutions, mostly across diverse social settings - Empirical granularity on practices, which highlights interplays that more traditional empirical units (actors, places, issues) may not account for - Reflexivity awareness in ICT in development contexts TABLE OF CONTENTS Telemedicine in the Upper Amazon - A Perspective on Health Development between Different Healing Practices 1 Abstract 3 Acknowledgements 5 Introduction 13 Chapter I {\textendash} Telemedicine between Knowledge and {\textquotedblleft}Development{\textquotedblright} 17 1. Research Field 18 1.1. Telemedicine and {\textquotedblleft}Development{\textquotedblright} 19 2. Boundaries of the Empirical Field 25 3. Organizations, ICT and Knowledge 28 3.1. Telemedicine and Knowledge Transfer 32 3.2. A Boundary of the Knowledge Society 33 4. Development and Organization 35 4.1. Contemporary Trends 38 5. Research Focal Points 41 5.1. Research Questions 43 Chapter II {\textendash} Introduction to the Telemedicine in the Upper Amazon case 45 1. Red Ibero-Suramericana de Salud Project 45 2. The Amazon area where the Telemedicine System is Implemented 50 3. Health Care System in the Upper Amazon 54 3.1. Public Health Insurance 57 4. Technical Aspects of the Telemedicine System 58 5. Planned Uses of the Telemedicine System 64 Chapter III {\textendash} Methodological Aspects 67 1. Documentary Study and Participant Observation 68 2. My Perspectives on the Case 76 2.1. Self Interview 77 2.2. Access the Empirical Field and Construction of my Role 79 2.3. Telemedicine as Knowledge Instrument: Contiguity of Viewpoints 82 3. Research Trajectory 92 4. Notes about Data Analysis and Presentation 115 Chapter IV {\textendash} Interorganizational Network of the Telemedicine Project 119 1. The Evaluation Conducted by Organizers 119 2. Interorganizational Aspects 130 2.1. Documentary Analysis of Mailing Lists and Chat Sessions 130 2.2. Academic Position of the RISS Project Coordinators 134 2.3. Discursive Alignments 137 3. Final Notes 142 Chapter V {\textendash} Telemedicine and {\textquotedblleft}Development{\textquotedblright}, the Case Of the Upper Amazon 145 1. RISS {\textendash} Peru{\textquoteright}s Perspectives 148 2. Arrival to the Amazon 158 2.1. First Impressions at the Hospital 163 2.2. Following the Prevention Programme 166 3. Re-starting from the Telemedicine System 172 3.1. Knowledge Sharing 185 3.2. Conference about Malaria 188 3.3. Epidemiologic Surveillance 192 3.4. Reports Transmission and Logistical Support 195 3.5. Maintenance and Responsibilities 199 4. Aspects of the Telemedicine Context 206 4.1. Use of Medical Plants 216 4.2. {\textquotedblleft}A Physician is Someone who Studies Medicine through the University{\textquotedblright} 221 4.3. Local Healers 234 5. Trajectories through Medicines 243 Chapter VI {\textendash} Discussion 251 1. Planned and Observed Uses 251 1.1. Problematizing an Approach to Telemedicine 256 2. Multiple Accountabilities 258 3. Expectations from the System 268 Conclusions 275 List of References 279}, author = {Miscione, G} } @booklet {miscione2006telemedicineeconomics, title = {Telemedicine in Amazon; Other Knowledges to be Accountable to (London School of Economics)}, year = {2006}, month = {Mar}, author = {Miscione, G} } @article {699, title = {To Vanquish the Social Monster: The Struggle for Social Inclusion among Peers in the Field of Systems Development}, year = {2006}, pages = {367 - 380}, abstract = {The mechanisms of social inclusion and exclusion may operate among professionals within organizations and communities of practice. These mechanisms can be embedded into formal organizational structures, and exert powerful control over who the members of organizations and communities will deem to be acceptable and unacceptable within their society. Using capital theories as a theoretical lens, we analyze the texts of interviews with knowledge leaders in a software development organization. The analysis reveals how a threshold event operates to bring inclusion of newcomers to a collection of social communities. Until the threshold event, communities of newcomers are socially excluded. The existence of the threshold event, and the nature of the threshold event, is an unspoken and unacknowledged structure used in creating the social fabric of the organization or community. It is collectively, yet implicitly, decided when such an event occurs, and the social inclusion triggered without any explication otherwise. }, doi = {10.1007/0-387-34588-4_24}, author = {Elisberg, Thomas and Richard Baskerville} } @article {700, title = {Understanding Meaning and Bridging Divides: The Use of an African Metaphor for the South African Open Source Center}, year = {2006}, pages = {279 - 293}, abstract = {This paper describes a conscious attempt to use metaphor to both promote and reinterpret ideas and values from the global free and open source software movement in the context of South Africa. A case study is given of an initiative launched by the South African Council for Industrial and Scientific Research to stimulate awareness and promote the use of free and open source software in South Africa and the region. The new Open Source Center made use of an African language metaphor to relate the concept of shared intellectual property in software to traditional communal land management. Whereas Western metaphors are commonly used in the field of organizational studies and Information Systems to facilitate meaning, the deliberate use of an African language metaphor to describe software systems is less common (even in Africa). This paper provides a background as to why such a metaphor was chosen as well as some reflection on its effectiveness. }, doi = {10.1007/0-387-34588-4_19}, author = {Byrne, Elaine and Jolliffe, Bob and Mabaso, Nhlanhla} } @booklet {370, title = {Unraveling the Virtual University}, howpublished = {Managing Dynamic Networks}, year = {2006}, month = {2006///}, pages = {259 - 279}, abstract = {This chapter critically explores the vision of a university {\textquotedblleft}without walls{\textquotedblright} has dominated these last years the discussions in academia and industry alike. In examining the efforts of a distributed virtual university to foster collaboration among the various participating actors through the establishment of a common technological infrastructure, we found that technological coupling is not enough in itself. In particular, the analysis showed that there are a number of defining factors namely, (1) task characteristics, (2) communication interface, and (3) frames that must be aligned for any effort to create a distributed virtual university to be successful. To this end, we examine in depth each of these defining factors and discuss the assumptions that lead universities to rely on technology to foster collaboration. We conclude by discussing the implications of the vision for a {\textquotedblleft}virtual{\textquotedblright} university for both academic research and practice.}, url = {http://dx.doi.org/10.1007/3-540-32884-X_10}, author = {Prasopoulou, Elpida and Angeliki Poulymenakou and Pouloudi, Nancy} } @article {701, title = {Viewing Information Technology Outsourcing Organizations Through a Postcolonial Lens}, year = {2006}, pages = {381 - 396}, abstract = {This paper discusses some of the difficulties and challenges that an information technology (IT) firm in a developing country faces in its attempt to become a global player. In 1999, the firm KnowICT embarked on a strategic project called Knowledge Management (KM), whose main purpose was to unify and integrate knowledge that resided in the various organizational business units into one strategic knowledge infrastructure. By combining the knowledge resources dispersed in the various organizational business units, KnowICT managers hoped that KnowICT could be transformed into a leading global IT consultancy firm, rather than be seen just as a provider of routine outsourcing jobs. Although at a basic operational level the KM project has been deemed a success, the attempt to combine the knowledge resources from the various organizational business units proved more difficult than anticipated. We use postcolonial theory to explain the difficulties and challenges that KnowICT faces. Postcolonial theory draws attention to issues of power, ownership, control, and identity. We suggest postcolonial theory can meaningfully enhance our understanding of the development and use of information and communication technologies in developing countries. }, doi = {10.1007/0-387-34588-4_25}, author = {Mayasandra, Ravishankar and Pan, Shan and Myers, Michael} } @inbook {878, title = {Viewing Information Technology Outsourcing Organizations through a Postcolonial Lens}, booktitle = {IFIP International Federation of Information Processing, Volume 208, Social Inclusion: Societal and Organizational Implications for Information Systems}, year = {2006}, note = {IFIP Working Group 8.2, Limerick, Ireland}, pages = {381-396}, publisher = {Springer}, organization = {Springer}, address = {Boston}, author = {Mayasandra, Ravishankar and Shan Ling Pan and Michael D. Myers}, editor = {Eileen M. Trauth and Debra Howcroft and Butler, Tom and Brian Fitzgerald and Janice I. DeGross} } @article {373, title = {Virtual Teams and Multiple Media: Structuring Media Use to Attain Strategic Goals}, journal = {Group Decision and Negotiation}, volume = {15}, year = {2006}, month = {2006/07/01/}, pages = {299 - 321}, abstract = {Work environments have grown substantially more complex over the years. Teams are increasingly distributed, and presented with a variety of different communication technologies, e.g., e-mail, instant messaging, cellular phones, pagers, and intranet applications, for use in distributed collaborative activities. Further, individuals often belong to multiple teams concurrently. This study explores how virtual team members structure their use of multiple media to attain strategic goals in complex work environments. A grounded theory approach was used to analyze data gathered from forty interviews of information technology workers. Our results indicate that there are two primary structures individuals employ when making use of multiple media: sequential and concurrent. Sequential combinations are of three types: redundant, serial, or complementary, while concurrent combinations are of two types: independent or complementary. Further, individuals strategically use multiple media to accomplish specific communication goals beyond simply transmitting the message, such as message acknowledgement, enhancement of mutual understanding, and participation in multiple communication interactions. The implications of these findings for research and practice are discussed.}, url = {http://dx.doi.org/10.1007/s10726-006-9044-8}, author = {B{\'e}langer, France and Watson-Manheim, Mary} } @article {702, title = {Web Accessibility: A Digital Divide for Disabled People?}, year = {2006}, pages = {217 - 228}, abstract = {The focus of this paper is Web accessibility for disabled people. Much of the Web remains inaccessible or difficult to access by people across a spectrum of disabilities and this may have serious implications for the potential use of the Web for increasing social inclusion. The topic of disabled Web access is introduced through a consideration of four discourses: digital divide, social construction of disability, legal, and Web accessibility. The lack of dialogue between these permits a passive liberal approach toward disability discrimination to prevail and this political position has become inscribed in widely used automatic software tools resulting in a reinforcement of the view that Web site accessibility approval may, in many cases, be deemed an empty shell. }, doi = {10.1007/0-387-34588-4_15}, author = {Alison E. Adam and Kreps, David} } @article {703, title = {Weblogging: Implementing Communities of Practice}, year = {2006}, pages = {295 - 316}, abstract = {This paper centers on the emergent phenomenon of weblogging. Even though the total number of weblogs is increasing at an exponential rate, little formal study has been done on this phenomenon. This paper provides two main contributions. First, it describes the phenomenon of weblogging and conceptualizes it, discussing significant attributes of weblogs that set it apart from traditional communication means. Second, it establishes a framework grounded in the theory of communities of practice that provides a lens to study the potential role of weblogging in organizational communication. The research approach is qualitative and analysis is done by interpreting the content of a weblog through a hermeneutic approach. Weblogging can be seen to foster social inclusion based on its characteristics and nature. Our study shows that by its features of interaction and informality, weblogging cultivates social inclusion, particularly that of employees working in a corporation. The paper concludes by reflecting on the potential of weblogging for enabling informal means of communication in organizations. }, doi = {10.1007/0-387-34588-4_20}, author = {Leiser Silva and Mousavidin, Elham and Goel, Lakshmi} } @article {704, title = {Women and ICT Training: Inclusion or Segregation in the New Economy?}, year = {2006}, pages = {185 - 202}, abstract = {With the digital revolution narrated as the means for social cohesion in the globally competitive national economy, policy and corporate moves are afoot to increase the inclusion of women into the ICT arena, particularly those who have traditionally remained on the fringes of societal inclusion such as lone women parents. By equipping them with ICT skills, such as network engineering, and utilizing their {\textquotedblleft}soft{\textquotedblright} relational expertise, greater employ ability and opportunity is seen as the route toward inclusion. Yet a tension emerges between policy and practice, where such women are finding it hard to gain work, for the ICT industry, renown for its long hours culture, is slow to implement government recommendations for greater work flexibility and their soft skills remain unrecognized. This paper positions this tension within a wider labor market background that focuses on part-time work, for a general lack of full-time flexibility means women with care responsibilities have a limited range of employment choice. Part-time employment is frequently reflective of dead-end jobs and a catalog of inequalities, where occupational segregation and discrimination point to the feminization of low-level ICT skills. This gendered relation to the labor market is hidden by the narrative of inclusion through ICT skills acquisition. Furthermore, the relational association reduces women and men to normative gendered identities and roles which will do little to challenge existing stereotypes of technical expertise. The paper concludes that rather than inclusion, the possible result is further gendered inequalities and exclusion. }, doi = {10.1007/0-387-34588-4_13}, author = {Gillard, Hazel and Mitev, Nathalie} } @article {278, title = {Approaching Information Infrastructure as an Ecology of Ubiquitous Sociotechnical Relations}, year = {2005}, pages = {249 - 260}, abstract = {In this paper, we seek to understand the ecology of ubiquitous sociotechnical relations involved in the development and use of information and communication technologies. We draw on some examples from an empirical case study on the development and use of a regional healthcare information technology network to illustrate our conceptualization of this information infrastructure as an ecology. We conclude with some implications for theory and practice.}, doi = {10.1007/0-387-28918-6_19}, url = {http://dx.doi.org/10.1007/0-387-28918-6_19}, author = {Constantinides, Panos and Michael Barrett} } @article {279, title = {Assessing the Mobile-Stationary Divide in Ubiquitous Transport Systems}, year = {2005}, pages = {123 - 137}, abstract = {Many transport organizations seek to develop seamlessly integrated computing environments. A central problem in attempts to realize such ubiquitous transport systems is the divide that exists between stationary transport management systems and mobile applications such as embedded vehicle sensor networks and in-vehicle services for message handling. Originating from different Innovation regimes, these technologies are heterogeneous in that they rely on different technological platforms and knowledge bases, as well as the institutionalized settings from which they have emerged. This paper assesses how the mobile-stationary divide plays out in practical efforts to develop ubiquitous transport systems in road haulage firms. This assessment is conducted through a multiple-case study that identifies socio-technical challenges associated with this divide. Building on this assessment, the paper contributes a set of implications for enterprise-wide ubiquitous computing environments where coordination of diverse sets of mobile units is central to organizational performance. On a general level, these implications are important for any organization attempting to integrate mobile and stationary information systems.}, doi = {10.1007/0-387-28918-6_11}, url = {http://dx.doi.org/10.1007/0-387-28918-6_11}, author = {Andersson, Magnus and Lindgren, Rikard and Ola Henfridsson} } @booklet {314, title = {Base Concepts}, howpublished = {Virtual Organizations}, year = {2005}, month = {2005///}, pages = {11 - 28}, abstract = {In literature numerous definitions and characteristics of virtual organizations are available. A large number of research initiatives and industry cases have been developing concepts, methods and enabling IT for virtual organizations. This chapter presents a synopsis of results from more than 60 national, European, and global research projects (including IMS), as well as US research and road-mapping activities (IMTI and FIATECH). The first part describes common definitions, characteristics and core concepts for networks and virtual organisations. In the second part expectations, potentials and management issues in virtual organizations are discussed.}, url = {http://dx.doi.org/10.1007/0-387-23757-7_2}, author = {K{\"u}r{\"u}ml{\"u}oglu, Mehmet and N{\o}stdal, Rita and Karvonen, Iris} } @article {495, title = {Becoming engaged with conferences: Reputations and networks}, journal = {Communications of the AIS}, volume = {16}, number = {46}, year = {2005}, pages = {895-903}, isbn = {1529-3181}, url = {CAIS2005.pdf}, author = {Avison, David and Karlheinz Kautz and Sigala, Marianna and Edgar A. Whitley and Winter, Robert} } @article {280, title = {Beliefs about Computing: Contrary Evidence from a Study of Mobile Computing Use among Criminal Justice Personnel}, year = {2005}, pages = {109 - 122}, abstract = {In this paper, we explore how technological determinism can act as a belief System. To do so, we draw on a multi-organization field trial of uses of mobile computing by criminal justice personnel. Our findings make clear that mobile computing does not yet meet operational needs. In high contrast, we find that the belief these mobile computing technologies will solve the preponderance of organizational, informational, and communication problems that beset contemporary criminal justice efforts is unchanged by the shortcomings of the current environment. While the devices, applications, and telecommunications network never worked as intended or expected, their introduction was met with acceptance, enthusiasm, and the deterministic belief that they would make work better. We go beyond the common explanation of learning from a field trial and explore the contradictions inherent to the findings through the lens of technological determinism. In doing this, we highlight several implications that deterministic beliefs have regarding organizational value of field trials and research conceptions regarding the introduction of new computing technologies.}, doi = {10.1007/0-387-28918-6_10}, url = {http://dx.doi.org/10.1007/0-387-28918-6_10}, author = {Tapia, Andrea and Steve Sawyer} } @article {543, title = {Biometric technology in the public sector: Implications of the Identity Cards Bill}, year = {2005}, author = {Edgar A. Whitley} } @article {316, title = {Biowarfare as a biopolitical icon}, journal = {Poiesis \& Praxis: International Journal of Technology Assessment and Ethics of Science}, volume = {3}, year = {2005}, month = {2005/12/03/}, pages = {242 - 255}, abstract = {Nuclear warfare threat has been one of the main driver for cultural, political, economical and social changes in the late twentieth century, biological warfare threat is about to take it over. However, while nuclear warfare was a concrete possibility, biological warfare is just an elusive risk. This paper will explore some reasons for this apparent inconsistency by discussing biowarfare from a symbolic point of view, looking for its inner meanings and philosophical implications.}, url = {http://dx.doi.org/10.1007/s10202-005-0005-0}, author = {Mordini, Emilio} } @article {281, title = {Building a Ubiquitous Artifact That Integrates Problem-Solving and Learning Processes to Support Creativity}, year = {2005}, pages = {345 - 348}, doi = {10.1007/0-387-28918-6_26}, url = {http://dx.doi.org/10.1007/0-387-28918-6_26}, author = {Ahonen, Mikko} } @article {282, title = {Community-Based Wireless Initiatives: The Cooperation Challenge}, year = {2005}, pages = {363 - 364}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_30}, author = {Shamp, Scott and Gonick, Lev and Jarvenpaa, Sirkka and Middleton, Pouline} } @article {283, title = {CrackBerries: The Social Implications of Ubiquitous Wireless E-Mail Devices}, year = {2005}, pages = {337 - 343}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_25}, author = {Mazmanian, Melissa and Orlikowski, Wanda and Yates, JoAnne} } @proceedings {875, title = {Critical Ethnography as a Means to Holistically Understand the Implementation of Information Systems}, year = {2005}, month = {4-6 November 200}, pages = {141-145}, address = {Beijing, China}, author = {Lee, Jiunn Chieh and Michael D. Myers} } @conference {2005culturereality, title = {Culture and Development Sustainability: Considering Discourses{\textquoteright} Interplay in Changing Reality}, year = {2005}, month = {Jan} } @article {297, title = {The Culture of Information: Ubiquitous Computing and Representations of Reality}, year = {2005}, pages = {23 - 26}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_4}, author = {Dourish, Paul} } @article {284, title = {Designing Context-Aware Interaction: An Action Research Study}, year = {2005}, pages = {233 - 247}, abstract = {Context-aware computing is an important research theme of ubiquitous computing. One of the most debated issues regarding context-aware applications is the extent to which such applications can capture the complexity of social context. This debate has been fueled by the fact that many of the documented context-aware applications convey a relatively simplistic view of context. The typical separation between human activity and context is problematic as context is not something simply in which interaction occurs. This paper applies and evaluates the plausibility of Dourish {\textquoteright}s (2001a, 2001b, 2004) interactional context view for designing context-aware applications that transcend the mainstream design agenda in context-aware computing. On the basis of a canonical action research study, we develop and test design principles for context-aware applications that convey an interactional view of context. Recognizing the car not only as an excellent example of a ubiquitous information environment, but also as an interesting and complex use setting already commonplace in the modern community, we have implemented and assessed a car infotainment application to provide us with a firm illustration of what such a context-aware application might be.}, doi = {10.1007/0-387-28918-6_18}, author = {Olsson, Carl and Ola Henfridsson} } @article {285, title = {Effects of Wireless Mobile Technology on Employee Work Behavior and Productivity: An Intel Case Study}, year = {2005}, pages = {349 - 351}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_27}, author = {Govindaraju, Majorkumar and Sward, David} } @article {286, title = {Fluid Organizing of Work in the Ubiquitous Information Environment}, year = {2005}, pages = {183 - 196}, abstract = {The strong trend of miniaturization and personalization of computing devices that continues in our everyday lives has become inseparably linked to the various services and functions these technological artifacts offer. Mobile workers can do their jobs, not just informal office space, but in locations as varied as hotels and train stations. These workers are actively utilizing various ICTs in their highly mobile work practices. This paper explores an emerging pattern of work practice in the ubiquitous information environment, namely, fluid organizing of work. In rapidly changing businesses such as media, entertainment, and ICT-related areas, an increasing number of workers perform their jobs independently and bring their distinct skills and expertise to organizations on an ad hoc basis. Since business activities are increasingly knowledge-intensive, the importance of effective utilization of external professional workers is increasingly important as well. Such a pattern of organizing work practice has blurred the formal boundaries of organizations. This paper addresses structural changes of those work practices, particularly in the context of mobile professional work, and the technological impacts on those changes. The paper concludes by proposing that in order to appreciate the emerging pattern of work practice in today{\textquoteright}s ubiquitous information environment, we should take seriously the fluid perspective of work and organization.}, doi = {10.1007/0-387-28918-6_15}, author = {Kakihara, Masao} } @article {287, title = {Friend or Foe? The Ambivalent Relationship between Mobile Technology and its Users}, year = {2005}, pages = {29 - 42}, abstract = {This paper reports on an empirical study that examined the total user experience of mobile technology users. We held a total of 33 focus group sessions comprised of 222 active mobile device users in four highly developed countries (Finland, Japan, Hong Kong, and the United States) with high penetration of mobile technology. We are specifically focusing on manifestations of paradoxes with regard to mobile technology. We identify eight major technology paradoxes that play a central role in the mobile technology usage experience: (1) empowerment-enslavement, (2) independence- dependence, (3) fulfills needs-creates needs, (4) competence-incompetence, (5) planning-improvisation, (6) engaging-disengaging, (7)public-private, and (8) illusion-disillusion. Our findings suggest conceptualizing the phenomenon of mobile technology usage experience from a context-based and process-oriented perspective where paradoxes of technology shape user experience and determine coping strategies.}, doi = {10.1007/0-387-28918-6_5}, author = {Jarvenpaa, Sirkka and Lang, Karl and Tuunainen, Virpi} } @article {298, title = {The Future of Work}, year = {2005}, pages = {17 - 20}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_2}, author = {Malone, Thomas} } @booklet {miscione2005irete, title = {I LIMITI DELLA STRUTTURAZIONE DELL{\textquoteright}INFORMAZIONE IN RETE}, year = {2005}, month = {Jan}, publisher = {.}, author = {Miscione, G} } @article {miscione2005limiti, title = {I limiti della strutturazione dell{\textquoteright}informazione in rete-pratiche e semantic web}, year = {2005}, publisher = {University of Trento}, author = {Miscione, Gianluca} } @article {299, title = {The Impact of Ubiquitous Computing Technologies on Business Process Change and Management: The Case of Singapore{\textquoteright}s National Library Board}, year = {2005}, pages = {139 - 152}, abstract = {Ubiquitous Computing technologies are reaching a stage of technical maturity that is enabling their application in everyday business environments. As organizations increasingly adopt these technologies, such as radio frequency identification (RFID), a deeper understanding of their impacts on business process management and design will reveal innovative opportunities for organizations to leverage upon in achieving their objectives. The case of RFID adoption at the National Library Board (NLB) reveals how the technology has enabled deskilling, modularity, and motility in business processes. As a result, NLB has enjoyed higher levels of efficiency, developed novel and differentiated services, and achieved greater customer satisfaction.}, doi = {10.1007/0-387-28918-6_12}, author = {Ramchand, Anand and Devadoss, Paul and Pan, Shan} } @article {DBLP:journals/jikm/AswanikumarGBT05, title = {An Information Retrieval Model Based on Latent Semantic Indexing with Intelligent Preprocessing}, journal = {JIKM}, volume = {4}, number = {4}, year = {2005}, pages = {279-285}, author = {Kumar, Ch. Aswani and Ankush Gupta and Mahmooda Batool and Shagun Trehan} } @article {549, title = {Interim Report}, year = {2005}, url = {http://identityproject.lse.ac.uk/InterimReport.pdf}, author = {LSE Identity Project,} } @article {277, title = {An International Mobile Security Standard Dispute: From the Actor{\textemdash}Network Perspective}, year = {2005}, pages = {293 - 304}, abstract = {In 2004 there was a trade and technology dispute of significance between China and the United States surrounding a mobile security standard called WAPI (Wireless LAN Authentication and Privacy Infrastructure). Using the remarkable size of its domestic market as a lever, China is challenging some existing or being-shaped standards to set its own standards not only within its own territory but also potentially in the world markets. WAPI is another example in a series of these attempts. Using the actor{\textemdash}network theory, we investigate the process of mobile standards setting in the international context where superpowers like China and the United States compete.}, doi = {10.1007/0-387-28918-6_22}, url = {http://dx.doi.org/10.1007/0-387-28918-6_22}, author = {Chan, Shirley and Lee, Heejin and Oh, Sangjo} } @article {496, title = {On the interpretative flexibility of hosted ERP systems}, journal = {Journal of Strategic Information Systems}, volume = {14}, number = {2}, year = {2005}, pages = {167-195}, isbn = {0963-8687}, url = {JSIS2005.pdf}, author = {Sarah Cadili and Edgar A. Whitley} } @article {288, title = {Its the Experience, Not the Price}, year = {2005}, pages = {21 - 22}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_3}, author = {Green, Lee} } @article {552, title = {LSE Team Responds to Home Office{\textquoteright}s Criticisms of The Identity Project Report}, year = {2005}, month = {5 August}, institution = {London School of Economics and Political Science}, url = {http://identityproject.lse.ac.uk/LSE_ResponseTo_HomeOffice.pdf}, author = {LSE Identity Project,} } @article {551, title = {Main Report}, year = {2005}, month = {27 June}, url = {http://identityproject.lse.ac.uk/identityreport.pdf}, author = {LSE Identity Project,} } @conference {2005medicalcontexts, title = {Medical Cultures and Medical Knowledge in Developmental Contexts}, year = {2005}, month = {Jun} } @article {289, title = {Mobile Systems Development: A Literature Review}, year = {2005}, pages = {215 - 232}, abstract = {This article reviews 105 representative contributions to the literature on mobile systems development. The contributions are categorized according to a simple conceptual framework. The framework comprises four perspectives: the requirements perspective, the technology perspective, the application perspective, and the business perspective. Our literature review shows that mobile systems development is overlooked in the current debate. From the review, we extend the traditional view on systems development to encompass mobile systems and, based on the identified perspectives, we propose core characteristics for mobile systems. We also extend the traditional focus found in systems development on processes in a development project to encompass the whole of the development company as well as interorganizational linkage between development companies. Finally, we point at research directions emerging from the review that are relevant to the field of mobile systems development.}, doi = {10.1007/0-387-28918-6_17}, author = {Hosbond, Jens and Nielsen, Peter} } @article {290, title = {Mobility in the Round: Use of Wireless Laptop PCs in Clinical Ward Rounds}, year = {2005}, pages = {93 - 108}, abstract = {It has been suggested that mobile Information and communication technologies (MICTs) are better suited than traditional desktop devices to support work practices where participants are either moving around or conduct their work in different spatially dispersed settings. One such practice, which might be expected to benefit from MICT support, is the ward rounds conducted by hospital doctors. After a brief description of this practice, data are presented on the usage of laptop PCs in ward rounds in the Medicine Service of a U.S. hospital with a well-established IT infrastructure. Drawing on questionnaires, Interviews, and observational evidence, the paper explores why, 5 years after the laptops were first introduced, a quarter of the clinicians had never used them, and only a quarter took advantage of more than their basic functionality. A number of possible reasons for the failure of doctors to adopt a technology that is seen as offering significant benefits to their work are discussed. In particular, it appeared that the reliability of the technology, differences in senior doctors{\textquoteright} ward round practices, and social inertia contributed to the low level of uptake. Other local factors, such as the architecture of the building and departmental practices regarding laptop usage, also affected doctors{\textquoteright} use. Implications for research on ubiquitous Computing are drawn.}, doi = {10.1007/0-387-28918-6_9}, author = {Martins, Henrique and Matthew Jones} } @article {291, title = {Ordinary Innovation of Mobile Services}, year = {2005}, pages = {305 - 319}, abstract = {The anabolic growth of dot.com{\textemdash}with third-generation network license auctions as the grand finale{\textemdash}implied a series of large investments in mobile technology. Without new products and services utilizing this infrastructure (m-services), however, these investments may never be recouped, and today there is no sure sign of demand for these new nomadic applications in the market. This paper shows how actors in the m-services value network coordinate their efforts to bring such applications to the marketplace. It shows their risk averse and locally optimizing strategies, which theoretically are very different from the current fascination in Information Systems with disruptive innovation. This paper illustrates the need for a theory of ordinary innovation in nomadic and ubiquitous computing.}, doi = {10.1007/0-387-28918-6_23}, author = {Kristoffersen, Steinar and Nielsen, Petter and Blechar, Jennifer and Ole Hanseth} } @proceedings {478, title = {Panel: Becoming involved with conferences: Lessons from ECIS}, year = {2005}, address = {Regensburg, Germany}, isbn = {3-937195-09-2}, url = {ECIS2005.pdf}, author = {Edgar A. Whitley and Avison, David and Karlheinz Kautz and Sigala, Marianna and Winter, Robert}, editor = {Bartmann, Dieter and Rajola, Federico and Kallinikos, Jannis and Avison, David and Winter, Robert and Ein-Dor, Phillip and Becker, J{\"o}rg and Bodendorf, Freimut and Weinhardt, Christof} } @proceedings {450, title = {Plagiarism, values and computing: differing cultural expectations of academic work in information systems education}, year = {2005}, address = {Ealing, London}, isbn = {3-937195-09-2}, url = {BEST2005.pdf}, author = {Niall Hayes and Lucas D. Introna and Edgar A. Whitley} } @article {531, title = {Policy discourse and data retention: The technology politics of surveillance in the United Kingdom}, journal = {Telecommunications Policy}, volume = {29}, number = {11}, year = {2005}, pages = {857-874}, isbn = {0308-5961}, url = {TP2005.pdf}, author = {Edgar A. Whitley and Ian R Hosein} } @booklet {346, title = {Post-Digital Awareness}, howpublished = {Human Creation between Reality and Illusion}, year = {2005}, month = {2005///}, pages = {169 - 183}, url = {http://dx.doi.org/10.1007/1-4020-3578-0_13}, author = {Werner, James} } @article {550, title = {Press Release about }, year = {2005}, month = {27 June}, url = {http://identityproject.lse.ac.uk/PR1.htm}, author = {LSE Identity Project,} } @article {292, title = {Privacy Considerations in Location-Based Advertising}, year = {2005}, pages = {71 - 90}, abstract = {The emergence of mobile communication and positioning technologies has presented advertisers and marketers with a new type of advertising approach: location-based advertising (LBA). Advertisers could deliver contextually appropriate advertising messages through wireless devices on a geographically targeted basis and could reach mobile consumers when they are most likely to make a purchase (K{\"o}lmel and Alexakis 2002). However, because LBA could also associate the lifestyle habits, behaviors, and movements with a consumer {\textquoteright}s personal identity, privacy concern is particularly salient for LBA. Drawing on the privacy literature and the exchange theory, we employ an experimental approach to develop and lest an adoption model by including risk-beneflt analysis as the major antecedent to behavioral intention. Two environmental variables{\textemdash}industry privacy self-regulation and privacy legislation{\textemdash}are included to further assess the role of industry self-regulator versus government legislator in bearing the responsibility of assuring consumer privacy. Our findings extend individual adoption research into the new L-Commerce context and offer several important implications for various players in the LBA industry: wireless advertising service/content providers, merchants, privacy advocates and government legislators.}, doi = {10.1007/0-387-28918-6_8}, author = {Xu, Heng and Teo, Hock-Hai} } @inbook {831, title = {Qualitative Research}, booktitle = {Research in Information Systems: A handbook for research supervisors and their students}, series = {Butterworth-Heinemann Information Systems Series}, year = {2005}, pages = {239-253}, publisher = {Elsevier Butterworth-Heinemann}, organization = {Elsevier Butterworth-Heinemann}, address = {Oxford}, author = {Avison, David and Myers, Michael}, editor = {Avison, David and Jan Pries-Heje} } @article {300, title = {The Reconstruction of Portable Computers: On the Flexibility of Mobile Computing in Mobile Activities}, year = {2005}, pages = {197 - 212}, abstract = {The remote distribution of contemporary activities has direct implications for the mobility of humans and associated actions. Remote distribution inherently entails parameters such as the mobility of individuals, artifacts, tasks, and information: and potential conflicts between objective and personal motives of individuals. The interactions of these parameters bear directly on the range of mobile computing services derivable from the use of these artefacts. Based on an activity-theoretical perspective, this paper presents a discussion of the dynamics of mobile computing services through an analysis of the process of reconstruction of personal digital assistants (PDAs) in a mobility-saturated work-integrated learning project. Upon this analysis, the flexibility of mobile computing as a direct function of the reconstruction process is discussed and a conceptual framework for the analysis of flexible mobile computing in mobile activities proposed.}, doi = {10.1007/0-387-28918-6_16}, author = {Wiredu, Gamel} } @article {293, title = {Reflexivity, the Social Actor, and M-Service Domestication: Linking the Human, Technological, and Contextual}, year = {2005}, pages = {57 - 70}, abstract = {The importance of understanding the factors impacting technology acceptance is well emphasized. However, technology acceptance research is primarily oriented to the individual level in which users or consumers are treated as actors typically making one-way adoption or rejection decisions related to the acceptance of new technology. In this article, we argue that such research stops short of acknowledging the influence of agents{\textquoteright} social monitoring of own and other{\textquoteright}s behavior. By leaning on the process of stratification and the construct of reflexivity, as applied by Giddens (1984), and coupling this with the view that humans are social actors reflexively engaged in the domestication of new technologies, we present the initial progress toward a process model that may guide our understanding of how potential and existing users of new mobile data services learn, draw upon previous and emerging experiences, and thereby bring, or do not bring, new m-services into the Performance of everyday practices. Based on the results front our field study, this paper suggests that re-projecting previous experience and reflexivity considerably influences cognition and action in the duration of m-service domestication, thereby bringing complementary understanding to current technology acceptance research.}, doi = {10.1007/0-387-28918-6_7}, author = {Blechar, Jennifer and Knutsen, Lars and Jan Damsgaard} } @article {301, title = {The Role of Ubiquitous Computing in Maintaining Work-Life Balance: Perspectives from Women in the Information Technology Workforce}, year = {2005}, pages = {43 - 55}, abstract = {Transformations in ubiquitous Computing and shifts in the domestic nature of home life are placing greater demands on men and women to balance work and life. Although work-life balance has been heavily investigated for many years, the majority of this research gives very little discussion to the role of technology. Thus, the question remains: Can ubiquitous computing address the issues raised by work-life balance? The purpose of this paper is to explore a particular instance of how ubiquitous computing is utilized to maintain work-life balance from the perspectives of women in the Information technology workforce.}, doi = {10.1007/0-387-28918-6_6}, author = {Quesenberry, Jeria and Trauth, Eileen} } @article {294, title = {Scaling the Wall: Factors Influencing the Conditions for Market Entry in the Mobile Data Market}, year = {2005}, pages = {277 - 291}, abstract = {Advances in mobile technology have created a fertile ground for the development of new and innovative information and entertainment services. However, the road from development to commercialization of these services is one that is currently under construction. In this research, we seek to understand the relationships between developers of information services and the powerful mobile network operators that dominate the industry, which in turn shed light on the forces shaping the diversity of information sources on the mobile Internet. To understand these relationships, we have undertaken a research project in which we follow the attempts of a small firm to commercialize their information service in the United States. The project combines knowledge of industry structures with the first-hand market entry experience of a small firm. Results derived from the application of an institutional economics theoretical lens indicate that informal institutions, technology, and market power have combined to create the context for mobile services provision, which can be characterized as a highly fragmented market. This market fragmentation, together with technology, market power, and informal institutions, defines the choices application developers must make and indirectly determines the developers who will and will not be able to enter the market.}, doi = {10.1007/0-387-28918-6_21}, author = {van Gorp, Annemijn and Maitland, Carleen and Cameron, Brian} } @article {302, title = {The Slight Surprise of Integration}, year = {2005}, pages = {261 - 274}, abstract = {Western hospitals of some size are characterized by a proliferation of nonintegrated information systems, resulting in considerable frustration both among users and information technology personnel. Consequently there have been many integration efforts. Such efforts typically include some or all of the four principle classes of hospital-based systems: electronic patient records, laboratory systems, radiology systems and patient administrative systems. In this study, we trace the implementation process during most of 2004 at the University Hospital of North Norway, where these systems were part of a larger replacement project. We analyze the images and visions of order and perfection serving as a foundation for the decision to replace the existing IT portfolio. Furthermore, we analyze the manner and form in which unintended consequences of the integrated solutions appear and, finally, how the very act of integration may indeed produce rather than curb disorder. As a result, a lack of integration of any reasonably complex information system is an immanent feature.}, doi = {10.1007/0-387-28918-6_20}, author = {Gunnar Ellingsen and Eric Monteiro} } @article {295, title = {Socio-Technical Research Challenges in Ubiquitous Computing: The Case of Telematics}, year = {2005}, pages = {359 - 362}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_29}, author = {Ola Henfridsson and John Leslie King and Mercer, Glenn and Pavlich, Dave and Scacchi, Walt} } @article {296, title = {Socio-Technical Studies of Mobility and Ubiquity}, year = {2005}, pages = {1 - 14}, doi = {10.1007/0-387-28918-6_1}, author = {Carsten S{\o}rensen and Yoo, Youngjin} } @article {497, title = {Special issue on Personal Reflections on Claudio Ciborra{\textquoteright}s life and work}, journal = {European Journal of Information Systems}, volume = {14}, number = {5}, year = {2005}, isbn = {0197-2243}, url = {./ClaudioSpecialIssue/}, author = {Antonio Cordella and Edgar A. Whitley and Kallinikos, Jannis} } @book {miscione2005suirete, title = {Sui limiti della rete}, year = {2005}, publisher = {Editrice UNI Service}, organization = {Editrice UNI Service}, address = {.}, isbn = {8888859179}, author = {Miscione, G} } @article {miscione2005sui, title = {Sui Limiti Della Rete (On the Net Boundaries)}, year = {2005}, author = {Miscione, Gianluca} } @book {miscione2005suiboundaries, title = {Sui Limiti Della Rete (On the Net Boundaries)}, year = {2005}, author = {Miscione, G} } @article {364, title = {The Technology Environment: Subjectivity, Language, and Machine}, journal = {International Journal of Technology and Design Education}, volume = {15}, year = {2005}, month = {2005/01/01/}, pages = {99 - 110}, abstract = {The question raised here is about the extent that liberal individualism and the consumerist ethos is the result of technology and to what extent is it the cultural norm of modernity. There has been a polarization in the way technology is understood. Predominantly it is assumed to be neutral but it can also be argued that technology exacerbates the understanding of people as {\textquoteleft}rational individual utility maximisers.{\textquoteright} C.A. Bowers argues that computer technology amplifies the conduit model of learning. The machine stores information and the student learns how to retrieve it and this constitutes neutral and objective research. Bowers advocates critical enquiry and an awareness of the socio-cultural factors that contribute to the generation of knowledge and community. The physiological parameters of machines are neither neutral nor strictly political. Technology shifts the constraints of phenomenological experience and encourages new and arguably impoverished ways of experiencing the world. However, by insisting on a critical dimension to understanding technology we could be able to transform education from its emphasis on vocationalism and governmentality to a more creative, equitable, and ecological set of factors.}, url = {http://dx.doi.org/10.1007/s10798-005-8278-0}, author = {Irwin, Ruth} } @inbook {2005telemedicinamedici, title = {Telemedicina in Alta Amazzonia, una prospettiva di sviluppo sanitario fra diversi saperi medici}, booktitle = {Giovani Sociologi 2004}, series = {Giovani Sociologi 2004}, year = {2005}, month = {Jan}, publisher = {Franco Angeli}, organization = {Franco Angeli}, address = {Milan}, isbn = {9788846470966} } @booklet {miscione2005telemedicineparis, title = {Telemedicine and Development - A Case From a Knowledge Society Boundary (Ecole Polytechnique, Paris)}, year = {2005}, month = {Jan}, author = {Miscione, G} } @booklet {miscione2005translatingparis, title = {Translating Telemedicine in Upper Amazon into the Academy (Ecole de Mines, Paris)}, year = {2005}, month = {Apr}, author = {Miscione, G} } @article {304, title = {Ubiquitous Computing and the Double Immutability of Remote Diagnostics Technology: An Exploration into Six Cases of Remote Diagnostics Technology Use}, year = {2005}, pages = {153 - 167}, abstract = {The aim of this paper is to display the use a specific type of ubiquitous computing technology{\textemdash}remote diagnostics technology{\textemdash}in organizations and, in particular, the way in which the technology is enacted in remote and local maintenance groups. By taking a case study approach, we look into the use of remote diagnostics technology in the maintenance industry. Drawing from actor{\textemdash}network theory, and in particular the notion of double immutability, we argue that we need to establish a stable relationship that uses remote diagnostics technology for monitoring machine performance from a remote place while also keeping a level of local responsiveness toward machine performance. The stability of the remote diagnostics technology is seemingly effective in that critical data can be collected, diffused, and manipulated. The stability of the network of relations surrounding the technology is, however, yet to emerge. The borders between the central group and the local maintenance workers must be considered and we need to acknowledge that it takes effort to sustain stable networks of relations. We need to establish a new relationship that uses ubiquitous computing technology for monitoring processes and activities from the remote group while also keeping a level of local responsiveness toward machine performance. Taken together, the remote and the local group, along with the remote diagnostics technology, constitute a maintenance work collective.}, doi = {10.1007/0-387-28918-6_13}, author = {Jonsson, Katrin and Holmstr{\"o}m, Jonny} } @article {305, title = {Ubiquitous Computing for Health and Medicine}, year = {2005}, pages = {355 - 358}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_28}, author = {Atkinson, Chris and Bonnie Kaplan and Larson, Kent and Martins, Henrique and Lundell, Jay and Harris, Martin} } @article {306, title = {Ubiquitous Computing in Practice}, year = {2005}, pages = {365 - 367}, abstract = {Without Abstract}, doi = {10.1007/0-387-28918-6_31}, author = {Braley, Dick and Fano, Andy and Lassila, Ora and Light, John and Germonprez, Matt} } @article {303, title = {The Ubiquity and Utility of Resistance: Codesign and Personalization of Information Systems}, year = {2005}, pages = {321 - 334}, abstract = {In assessing the positive and negative connotations of ubiquity, this paper favors association with cohabitation and domestication of technology rather than colonization and domination. Unpredicted user responses to technology are often framed as resistance. Despite its ubiquity, resistance remains a neglected topic in information systems research, and belief in technology as {\textquotedblleft}the one true way{\textquotedblright} of solving a problem means that it will often be demonized. Recognition of the powerful nature of IS elucidates sources of resistance: the policies governing the behavior and reactions of users to technology will impinge on the range of user activities deemed to be recalcitrant. This is especially important with the types of technology involved in ubiquitous information environments as they are often used outside of organizations for leisure and social activities. However, one cannot assume that newer mobile technologies deployed to achieve organizational goals will be adopted and used by employees with the degree of success that these technologies have enjoyed in voluntary environments. An alternative approach is advocated: resistance is perceived not as a threat, but as a site for personalization, and local adaptation: users{\textquoteright} subversive acts can play a role in improving the technology; IS failure can be lessened and resistance may ultimately play a role in stabilizing a system. Finally, an argument is made for personalization through user-driven codesign as part of a strategy of utilizing resistance.}, doi = {10.1007/0-387-28918-6_24}, author = {Melanie Wilson} } @article {526, title = {Visiting the red-light zones with Claudio}, journal = {European Journal of Information Systems}, volume = {14}, number = {5}, year = {2005}, pages = {477-479}, isbn = {0960-085X}, url = {./ClaudioSpecialIssue/Whitley.pdf}, author = {Edgar A. Whitley} } @article {544, title = {What impact will the Government{\textquoteright}s identity cards scheme have on society?}, year = {2005}, author = {Edgar A. Whitley} } @article {307, title = {Wireless Grids: Assessing a New Technology from a User Perspective}, year = {2005}, pages = {169 - 181}, abstract = {The objective of this paper is to assess the value of wireless grids from the perspective of users. In a ubiquitous information environment, wireless grids allow the ad hoc sharing of resources (e.g., microphones, screens, processing power) of edge devices (e.g., mobile phone, laptop, PDA). Wireless grids are one of the emerging wireless communication concepts that have been developed in university and industry research laboratories. So far, literature about wireless grids has tackled some of the technical and policy issues about the technology. This paper provides the first empirical study about wireless grid technology from the user perspective. Using Rogers{\textquoteright} diffusion of innovations model, this paper focuses on the future diffusion of this technology. Using the results of two focus group meetings, we suggest that the introduction of the technology and its future diffusion will be a complex process. The future acceptance and use of this technology requires not only social and mental changes to move from one stage to another in the diffusion process, but also changes in the coordination and pricing mechanisms, and even changes in the technology itself.}, doi = {10.1007/0-387-28918-6_14}, author = {McKnight, Lee and Sharif, Raed and van de Wijngaert, Lidwien} } @article {312, title = {Act Without Denial: Slavoj {\v Z}i{\v z}ek on Totalitarianism, Revolution and Political Act}, journal = {Studies in East European Thought}, volume = {56}, year = {2004}, month = {2004/12/01/}, pages = {299 - 334}, abstract = {{\v Z}i{\v z}ek{\textquoteright}s thinking departs from the Lacanian claim that we live in a symbolic order, not a {\textquotedblleft}real world,{\textquotedblright} and that {\textquotedblleft}the Real{\textquotedblright} is what we desire, but can never know or grasp. There is a fundamental {\textquotedblleft}virtuality{\textquotedblright} of {\textquotedblleft}reality{\textquotedblright} that points to the {\textquotedblleft}lie{\textquotedblright} in every truth-claim, and there are two ways of dealing with this:repression and denial. An ideology, a system or a regime becomes totalitarian when it denies the virtual character of both its world and its subject (democracy represses truth{\textquoteright}s basic lie, which makes it possible for the repressed to return). {\v Z}i{\v z}ek{\textquoteright}s analysis of totalitarianism, particularly Stalinism, shows how a totalitarian system denies its subject, which, being desire for the Real, cannot act in the name of truth but must acknowledge the contingency of its action (a political act can fail to reach its goal), whereas an established system can no longer fail and has to deny its flaws. Any political act disrupts the (evolution of) the symbolic order and thus is revolutionary, creating an event ex nihilo. An act is a jump into the inconsistency of the symbolic order, i.e. into {\textquotedblleft}das Ding,{\textquotedblright} a jump both into and out of the nihil in which our world is grounded. Politics therefore can never be Realpolitik. The realization that politics is a symbolic phenomenon, supported not by {\textquotedblleft}the real,{\textquotedblright} but by signifiers, is the Lacanian foundation of {\v Z}i{\v z}ek{\textquoteright}s political theory.}, url = {http://dx.doi.org/10.1023/B:SOVI.0000043004.96751.d7}, author = {De Kesel, Marc} } @article {226, title = {Action Research: Time to Take a Turn?}, year = {2004}, month = {2004}, pages = {315 - 333}, abstract = {Following the linguistic turn of social sciences in the 20th century, some researchers are now taking a turn to action. They use action research but give it a broader meaning than that currently understood by many researchers in IS. This paper discusses the newer meaning of action research and indicates how it contrasts with some uses of action research reported in the IS literature. Five quality issues for the new action research are discussed: relational praxis, reflexive-practical outcome, plurality of knowing, significant work, and new and enduring consequences or infrastructure. The paper then gives a reflexive account of an IS research study that attempted to address these five issues. Finally, the paper discusses some of the broader implications for IS research of a turn to action.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_18}, author = {Oates, Briony} } @article {952, title = {On adopting software agents for distributed digital libraries}, journal = {DESIDOC Bulletin of Information Technology}, volume = {24}, number = {3}, year = {2004}, pages = {3-8}, publisher = {DRDO, DESIDOC}, issn = {0971-4383}, author = {AswaniKumar. Ch, Srinivas. S.} } @article {227, title = {Applying Adaptive Structuration Theory to the Study of Context-Aware Applications}, year = {2004}, month = {2004}, pages = {735 - 741}, abstract = {Adaptive structuration theory (AST)has been used for a number of years in the information systems discipline to study the use of new technologies in organizations. In this paper it is applied to a relatively new technology, context-aware applications. AST provides a useful lens for examining the impact of a particular context-aware application, CABdriver. Used in conjunction with the repertory grid technique and lead users in an action research study, a research approach for exploring the ways in which the technology impacts individuals within small groups is presented.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_51}, author = {Olsson, Carl and Nancy L. Russo} } @article {228, title = {Applying Habermas{\textquoteright} Validity Claims as a Standard for Critical Discourse Analysis}, year = {2004}, month = {2004}, pages = {233 - 258}, abstract = {It has been proposed that the theory and practice of information systems development could benefit from a more explicit consideration of concepts of rationality. Habermas{\textquoteright} communicative rationality has been proposed as an approach to improve the conditions for rational discourse in systems development, thereby improving outcomes (Klein and Hirschheim 1991), and applied at the project level (Ulrich 2001) and to specific episodes of managerial communications (Ngwenyama and Lee 1997). At the same time, it is understood that societal discourses and ideologies shape the external environments of organizational decision making. A variety of approaches has been proposed to analyze these discourses including qualitative techniques for reading or interpreting texts, artifacts, and social practices (Philips and Hardy 2002). This paper examines the way in which Habermasian validity claims can provide an explicit and ethical standard for critical discourse analysis in order to reveal the distortions that shape the institutional environments of technology decision making. It offers an approach to operationalizing Habermas{\textquoteright} validity claims for an analysis of media texts related to a case study involving learning technology.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_14}, author = {Cukier, Wendy and Robert Bauer and Middleton, Catherine} } @proceedings {458, title = {Assessing UK e-government websites: Classification and benchmarking}, year = {2004}, publisher = {Turku School of Economics and Business Administration}, address = {Turku, Finland}, isbn = {951-564-192-6}, url = {ECIS2004.pdf}, author = {Benjamin Mosse and Edgar A. Whitley}, editor = {Leino, Timo and Saarinen, Timo and Stefan Klein} } @booklet {579, title = {Book review of "A Computer Called LEO: Lyons Teashops and the World{\textquoteright}s First Office Computer" by Georgina Ferry}, howpublished = {Information technology and people}, volume = {17}, number = {1}, year = {2004}, pages = {102-104}, isbn = {0960-085X}, url = {ITP2004b.pdf}, author = {Edgar A. Whitley} } @booklet {581, title = {Book review of "Ruling the root: Internet governance and the taming of cyberspace" by Milton L Mueller and "Internet governance in transition: Who is the master of this domain?" by Daniel J Par{\'e}.}, howpublished = {Information technology and people}, volume = {17}, number = {4}, year = {2004}, pages = {462-463}, isbn = {0960-085X}, url = {ITP2004a.pdf}, author = {Edgar A. Whitley} } @booklet {580, title = {Book review of "Virtual society? Technology, Cyperbole, Reality" edited by Steve Woolgar}, howpublished = {British Journal of Sociology}, volume = {55}, number = {2}, year = {2004}, pages = {311-312}, isbn = {0007-1315}, url = {BJOS2004.pdf}, author = {Edgar A. Whitley} } @article {229, title = {Building Capacity for E-Government: Contradictions and Synergies in the Dialectics of Action Research}, year = {2004}, month = {2004}, pages = {651 - 652}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_36}, author = {Wastell, David and Kawalek, Peter and Newman, Mike and Willetts, Mike and Langmead-Jones, Peter} } @article {230, title = {Challenges for Participatory Action Research in Industry-Funded Information Systems Projects}, year = {2004}, month = {2004}, pages = {661 - 666}, abstract = {The purpose of this position paper is to open a discussion about the practicability of participatory action research (PAR) within industry-funded information systems (IS)research. We reflect on a project in which the undue exercise of power by the practitioners on the research team compromised the methodological rigor of the inquiry. Theories of power are used to articulate our reflections and develop suggestions for mitigating power imbalances on PAR research teams, although we conclude that PAR cannot be followed faithfully to its principles in industry-funded engagements.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_41}, author = {Breu, Karin and Hemingway, Christopher and Peppard, Joe} } @conference {319, title = {Challenges of Collaborative Networks in Europe}, booktitle = {Collaborative Networked Organizations}, year = {2004}, month = {2004}, pages = {77 - 90}, abstract = {This chapter summarizes the results of a series of discussions, focused on emerging industry needs, held with the experts in the field, during twelve regional THINKcreative workshops in Europe. The chapter further categorizes the discussed challenging requirements for industries, and draws some conclusions on these findings. The workshops were held in 2002/2003 in seven European countries, namely Portugal, UK, Czech Republic, The Netherlands, Germany, Belgium and Switzerland. In total, more than 400 participants, mostly from a wide range of Industry, and also some from the research and academia, attended these workshops. The presence of experts from research and academia facilitated some discussion on base concepts, and was necessary to better Inform industry experts of both the advances in the Virtual Organization paradigm and the advantages of its potential application to future emerging, competitive, and global market opportunities.}, url = {http://dx.doi.org/10.1007/1-4020-7833-1_9}, author = {Afsarmanesh, Hamideh and Ma{\v r}ik, Vladmir and Camarinha-Matos, Luis} } @proceedings {873, title = {The Challenges of Enterprise Integration: Cycles of Integration and Disintegration over Time}, year = {2004}, month = {12-15 December 2}, pages = {927-938}, address = {Washington DC}, author = {Lee, Jiunn Chieh and Michael D. Myers} } @proceedings {896, title = {The challenges of implementing enterprise-wide information systems: Lessons from research}, year = {2004}, note = {Keynote speech}, address = {Melbourne, Australia}, abstract = {Over the past decade we have dramatically improved of our tools, our methods, and our technology. But implementing enterprise-wide information systems remains a challenge. Why is it that we still have huge ERP disasters, systems that fail to meet the expectations, and more than 50\% of IT projects deemed to be a failure? In this presentation, Michael will share some of the lessons learned from his 15 years of research looking at information systems success and failure. He will give examples from a variety of organisations and industries to illustrate the challenges we face.}, author = {Michael D. Myers} } @article {263, title = {The Choice of Critical Information Systems Research}, year = {2004}, month = {2004}, pages = {195 - 211}, abstract = {Accompanying the development and diffusion of information technologies throughout organizations and society is the research challenge to examine the relationship between information systems and the organizations and societies within which they are embedded. As the field of information systems matures, it is fitting that consideration be given to the ways in which such an examination is carried out. Thus, there is a research need not only to examine and assess the ways in which information systems are used and affect people; there is also a research need to examine and assess the research approaches that are used to carry out these assessments. This paper examines the enactment of the critical tradition in IS research and the possibilities for new insights that can arise from shifting the lens from positivist or interpretive to critical. This consideration leads to a discussion of issues that arise from the choice of critical IS research, followed by some recommendations for addressing these issues.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_12}, author = {Debra Howcroft and Trauth, Eileen} } @article {231, title = {Conducting and Evaluating Critical Interpretive Research: Examining Criteria as a Key Component in Building a Research Tradition}, year = {2004}, month = {2004}, pages = {275 - 292}, abstract = {The collection, analysis, and interpretation of empirical materials are always conducted within some broader understanding of what constitutes legitimate inquiry and valid knowledge. In the Information Systems field, there are well known and widely accepted methodological principles consistent with the conventions of positivism. However, the same is not yet true of interpretive research. The emergence of interpretivism in IS research was advocated by Walsham (1995) and corroborated by a series of special issues in outstanding IS journals. An example of the effort to advance the legitimacy of studies grounded in an interpretive position is the set of principles suggested by Klein and Myers (1999), which applies mostly to hermeneutics. However, because not all interpretive studies are built on a hermeneutical philosophical base, they recommended that other researchers, representing other forms of interpretivism, suggest additional principles. This paper follows in this vein, advocating the timely emergence of a critical interpretive perspective in IS research and pressing the argument that an extended version of Golden-Biddle and Locke{\textquoteright}s (1993) criteria is not only appropriate but comprehensive as initial guidelines for conducting and evaluating critical interpretive research. Critical interpretive research, research criteria, intensive research, qualitative research}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_16}, author = {Pozzebon, Marlei} } @article {232, title = {Conducting Critical Research in Information Systems: Can Actor-Network Theory Help?}, year = {2004}, month = {2004}, pages = {259 - 274}, abstract = {This paper considers the proposition that actor-network theory (ANT)might be adopted within a broader critical paradigm to conduct empirical studies. The paper outlines the main tenets of the two theories, with the critical perspective primarily represented by Foucault. The aim is not to provide an extensive discussion of critical theory and ANT but to focus on their approach to the nature, scope, and level of empirical studies, particularly in their treatment of micro/macro analysis. The paper concludes that the differences are less significant than it may appear at first and that some of ANT{\textquoteright}s ideas are close to Foucault{\textquoteright}s position. However, ANT focuses on actors and their actions as they are performed in a particular time and place and does not appear to be concerned to what extent they may be historically conditioned. Thus, ANT on its own, in the view of the author, might not offer sufficient explanations as to why the actors under study take particular actions and why some actors are excluded or marginalized from the innovation process, e.g. from the development and implementation of an IS. For these reasons this paper suggests a critical research agenda enriched by ANT insights.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_15}, author = {Klecu{\'n}, Ela} } @article {511, title = {Configuring peer{\textendash}to{\textendash}peer software: An empirical study of how users react to the regulatory features of software}, journal = {European Journal of Information Systems}, volume = {13}, number = {2}, year = {2004}, pages = {95-102}, isbn = {0960-085X}, url = {EJIS2004.pdf}, author = {Adela Mlcakova and Edgar A. Whitley} } @article {233, title = {Contextual Dependencies and Gender Strategy}, year = {2004}, month = {2004}, pages = {681 - 686}, abstract = {Analysts are often asked to help deliver systems that have a great mix of performance and features. Unfortunately, problematic organizational gender related issues have sometimes been degraded and treated as unrelated to technological issues. While information systems development in general is trying to ensure support for businesses, we might in the future expect more than just a gender-ignorant quality measure in the way the IS works to meet organizational demands. In this paper it is proposed that an interpretative and contextual analysis would support ISD in the creation of a necessary level of understanding of each specific business. The intention with an inquiry into contextual dependencies is that it helps to identify some methodological limitations which result in traps unconsciously biasing analysis of investigated problem spaces. This paper introduces a contextual analysis highlighting some contextual dependencies that are typically ignored in existing works or analysis. An initial framework is proposed using gender as an example of an inquiry into some existing contextual dependencies.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_44}, author = {Bednar, Peter} } @article {234, title = {Cores and Definitions: Building the Cognitive Legitimacy of the Information Systems Discipline Across the Atlantic}, year = {2004}, month = {2004}, pages = {83 - 101}, abstract = {The issue of the legitimacy of Information Systems is important for researchers in this field because other disciplines have begun to lay claim to research topics often thought to belong to the domain of IS research, and the field itself is under challenge in academic intuitions around the world (Avison 2002). Benbasat and Zmud{\textquoteright}s (2003) opinion is that IS has gained socio-political legitimacy but not cognitive legitimacy in large measure because the object of study in much IS research is not clearly delineated. In part, they are defining a disciplinary boundary issue and beginning to define criteria by which our field may be distinguished from reference disciplines or other related disciplines. Therefore, to gain more cognitive legitimacy, a clearer understanding of what we mean by {\textquotedblleft}an information system{\textquotedblright} and of the central issues driving its creation and use is needed if it is at the core of that which we study. This paper advances that discourse by examining the role of a handful of French scholars, many of whom are not well known out of French academic circles, but whose thoughts on the issue are useful in furthering the debate on the ontological grounding of our field.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_6}, author = {Rowe, Frantz and Duane P. Truex and Lynette Kvasny} } @article {264, title = {The Crisis of Relevance and the Relevance of Crisis: Renegotiating Critique in Information Systems Scholarship}, year = {2004}, month = {2004}, pages = {143 - 158}, abstract = {Information systems as a discipline has recently been under pressure to justify its existence as a core subject within the management curriculum. There has also been recent pressure about the relevance of the IS research agenda. These are pressures felt at the more general level of business education as well, and calls have been made for business scholars to take a more holistic approach to scholarship as well as to make more explicit links to the practice of business. We take the position in this paper that the pressures can be addressed in one way by renegotiating the notion of scholarly critique. Specifically, we reconnect the idea of critique to that of crisis and attempt to show how crisis has the potential to reengage the IS scholar with praxis and help bring the often disparate projects of research, teaching, and consulting into an integrated scholarly enterprise.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_9}, author = {Marcon, Teresa and Chiasson, Mike and Abhijit Gopal} } @article {235, title = {Crossing Disciplinary Boundaries: Reflections on Information Systems Research in Health Care and the State of Information Systems}, year = {2004}, month = {2004}, pages = {657 - 658}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_39}, author = {Barber, Nicholas and Brennan, Patricia and Chiasson, Mike and Tony Cornford and Elizabeth Davidson and Bonnie Kaplan and Klecu{\'n}, Ela} } @article {236, title = {Debatable Advice and Inconsistent Evidence: Methodology in Information Systems Research}, year = {2004}, month = {2004}, pages = {121 - 142}, abstract = {The range of legitimate methods in IS research has expanded considerably over the past 20 years, a process to which IFIP Working Group 8.2 is seen to have made an important contribution. This has probably made it even harder, however, for IS researchers to know what constitutes good methodological practice. This paper addresses this issue from two angles: first through a critical analysis of claims made in the IS literature regarding the characteristics of good research; and second through an examination of the use of methodology, as reported in a number of IS research papers. The characteristics of good research considered are that it should follow the scientific method; that it should fulfill certain criteria; that it should be relevant; and that it should employ multiple methods Each of these is shown to have limitations. With respect to methodology in practice, the analysis indicates a remarkable lack of consistency in the reporting of IS research. The implications of these findings are discussed.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_8}, author = {Matthew Jones} } @booklet {2004desovietizationcountries, title = {De-Sovietization of Knowledge: Efforts to Promote Economic Development Through ICT in ex-Soviet Countries}, year = {2004}, month = {Jan} } @article {237, title = {Doctor of Philosophy, Heal Thyself}, year = {2004}, month = {2004}, pages = {21 - 34}, abstract = {As doctors of philosophy who are specialists in information systems, we routinely perform diagnoses of, and write prescriptions for, individuals, groups, organizations, societies, and their artifacts. The proverb {\textquotedblleft}physician, heal thyself{\textquotedblright} requires that we ourselves, along with our scholarly artifacts, societies, organizations, and groups, undergo the same manner of diagnosis to which we subject others, and that we have a taste of our own medicine. This essay uses three published papers of Working Group 8.2 of the International Federation for Information Processing{\textemdash}from the 1984 Manchester meeting, from the 1990 Copenhagen meeting, and from the 1997 Philadelphia meeting{\textemdash}as a source of rich material with which to illustrate the difference in our diagnoses and prescriptions if we were to do unto ourselves what we do unto others.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_2}, author = {Lee, Allen} } @article {874, title = {Dominant actors, political agendas, and strategic shifts over time: A critical ethnography of an enterprise systems implementation}, journal = {Journal of Strategic Information Systems}, volume = {13}, number = {4}, year = {2004}, pages = {355-374}, abstract = {Much of the literature on enterprise systems implementation suggests that ERP systems should support the strategic objectives of the organization. In fact some ERP vendors tend to assume that implementing their products is a straightforward translation from strategy to IT-enabled business processes. But the strategic management literature reveals that corporate strategy is often contested terrain. Conflict over strategy has the potential to delay or derail ERP implementation efforts, leading to cost overruns, failures, and lack of expected benefits. This paper seeks to understand and explain how conflicts over strategy can affect the success of ERP implementations. We studied one firm{\textquoteright}s attempt to pursue information technology-enabled enterprise integration using critical ethnography. The firm is a small-to-medium sized enterprise within a large conglomerate in the Asia-Pacific region. Our findings show that, as the dominant actors and political agendas changed, so too did the company{\textquoteright}s enterprise integration strategy. The ERP system was designed to support a future corporate world and work environment that never arrived.}, author = {Lee, Jiunn Chieh and Michael D. Myers} } @article {238, title = {Dynamics of Use and Supply: An Analytic Lens for Information Systems Research}, year = {2004}, month = {2004}, pages = {723 - 734}, abstract = {This paper describes a dual focus on the dynamics of use and supply as an analytic lens for deconstructing and examining the IT artifact. It then gives an example of the use of this approach in empirical work. Over the last 20 years, most research has focused either on organizational use of information systems or on their development and supply. There is a need to bring these two pictures into combined focus to examine creation, definition, and modification of emergent systems. Building on work in the innovation studies tradition, an analytic lens is developed to examine the evolving IT artifact across the boundaries of use and supply. Its application is demonstrated in a study of virtual reality in the construction sector. Sensemaking in the software organizations that supply virtual reality applications to the sector and in the engineering, design, and construction organizations that use them is explored. The comparison exposed a mismatch of priorities, which poses a challenge to the establishment and continued validity of these applications. The paper concludes by reflecting on how this approach builds on, and may help us extend, existing theoretical understandings of information systems and how research that uses the approach may inform practice.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_50}, author = {Whyte, Jennifer} } @article {239, title = {Embracing Information as Concept and Practice}, year = {2004}, month = {2004}, pages = {693 - 697}, abstract = {In this position paper it is argued that generic theories of the information concept will be an obstacle to the Information Systems discipline assuming intellectual leadership of the information portfolio associated with the growth of computing technologies beyond the organization.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_46}, author = {Stephens, Robert} } @article {240, title = {Enterprise System as an Orchestrator of Dynamic Capability Development: A Case Study of the IRAS and TechCo}, year = {2004}, month = {2004}, pages = {515 - 534}, abstract = {Corporations are perpetually hunting for ways to develop exclusive, sustainable, and competitive advantages that will enable them to leapfrog ahead of their industrial adversaries. Notably, the debut of enterprise systems (ES) during the recent decade has given rise to frequent talk of the utilization of integrative, IT-inspired business mechanisms to achieve the much sought-after but elusive competitive edge. Others, however, have argued that the search for sustainable competitiveness should instead be anchored in organizational efforts to cultivate and build up firm-specific dynamic capabilities. Cognizant of the various perspectives, this paper takes a holistic approach in proposing the achievement of sustainable competitive advantages by examining the manner in which ES adoption can contribute to the forging of dynamic capabilities. In particular, Montealegre{\textquoteright}s (2002) process model of capability development is adopted as the analytical framework to explore the strategization of ES development in two different organizations, with the main distinction being that one of them subscribes to commercially available SAP applications while the other chooses to develop its ES in-house. Through comparing and contrasting evidence from both cases, this study attempts to decipher how ES adoption can be strategized to develop strategic capabilities and understand the implications between off-the-shelf and bespoke ES in affecting the process of dynamic capability development.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_28}, author = {Tan, Chee and Lim, Eric and Pan, Shan and Chan, Calvin} } @proceedings {872, title = {Enterprise Systems Implementation Failure: The Role of Organizational Defensive Routines}, year = {2004}, month = {8-11 July}, pages = {1191-1204}, address = {Shanghai, China}, author = {Lee, Jiunn Chieh and Michael D. Myers} } @article {241, title = {Exposing Best Practices Through Narrative: The ERP Example}, year = {2004}, month = {2004}, pages = {433 - 451}, abstract = {The phrase best practice has entered into common parlance in contemporary business discourse, yet recent research has shown that the construction of industry standards and their inscription into software packages is not straightforward. Organizations increasingly find they are bound to accept project outcomes that have emerged as a consequence of negotiations between an installed base of consultancy or software vendor solutions and local context. We adopt a narrative approach to analyze the negotiation of a best practice design during the implementation of an ERP system. Having adopted the position that the IT artifact is part of an ensemble of networked agencies that shift over time, we then use an actor-network perspective to trace the different sources, agencies, and affects of inscription during the ERP project. Doing so highlights the politics involved in localizing an IT artifact and the issues raised when software vendors and sector specific partners collaborate with the intention of manufacturing a commercially viable ERP package intended to represent the embodiment of best practice. The paper contributes to IS research discourse by demonstrating the application of narrative analysis in longitudinal interpretive field studies.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_24}, author = {Wagner, Erica and Galliers, Robert and Scott, Susan} } @booklet {333, title = {Extrinsic Camera Parameter Recovery from Multiple Image Sequences Captured by an Omni-Directional Multi-camera System}, howpublished = {Computer Vision - ECCV 2004}, year = {2004}, month = {2004///}, pages = {326 - 340}, abstract = {Recently, many types of omni-directional cameras have been developed and attracted much attention in a number of different fields. Especially, the multi-camera type of omni-directional camera has advantages of high-resolution and almost uniform resolution for any direction of view. In this paper, an extrinsic camera parameter recovery method for a moving omni-directional multi-camera system (OMS) is proposed. First, we discuss a perspective n-point (PnP) problem for an OMS, and then describe a practical method for estimating extrinsic camera parameters from multiple image sequences obtained by an OMS. The proposed method is based on using the shape-from-motion and the PnP techniques.}, url = {http://www.springerlink.com/content/fuhnhnka3dvb5lc7}, author = {Sato, Tomokazu and Ikeda, Sei and Yokoya, Naokazu} } @article {334, title = {Forget the virtual: Bergson, actualism, and the refraction of reality}, journal = {Continental Philosophy Review}, volume = {37}, year = {2004}, month = {2004/12/14/}, pages = {469 - 493}, abstract = {In this essay I critique a particular reading of Bergson that places an excessive weight on the concept of the {\textquoteleft}virtual{\textquoteright}. Driven by the popularity of Deleuze{\textquoteright}s use of the virtual, this image of Bergson (seen especially through his text of 1896, Matter and Memory, where the idea is introduced) generates an imbalance that fails to recognise the importance of concepts of actuality, like space or psychology, in his other works. In fact, I argue that the virtual is not the key concept for Bergsonism and that there is a good deal of evidence in Bergson{\textquoteright}s other writings, especially those connected with his actualist notion of {\textquoteleft}refraction{\textquoteright}, to think of him as a perspectivist philosopher. Moreover, it will be seen that Virtualism resides within an economy of reflection that is subsumed within the broader paradigm of Actualist refraction. Taking these optical metaphors seriously, the virtual becomes a perspectival image seen from an actual position, or rather, an interacting set of actual positions. This interaction is termed {\textquoteleft}virtualization{\textquoteright}, denoting the substitution of a substantive conception with a processual one. In the first two parts of the essay, I direct my remarks more towards Deleuzian readings of the actual rather than Deleuze himself (Deleuze is so open about the biases he brings to his reading of Bergson as to be beyond criticism). In the second two sections, I pursue a philosophical argument for the probity of a non-Virtualist position as such within philosophy, based upon the concept of refraction. This is done not only because it is important that we remain open to other readings of Bergson that are not so heavily mediated in one direction, but also in view of the power of refraction as a new concept for reconciling actual modes such as molar identity, the present, and extension, with their virtual opposites.}, url = {http://dx.doi.org/10.1007/s11007-005-7097-z}, author = {Mullarkey, John} } @article {242, title = {From Critical Theory into Information Systems Practice: A Case Study of a Payroll-Personnel System}, year = {2004}, month = {2004}, pages = {555 - 575}, abstract = {Modern organizations both in the private and public sector are seen to be increasingly reliant, in terms of achieving improvements and service targets, on the efficient provision of information to enable administrative and managerial decision making. A key barrier to effective ICT introduction and integration of information systems has been identified as the complex social, organizational, and political issues endemic within organizations, preventing true discourse. This paper describes how an approach based upon some of the emancipatory principles of Jurgen Habermas may be used to develop an innovative approach to participative process and information flow modeling. This approach was used within a UK Hospital Trust in the North East of England to facilitate the integration of two departments and the procurement of a computerized payroll-personnel system. The results of the action research project are described and conclusions drawn as to the success of the approach and the role of the systems analyst within this type of project.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_30}, author = {Waring, Teresa} } @article {912, title = {The Great Quantitative / Qualitative Debate: The Past, Present, and Future of Positivism and Post-Positivism in Information Systems}, year = {2004}, note = {IFIP, International Federation of Information Processing}, pages = {659-660}, publisher = {Kluwer Academic Publishers}, address = {Norwell, MA}, author = {Michael D. Myers and Straub, Detmar W and Mingers, John and Geoff Walsham}, editor = {Bonnie Kaplan and Duane P. Truex and Wastell, David and Wood-Harper, A T and Janice I. DeGross} } @article {265, title = {The Great Quantitative/Qualitative Debate: The Past, Present, and Future of Positivism and Post-Positivism in Information Systems}, year = {2004}, month = {2004}, pages = {659 - 660}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_40}, author = {Myers, Michael and Straub, Detmar and Mingers, John and Geoff Walsham} } @conference {2004healthamazon, title = {Health Development and Information and Communication Technologies in High Amazon}, year = {2004}, month = {Jun} } @inbook {895, title = {Hermeneutics in Information Systems Research}, booktitle = {Social Theory and Philosophy for Information Systems}, year = {2004}, pages = {103-128}, publisher = {John Wiley \& Sons}, organization = {John Wiley \& Sons}, address = {Chichester}, author = {Michael D. Myers}, editor = {Mingers, John and Leslie P. Willcocks} } @article {243, title = {How Stakeholder Analysis can be Mobilized with Actor-Network Theory to Identify Actors}, year = {2004}, month = {2004}, pages = {705 - 711}, abstract = {Actor-network theory studies provide detailed accounts of how human and nonhuman actors gradually form stable actor networks. However, due to their focus on a particular context, there is little generic guidance on how such relevant actors can be identified when a different research context is under study. The principles of (human) stakeholder behavior presented in this paper guide the identification of human stakeholders through an iterative, interpretive, dynamic and context-contingent process. We show how they can be adopted and extended to include the identification of nonhuman actants as well. Thus, we argue that they can be instrumental in providing a generic, context-free guidance to stakeholder identification that is currently missing from ANT studies.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_48}, author = {Pouloudi, A. and Gandecha, R. and Atkinson, C. and Papazafeiropoulou, A.} } @article {244, title = {Improvisation in Information Systems Development}, year = {2004}, month = {2004}, pages = {631 - 646}, abstract = {This paper discusses the role of extemporaneous action and bricolage in designing and implementing information systems in organizations. We report on a longitudinal field study of design and implementation of a Web-based groupware application in a multinational corporation. We adopt a sensemaking perspective to analyze the dynamics of this process and show that improvisational action and bricolage (making do with the materials at hand) played a vital role in the development of the application. Finally, we suggest that this case study provides an occasion to reconsider how we conceptualize information systems development (ISD).}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_34}, author = {Bansler, J{\o}rgen and Havn, Erling} } @article {248, title = {Information Systems{\textemdash} a Cyborg Discipline}, year = {2004}, month = {2004}, pages = {71 - 81}, abstract = {This paper argues for a model of information systems in terms of cyborgs: a boundary-crossing mixture of the technical and the social. The argument for this model is substantiated from the personal experience of the author, presented as examples of being a cyborg researcher within a disciplinary context. Lessons for information systems are drawn.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_5}, author = {Ramage, Magnus} } @article {245, title = {Information Systems in Organizations and Society: Speculating on the Next 25 Years of Research}, year = {2004}, month = {2004}, pages = {35 - 52}, abstract = {The community of scholars focused on information systems in organizations and society (the IFIP 8.2 community) has grown in number, voice, and influence over the last 25 years. What will this community contribute during the next 25 years? We speculate on two possible areas: more articulate conceptualizations of information systems and more detailed socio-technical theories of their effects. For both of these possibilities, we project forward from the historical trajectory of the IFIP 8.2 community{\textquoteright}s involvement. Like all speculative scholarship, our argumentation is more about imagining possible directions than arguing the superiority of one particular view relative to all others. This considered speculation is directed at both stirring the community{\textquoteright}s collective mind and advancing the value of this community{\textquoteright}s work to interested others.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_3}, author = {Steve Sawyer and Kevin Crowston} } @article {246, title = {Information Systems Research and Development by Activity Analysis and Development: Dead Horse or the Next Wave?}, year = {2004}, month = {2004}, pages = {453 - 471}, abstract = {We argue that the currently dominant methods in Information Systems are not satisfactory for emancipatory research and development whose starting point is work. Activity theory was proposed as such an emancipatory research-cum-development approach in IS a decade ago. However, the potential identified in the theory has not fully materialized. As our own contribution toward making activity theory more operational in IS, we present an elaborated framework, ActAD, and review our experience in applying it to descriptive research, practical analysis, and constructive research. We claim that in order to fully unleash the potential of activity theory, activity-based methods should be developed further for IS requirements analysis projects and IS implementation projects, as well as for facilitating software development. The most appropriate way of developing such applied methods is through collaborative action research in real-life information systems work{\textemdash}the information systems practitioners developing their own work through activity analysis and development, with researcher participation.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_25}, author = {Mikko Korpela and Anja Mursu and Soriyan, Abimbola and Eerola, Anne and H{\"a}kkinen, Heidi and Toivanen, Marika} } @article {247, title = {Information Systems Research as Design: Identity, Process, and Narrative}, year = {2004}, month = {2004}, pages = {53 - 68}, abstract = {Information systems research has moved beyond the antagonistic dualisms that dominated its discourse over the last 20 years. Our community is now largely inclusive of diverse research traditions, and without a strong dogma. But it is also experiencing an identity crisis. Scholars are asking what the information systems field is or should be, and where it is going or should go. In this paper, we argue that such questions, although understandable as sense-making devices, are fundamentally misdirected because they ask about the things that should be part of our identity rather than the process through which we should construct it. As an alternative to this search for identity through the identification of things with which to align, we propose that a better way forward is to appreciate that researchers are designers. Viewing researchers as designers allows our identity to emerge from the unique and critical processes whereby we both reflect and shape the socio-technical world, as well as establish our position in an intellectual field. Viewing the researcher as designer leads to a questioning of the structurational processes in which researchers are, at the same time, both representing the socio-technical world (it is our medium) and shaping it through our knowledge generation (it is our outcome). Our ongoing choice of theories, methods, artifacts, and subjects becomes a fateful, existential choice of our identity, for which we should assume responsibility in the reflexive monitoring of our research conduct. The narratives we accept or resist in making our studies of information systems constitute our identity, as well as that of our field and of our subjects. The way forward is to take responsibility for maintaining a dynamic balance in the existential choices through which we bring ourselves as researchers, our research subjects, and the socio-technical world into being.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_4}, author = {Boland, Richard and Kalle Lyytinen} } @article {249, title = {Information Technology and the Good Life}, year = {2004}, month = {2004}, pages = {687 - 692}, abstract = {The ongoing development of information technology creates new and immensely complex environments. Our lifeworld is drastically influenced by these developments. The way information technology is intertwined in our daily life raises new issues concerning the possibility of understanding these new configurations. This paper is about the ways in which IS research can contribute to a deeper understanding of technology and the ongoing transformations of our lifeworld. As such, the paper is a conceptual exploration driven by a sincere and authentic desire to make a real difference in the way research on how technology influences our society is carried out. The article is based on the assumption that there are some foundational decisions forming research: the question of methodology, the question of object of study, and, most importantly, the question of being in service. In the paper we explore and propose a research position by taking a critical stance against unreflective acceptance of information technology and instead acknowledge people{\textquoteright} s life-world as a core focus of inquiry. The position is also framed around an empirical and theoretical understanding of the evolving technology that we label the digital transformation in which an appreciation of aesthetic experience is regarded to be a focal methodological concept.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_45}, author = {Stolterman, Erik and Fors, Anna} } @article {844, title = {Information Technology and the Transformation of Industries: Three Research Perspectives}, journal = {Journal of Strategic Information Systems}, volume = {13}, number = {1}, year = {2004}, pages = {5-28}, author = {Kevin Crowston and Michael D. Myers} } @article {853, title = {IT Industry Success and the Knowledge Economy: A Four Country Study}, journal = {Journal of Global Information Management}, volume = {12}, number = {4}, year = {2004}, pages = {23-49}, abstract = {It is generally accepted that knowledge has become a third major factor of production, inaddition to the traditional factors {\textemdash} labor and capital. Information technology production isa significant factor in the knowledge economy both because it is a major enabler of thateconomy and because it is itself highly knowledge intensive. Many countries around the worldare looking for ways to promote the development of the knowledge economy, and informationtechnology industries in particular. An important question is to what extent {\textemdash} and how {\textemdash}small developed countries might succeed in this endeavor. This study suggests a modified andmore comprehensive version of the Ein-Dor et al. (1997) model of IT (information technology)industry success in small developed countries. Whereas the earlier model of IT industry successwas based solely on the macro-economic theory of Grossman and Helpman (1991), the revisedmodel suggested here incorporates Romer{\textquoteright}s (1990) work in New Growth economics. A significantadvance over earlier work in this area is the use of both longitudinal and time slice data. Thisarticle provides an in-depth analysis of the IT industry in four countries over a five-year period:Finland, Israel, New Zealand and Singapore. It analyses some changes that occurred over theperiod 1994 through 1998 and thus provides a reasonably comprehensive picture of the factorsaffecting the production of IT in these small developed countries. Our study reveals that four ofthe five endogenous variables studied have a close relationship to the development of ITindustries in small developed countries. These variables are research and development,technological infrastructure, firm strategies, and capital availability. On the other hand,domestic IT use does not seem to be a major factor in IT industry development. Our analysis thuslargely supports the more comprehensive model of IT industry success. These findings should beof interest to both researchers and policy makers seeking to develop the knowledge economyand information technology industries in particular.}, author = {Ein-Dor, Phillip and Michael D. Myers and K.S. Raman} } @article {250, title = {Making Contributions From Interpretive Case Studies: Examining Processes of Construction and Use}, year = {2004}, month = {2004}, pages = {293 - 312}, abstract = {In this paper, we examine how contributions are established in interpretive case studies. By focusing on the introductory sections of articles, previous research in the organizational literature has recently shed light on how theorists construct opportunities for making contributions. Our theoretical approach is broader in scope, examining both the construction and use of contributions in all sections of an article. We use this approach to explore how a well-ited IS interpretive case study makes contributions. With respect to constructing contributions, our findings confirm previous strategies suggested by earlier research, and uncover the use of plural strategies. Our analysis of the use of contributions is more unexpected. For example, key theoretical and conceptual contributions that were central to the case study were rarely drawn on and incorporated by later texts. Rather, multiple audiences took up the softer, and simpler, conceptual contributions. Furthermore, our findings categorize a number of different types of referencing used by later texts in incorporating and using contributions, namely mistaken referencing, ambiguous referencing, incorporating into a new term, and related work referencing. We conclude by providing some suggestions as to how IS researchers can make better contributions from interpretive case studies}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_17}, author = {Michael Barrett and Geoff Walsham} } @article {251, title = {Making Sense of Technological Frames: Promise, Progress, and Potential}, year = {2004}, month = {2004}, pages = {473 - 491}, abstract = {In a seminal paper, Orlikowski and Gash (1994) articulated a conceptual framework for technological frames of reference (TFR) to lay the groundwork for a systematic approach to socio-cognitive research on information technology. This work is widely cited as a justification for social and socio-cognitive analysis of IT, but a limited number of studies utilizing and further developing the frames concept have been published in the ensuing decade. In this paper, we review the promise of the technological frame concept, assess theoretical and methodological progress evident in TFR publications, and consider how potential contributions of TFR may be realized in future research. In doing so, we consider how limitations in TFR research to-date might be addressed, including the feasibility of a rapprochement with quantitative research methods, of TFR analysis at the industry level of analysis, and of action research approaches.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_26}, author = {Elizabeth Davidson and Pai, David} } @article {358, title = {The memory of another past: Bergson, Deleuze and a new theory of time}, journal = {Continental Philosophy Review}, volume = {37}, year = {2004}, month = {2004/06/14/}, pages = {203 - 239}, abstract = {Through the philosophies of Bergson and Deleuze, my paper explores a different theory of time. I reconstitute Deleuze{\textquoteright}s paradoxes of the past in Difference and Repetition and Bergsonism to reveal a theory of time in which the relation between past and present is one of coexistence rather than succession. The theory of memory implied here is a non-representational one. To elaborate this theory, I ask: what is the role of the {\textquotedblleft}virtual image{\textquotedblright} in Bergson{\textquoteright}s Matter and Memory? Far from representing the simple afterimage of a present perception, the {\textquotedblleft}virtual image{\textquotedblright} carries multiple senses. Contracting the immediate past for the present, or expanding virtually to hold the whole of memory (and even the whole of the universe), the virtual image can form a bridge between the present and the non-representational past. This non-representational account of memory sheds light not only on the structure of time for Bergson, but also on his concepts of pure memory and virtuality. The rereading of memory also opens the way for Bergsonian intuition to play an intersubjective role; intuition becomes a means for navigating the resonances and dissonances that can be felt between different rhythms of becoming or planes of memory, which constitute different subjects.}, url = {http://dx.doi.org/10.1007/s11007-005-5560-5}, author = {Al-Saji, Alia} } @booklet {miscione2004microsettings, title = {Micro Policies on Health Development and Information and Communication Technologies - A Bottom-up Perspective on Policy Making about Telemedicine Services in Cross-cultural Settings}, year = {2004}, pages = {21{\textendash}21}, publisher = {Rome, Italy}, address = {Rome, Italy}, author = {Miscione, G} } @article {252, title = {New Insights into Studying Agency and Information Technology}, year = {2004}, month = {2004}, pages = {653 - 654}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_37}, author = {Tony Salvador and Jeremy Rose and Whitley, Edgar and Melanie Wilson} } @article {253, title = {Non-Dualism and Information Systems Research}, year = {2004}, month = {2004}, pages = {675 - 680}, abstract = {This paper makes a case for the grounding of information systems research within theoretical frameworks that reject the idea of subject-object dualism. In support, two rationales are offered. (1) Research in information systems exhibits an overwhelming dominance of positivistic research methodologies. Such positivistic research approaches have their roots in the scientific method, and in the attempt to transplant the scientific method from the context of the natural sciences to the context of the social sciences. Further, according to various theorists, the scientific method has its roots in the concept of subject-object dualism put forward by Descartes and others. Thus, this paper argues that IS researchers who wish to resist the current orthodoxy, and who seek to advance a non-positivistic research program, may find it useful to anchor their research within paradigmatic and theoretical frameworks that reject the concept of subject-object dualism. (2) Research into differences in cognitive processes among distinct cultures suggests that there are differences between Western and Eastern ways of thinking. The Eastern mindset is typically more sympathetic to the notion of subject-object non-dualism than the Western mindset. This difference may have implications for the design of IS that rely heavily on modes of human cognition (e.g., knowledge management or decision support systems). This suggests that when considering certain cultural or cross-cultural contexts, IS researchers may benefit from grounding their assumptions within non-dualistic paradigmatic and theoretical frameworks.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_43}, author = {Jain, Abhijit} } @article {467, title = {Panel: New insights into studying agency and information technology}, year = {2004}, pages = {653-654}, publisher = {Kluwer}, address = {Boston}, url = {IFIP822004.pdf}, author = {Tony Salvador and Jeremy Rose and Edgar A. Whitley and Melanie Wilson}, editor = {Bonnie Kaplan and Duane P. Truex III, and Wastell, David and A. Trevor Wood-Harper and Janice I. DeGross} } @article {266, title = {The Politics of Knowledge in Using GIS for Land Management in India}, year = {2004}, month = {2004}, pages = {597 - 614}, abstract = {This paper focuses on understanding the knowledge politics that inhibit effective use of geographic information systems (GIS) for managing the land degradation problem in India. It is argued that the issues of power and politics of knowledge are ubiquitously embedded in representation of the problem domain and the technology itself. Addressing these issues is an inseparable part of the challenges to information systems design and implementation. Theoretical perspective is first developed around political considerations involved in the co-construction and use of knowledge domains relevant to the design of GIS applications to address land degradation. This theoretical framework is drawn upon to analyze the politics of representation, the politics of invisible work, and the politics of institutions observed in the case of a GIS implementation in rural India. The analysis also demonstrates how the insidious impacts of such politics may be somewhat mitigated by creating socio-material networks to cultivate communicative action that leads to better design and technology acceptance by the end users.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_32}, author = {Puri, S. and Sundeep Sahay} } @conference {2004problemspractices, title = {Problems in Structuring the Information on the Internet - Semantic Web and Practices}, year = {2004}, month = {Sep} } @proceedings {897, title = {Qualitative Research And IT: A Personal View}, year = {2004}, note = {Keynote speech}, pages = {1-6}, address = {Brisbane, Australia}, abstract = {Qualitative research is now well accepted in the field of Information Systems (IS). Almost all major IS journals have senior or associate editors with expertise in qualitative research methods. In this paper I begin by describing my own career as a qualitative researcher. I started out doing ethnography in social anthropology, but now use ethnography (and other qualitative methods) in IS. Following this personal narrative I provide a brief history of the field of Information Systems, focusing specifically on the progress that has been made in the use of qualitative research. In the final section I discuss some of the lessons that I have learned along the way. This includes some discussion of the value of qualitative data analysis software, and the challenges of writing up qualitative research work for academic peer-reviewed journals.}, author = {Michael D. Myers} } @proceedings {431, title = {Reconstructing {\textquoteright}Best Practices{\textquoteright} Embedded in Software Packages: An Actor-Network Perspective}, year = {2004}, address = {USA}, author = {Sia, S.K. and Yeow, A.} } @article {255, title = {Reflection on Development Techniques Using the Psychology Literature: Over Two Decades of Bias and Conceptual Blocks}, year = {2004}, month = {2004}, pages = {493 - 510}, abstract = {Analysis and development techniques have played an important role in information systems, providing support for developers in structuring and directing tasks. They also provide cognitive support in collecting, collating, analyzing, and representing information about system requirements and attributes. However, by developing previous work further, in particular by classifying techniques into six generic types and transcribing these onto problem/solution space diagrams, this paper argues that by directing tasks and dictating what and how information is collected and represented, techniques can bias developers{\textquoteright} understanding of system requirements and attributes. The 1984 IFIPWG8.2 conference showed how IS can be informed by literature in our foundation disciplines. By drawing on the psychology literature to develop a classification of techniques, this paper shows some of the potential biases inherent in techniques. The classification is applied to many techniques which have contributed to development activity. Through an understanding of the conceptual blocks embedded in them, the paper hopes to inform practice about the selection and mixing of development techniques. More generally, the paper suggests a reexamination of our assumptions when undertaking IS development. The techniques that limit problem and solution scope most and also provide the most cognitive and conceptual biases are the more formal, objective ones, and we recommend that less formal techniques are also used in practice. Parallels can be drawn with the movement encouraging the use of qualitative research approaches in IS research inspired by the 1984 conference. Research methods and techniques also provide support in the form of directed tasks, activities, guidance on data collection, analysis, and representation. Drawing on this parallel, it could be argued that quantitative, formal research approaches may introduce more conceptual biases than less formal qualitative, approaches, and that the latter should be used instead of, or at least alongside, quantitative approaches.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_27}, author = {Adams, Carl and Avison, David} } @article {267, title = {The Research Approach and Methodology Used in an Interpretive Study of a Web Information System: Contextualizing Practice}, year = {2004}, month = {2004}, pages = {213 - 231}, abstract = {This paper contextualizes the research approach followed in an interpretive Information Systems study that explored the development of a Web information system. The paper provides details of the methodological approach followed in the project, the assumptions used, and the research techniques utilized when conducting a specific interpretive study of IS development. The aim of this paper is to provide a detailed presentation of the range of methods chosen to detail the rigor maintained in the research process associated with interpretive IS research. This paper illustrates how methods that are described as visual methodological techniques can be applied to an Information Systems study. With the presentation of this detail, it is hoped other IS researchers can reflect on their own practices when conducting interpretive research projects in comparison with those chosen for this project. The paper bridges the theoretical background of existing literature to illustrate how the exploration of method and research practice contributes to the examination of a chosen research topic.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_13}, author = {Greenhill, Anita} } @article {256, title = {Researching and Developing Work Activities in Information Systems: Experiences and the Way Forward}, year = {2004}, month = {2004}, pages = {655 - 657}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_38}, author = {Mikko Korpela and Allen, Jonathan and Bertelsen, Olav and Dittrich, Yvonne and Kuutti, Kari and Lauche, Kristina and Anja Mursu} } @article {257, title = {Resistance or Deviance? A High-Tech Workplace During the Bursting of the Dot-Com Bubble}, year = {2004}, month = {2004}, pages = {577 - 596}, abstract = {Under certain circumstances, a critical orientation to the study of workplace deviance/resistance is necessary to understand ICT-enabled workplace culture and employee behavior. The critical orientation to workplace deviance characterizes acts in opposition to an organization with the potential to do harm as semi-organized, group resistance to organizational authority. The questions that drive this research are, does technology enable deviance? When does an act of social deviance become an act of resistance against domination? The answers depend on the perspective of the labeler. To discuss these, I offer the example of a case study of a small software development company called Ebiz.com. For the first few years of the existence of Ebiz.com, the social control exerted on the employees increased yet there were no observable or discussed acts of employee retaliation. I argue that the social environment of the dot-com bubble allowed several myths to propagate widely and affect human behavior. As the market began to fail, and dot-corns began to close, the employees seemed to recognize their situation and enact deviant behavior, or resist. Most importantly, what I have learned from this work is that ICT work may lead to increased deviant or resistant behaviors and that ICT work may also provide a means to do increased deviant or resistant behavior.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_31}, author = {Tapia, Andrea} } @article {268, title = {The Role of Conventional Research Methods in Information Systems Action Research}, year = {2004}, month = {2004}, pages = {335 - 352}, abstract = {Action research has for many years been promoted and practiced as one way to conduct empirical research within the Information Systems discipline. While the approach can lead to highly relevant contributions, researchers are warned against the many risks involved in action research. Based on successful cases of Information Systems action research we explore the role played by conventional research methods in developing and presenting research contributions. The cases suggest that action research lends itself strongly toward multi-method approaches and facilitates the creation of multicontribution projects. We identify two approaches to mixing action research and conventional research methods{\textemdash}the planned and the emergent approaches{\textemdash}and we argue that action research can be adopted in ways that are no more risky than other conventional approaches to Information Systems research.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_19}, author = {Germonprez, Matt and Lars Mathiassen} } @booklet {573, title = {Sociology of information systems: External programme study guide}, year = {2004}, publisher = {University of London}, edition = {First edition}, address = {London}, author = {Edgar A. Whitley} } @article {258, title = {Socio-Technical Structure: An Experiment in Integrative Theory Building}, year = {2004}, month = {2004}, pages = {411 - 432}, abstract = {When it comes to investigating the relationship between the social and the technical, the Information Systems (IS)discipline has been a net importer of theories. These theories often carry differing interpretations of central concepts, which then become both contusing and difficult to integrate. In response to calls for IS to become a reference discipline in its own right (in other words, a theory exporter), this paper offers an example of integrative theory development. Instead of adapting a theory from another discipline or building a theory from empirical data, we examine the structure concept in some of its various theoretical adaptations in IS and try to integrate them to produce theory focusing on IS concerns while resolving some of the major areas of contention. Both social and technological versions of structure are investigated through three theoretical IS perspectives drawn from different reference disciplines. The first perspective relates to social theories (principally structuration theory), the second to linguistic theories (principally the structural linguistics of Chomsky), and the last to science studies (principally actor-network theory). The objective is to study areas of agreement and contention around the structure concept. Areas of agreement can be incorporated into integrative theory development, whereas areas of contention must be resolved (a far more difficult task). The resulting theoretical model is illustrated with a case study involving competence management systems design and use at Volvo Information Technology in Gotteborg, Sweden.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_23}, author = {Jeremy Rose and Lindgren, Rikard and Ola Henfridsson} } @article {836, title = {Special Issue on Action Research in Information Systems: Making IS Research Relevant to Practice-Foreword}, journal = {MIS Quarterly}, volume = {28}, number = {3}, year = {2004}, pages = {329-335}, author = {Richard Baskerville and Michael D. Myers} } @article {259, title = {Structurantion in Research and Practice: Representing Actor Networks Their Structurated Orders and Translations}, year = {2004}, month = {2004}, pages = {389 - 409}, abstract = {This paper sets out to describe how the StructurANTion theoretical framework and tools derived from it can be used to represent translations of humanchine actor networks and their structurated orders, to underpin both research and practice in integrating IS and organizational transformation.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_22}, author = {Laurence Brooks and Atkinson, Chris} } @article {260, title = {Supporting Engineering of Information Systems in Emergent Organizations}, year = {2004}, month = {2004}, pages = {175 - 192}, abstract = {Research related to information systems development has roughly followed two diverse paths. The first, pursued by the software engineering community, is aimed at creating techniques for the efficient engineering of IT artifacts. The second, pursued by communities such as IFIP 8.2, attempts to understand and anticipate the impact of IT on organizations or upon one another by incorporating social science theories. The two views are in conflict because the former treats information systems merely as reflections of requirements, whereas the latter views them as agents of change. As a result, the two streams have suffered from increasing emphasis on minutiae and are, at worst, in danger of losing their relevance. Recent research in emergent systems development and developers{\textquoteright} engagement in problem and design spaces suggest a possible approach to integrating the two streams. In particular, we argue that novel R-forms (representation techniques) can proactively facilitate the engineering of information systems in emergent organizations. Using insights from research in both streams, we develop a set of requirements that can guide the development of new R-forms that may take into account both the engineering of the IT artifact as well as the emergent nature of organizational context in which the IT artifact will be deployed.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_11}, author = {Purao, Sandeep and Duane P. Truex} } @article {261, title = {Symbolic Processes in ERP Versus Legacy System Usage}, year = {2004}, month = {2004}, pages = {713 - 722}, abstract = {Being hailed as possessing the ability to drive effective business reengineering and management of core and support processes, it is not surprising that enterprise resource planning (ERP) systems have been adopted by more than 60 percent of Fortune 500 companies at the turn of the century. In contrast, legacy systems have frequently been attached with negative connotations. Yet at the same time, it is common knowledge that some legacy systems are not replaced when companies adopt ERP solutions, while new in-house systems still continue to be developed. While risks and time involved have been highlighted as possible reasons for the non-replacement of legacy systems, little attention has been paid to process issues as well as the symbolic meanings attached to the ERP vis-a-vis the other coexisting information systems. This research employs symbolic interactionism as the informing theoretical perspective in an ethnographic study of a large government authority in Singapore. Our findings surprisingly indicate that contrary to popular belief, the end-users in that organization tend to attach rather favorable symbols to their legacy and new in-house developed systems, while displaying relatively negative sentiments towards their ERP package. In this paper, we first discuss the different symbolism attached over the years to the coexisting systems. Next, we highlight how certain symbols gradually got sedimented over time. Finally, we demonstrate how the consequent manifestations of these symbolic realities influenced certain organizational actions that impacted the usage and perpetuation of the coexisting systems.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_49}, author = {Ng, Martin and Tan, Michael} } @article {262, title = {Systems Development in the Wild: User-Led Exploration and Transformation of Organizing Visions}, year = {2004}, month = {2004}, pages = {615 - 630}, abstract = {This paper addresses an increasingly significant category of IT use: that of user-led deployment of generic technologies in organizational settings. Three case studies of such deployment are presented: a Web-based collaboration application developed in-house and deployed in distributed work of a multinational pharmaceutical company, a commercial groupware application deployed in the merger of a Northern European financial company, and a communication infrastructure for multimedia telemedicine in a Norwegian hospital. The activities studied were not fully organized in formal development projects, but were to a large extent initiatives {\textquotedblleft}in the wild{\textquotedblright} where users influenced directions and outcomes of the process. In all three cases, we found a slow transformation of the initial organizing visions and intentions, a successive addition and adjustment of various technological components, and gradual alterations in work practice. In this paper, we classify this work as development in order to emphasize the importance of such redesigns, tailoring, and adaptations of the technologies that take place in use settings. In closing, the paper discusses the implications for the position and contribution of the IS professional in informing this process.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_33}, author = {Margunn Aanestad and Henriksen, Dixi and Pors, Jens} } @booklet {miscione2004telemedicinasocioculturales, title = {Telemedicina en Per{\'u}: Un Estudio de los Aspectos Socio-Culturales}, year = {2004}, month = {Jan}, publisher = {Cayetano Heredia University, Lima, Peru}, author = {Miscione, G} } @article {270, title = {Themes, Iteration, and Recoverability in Action Research}, year = {2004}, month = {2004}, pages = {353 - 362}, abstract = {This paper develops three concepts important to the practice of action research{\textemdash}recoverability, research themes, and iteration{\textemdash}by highlighting their applicability beyond single action research studies. The concepts are discussed against a program of action research, undertaken by a multidisciplinary research team, with a research focus on local, sector and national levels. This contrasts with the more usual pattern of action research in single situations. Action research is criticized on the grounds that it lacks generalizability and external validity from one-off studies. Goodness criteria have been derived to address these and other criticisms. The recoverability criterion, less strong than the repeatability of experimentation, is central to these. A second concept, that of research themes, links the recoverability criterion and iteration in action research. Iteration within and between projects and the notion of critical mass, of doing work in more than one setting, address the limitations of single setting studies.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_20}, author = {Holwell, Sue} } @article {271, title = {Theory and Action for Emancipation: Elements of a Critical Realist Approach}, year = {2004}, month = {2004}, pages = {667 - 674}, abstract = {Adopting a non-Habermasian critical realist position, this paper seeks to outline some key elements of a realist ontology, on the one hand, and a radical critical stance on the other. The relationship of critical realism to positivism and interpretivism is described, and the case for methodological pluralism made. The elements of realism described are connection of the particular with general, contribution to knowledge, and construction of alternatives. The critical aims entail a commitment to emancipation, a focus on issues of equality and inequality, a questioning of the status quo, and a challenging of ideology. One key conclusion for practice concerns the alliances for researchers with less conservative members of organizations in order to avoid compromise on emancipatory aims. The contribution of the paper is summarized in a concluding table.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_42}, author = {Melanie Wilson and Greenhill, Anita} } @article {254, title = {On Transferring a Method into a Usage Situation}, year = {2004}, month = {2004}, pages = {535 - 553}, abstract = {Many things can militate against the successful transfer of IS methods from research to commercial environments. In this paper we synthesize a framework for reasoning about method transfer. Four main themes emerge from analysis of the relevant literature: the importance of a clear conceptual framework for a method; support for learning; usability within a defined context; and acceptability to stakeholders. These themes are elaborated in the paper, and also illuminated, by reference to Langefors{\textquoteright} infological equation and from experience gained in four case studies of method transfer. We claim that there is an onus on both method developers and those responsible for method adoption to consider all identified aspects, in an attempt to minimize inherent tensions between methods in concept and methods in action.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_29}, author = {Brian Lings and Bj{\"o}rn Lundell} } @article {273, title = {Truth, Journals, and Politics: The Case of the MIS Quarterly}, year = {2004}, month = {2004}, pages = {103 - 120}, abstract = {In this paper, we want to demonstrate the way in which regimes of truth at the MIS Quarterly (MISQ) have made it possible for certain types of research to be published there, and others not. The importance of this claim lies in the fact that publication in MISQ is often seen as an indication of status. Furthermore, publication in MISQ also plays an important role in decisions about tenure and promotion. However, the aim of the paper is not to rid MISQ of regimes of truth{\textemdash}this is not possible. The paper will argue, with Foucault, that all institutions always already have their politics of truth. The production of truth is always intimately tied to relations of power which itself depends upon truth for its sustenance. The aim of the paper is to show this intimate connection between truth and power. In particular, in the case of MISQ, we want to question the often-implied legitimacy and status that the MISQ has over and against other high quality journals in the field. Foucault argues that power is most effective when it hides itself. This paper is an attempt to make its face more public and open to scrutiny.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_7}, author = {Introna, Lucas and Louise Whittaker} } @article {272, title = {Truth to Tell?}, year = {2004}, month = {2004}, pages = {699 - 704}, abstract = {A motivation for the 1984 Manchester conference was to question the applicability of scientific truth tests to the study of socio-technical systems. While most IS researchers now agree that such tests are not appropriate, or at least are not always appropriate, the debate on the use of alternatives continues. This paper examines several truth tests applied to two truth statements in one piece of published research. Since the paper was published in a mainstream IS journal, it is argued that the standard of truth tests applied to this paper is indicative of the standard of truth tests acceptable within the IS community. It is observed that different standards of truth test are applied, for different purposes, at different stages of the review process, reflecting the different purposes and standards of the truth statements made. Whereas the truth tests applied to the first truth statement (an inductive statement reporting the findings of the research) can be read through the text, those applied to the second truth statement (a deductive statement seeking to generalize these research findings) cannot. The observed differences in the application of internal and external validity tests point to the need for greater transparency in the application of this (second) type of truth test to better inform authors, reviewers, and readers alike; thereby improving the quality of truth statements made and of resultant publications.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_47}, author = {Webb, Brian} } @article {274, title = {Twenty Years of Applying Grounded Theory in Information Systems: A Coding Method, Useful Theory Generation Method, or an Orthodox Positivist Method of Data Analysis ?}, year = {2004}, month = {2004}, pages = {649 - 650}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_35}, author = {Bryant, Tony and Hughes, Jim and Myers, Michael and Trauth, Eileen and Cathy Urquhart} } @article {841, title = {Twenty Years of Applying Grounded Theory in Information Systems: A Coding Method, Useful Theory Generation Method, or an Orthodox Positivist Method of Data Analysis?}, year = {2004}, pages = {649-650}, publisher = {Kluwer Academic Publishers}, address = {Norwell, MA}, author = {Bryant, Tony and Hughes, Jim and Michael D. Myers and Trauth, E.M. and Cathy Urquhart}, editor = {Bonnie Kaplan and Duane P. Truex and Wastell, David and Wood-Harper, A T and Janice I. DeGross} } @article {269, title = {The Use of Social Theories in 20 Years of WG 8.2 Empirical Research}, year = {2004}, month = {2004}, pages = {365 - 388}, abstract = {We study the use of social theories in empirical Information Systems research in the IFIP WG 8.2 conference proceedings since the 1984 Manchester conference. Our results are that interpretivist research and the use of qualitative methods have increased significantly and that only 22 percent of included papers generate theory or concepts according to a narrow definition of theory based on Walsham{\textquoteright}s classification; the majority of WG 8.2 researchers thus appear reluctant to generalize to theory from their findings, particularly when undertaking interpretivist research. However, using a wide definition of theory that includes researchers{\textquoteright} own theory used in their papers, we suggest that additional theory is in fact being generated although in a non-explicit manner.We close by pointing out the benefits of theory generation, inviting WG 8.2 researchers to make their use of theory more explicit and to familiarize themselves with the view that there are forms of generality which are possible within the interpretivist paradigm.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_21}, author = {Flynn, Donal and Gregory, Peggy} } @article {539, title = {What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research}, journal = {Communications of the AIS}, volume = {13}, number = {21}, year = {2004}, pages = {317-335}, isbn = {1529-3181}, url = {CAIS2004.pdf}, author = {Edgar A. Whitley and Sandra Sieber and Cristina C{\'a}liz and Mary L Darking and Chiara Frigerio and Edoardo Jacucci and Anna N{\"o}teberg and Michael Rill} } @article {275, title = {Whatever Happened to Information Systems Ethics?}, year = {2004}, month = {2004}, pages = {159 - 174}, abstract = {This paper explores the development of information systems and computer ethics along separate trajectories over the 20 years since the first Manchester Conference, and ponders how things might have been and could be different. Along each trajectory, the challenge of aligning theory and practice has stimulated much research. We evaluate some of this research with respect to this alignment, discuss ethical theories and behavior, and explore the role of education in the development of practitioners who can and do behave ethically. We recommend the inclusion of the ethics of care, and more research into the teaching and learning of ethics as part of the personal journey of students, teachers, and practitioners.}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_10}, author = {Bell, Frances and Alison E. Adam} } @article {902, title = {Will real estate agents survive? The transformation of the real estate industry by information technology}, journal = {University of Auckland Business Review}, volume = {6}, number = {1}, year = {2004}, pages = {38-50}, author = {Michael D. Myers and Kevin Crowston} } @article {276, title = {Young Turks, Old Guardsmen, and the Conundrum of the Broken Mold: A Progress Report on Twenty Years of Information Systems Research}, year = {2004}, month = {2004}, pages = {1 - 18}, url = {http://dx.doi.org/10.1007/1-4020-8095-6_1}, author = {Bonnie Kaplan and Duane P. Truex and Wastell, David and Wood-Harper, A.} } @article {DBLP:conf/ifip8-2/TuckerP03, title = {Back to Basics: Sharing Goals and Developing Trust in Global Virtual Teams}, year = {2003}, pages = {85-98}, author = {Robert J. Tucker and Niki Panteli} } @article {DBLP:conf/ifip8-2/StandingSSW03, title = {Can E-Marketplaces Bridge the Digital Divide?}, year = {2003}, pages = {339-353}, author = {Craig Standing and Ian Sims and Rosemary Stockdale and Arjen Wassenaar} } @proceedings {457, title = {Configuring peer{\textendash}to{\textendash}peer software: An empirical study of how users react to the regulatory features of software}, year = {2003}, publisher = {Winner of best conference paper prize}, address = {Naples, Italy}, url = {ECIS2003.pdf}, author = {Adela Mlcakova and Edgar A. Whitley}, editor = {Claudio Ciborra and Ricardo Mercurio and Marco de Marco and Marcello Martinez and Andrea Carignani} } @article {DBLP:conf/ifip8-2/PorsS03, title = {Coordinating Work with Groupware: The Challenge of Integrating Protocol and Artefact}, year = {2003}, pages = {53-68}, author = {Jens Kaaber Pors and Jesper Simonsen} } @article {DBLP:conf/ifip8-2/MosseS03, title = {Counter Networks, Communication and Health Information Systems: A Case Study from Mozambique}, year = {2003}, pages = {35-51}, author = {Emilio Mosse and Sundeep Sahay} } @article {DBLP:conf/ifip8-2/Richardson03, title = {CRM in Call Centres: The Logic of Practice}, year = {2003}, pages = {69-83}, author = {Helen J. Richardson} } @article {DBLP:conf/ifip8-2/ShoibN03, title = {Cross-Cultural IS Adoption in Multinational Corporations: A Study of Rationality}, year = {2003}, pages = {435-451}, author = {Gamila Shoib and Joe Nandhakumar} } @article {894, title = {Defining the Core Properties of the IS Discipline: Not Yet, Not Now}, journal = {Communications of the AIS}, volume = {12}, year = {2003}, pages = {582-587}, abstract = {I believe that a lively and vigorous debate about the nature of the IS discipline is important. Weneed an open and constructive debate about the identity of the IS field and its subject matter. Forthis reason I welcome Benbasat and Zmud{\textquoteright}s June 2003 article in MIS Quarterly in which theysuggested that the core of IS research should be the IT artifact. I also welcome Alter{\textquoteright}s responsein this issue of Communications of the AIS, in which he argues that the core of IS research shouldbe {\textquotedblleft}systems in organizations{\textquotedblright}. However, both articles take one point for granted: that the ISdiscipline is ready and able to define a core. In this article I take issue with this fundamentalassumption. I believe the attempt to narrow the field to a core is misguided, at least at this point intime. The argument of this paper is that the field of information systems is nowhere near ready todefine a core in information systems.}, author = {Michael D. Myers} } @article {DBLP:conf/ifip8-2/MetcalfeJ03, title = {The {\textquoteright}Ear{\textquoteright} and {\textquoteright}Eye{\textquoteright} Digital Divide}, year = {2003}, pages = {419-434}, author = {Mike Metcalfe and Carmen Joham} } @article {DBLP:conf/ifip8-2/KendallKK03, title = {The Emergence of ICTs for Developing Countries: Using Dramatistic Analysis to Identify the Heroes and Villains}, year = {2003}, pages = {403-418}, author = {Kenneth E. Kendall and Julie E. Kendall and Muhammadou M. O. Kah} } @article {DBLP:conf/ifip8-2/HeavinFT03, title = {Factors Influencing Ireland{\textquoteright}s Software Industry: Lessons for Economic Development through IT}, year = {2003}, pages = {235-252}, author = {Ciara Heavin and Brian Fitzerald and Eileen M. Trauth} } @article {DBLP:conf/ifip8-2/TsiavosHW03, title = {The Footprint of Regulation: How Information Systems are Affecting the Sources of Control in a Global Economy}, year = {2003}, pages = {355-370}, author = {Prodromos Tsiavos and Ian Hosein and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/CiborraN03, title = {Good Governance and Development Aid: Risks and Challenges of E-Government in Jordan}, year = {2003}, pages = {387-402}, author = {Claudio Ciborra and Diego D. Navarra} } @article {DBLP:conf/ifip8-2/AdamM03, title = {Have You Got Anything to Declare? Neo-Colonialism, Information Systems, and the Imposition of Customs and Duties in a Third World Country}, year = {2003}, pages = {101-115}, author = {Mariyam S. Adam and Michael D. Myers} } @inbook {829, title = {Have you got anything to declare? Neo-colonialism, Information Systems, and the imposition of customs and duties in a Third World Country}, booktitle = {IS Perspectives and Challenges in the Context of Globalization}, year = {2003}, note = {IFIP Joint WG 8.2 and 9.4 Conference, 15-17 June 2003, Athens University of Economics and Business, Athens, Greece}, pages = {101-115}, publisher = {Kluwer Academic Publishers}, organization = {Kluwer Academic Publishers}, address = {Boston}, keywords = {IFIP, conference, colonialism, neo-colonialism}, author = {Mariyam S. Adam and Michael D. Myers}, editor = {Mikko Korpela and Ramiro Montealegre and Angeliki Poulymenakou} } @article {DBLP:conf/ifip8-2/LiuW03, title = {ICTs and Organizational Control Across Cultures: The Case of a UK Multinational Operating in China}, year = {2003}, pages = {155-168}, author = {Wei Liu and Chris Westrup} } @article {DBLP:conf/ifip8-2/McGrath03, title = {ICTs Supporting Targetmania: How the UK Health Sector is Trying to Modernise}, year = {2003}, pages = {19-34}, author = {Kathy McGrath} } @article {DBLP:conf/ifip8-2/Macome03, title = {On the Implementation of an Information System in the Mozambican Context: The EDM Case}, year = {2003}, pages = {169-184}, author = {Esselina Macome} } @article {DBLP:conf/ifip8-2/PanPCF03, title = {Implementing Global Information Technology Product in a Localized Context: An Exploratory Study of ERP System Implementation in China}, year = {2003}, pages = {185-198}, author = {Gary S. C. Pan and Shan Ling Pan and Xin-Xin Chen and Donal J. Flynn} } @article {DBLP:conf/ifip8-2/Al-Qirim03, title = {Innovation Theories in Retrospect: The Case of Electronic Commerce Adoption in Small Business in New Zealand}, year = {2003}, pages = {117-137}, author = {Nabeel A. Y. Al-Qirim} } @article {DBLP:conf/ifip8-2/PuriS03, title = {Institutional Structures and Participation: Comparative Case Studies from India}, year = {2003}, pages = {271-287}, author = {Satish K. Puri and Sundeep Sahay} } @article {DBLP:conf/ifip8-2/Johnstone03, title = {Knowledge, NGOs and Networks: Applying Epistemology to the Work of Development}, year = {2003}, pages = {307-322}, author = {Justine Johnstone} } @article {DBLP:conf/ifip8-2/SalvadorSU03, title = {Less Cyber, More Caf{\'e}: Design Implications for Easing the Digital Divide with Locally Social Cyber Cafes}, year = {2003}, pages = {323-337}, author = {Tony Salvador and John W. Sherry and Alvaro E. Urrutia} } @article {DBLP:conf/ifip8-2/Avgerou03, title = {The Link Between ICT and Economic Growth in the Discourse of Development}, year = {2003}, pages = {373-386}, author = {Chrisanthi Avgerou} } @article {DBLP:conf/ifip8-2/FellerFLB03, title = {Open Source and Free Software: Organizational and Societal Implications}, year = {2003}, pages = {461-464}, author = {Joseph Feller and Brian Fitzgerald and Jan Ljungberg and Magnus Bergquist} } @article {DBLP:conf/ifip8-2/EstevesPC03, title = {Organizational and National Issues of an ERP Implementation in a Portuguese Company}, year = {2003}, pages = {139-153}, author = {Jos{\'e} Esteves and Joan Antoni Pastor and Jo{\~a}o Carvalho} } @proceedings {491, title = {Panel: What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research}, year = {2003}, address = {Naples, Italy}, url = {ECIS2003PhD.pdf}, author = {Edgar A. Whitley and Sandra Sieber and Mary L Darking and Cristina Caliz and Chiara Frigerio and Anna Noteberg}, editor = {Claudio Ciborra and Ricardo Mercurio and Marco de Marco and Marcello Martinez and Andrea Carignani} } @article {DBLP:conf/ifip8-2/KorpelaMP03, title = {Perspectives and Challenges of Organizational Information Systems in the Context of Globalization}, year = {2003}, pages = {1-15}, author = {Mikko Korpela and Ramiro Montealegre and Angeliki Poulymenakou} } @article {DBLP:conf/ifip8-2/AmanN03, title = {The Process of Offshore Software Development: Preliminary Studies of UK Companies in Malaysia}, year = {2003}, pages = {201-216}, author = {Aini Aman and Brian Nicholson} } @article {DBLP:conf/ifip8-2/DavisonJHA03, title = {Professional Socieies in Information Systems: A Force for Globalisation or Good?}, year = {2003}, pages = {455-459}, author = {Robert M. Davison and Ernest Jordan and Carol Hsu and Chrisanthi Avgerou} } @article {504, title = {Regulating Architecture and Architectures of Regulation: Contributions from Information Systems}, journal = {International Review of Computing Law and Technology}, volume = {17}, number = {1}, year = {2003}, pages = {85-97}, isbn = {1360-0869}, url = {IRCLT2003.pdf}, author = {Ian R Hosein and Prodromos Tsiavos and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/Pries-HejeBH03, title = {Russian High-Speed Software Development: Overcoming the Challenges of Globalization}, year = {2003}, pages = {253-269}, author = {Jan Pries-Heje and Richard Baskerville and Galina Ianshina Hansen} } @article {DBLP:conf/ifip8-2/CornfordK03, title = {Social Exclusion and Information Systems in Community Healthcare}, year = {2003}, pages = {291-305}, author = {Tony Cornford and Ela Klecun-Dabrowska} } @proceedings {447, title = {An Anatomy of European Information Systems Research ECIS 1993-ECIS 2002: Some Initial Findings}, year = {2002}, pages = {3-18}, address = {Gdansk, Poland}, isbn = {83-7326-077-3}, url = {ECIS2002.pdf}, author = {Robert D. Galliers and Edgar A. Whitley}, editor = {S Wrycza} } @article {DBLP:conf/ifip8-2/MetcalfeL02, title = {Arguing for Information Systems Project Definition}, year = {2002}, pages = {295-321}, author = {Mike Metcalfe and Maureen Lynch} } @article {839, title = {IS as a Reference Discipline}, journal = {MIS Quarterly}, volume = {26}, number = {1}, year = {2002}, pages = {1-14}, author = {Baskerville, Richard L and Michael D. Myers} } @article {913, title = {Beyond Models of National Culture in Information Systems Research}, journal = {Journal of Global Information Management}, volume = {10}, number = {1}, year = {2002}, pages = {24-32}, abstract = {Many IS scholars argue that global organizations need to understand cultural differences if they are to successfully deploy information technology. We agree that an understanding of cultural differences is important, but suggest that the concept of {\textquotedblleft}national culture{\textquotedblright} that has tended to dominate the IS research literature is too simplistic. In this article, we challenge information systems researchers to go beyond models of national culture. We propose that IS researchers should adopt a more dynamic view of culture {\textendash} one that sees culture as contested, temporal and emergent.}, author = {Michael D. Myers and Tan, Felix} } @article {DBLP:conf/ifip8-2/SawyerC02, title = {Conceptualizing Information Technology in the Study of Information Systems: Trends and Issues}, year = {2002}, pages = {109-131}, author = {Steve Sawyer and Tina T. Chen} } @article {DBLP:conf/ifip8-2/KvasnyT02, title = {The Digital Divide at Work and Home: The Discourse about Power and Underrepresented Groups in the Information Society}, year = {2002}, pages = {273-291}, author = {Lynette Kvasny and Eileen M. Trauth} } @article {DBLP:conf/ifip8-2/BarrettHOP02, title = {Discourse and Organizational Transformation in Information Systems Research}, year = {2002}, pages = {533-538}, author = {Michael Barrett and Loizos Heracleous and Orlikowski, Wanda and Niki Panteli} } @article {DBLP:conf/ifip8-2/Westrup02, title = {Discourse, Management Fashions, and ERP Systems}, year = {2002}, pages = {401-418}, author = {Chris Westrup} } @article {DBLP:conf/ifip8-2/MonodTB02, title = {The Discourse of a Large Scale Organizational Transformation: The Reengineering of IBM, 1989-1994}, year = {2002}, pages = {249-272}, author = {Emmanuel Monod and Duane P. Truex and Richard Baskerville} } @article {DBLP:conf/ifip8-2/CukierMB02, title = {The Discourse of Learning Technology in Canada: Undestanding Communication Distortions and Their Implications for Decision Making}, year = {2002}, pages = {197-221}, author = {Wendy L. Cukier and Catherine A. Middleton and Robert Bauer} } @article {DBLP:conf/ifip8-2/RoseK02, title = {Dominant Technological Discourses in Action: Paradigmatic Shifts in Sense Making in the Implementation of an ERP System}, year = {2002}, pages = {437-462}, author = {Jeremy Rose and Pernille Kr{\ae}mmergaard} } @article {DBLP:conf/ifip8-2/OliverO02, title = {ERP Adoption: Selling the System}, year = {2002}, pages = {507-523}, author = {Dave Oliver and Lyn Oliver} } @proceedings {470, title = {An exploration of the emergence, development and evolution of regulatory characteristics of Information Systems}, year = {2002}, pages = {813-816}, address = {Barcelona, Spain}, url = {ICIS2002.pdf}, author = {Prodromos Tsiavos and Edgar A. Whitley and Ian R Hosein}, editor = {Linda Applegate and Robert D. Galliers and Janice I. De Gross} } @article {DBLP:conf/ifip8-2/Suchman02, title = {Figuring Service in Discourses of ICT: The Case of Software Agents}, year = {2002}, pages = {33-43}, author = {Lucy A. Suchman} } @booklet {933, title = {Global and Organizational Discourse about Information Technology}, year = {2002}, note = {IFIP Working Group 8.2 Proceedings, Barcelona, Spain, December 2002}, pages = {548}, publisher = {Kluwer Academic Publishers}, address = {Boston}, author = {Eleanor H. Wynn and Edgar A. Whitley and Michael D. Myers and Janice I. DeGross} } @article {DBLP:conf/ifip8-2/Thompson02, title = {ICT, Power, and Developmental Discourse: A Critical Analysis}, year = {2002}, pages = {347-373}, author = {Mark Thompson} } @article {DBLP:conf/ifip8-2/AbbottJ02, title = {The Importance of Being Nearest: Nearshore Software Outsourcing and Globalization Discourse}, year = {2002}, pages = {375-397}, author = {Pamela Abbott and Matthew Jones} } @article {DBLP:conf/ifip8-2/McGrath02, title = {In a Mood to Make Sense of Technology: A Longitudinal Study of Discursive Practices at the London Ambulance Service}, year = {2002}, pages = {485-506}, author = {Kathy McGrath} } @article {DBLP:conf/ifip8-2/Wagner02, title = {Interconnecting Information Systems Narrative Research: An End-to-End Approach for Process-Oriented Field Studies}, year = {2002}, pages = {419-435}, author = {Erica L. Wagner} } @inbook {932, title = {IT Industry Success in Small Countries: The Cases of Finland and New Zealand}, booktitle = {Cases on Global IT Applications and Management: Successes and Pitfalls}, year = {2002}, pages = {226-251}, publisher = {Idea Group Publishing}, organization = {Idea Group Publishing}, address = {Hershey, PA}, author = {Watson, Rebecca and Michael D. Myers}, editor = {Felix B. Tan} } @article {DBLP:conf/ifip8-2/Ellingsen02, title = {Knowledge Work in Hospitals}, year = {2002}, pages = {465-484}, author = {Gunnar Ellingsen} } @inbook {835, title = {La recherche qualitative en systemes d{\textquoteright}information}, booktitle = {Faire de la recherche en systemes d{\textquoteright}information}, year = {2002}, pages = {57-66}, publisher = {Vuibert}, organization = {Vuibert}, address = {Paris}, author = {Avison, David and Michael D. Myers}, editor = {Rowe, Frantz} } @article {DBLP:conf/ifip8-2/Atkinson02, title = {The Nature and Role of Generative Systemic Metaphor within Information Systems Planning and Development}, year = {2002}, pages = {323-343}, author = {Christopher J. Atkinson} } @article {DBLP:conf/ifip8-2/KaplanKST02, title = {New Words and Old Books: Challenging Conventional Discourses about Domain and Theory in Information Systems Research}, year = {2002}, pages = {539-545}, author = {Bonnie Kaplan and Lynette Kvasny and Steve Sawyer and Eileen M. Trauth} } @article {DBLP:conf/ifip8-2/Wastell02, title = {Organizational Discourse as a Social Defense: Taming the Tiger of Electronic Government}, year = {2002}, pages = {179-195}, author = {David Graham Wastell} } @booklet {345, title = {Perceptions of Self in Art and Intelligent Agents}, howpublished = {Socially Intelligent Agents}, year = {2002}, month = {2002///}, pages = {235 - 242}, abstract = {The article discusses the term {\textquotedblleft}embodiment{\textquotedblright} according to the different meanings it has in contemporary cultural discourse on the one hand, and in Artificial Intelligence or Artificial Life modeling on the other. The discussion serves as a backdrop for analysis of an interactive artwork by Vancouver artist Liz Van der Zaag, {\textquotedblleft}Talk Nice{\textquotedblright}, which behaves like an Intelligent A gent that interacts socially with humans. {\textquotedblleft}Talk Nice{\textquotedblright} has features corresponding to both conceptions of embodiment, and it elicits further ideas about the significance of those notions for definitions of selfhood.}, url = {http://dx.doi.org/10.1007/0-306-47373-9_29}, author = {Tenhaaf, Nell} } @article {DBLP:conf/ifip8-2/IntronaW02, title = {The Phenomenology of Information Systems Evaluation: Overcoming the Subject/Object Dualism}, year = {2002}, pages = {155-175}, author = {Lucas D. Introna and Louise Whittaker} } @article {DBLP:conf/ifip8-2/WynnWM02, title = {Placing Language in the Foreground: Themes and Methods in Information Technology Discourse}, year = {2002}, pages = {1-12}, author = {Eleanor Wynn and Edgar A. Whitley and Michael D. Myers} } @article {828, title = {Placing Language in the Foreground: Themes and Methods in Information Technology Discourse}, year = {2002}, note = {IFIP Working Group 8.2 Proceedings, Barcelona, Spain, December 2002}, pages = {1-12}, publisher = {Kluwer Academic Publishers}, address = {Boston}, author = {Eleanor H. Wynn and Edgar A. Whitley and Michael D. Myers}, editor = {Eleanor H. Wynn and Edgar A. Whitley and Michael D. Myers and Janice I. DeGross} } @booklet {900, title = {Qualitative Research in Information Systems: A Reader}, howpublished = {Introducing Qualitative Methods Series}, year = {2002}, pages = {328}, publisher = {Sage Publications}, address = {London}, abstract = {Qualitative research has become a legitimate approach within the information systems community, but researchers have traditionally drawn upon material from the social sciences given the absence of a single source relevant to them. Qualitative Research in Information Systems: A Reader represents just such a volume and is both timely and relevant. Information systems and qualitative research articles are now widely used for teaching on many upper level courses in information systems, and there is demand for a definitive collection of these readings as a basic reader and teaching text. This book expertly brings together the seminal works in the field, along with editorial introductions to assist the reader in understanding the essential principles of qualitative research.The book is organised according to the following thematic sections: {\`A} Part I: Overview of Qualitative Research{\`A} Part II: Philosophical Perspectives{\`A} Part III: Qualitative Research Methods{\`A} Part IV: Modes of Analyzing and Interpreting Qualitative DataQualitative Research in Information Systems: A Reader should become the benchmark reference point for students and researchers in information systems, management science and others involved in information technology needing to learn about qualitative research. PART ONE: OVERVIEW OF QUALITATIVE RESEARCH \ Michael D Myers and David E Avison An Introduction to Qualitative Research in Information Systems \ Bob Galliers and Frank Land Choosing Appropriate Information Systems Research Methodologies \ M Lynne Markus Power, Politics and MIS Implementation \ PART TWO: PHILOSOPHICAL PERSPECTIVES \ Wanda Orlikowski and J J Baroudi Studying Information Technology in Organizations: Research Approaches and Assumptions \ Izak Benbasat, D K Goldstein and M Mead The Case Research Strategy in Studies of Information Systems \ Geoff Walsham Interpretive Case Studies in IS Research: Nature and Method \ Ojelanki Ngwenyama The Critical Social Theory Approach to Information Systems: Problems and Challenges \ PART THREE: QUALITATIVE RESEARCH METHODS \ Richard Baskerville and Trevor Wood-Harper A Critical Perspective on Action Research as a Method for Information Systems Research \ A S Lee A Scientific Methodology for MIS Case Studies \ Lynda Harvey and Michael D Myers Scholarship and Practice: The Contribution of Ethnographic Research Methods to Bridging the Gap \ Wanda Orlikowski CASE Tools Are Organizational Change: Investigating Incremental and Radical Changes in Systems Development \ PART FOUR: MODES OF ANALYZING AND INTERPRETING QUALITATIVE DATA \ Richard J Boland Jr Information System Use as an Hermeneutic Process \ Rudy Hirschheim and Mike Newman Symbolism and Information Systems Development: Myth, Metaphor and Magic}, isbn = {0761966323}, author = {Michael D. Myers and Avison, David} } @proceedings {453, title = {Regulating Architecture and Architectures of Regulation: Contributions from Information Systems}, number = {xx}, year = {2002}, pages = {xx}, address = {Amsterdam}, url = {Bileta2002.pdf}, author = {Ian R Hosein and Prodromos Tsiavos and Edgar A. Whitley}, editor = {BILETA} } @article {505, title = {The regulation of electronic commerce: learning from the UK{\textquoteright}s RIP act}, journal = {Journal of Strategic Information Systems}, volume = {11}, number = {1}, year = {2002}, pages = {31-58}, isbn = {0963-8687}, url = {JSIS2002.pdf}, author = {Ian R Hosein and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/Hosein02, title = {A Research Note on Capturing Technology: Toward Moments of Interest}, year = {2002}, pages = {133-153}, author = {Ian Hosein} } @article {864, title = {IS Research Relevance Revisited: Subtle Accomplishment, Unfulfilled Promise, or Serial Hypocrisy?}, journal = {Communications of the AIS}, volume = {8}, year = {2002}, pages = {330-346}, author = {Kock, Ned and Paul Gray and Hoving, Ray and Heinz Klein and Michael D. Myers and Rockart, Jack} } @article {DBLP:conf/ifip8-2/Wilson02, title = {Rhetoric of Enrollment and Acts of Resistance: Information Technology as Text}, year = {2002}, pages = {225-248}, author = {Melanie Wilson} } @inbook {855, title = {Scholarship and Practice: The Contribution of Ethnographic Research Methods to Bridging the Gap}, booktitle = {Qualitative Research in Information Systems: A Reader}, series = {Introducing Qualitative Methods Series}, year = {2002}, pages = {169-180}, publisher = {Sage Publications}, organization = {Sage Publications}, address = {London}, author = {Harvey, Lynda J and Michael D. Myers}, editor = {Michael D. Myers and Avison, David} } @article {509, title = {Special issue on Time and information technology: Temporal impacts on individuals, organizations, and society}, journal = {The Information Society}, volume = {18}, number = {4}, year = {2002}, isbn = {0197-2243}, url = {./timespecialissue/}, author = {Lee, Heejin and Edgar A. Whitley} } @inbook {441, title = {Studying the translations of NHSnet}, booktitle = {Advanced topics in end user computing}, year = {2002}, pages = {158-176}, publisher = {Idea Group}, organization = {Idea Group}, address = {Hershey}, isbn = {1-930708-42-4}, url = {JEUC2001.pdf}, author = {Edgar A. Whitley and Athanasia Pouloudi}, editor = {Mo Adam Mahmood} } @article {DBLP:conf/ifip8-2/Swanson02, title = {Talking the IS Innovation Walk}, year = {2002}, pages = {15-31}, author = {E. Burton Swanson} } @article {366, title = {The time-image and Deleuze{\textquoteright}s transcendental experience}, journal = {Continental Philosophy Review}, volume = {35}, year = {2002}, month = {2002/07/01/}, pages = {325 - 345}, abstract = {In this paper I examine the meaning of Deleuze{\textquoteright}s {\textquotedblleft}transcendental empiricism{\textquotedblright} by means of the kind of experience that his project opens up for us {\textendash} an experience that I want to call transcendental. Primarily on the basis of his works on cinema, famously dedicated to freely investigating Bergson{\textquoteright}s thought, I argue that Deleuze{\textquoteright}s notion of the time-image, together with his search for its real and necessary conditions, consists in the liberation of experience from its Kantian limitative conditioning. I then examine both the new kind of subjectivity (the fissured ego) that emerges from this enlarged experience and the new conception of temporality (time out of joint) that subtends it. Finally, I try to bring out the concrete relations between (transcendental) experience, thought and the brain that Deleuze brings to light in his analysis of great cinema{\textquoteright}s reinvention of the relationship between time and movement.}, url = {http://dx.doi.org/10.1023/A:1022687422795}, author = {Moulard, Valentine} } @article {DBLP:conf/ifip8-2/LambP02, title = {Transitioning Toward an Internet Culture: An Interorganizational Analysis of Identity Construction from Online Services to Intranets}, year = {2002}, pages = {47-71}, author = {Roberta Lamb and Mark Poster} } @article {DBLP:conf/ifip8-2/AckermanPQY02, title = {Visual Elements in the Discourse on Information Technology}, year = {2002}, pages = {527-531}, author = {Mark S. Ackerman and Brian T. Pentland and Sajda Qureshi and Elaine K. Yakura} } @article {DBLP:conf/ifip8-2/Stahl02, title = {When Does a Computer Speak the Truth? The Problem of IT and Validity Claims}, year = {2002}, pages = {91-107}, author = {Bernd Carsten Stahl} } @article {DBLP:conf/ifip8-2/AdamHR01, title = {Absent Friends? The Gender Dimension in Information Systems Research}, year = {2001}, pages = {333-352}, author = {Alison E. Adam and Debra Howcroft and Helen Richardson} } @article {DBLP:conf/ifip8-2/BaskervilleS01, title = {Accommodating Emergent Work Pratices: Ethnographic Choice of Method Fragments}, year = {2001}, pages = {11-28}, author = {Richard Baskerville and Jan Stage} } @proceedings {856, title = {Assessing Three Theories of Information Systems Innovation: An Interpretive Case Study of a Funds Management Company}, year = {2001}, month = {20-22 June 2001}, pages = {1005-1019}, address = {Seoul, Korea}, author = {Jones, Nick and Michael D. Myers} } @article {DBLP:conf/ifip8-2/HenfridssonHH01, title = {Better Safe than Sorry? In Search of an Internet Business Model in Online Entertainment}, year = {2001}, pages = {183-202}, author = {Ola Henfridsson and Helena Holmstr{\"o}m and Ole Hanseth} } @inbook {861, title = {A Classification Scheme for Interpretive Research in Information Systems}, booktitle = {Qualitative Research in IS: Issues and Trends}, year = {2001}, pages = {218-239}, publisher = {Idea Group Publishing}, organization = {Idea Group Publishing}, address = {Hershey, PA}, author = {Heinz K. Klein and Michael D. Myers}, editor = {Eileen M. Trauth} } @article {DBLP:conf/ifip8-2/BrooksA01, title = {Consumer Privacy and Online Marketing: Bringing the Human Back into the Picture}, year = {2001}, pages = {203-210}, author = {Laurence Brooks and Alexis Airey} } @article {833, title = {Controlling action research projects}, journal = {Information Technology \& People}, volume = {14}, number = {1}, year = {2001}, pages = {28-45}, keywords = {action research}, author = {Avison, David and Richard Baskerville and Michael D. Myers} } @article {DBLP:conf/ifip8-2/SorensenWMKHJ01, title = {Cultivating Recalcitrance in Information Systems Research}, year = {2001}, pages = {297-316}, author = {Carsten S{\o}rensen and Edgar A. Whitley and Shirin Madon and Dasha Klyachko and Ian Hosein and Justine Johnstone} } @article {DBLP:conf/ifip8-2/KvasnyT01, title = {Defining Away the Digital Divide: A Content Analysis of Institutional Influences on Popular Representations of Technology}, year = {2001}, pages = {399-414}, author = {Lynette Kvasny and Duane P. Truex} } @article {DBLP:conf/ifip8-2/MoretonA01, title = {Developing a Methodology to Evaluate the Impact of Staff Perceptions on the Strategic Value of Information Systems in a Small to Medium Sized Enterprise}, year = {2001}, pages = {109-126}, author = {Robert Moreton and Diana Aiken} } @article {DBLP:conf/ifip8-2/RussoF01, title = {Directions in Information Systems Development: Integrating New Technologies, Research Approaches, and Development Practices}, year = {2001}, pages = {1-10}, author = {Nancy L. Russo and Brian Fitzgerald} } @article {DBLP:conf/ifip8-2/WhitleyH01, title = {Doing Politics Around Electronic Commerce: Opposing the Regulation of Investigatory Powers Bill}, year = {2001}, pages = {415-438}, author = {Edgar A. Whitley and Ian Hosein} } @proceedings {483, title = {Doing politics around electronic commerce: Opposing the Regulation of Investigatory Powers Bill}, year = {2001}, month = {9-10 July 2001}, pages = {15}, address = {Salford, UK}, url = {IFIP822001Politics.pdf}, author = {Edgar A. Whitley and Ian R Hosein}, editor = {Alison E. Adam and Debra Howcroft and Helen Richardson and Bruce Robinson} } @article {DBLP:conf/ifip8-2/NandhakumarV01, title = {Due Process and the Introduction of New Technology: The Institution of Video Teleconferencing}, year = {2001}, pages = {127-148}, author = {Joe Nandhakumar and Richard T. Vidgen} } @article {329, title = {Emerging roles for third parties in cyberspace}, journal = {Ethics and Information Technology}, volume = {3}, year = {2001}, month = {2001/12/01/}, pages = {267 - 276}, abstract = {In {\textquoteleft}real{\textquoteright} space, third parties have always been useful to facilitate transactions. With cyberspace opening up, it isto be expected that intermediation will also develop in a virtual fashion. The article focuses upon new cyberroles for third parties that seem to announce themselves clearly. First, virtualization of the market place has paved the way for {\textquoteleft}cybermediaries{\textquoteright}, who broker between supply and demand of material and informational goods. Secondly, cybercommunication has created new uncertainties concerning informational security and privacy. Also, as in real space,transacting supposes some decency with one{\textquoteright}spartners. These needs are being addressed byTrusted Third Parties, anonymizers, escrow arrangements, facilitators and external auditing. Virtual reputation tracking mechanisms are being developed as well. Finally, in order to resolve disputes,mediators and arbitrators have started offering their services online. In the closing sectionthese emerging cyberroles are assessed critically. It is argued in particular, that both cybermediaries and cyberjustice pose serious threats to privacy. Moreover, online dispute resolution, as it is practised now,neglects its duties of public accounting.}, url = {http://dx.doi.org/10.1023/A:1013871421924}, author = {de Laat, Paul B.} } @article {DBLP:conf/ifip8-2/WynekoopJF01, title = {Enterprise Network Design: How Is it Done?}, year = {2001}, pages = {87-94}, author = {Judy L. Wynekoop and David Johnson and Jim Finan} } @article {DBLP:conf/ifip8-2/AllenK01, title = {Enterprise Resource Planning Implementation: Stories of Power, Politics, and Resistance}, year = {2001}, pages = {149-162}, author = {David K. Allen and Thomas Kern} } @article {DBLP:conf/ifip8-2/Layzell01, title = {Implications of a Service-Oriented View of Software}, year = {2001}, pages = {241-256}, author = {Paul J. Layzell} } @article {DBLP:conf/ifip8-2/Beeson01, title = {Implications of the Theory of Autopoiesis for the Discipline and Practice of Information Systems}, year = {2001}, pages = {317-332}, author = {Ian Beeson} } @article {DBLP:conf/ifip8-2/CunhaF01, title = {Information Systems Development as Flowing Wholeness}, year = {2001}, pages = {29-48}, author = {Paulo Rupino da Cunha and Ant{\'o}nio Dias de Figueiredo} } @article {931, title = {IT Industry Success in Small Countries: The Cases of Finland and New Zealand}, journal = {Journal of Global Information Management}, volume = {9}, number = {2}, year = {2001}, pages = {4-14}, author = {Watson, Rebecca and Michael D. Myers} } @article {DBLP:conf/ifip8-2/GalliersEMN01, title = {Knowledge Management Systems: Hype, Hope, or Folly?}, year = {2001}, pages = {471-476}, author = {Robert D. Galliers and Ellen Enkel and Lisa D. Murphy and Sue Newell} } @article {DBLP:conf/ifip8-2/Sterner01, title = {Managing Knowledge Development in the Network Economy: Methodological Contributions}, year = {2001}, pages = {387-398}, abstract = {Without abstract.}, author = {Haakan Sterner} } @proceedings {449, title = {Managing knowledge under conflicting weltanschauungen: Introducing the Danish Unit Model to the Faroe Islands}, year = {2001}, publisher = {IKON}, address = {Leicester}, url = {IKON2001.pdf}, author = {Heini Hatun and Edgar A. Whitley}, editor = {Chris Carter and Harry Scarbrough and Jacky Swan} } @article {DBLP:conf/ifip8-2/Beynon-DaviesW01, title = {Method Diffusion as a Social Movement}, year = {2001}, pages = {257-272}, author = {Paul Beynon-Davies and Michael D. Williams} } @article {DBLP:conf/ifip8-2/Wilson01, title = {A New Paradigm for Considering Gender in Information Systems Development Research}, year = {2001}, pages = {353-366}, author = {Melanie Wilson} } @article {DBLP:conf/ifip8-2/RehbinderLLBN01, title = {Observations from a Field Study on Developing a Framework for Pre-Usage Evaluation of CASE Tools}, year = {2001}, pages = {211-220}, author = {Adam Rehbinder and Brian Lings and Bj{\"o}rn Lundell and Runo Burman and Anette Nilsson} } @article {DBLP:conf/ifip8-2/BaskervilleP01, title = {Racing the E-Bomb: How the Internet Is Redefining Information Systems Development Methodology}, year = {2001}, pages = {49-68}, author = {Richard Baskerville and Jan Pries-Heje} } @proceedings {832, title = {Research into Practice: Qualitative Research in Information Systems}, year = {2001}, month = {7-9 June 2001}, address = {Nantes, France}, author = {Avison, David and Michael D. Myers} } @proceedings {863, title = {IS Research Relevance Revisited: Subtle Accomplishment, Unfulfilled Promise, or Serial Hypocrisy?}, year = {2001}, pages = {623-628}, address = {New Orleans, USA}, author = {Kock, Ned and Paul Gray and Hoving, Ray and Heinz Klein and Michael D. Myers and Rockart, Jack} } @article {DBLP:conf/ifip8-2/RoostKV01, title = {A Role-Based Framework for Information System Self-Development}, year = {2001}, pages = {95-108}, author = {Mart Roost and Rein Kuusik and Tarmo Veskioja} } @booklet {571, title = {Sociology and ethics of information systems: External programme study guide}, year = {2001}, publisher = {University of London}, edition = {Second edition}, address = {London}, author = {Lucas D. Introna and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/NielsenN01, title = {Software Process Maturity and Organizational Politics}, year = {2001}, pages = {221-240}, author = {Peter Axel Nielsen and Jacob N{\o}rbjerg} } @article {536, title = {Studying the translations of NHSnet}, journal = {Journal of End User Computing}, volume = {13}, number = {3}, year = {2001}, pages = {30-40}, isbn = {1063-2239}, url = {JEUC2001.pdf}, author = {Edgar A. Whitley and Athanasia Pouloudi} } @article {DBLP:conf/ifip8-2/LangB01, title = {Techniques and Methodologies for Multimedia Systems Development: A Survey of Industrial Practice}, year = {2001}, pages = {77-86}, author = {Michael Lang and Chris Barry} } @article {DBLP:conf/ifip8-2/BonnerG01, title = {The Technology Imperative in Education}, year = {2001}, pages = {439-460}, author = {William T. Bonner and Abhijit Gopal} } @article {DBLP:conf/ifip8-2/Feller01, title = {Thoughts on Studying Open Source Software Communities}, year = {2001}, pages = {379-386}, author = {Joseph Feller} } @article {DBLP:conf/ifip8-2/KorpelaMS01, title = {Two Times Four Integrative Levels of Analysis: A Framework}, year = {2001}, pages = {367-378}, author = {Mikko Korpela and Anja Mursu and Hettie Abimbola Soriyan} } @article {DBLP:conf/ifip8-2/HedstromE01, title = {The Use of Research-Based Information System Development Methods}, year = {2001}, pages = {69-76}, author = {Karin Hedstr{\"o}m and Emma Eliason} } @article {DBLP:conf/ifip8-2/RoseL01, title = {Using Structuration Theory in Action Research: An Intranet Development Project}, year = {2001}, pages = {273-296}, author = {Jeremy Rose and Paul H. Lewis} } @article {DBLP:conf/ifip8-2/EschenfelderS01, title = {Web Information Systems Management: Proactive or Reactive Emergence}, year = {2001}, pages = {163-182}, author = {Kristin R. Eschenfelder and Steve Sawyer} } @article {DBLP:conf/ifip8-2/SawyerHTN01, title = {What Do We Mean by Information Technology? Perspectives on Studying Computing}, year = {2001}, pages = {461-466}, author = {Steve Sawyer and Steven Haynes and Duane P. Truex and Ojelanki K. Ngwenyama} } @article {508, title = {About experiments and style: A critique of laboratory research in information systems}, journal = {Information technology and people}, volume = {13}, number = {3}, year = {2000}, pages = {161-173}, isbn = {0959-3845}, url = {ITP2000.pdf}, author = {Lucas D. Introna and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/SchultzeMT00, title = {Addressing the Shortcomings of Interpretive Field Research: Reflecting Social Construction in the Write-up}, year = {2000}, pages = {507-510}, author = {Ulrike Schultze and Michael D. Myers and Eileen M. Trauth} } @inbook {924, title = {Addressing the Shortcomings of Interpretive Field Research: Reflecting Social Construction in the Write-Up}, booktitle = {Organizational and Social Perspectives on Information Technology}, year = {2000}, pages = {507-510}, publisher = {Kluwer}, organization = {Kluwer}, address = {Norwell, MA}, author = {Ulrike Schultze and Michael D. Myers and Trauth, Eileen}, editor = {Baskerville, R. and Stage, J and DeGross, J I} } @booklet {578, title = {Book review of "The shape of actions" by Harry Collins and Martin Kusch}, howpublished = {The Times Higher Education Supplement}, volume = {June 9th}, number = {2000}, year = {2000}, pages = {34}, address = {London}, url = {THES2000.pdf}, author = {Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/Mathiassen00, title = {Collaborative Practice Research}, year = {2000}, pages = {127-148}, author = {Lars Mathiassen} } @proceedings {930, title = {A Comparison of IT Industry Success in Finland and New Zealand}, year = {2000}, month = {1-3 June 2000}, pages = {414-427}, address = {Hong Kong}, author = {Watson, Rebecca and Michael D. Myers} } @article {DBLP:conf/ifip8-2/Karsten00, title = {Constructing Interdependencies with Collaborative Information Technology}, year = {2000}, pages = {429-452}, author = {Helena Karsten} } @article {DBLP:conf/ifip8-2/VenableT00, title = {Developing a Virtual Community-based Information Systems Digital Library: A Proposal and Research Program}, year = {2000}, pages = {319-338}, author = {John R. Venable and Julie Travis} } @article {DBLP:conf/ifip8-2/BaskervilleS00, title = {Discourses on the Interaction of Information Systems, Organizations, and Society: Reformation and Transformation}, year = {2000}, pages = {1-14}, author = {Richard Baskerville and Jan Stage} } @article {542, title = {Dotcompetition: Surviving in e-business}, volume = {12}, number = {2}, year = {2000}, month = {Winter}, pages = {12-13}, url = {LSE2000.pdf}, author = {Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/Land00, title = {Evaluation in a Socio-technical Context}, year = {2000}, pages = {115-126}, author = {Frank F. Land} } @article {DBLP:conf/ifip8-2/Russo00, title = {Expanding the Horizons of Information Systems Development}, year = {2000}, pages = {103-114}, author = {Nancy L. Russo} } @article {DBLP:conf/ifip8-2/Walsham00, title = {Globalization and IT: Agenda for Research}, year = {2000}, pages = {195-212}, author = {Geoff Walsham} } @article {miscione2000hack3rz, title = {hAcK3rZ and Information Warfare}, year = {2000}, publisher = {Rosenberg and Sellier}, author = {Miscione, Gianluca} } @article {miscione2000hack3rzwarfare, title = {hAcK3rZ e information warfare}, journal = {Quaderni di Sociologia}, number = {23}, year = {2000}, month = {Aug}, pages = {22{\textendash}47}, publisher = {OpenEdition}, issn = {0033-4952}, doi = {10.4000/qds.1359}, author = {Miscione, G} } @article {DBLP:conf/ifip8-2/BraaR00, title = {Horizontal Information Systems: Emergent Trends and Perspectives}, year = {2000}, pages = {83-102}, author = {Kristin Braa and Knut H. Rolland} } @proceedings {893, title = {The Impact of IT on Business, Governmental Institutions, and Society: A New Agenda for IS Research}, year = {2000}, note = {Keynote presentation}, month = {June 12-13}, pages = {369-376}, address = {Prague, Czech Republic}, author = {Michael D. Myers} } @article {DBLP:conf/ifip8-2/AanestadH00, title = {Implementing Open Network Technologies in Complex Work Practices: A Case from Telemedicine}, year = {2000}, pages = {355-370}, author = {Margunn Aanestad and Ole Hanseth} } @article {DBLP:conf/ifip8-2/KendallK00, title = {Individual, Organizational, and Societal Perspectives on Information Delivery Systems: Bright and Dark Sides to Push and Pull Technologies}, year = {2000}, pages = {179-194}, author = {Julie E. Kendall and Kenneth E. Kendall} } @article {DBLP:conf/ifip8-2/Davis00, title = {Information Systems Conceptual Foundations: Looking Backward and Forward}, year = {2000}, pages = {61-82}, author = {Gordon B. Davis} } @article {DBLP:conf/ifip8-2/HirschheimK00, title = {Information Systems Research at the Crossroads: External Versus Internal Views}, year = {2000}, pages = {233-254}, author = {Rudy Hirschheim and Heinz K. Klein} } @article {DBLP:conf/ifip8-2/KvasnyT00, title = {Information Technology and the Cultural Reproduction of Social Order: A Research Paradigm}, year = {2000}, pages = {277-294}, author = {Lynette Kvasny and Duane P. Truex} } @article {miscione2000isole, title = {Isole ultra libearli}, journal = {Internet News}, volume = {12}, year = {2000}, pages = {54{\textendash}58}, publisher = {Tecniche Nuove}, author = {Miscione, Gianluca} } @booklet {2000isoleislands, title = {Isole Ultra Liberali (Ultra Liberalist Islands)}, howpublished = {Internet News}, year = {2000}, month = {Dec}, pages = {54{\textendash}58}, publisher = {Tecniche Nuove}, address = {Milano, Italy}, abstract = {Very different phenomena share the aim of creating islands as independent as possible from the laws that govern offline reality and also dominant online norms. Two special cases are Sealand and MojoNation. The first is a microstate in international waters, East coast of England. Although it is not officially recognized by the international community, enjoys a certain autonomy. MojoNation is a file-sharing system technically unassailable It has the particularity of mediating all trade with its own currency, the Mojo. The result? Perhaps the birth of a new parallel economy.} } @inbook {857, title = {Learning and Teaching Qualitative Research: A View from Reference Disciplines of History and Anthropology}, booktitle = {Organizational and Social Perspectives on Information Technology}, year = {2000}, pages = {511-515}, publisher = {Kluwer}, organization = {Kluwer}, address = {Norwell, MA}, author = {Bonnie Kaplan and Jonathan Liebenau and Michael D. Myers and Eleanor Wynn}, editor = {Baskerville, R. and Stage, J and DeGross, J I} } @article {DBLP:conf/ifip8-2/KaplanLMW00, title = {Learning and Teaching Qualitative Research: A View from the Reference Disciplines of Anthropology and History}, year = {2000}, pages = {511-516}, author = {Bonnie Kaplan and Jonathan Liebenau and Michael D. Myers and Eleanor Wynn} } @article {DBLP:conf/ifip8-2/Berg00, title = {Lessons from a Dinosaur: Mediating IS Research Through an Analysis of the Medical Record}, year = {2000}, pages = {487-506}, author = {Marc Berg} } @article {DBLP:conf/ifip8-2/Eriksen00, title = {Limitations and Opportunities of System Development Methods in Web Information System Design}, year = {2000}, pages = {473-486}, author = {Lars Bo Eriksen} } @article {DBLP:conf/ifip8-2/Boland00, title = {The Limits of Language in Doing Systems Work}, year = {2000}, pages = {47-60}, author = {Richard J. Boland Jr.} } @article {DBLP:conf/ifip8-2/RoseT00, title = {Machine Agency as Perceived Autonomy: An Action Perspective}, year = {2000}, pages = {371-390}, author = {Jeremy Rose and Duane P. Truex} } @article {DBLP:conf/ifip8-2/Grunden00, title = {MOA-S: A Scenario Model for Integrating Work Organization Aspects into the Design Process of CSCW Systems}, year = {2000}, pages = {409-428}, author = {Kerstin Grund{\'e}n} } @article {DBLP:conf/ifip8-2/Jones00, title = {The Moving Finger: The Use of Social Theory in WG 8.2 Conference Papers, 1975-1999}, year = {2000}, pages = {15-32}, author = {Matthew Jones} } @article {DBLP:conf/ifip8-2/LambD00, title = {The New Computing Archipelago: Intranet Islands of Practice}, year = {2000}, pages = {255-276}, author = {Roberta Lamb and Elizabeth Davidson} } @article {343, title = {Our moral condition in cyberspace}, journal = {Ethics and Information Technology}, volume = {2}, year = {2000}, month = {2000/09/01/}, pages = {147 - 152}, abstract = {Some kinds of technological change not only trigger new ethical problems, but also give rise to questions about those very approaches to addressing ethical problems that have been relied upon in the past. Writing in the aftermath of World War II, Hans Jonas called for a new {\textquoteleft}{\textquoteleft}ethics of responsibility,{\textquoteright}{\textquoteright} based on the reasoning that modern technology dramatically divorces our moral condition from the assumptions under which standard ethical theories were first conceived. Can a similar claim be made about the technologies of cyberspace? Do online information technologies so alter our moral condition that standard ethical theories become ineffective in helping us address the moral problems they create? I approach this question from two angles. First, I look at the impact of online information technologies on our powers of causal efficacy. I then go on to consider their impact on self-identity. We have good reasons, I suggest, to be skeptical of any claim that there is a need for a new, cyberspace ethics to address the moral dilemmas arising from these technologies. I conclude by giving a brief sketch of why this suggestion does not imply there is nothing philosophically interesting about the ethical challenges associated with cyberspace.}, url = {http://dx.doi.org/10.1023/A:1010049320893}, author = {Michelfelder, Diane P.} } @proceedings {488, title = {Panel: The Y2K date rollover: Experiences and lessons learned from AIS region 2}, year = {2000}, pages = {561}, address = {Vienna}, url = {ECIS2000Y2K.pdf}, author = {Edgar A. Whitley and Angeliki Poulymenakou and Dewald Roode and Gamila Shoib and Gert Jan Hofstede}, editor = {Hans Robert Hansen and Martin Bichler and Harald Mahrer} } @article {DBLP:conf/ifip8-2/Crowston00, title = {Process as Theory in Information Systems Research}, year = {2000}, pages = {149-166}, author = {Kevin Crowston} } @article {DBLP:conf/ifip8-2/PouloudiW00, title = {Representing Human and Non-human Stakeholders: On Speaking with Authority}, year = {2000}, pages = {339-354}, author = {Athanasia Pouloudi and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/WilsonH00, title = {The Role of Gender in User Resistance and Information Systems Failure}, year = {2000}, pages = {453-472}, author = {Melanie Wilson and Debra Howcroft} } @article {DBLP:conf/ifip8-2/IntronaI00, title = {The Screen and the World: A Phenomenological Investigation into Screens and Our Engagement in the World}, year = {2000}, pages = {295-318}, author = {Lucas D. Introna and Fernando M. Ilharco} } @booklet {570, title = {Sociology and ethics of information systems: External programme study guide}, year = {2000}, publisher = {University of London}, edition = {First edition}, address = {London}, author = {Lucas D. Introna and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/Mumford00, title = {Socio-technical Design: An Unfulfilled Promise or a Future Opportunity}, year = {2000}, pages = {33-46}, author = {Enid Mumford} } @article {DBLP:conf/ifip8-2/Mark00, title = {Some Challenges Facing Virtually Colocated Teams}, year = {2000}, pages = {391-408}, author = {Gloria Mark} } @article {DBLP:conf/ifip8-2/AndersenDHKMM00, title = {Standardization, Network Economics, and IT}, year = {2000}, pages = {521-526}, author = {Esben S. Andersen and Jan Damsgaard and Ole Hanseth and John Leslie King and M. Lynne Markus and Eric Monteiro} } @article {DBLP:conf/ifip8-2/Sawyer00, title = {Studying Organizational Computing Infrastructures: Multi-method Approaches}, year = {2000}, pages = {213-232}, author = {Steve Sawyer} } @article {DBLP:conf/ifip8-2/AartsGHK00, title = {Successful Development, Implementation, and Evaluation of Information Systems: Does Healthcare Serve as a Model for Networked Organizations?}, year = {2000}, pages = {517-520}, author = {Jos Aarts and Els Goorman and Heather Heathfield and Bonnie Kaplan} } @proceedings {477, title = {Tacit and explicit knowledge: Conceptual confusion around the commodification of knowledge}, year = {2000}, pages = {62-64}, publisher = {BPRC}, address = {Warwick University}, url = {BPRC2000.pdf}, author = {Edgar A. Whitley}, editor = {Jacky Swan and Harry Scarbrough and Rebecca Dale} } @proceedings {871, title = {Three Perspectives: If Markus{\textquoteright} 1983 Classic Study, "Power, Politics, and MIS Implementation," Were Being Reviewed Today}, year = {2000}, month = {10-13 December 2}, pages = {724-726}, address = {Brisbane}, author = {Allen S. Lee and Michael D. Myers and Par{\'e}, Guy and Cathy Urquhart} } @article {DBLP:conf/ifip8-2/Markus00, title = {Toward an Integrated Theory of IT-related Risk Control}, year = {2000}, pages = {167-178}, author = {M. Lynne Markus} } @proceedings {452, title = {What is meant by tacit knowledge: Towards a better understanding of the shape of actions}, year = {2000}, pages = {46-51}, address = {Vienna}, url = {ECIS2000Tacit.pdf}, author = {Ted Hedesstrom and Edgar A. Whitley}, editor = {Hans Robert Hansen and Martin Bichler and Harald Mahrer} } @article {830, title = {Action Research}, journal = {Communications of the ACM}, volume = {42}, number = {1}, year = {1999}, pages = {94-97}, author = {Avison, David and Lau, Francis and Myers, Michael David and Nielson, Peter Axel} } @proceedings {862, title = {IS Action Research: Can We Serve Two Masters?}, year = {1999}, month = {12-15 December 1}, pages = {582-585}, address = {Charlotte, North Carolina}, author = {Kock, Ned and Avison, David and Richard Baskerville and Michael D. Myers and Trevor Wood-Harper} } @proceedings {479, title = {An anti{\textendash}essentialist reading of intranet development: What is the role of technology?}, year = {1999}, pages = {97-104}, publisher = {McGraw-Hill}, address = {York}, isbn = {0 07 709558 8}, url = {UKAIS1999.pdf}, author = {Edgar A. Whitley and Shervin Bouzari}, editor = {Laurence Brooks and Chris Kimble} } @article {DBLP:conf/ifip8-2/KarstenLHK99, title = {Balancing Flexibility and Coherence: Information Exchange in a Paper Machinery Project}, year = {1999}, pages = {241-256}, author = {Helena Karsten and Kalle Lyytinen and Markku Hurskainen and Timo Koskelainen} } @booklet {577, title = {Book review of "Aramis or the love of technology" by Bruno Latour}, howpublished = {Information technology and people}, volume = {12}, number = {4}, year = {1999}, pages = {405-407}, isbn = {0959-3845}, url = {ITP1999a.pdf}, author = {Edgar A. Whitley} } @booklet {576, title = {Book review of "The construction of social reality" by John R Searle}, howpublished = {Information technology and people}, volume = {12}, number = {4}, year = {1999}, pages = {403-405}, isbn = {0959-3845}, url = {ITP1999b.pdf}, author = {Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/NgwenyamaIM99, title = {Building on a Decade of Research on IT and Organizations}, year = {1999}, pages = {1-10}, author = {Ojelanki K. Ngwenyama and Lucas D. Introna and Michael D. Myers} } @inbook {918, title = {Building on a Decade of Research on IT and Organizations}, booktitle = {New Information Technologies in Organizational Processes: Field Studies and Theoretical Reflections on the Future of Work}, year = {1999}, pages = {1-7}, publisher = {Kluwer Academic Publishers}, organization = {Kluwer Academic Publishers}, address = {Norwell, MA}, keywords = {IFIP 8.2}, author = {Ojelanki K. Ngwenyama and Lucas D. Introna and Michael D. Myers}, editor = {Ojelanki K. Ngwenyama and Lucas D. Introna and Michael D. Myers and Janice I. DeGross} } @proceedings {476, title = {Change? What really happens when new information systems are introduced}, year = {1999}, publisher = {IFIP 8.2}, address = {Charlotte, NC}, url = {IFIP821999b.pdf}, author = {Edgar A. Whitley}, editor = {Julie E. Kendall} } @article {DBLP:conf/ifip8-2/BaskervilleL99, title = {Distinctions Among Different Types of Generalizing in Information Systems Research}, year = {1999}, pages = {49-66}, author = {Richard Baskerville and Allen S. Lee} } @article {850, title = {The Dreams of the Cashless Society: A Study of EFTPOS in New Zealand}, journal = {Journal of International Information Management}, volume = {8}, number = {1}, year = {1999}, pages = {63-75}, author = {Dunwoodie, E and Michael D. Myers} } @proceedings {475, title = {Escalation and anti-essentialism: A teaching case study}, volume = {III}, year = {1999}, pages = {984-994}, publisher = {Copenhagen Business School}, address = {Copenhagen}, url = {ECIS1999.pdf}, author = {Edgar A. Whitley}, editor = {Jan Pries-Heje and Claudio Ciborra and Karlheinz Kautz and Josep Valor and Ellen Christiaanse and Avison, David and Claus Heje} } @proceedings {907, title = {Getting Qualitative Research Published}, year = {1999}, note = {Invited plenary panel session}, month = {1-3 December 199}, address = {Wellington}, author = {Michael D. Myers and M. Lynne Markus and Cathy Urquhart} } @proceedings {474, title = {Habermas and the non-humans: Towards a critical theory for the new collective}, year = {1999}, pages = {83}, publisher = {http://www.mngt.waikato.ac.nz/ejrot/cmsconference/documents/Information\%20Tech/Habermas\%20and\%20the\%20non-humans.pdf}, address = {Manchester}, url = {CMS1999.pdf}, author = {Edgar A. Whitley}, editor = {Hugh Willmott and Irena Grugulis} } @article {DBLP:conf/ifip8-2/SarkerL99, title = {A Hermeneutic Interpretation of the Effect of Computerized BPR Tools on Redesign Effectiveness in Two Organizations}, year = {1999}, pages = {197-218}, author = {Suprateek Sarker and Allen S. Lee} } @article {DBLP:conf/ifip8-2/HansethB99, title = {Hunting for the Treasure at the End of the Rainbow: Standardizing Corporate IT Infrastructure}, year = {1999}, pages = {121-140}, author = {Ole Hanseth and Kristin Braa} } @article {DBLP:conf/ifip8-2/ParrSD99, title = {Identification of Necessary Factors for Successful Implementation of ERP Systems}, year = {1999}, pages = {99-120}, author = {Anne N. Parr and Graeme G. Shanks and Peta Darke} } @article {DBLP:conf/ifip8-2/HemingwayG99, title = {Incorporating Social Transformation into the Information Systems and Software Development Lifecycles}, year = {1999}, pages = {277-292}, author = {Hemingway, Christopher and Tom G. Gough} } @article {892, title = {Investigating Information Systems with Ethnographic Research}, journal = {Communications of the AIS}, volume = {2}, number = {23}, year = {1999}, pages = {1-20}, keywords = {ethnography, research methods}, author = {Michael D. Myers} } @article {DBLP:conf/ifip8-2/Scheepers99, title = {Key Role Players in the Initiation and Implementation of Intranet Technology}, year = {1999}, pages = {175-196}, author = {Rens Scheepers} } @article {DBLP:conf/ifip8-2/Klein99, title = {Knowledge and Methods in IS Research: From Beginnings to the Future}, year = {1999}, pages = {13-26}, author = {Heinz K. Klein} } @article {DBLP:conf/ifip8-2/Poster99, title = {Nations, Identities, and Global Technologies}, year = {1999}, pages = {11-12}, author = {Mark Poster} } @booklet {919, title = {New Information Technologies in Organizational Processes: Field Studies and Theoretical Reflections on the Future of Work}, year = {1999}, publisher = {Kluwer Academic Publishers}, address = {Norwell, MA}, keywords = {IFIP 8.2}, author = {Ojelanki K. Ngwenyama and Lucas D. Introna and Michael D. Myers and Janice I. DeGross} } @article {DBLP:conf/ifip8-2/ODonovan99, title = {Organizational Disposition and Its Influence on the Adoption and Diffusion of Information Systems}, year = {1999}, pages = {155-174}, author = {Brian O{\textquoteright}Donovan} } @article {DBLP:conf/ifip8-2/KleinH99, title = {The Potential of the Language Action Perspective in Ethnographic Analysis}, year = {1999}, pages = {79-98}, author = {Heinz K. Klein and Minh Q. Huynh} } @article {DBLP:conf/ifip8-2/SauerJKMY99, title = {Reengineering the Supply Chain Using Collaborative Technology: Opportunities and Barriers to Change in the Building and Construction Industry}, year = {1999}, pages = {141-154}, author = {Chris Sauer and Kim Johnston and K. Karim and M. Marosszeky and Philip Yetton} } @article {DBLP:conf/ifip8-2/HansethSSW99, title = {Re-evaluating Power in Information Rich Organizations: New Theories and Approaches}, year = {1999}, pages = {297-298}, author = {Ole Hanseth and Scott, Susan and Leiser Silva and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/KaplanFF99, title = {Research and Ethical Issues Arising from Ethnographic Interviews of Patients{\textquoteright} Reactions to an Intelligent Interactive Telephone Health Behavior Advisor}, year = {1999}, pages = {67-78}, author = {Bonnie Kaplan and Ramesh Farzanfar and Robert H. Freeman} } @article {DBLP:conf/ifip8-2/SpitlerG99, title = {The Role of Information Technology in the Learning of Knowledge Work}, year = {1999}, pages = {257-276}, author = {Valerie K. Spitler and Michael Gallivan} } @article {860, title = {A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems}, journal = {MIS Quarterly}, volume = {23}, number = {1}, year = {1999}, note = {MISQ Special Issue on Intensive Research}, pages = {67-93}, keywords = {hermeneutics, case study, ethnography}, author = {Heinz K. Klein and Michael D. Myers} } @article {548, title = {Social theory and Y2K}, volume = {33}, number = {2}, year = {1999}, month = {November}, pages = {6}, author = {Edgar A. Whitley and Lucas D. Introna} } @article {921, title = {Trying To Improve Communication And Collaboration With Information Technology: An Action Research Project Which Failed}, journal = {Information Technology \& People}, volume = {12}, number = {4}, year = {1999}, pages = {317-332}, author = {Olesen, Karin and Michael D. Myers} } @article {DBLP:conf/ifip8-2/Boland99, title = {The Tyranny of Space in Organizational Analysis}, year = {1999}, pages = {27-48}, author = {Richard J. Boland Jr.} } @article {DBLP:conf/ifip8-2/CongerS99, title = {Understanding E-commerce Through Genre Theory: The Case of The Car-Buying Process}, year = {1999}, pages = {219-240}, author = {Sue A. Conger and Ulrike Schultze} } @article {525, title = {Understanding participation in entrepreneurial organisations: Some hermeneutic readings}, journal = {Journal of information technology}, volume = {14}, number = {2}, year = {1999}, pages = {193-202}, isbn = {0268-3962}, url = {JIT1999.pdf}, author = {Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/BaskervilleSTTU99, title = {The Uses and Abuses of Evaluative Criteria for Qualitative Research Methods}, year = {1999}, pages = {293-296}, author = {Richard Baskerville and Steve Sawyer and Eileen M. Trauth and Duane P. Truex and Cathy Urquhart} } @article {342, title = {On the Vicissitudes of Cyberspace as Potential-Space}, journal = {Human Relations}, volume = {52}, year = {1999}, month = {1999/04/24/}, pages = {485 - 506}, abstract = {This paper examines some issues which emerge from the use of cyberspace within organizations,focusing on the extent to which cyberspace facilitates and/or interferes with individual and organizational growth. It is argued that the Internet has come to facilitate a form of interaction which may appear largely social and related, while remaining relatively isolated, asocial or at best partially social, self-protective, and removed. This is a form of interaction which is often characterized by partial relationships as well as confusion or ambiguity between what is happening and what is imagined. In much of our relational life, we maintain a tension and dynamic interplay between our experience of ourselves and of the world as structured and ordered and our experience of ourselves and of the world as disordered and chaotic. In the organizational Internet interactions explored in this paper, this tension is often suspended, or at times obliterated. However, it is proposed here that, as profoundly ambiguous and disturbing as these Internet interactions maybe, they may at times serve the function of a potential space in which growth is facilitated. In other instances, however, they serve to inhibit or even destroy potential. The theoretical basis for these findings is built on the contributions of Klein, Winnicott, and Matte-Blanco and is illustrated by clinical examples from organizations.}, url = {http://dx.doi.org/10.1023/A:1016961525238}, author = {Civin, Michael} } @article {867, title = {When success turns into failure: a package-driven business process re-engineering project in the financial services industry}, journal = {Journal of Strategic Information Systems}, volume = {8}, number = {4}, year = {1999}, pages = {395-417}, keywords = {strategic information systems, business process reengineering, BPR, case study, ERP, SAP}, author = {Larsen, Melissa and Michael D. Myers} } @booklet {318, title = {Can We Define Virtual Reality? The M R IC Model }, howpublished = {Virtual Worlds}, year = {1998}, month = {1998///}, pages = {29 - 41}, abstract = {In this paper, we propose a reasoning model aimed at helping to decide on the virtual status of a given situation, from a human point of view rather than from a technological one. We first describe how a human and his environment interact. The notion of {\textquotedblleft}reality{\textquotedblright} will be seen through this description. Then, we propose a set of possible {\textquotedblleft}cognitive deviations{\textquotedblright} of reality leading to situations of virtual reality. This model provides three major benefits to the field of Virtual Reality: first, a global definition and a systematic mean of categorizing related situations; secondly, the ability to discuss on the virtual status of real situations and not only synthetic, computer generated ones; thirdly, a demonstration on how the field of Tele-Operation is heavily related to virtual reality concepts, and some perspectives on future tele-operation intelligent user interfaces.}, url = {http://dx.doi.org/10.1007/3-540-68686-X_3}, author = {Verna, Didier and Grumbach, Alain} } @article {538, title = {Creating and maintaining obligations with emerging technologies: An empirical study of mediated and face-to-face communication}, journal = {Journal of computing and information technology}, volume = {6}, number = {3}, year = {1998}, pages = {343-353}, isbn = {1330-1136}, url = {JCIT1998.pdf}, author = {Edgar A. Whitley and Rachael Scothern} } @proceedings {920, title = {The Effects of Groupware in Social Situations: Maintaining the Status Quo?}, year = {1998}, month = {29 September - 2}, pages = {474-485}, address = {Sydney, Australia}, author = {Olesen, Karin and Michael D. Myers} } @article {914, title = {Guest Editorial: Exemplifying Interpretive Research in Information Systems: An Overview}, journal = {Journal of Information Technology}, volume = {13}, number = {4}, year = {1998}, pages = {233-234}, keywords = {special issue, interpretive}, author = {Michael D. Myers and Geoff Walsham} } @proceedings {473, title = {Method-ism in practice: Investigating the relationship between method and understanding in web page design}, year = {1998}, pages = {68-75}, publisher = {ICIS}, address = {Helsinki, Finland}, url = {ICIS1998.pdf}, author = {Edgar A. Whitley}, editor = {Rudy Hirschheim and Michael Newman and Janice I. De Gross} } @proceedings {442, title = {Panel: Doing and writing up case research: Issues and practices}, volume = {IV}, year = {1998}, pages = {1751}, publisher = {Euro-Arab Management School}, address = {Aix-en-Provence, France}, isbn = {84-923833-0-5}, url = {ECIS1998Panel.pdf}, author = {Ellen Christiaanse and Ramon O{\textquoteright}Callaghan and Edgar A. Whitley and Willcocks, Leslie}, editor = {Walter Baets} } @article {535, title = {Special issue on Heidegger and information technology}, journal = {Information technology and people}, volume = {11}, number = {4}, year = {1998}, isbn = {0959-3845}, url = {./heideggerspecialissue/}, author = {Edgar A. Whitley and Lucas D. Introna} } @article {351, title = {Stages of virtually: Instructor and student}, journal = {TechTrends}, volume = {43}, year = {1998}, month = {1998/04/30/}, pages = {23 - 26}, url = {http://dx.doi.org/10.1007/BF02824051}, author = {McGonigle, Dee and Eggers, Renee} } @inbook {910, title = {Theoretical Frameworks: Valuable Aids or Seductive Traps?}, booktitle = {Information Systems: Current Issues and Future Changes}, year = {1998}, pages = {303-305}, publisher = {IFIP}, organization = {IFIP}, address = {Laxenburg}, author = {Michael D. Myers and Dan Robey and Chris Sauer and Geoff Walsham}, editor = {Larsen, Tor J and Levine, Linda and Janice I. DeGross} } @proceedings {472, title = {Understanding participation in entrepreneurial organisations: Applying the sociology of translation}, volume = {III}, year = {1998}, pages = {1225-1237}, publisher = {Euro-Arab Management School}, address = {Aix-en-Provence, France}, isbn = {84-923833-0-5}, url = {ECIS1998.pdf}, author = {Edgar A. Whitley}, editor = {Walter Baets} } @article {278911, title = {Acquiring expert knowledge on IS function design}, year = {1997}, pages = {324{\textendash}340}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Mantelaers, P.} } @article {278919, title = {Actor-network theory and IS research: current status and future prospects}, year = {1997}, pages = {466{\textendash}480}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Walsham, G.} } @article {506, title = {Against method-}, journal = {Information technology and people}, volume = {10}, number = {1}, year = {1997}, pages = {31-45}, isbn = {0959-3845}, url = {ITP1997Method.pdf}, author = {Lucas D. Introna and Edgar A. Whitley} } @article {507, title = {Against method-}, journal = {Logistics information management}, volume = {10}, number = {5}, year = {1997}, pages = {235-245}, isbn = {0957-6053}, url = {ITP1997Method.pdf}, author = {Lucas D. Introna and Edgar A. Whitley} } @article {278923, title = {Balancing interpretation and intervention in information systems research: the action case approach}, year = {1997}, pages = {524{\textendash}541}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Vidgen, R. and Braa, K.} } @article {278915, title = {Becoming part of the furniture: the institutionalization of information systems}, year = {1997}, pages = {389{\textendash}414}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Silva, L. and Backhouse, J.} } @proceedings {866, title = {BPR Success Or Failure? A Business Process Re-Engineering Project In The Financial Services Industry}, year = {1997}, month = {14-17 December}, pages = {367-382}, address = {Atlanta, Georgia}, keywords = {strategic information systems, business process reengineering, case study}, author = {Larsen, Melissa and Michael D. Myers} } @article {278907, title = {Capturing complex, distributed activities: video-based interaction analysis as a component of workplace ethnography}, year = {1997}, pages = {246{\textendash}275}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Ruhleder, K. and Jordan, B.} } @article {278903, title = {Constituting users in requirements techniques}, year = {1997}, pages = {182{\textendash}204}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Westrup, C.} } @proceedings {490, title = {Creating and maintaining obligations: An empirical study of mediated and face{\textendash}to{\textendash}face communication}, volume = {II}, year = {1997}, pages = {801-815}, publisher = {Cork Publishing Ltd}, address = {Cork}, isbn = {1-86076-953-5}, url = {ECIS1997.pdf}, author = {Edgar A. Whitley and Rachael Scothern}, editor = {Robert D. Galliers and Ciaran Murphy and Sven Carlsson and Claudia Loebbecke and Hans Robert Hansen and Ramon O{\textquoteright}Callaghan} } @article {278892, title = {Crisis in the case study crisis: marginal diminishing returns to scale in the quantitative-qualitative research debate}, year = {1997}, pages = {28{\textendash}30}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {King, J. L. and Applegate, L. M.} } @article {278908, title = {Critical ethnography in information systems}, year = {1997}, pages = {276{\textendash}300}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Myers, M. D.} } @inbook {889, title = {Critical Ethnography in Information Systems}, booktitle = {Information Systems and Qualitative Research}, year = {1997}, pages = {276-300}, publisher = {Chapman and Hall}, organization = {Chapman and Hall}, address = {London}, keywords = {hermeneutics}, author = {Myers, Michael David}, editor = {Lee, A. S. and Liebenau, J. and DeGross, J I} } @article {278904, title = {A discourse on ethnography}, year = {1997}, pages = {207{\textendash}224}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Harvey, L.} } @proceedings {849, title = {The Dreams of the Cashless Society: A Study of EFTPOS in New Zealand}, year = {1997}, month = {30 September - 2}, pages = {1-12}, address = {Adelaide, Australia}, author = {Dunwoodie, E and Michael D. Myers} } @proceedings {917, title = {Ethnographic Research in Information Systems: An Exploration of Three Alternative Approaches to Ethnography}, year = {1997}, month = {14-17 December 1}, address = {Atlanta, Georgia}, author = {Ojelanki K. Ngwenyama and Harvey, Lynda and Michael D. Myers and Eleanor Wynn} } @article {278900, title = {Examining project history narratives: an analytic approach}, year = {1997}, pages = {123{\textendash}148}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Davidson, E. J.} } @article {842, title = {Executive Information Systems Failure: A New Zealand Case Study}, journal = {Journal of Information Technology}, volume = {12}, number = {2}, year = {1997}, pages = {145-153}, keywords = {EIS, implementation, failure, success factors, interpretive, case study}, author = {Bussen, Wendy and Michael D. Myers} } @proceedings {843, title = {Executive Information Systems Failure: A New Zealand Case Study}, year = {1997}, month = {1-5 April 1997}, pages = {253-262}, address = {Brisbane, Australia}, author = {Bussen, Wendy and Michael D. Myers} } @article {278910, title = {Exploring a chairman of the board{\textquoteright}s construction of organizational reality: the Colruyt case}, year = {1997}, pages = {303{\textendash}323}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Janson, M. and Guimaraes, T. and Brown, A. and Taillieu, T.} } @article {278902, title = {Exploring analyst-client communication: using grounded theory techniques to investigate interaction in informal requirements gathering}, year = {1997}, pages = {149{\textendash}181}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Urquhart, C.} } @article {916, title = {Hidden Agendas, Power, and Managerial Assumptions in Information Systems Development: An Ethnographic Study}, journal = {Information Technology \& People}, volume = {10}, number = {3}, year = {1997}, pages = {224-240}, keywords = {Habermas, critical social theory, lifeworld}, author = {Myers, Michael David and Young, Leslie W} } @article {278920, title = {Imagine: thought experiments in information systems research}, year = {1997}, pages = {481{\textendash}496}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Introna, L. D. and Whitley, E. A.} } @inbook {837, title = {The Impact of Action Research on Information Systems}, booktitle = {Information Systems and Qualitative Research}, year = {1997}, publisher = {Chapman and Hall}, organization = {Chapman and Hall}, address = {London}, author = {Richard Baskerville and Michael D. Myers and Nielson, Peter Axel and Trevor Wood-Harper}, editor = {Allen S. Lee and Jonathan Liebenau and Janice I. DeGross} } @article {523, title = {In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge}, journal = {Information technology and people}, volume = {10}, number = {2}, year = {1997}, pages = {147-163}, isbn = {0959-3845}, url = {ITP1997Identity.pdf}, author = {Edgar A. Whitley} } @article {524, title = {In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge}, journal = {OCLC Systems and services}, volume = {13}, number = {4}, year = {1997}, pages = {152-163}, isbn = {1065-075X}, url = {ITP1997Identity.pdf}, author = {Edgar A. Whitley} } @proceedings {891, title = {Information Literacy: Understanding the Organizational Implications of Information Technology}, year = {1997}, month = {November 4-7}, address = {Tokyo, Japan}, author = {Michael D. Myers} } @article {834, title = {Information Systems and Anthropology: An Anthropological Perspective on IT and Organizational Culture}, journal = {Information Technology \& People}, volume = {10}, number = {3}, year = {1997}, pages = {43-56}, author = {Avison, David and Michael D. Myers} } @article {278890, title = {Information systems and qualitative research}, year = {1997}, pages = {1{\textendash}8}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Lee, A. S. and Liebenau, J.} } @article {852, title = {Information Technology in Three Small Developed Countries}, journal = {Journal of Management Information Systems}, volume = {13}, number = {4}, year = {1997}, pages = {61-89}, author = {Ein-Dor, Phillip and Michael D. Myers and K.S. Raman} } @inbook {890, title = {Interpretive Research Methods in Information Systems}, booktitle = {Information Systems: An Emerging Discipline}, year = {1997}, pages = {239-266}, publisher = {McGraw Hill}, organization = {McGraw Hill}, address = {London}, keywords = {hermeneutics}, author = {Michael D. Myers}, editor = {Mingers, John and Stowell, Frank} } @article {278922, title = {Legal case analysis in IS research: failures in employing and outsourcing for IT professionals}, year = {1997}, pages = {497{\textendash}523}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Ang, S. and Endeshaw, A.} } @article {278899, title = {Panel{\textendash}-assessing critical social theory research in information systems}, year = {1997}, pages = {119{\textendash}120}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Ngwenyama, O. and Davis, G. and Lyytinen, K and Truex, D. and Cule, P.} } @article {278926, title = {Panel{\textendash}-information systems qualitative research in health care}, year = {1997}, pages = {569{\textendash}570}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Kaplan, B. and Lau, F. and Aarts, J. and Forsythe, D. E.} } @article {278895, title = {Panel{\textendash}-the impact of action research on information systems}, year = {1997}, pages = {69}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Baskerville, R. and Myers, M. and Nielsen, P. A. and Wood-Harper, T.} } @article {278913, title = {Playing politics with E-mail: a longitudinal conflict-based analysis}, year = {1997}, pages = {362{\textendash}388}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Romm, C. T. and Pliskin, N.} } @article {278896, title = {Process models in information systems}, year = {1997}, pages = {70{\textendash}100}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Shaw, T. and Jarvenpaa, S.} } @article {278891, title = {The qualitative difference in information systems research and practice}, year = {1997}, pages = {11{\textendash}27}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Markus, M. L.} } @article {888, title = {Qualitative Research in Information Systems}, journal = {MIS Quarterly}, volume = {21}, number = {2}, year = {1997}, pages = {241-242}, keywords = {qualitative research, action research, case study research, ethnography, grounded theory, positivist, interpretive, critical, hermeneutics, semiotics}, url = {www.qual.auckland.ac.nz}, author = {Michael D. Myers} } @article {278917, title = {Qualitative research in information systems: time to be subjective?}, year = {1997}, pages = {444{\textendash}465}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Garcia, L. and Quek, F.} } @article {278894, title = {A review on the use of action research in information systems studies}, year = {1997}, pages = {31{\textendash}68}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Lau, F.} } @article {517, title = {Stakeholder identification in inter-organizational systems: Gaining insights for drug use management systems}, journal = {European journal of information systems}, volume = {6}, number = {1}, year = {1997}, pages = {1-14}, isbn = {0960-085X}, url = {EJIS1997.pdf}, author = {Athanasia Pouloudi and Edgar A. Whitley} } @proceedings {492, title = {Studying the involved computer user: A phenomenological approach}, year = {1997}, month = {August 15-17}, pages = {327-329}, address = {Indianapolis, Indiana}, url = {AMCIS1997.pdf}, author = {Edgar A. Whitley and Julika Siemer and Lucas D. Introna}, editor = {JND Gupta} } @article {278898, title = {Systems of meaning: ethnography as a methodology for the study of information technologies}, year = {1997}, pages = {101{\textendash}118}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Prasad, P.} } @article {278912, title = {Transitioning to client/server: using a temporal framework to study organizational change}, year = {1997}, pages = {343{\textendash}361}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Sawyer, S. and Southwick, R.} } @article {278924, title = {Using case study research to build theories of IT implementation}, year = {1997}, pages = {542{\textendash}568}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Par{\'e}, G. and Elam, J. J.} } @article {278916, title = {Value in triangulation: a comparison of two approaches for combining qualitative and quantitative methods}, year = {1997}, pages = {417{\textendash}443}, publisher = {Chapman \& Hall, Ltd.}, address = {Philadelphia, PA, USA}, isbn = {0-412-82360-8}, author = {Gallivan, M. J.} } @proceedings {460, title = {Applying stakeholder analysis to inter-organisational systems in the context of health care in the UK}, year = {1996}, pages = {51-64}, publisher = {Stakes}, address = {Finland}, isbn = {951-33-0230-X}, url = {HUSITA1996.pdf}, author = {Athanasia Pouloudi and Edgar A. Whitley}, editor = {Bryan Glastonbury} } @article {887, title = {Can Kiwis Fly? Computing in New Zealand}, journal = {Communications of the ACM}, volume = {39}, number = {4}, year = {1996}, pages = {11-15}, keywords = {New Zealand}, author = {Michael D. Myers} } @article {522, title = {Confusion, social knowledge and the design of intelligent machines}, journal = {Journal of experimental and theoretical artificial intelligence}, volume = {8}, number = {3/4}, year = {1996}, pages = {365-381}, isbn = {0952-813X}, url = {JETAI1996.pdf}, author = {Edgar A. Whitley} } @article {516, title = {Discussing the role of information systems in the manifestation of organizational and inter-organizational conflict}, journal = {Systemist}, volume = {18}, number = {4}, year = {1996}, pages = {217-238}, isbn = {0961-8309}, author = {Athanasia Pouloudi and Edgar A. Whitley} } @article {908, title = {Ethical Dilemmas in the Use of Information Technology: An Aristotelian Perspective}, journal = {Ethics and Behavior}, volume = {6}, number = {2}, year = {1996}, pages = {153-160}, author = {Michael D. Myers and Miller, Leigh} } @article {547, title = {How do you make a deal when you can{\textquoteright}t shake hands?}, volume = {1}, number = {2}, year = {1996}, month = {June}, pages = {32,34}, isbn = {1363-979X}, author = {Edgar A. Whitley and Lucas D. Introna} } @proceedings {455, title = {Information systems as a social science? The individual perspective}, year = {1996}, pages = {814-816}, publisher = {AIS}, address = {Phoenix, Arizona}, url = {AMCIS1996.pdf}, author = {Lucas D. Introna and Edgar A. Whitley}, editor = {Jane M Carey} } @proceedings {462, title = {Managing information systems conflict: From the organizational to the interorganizational context}, year = {1996}, address = {Milton Keynes}, author = {Athanasia Pouloudi and Edgar A. Whitley} } @proceedings {904, title = {The Merits Of Three Qualitative Research Methods}, year = {1996}, month = {15-18 December 1}, address = {Cleveland, Ohio}, author = {Michael D. Myers and Heinz K. Klein and Truex, Duane and Eleanor Wynn} } @proceedings {463, title = {Privacy of electronic medical records: Understanding conflicting concerns}, year = {1996}, pages = {307-327}, address = {Madrid, Spain}, author = {Athanasia Pouloudi and Edgar A. Whitley}, editor = {P Barroso and T W Bynum and S Rogerson and L Joyanes} } @proceedings {461, title = {Stakeholder analysis as a longitudinal approach to interorganizational systems analysis}, volume = {1}, year = {1996}, pages = {33-44}, address = {Lisbon, Portugal}, isbn = {972-8093-12-8}, url = {ECIS1996.pdf}, author = {Athanasia Pouloudi and Edgar A. Whitley}, editor = {J Dias Coelho and Tawfik Jelassi and Wolfgang K{\"o}nig and Helmut Krcmar and Ramon O{\textquoteright}Callaghan and Markku S{\"a}{\"a}ksjarvi} } @proceedings {454, title = {Thinking about obligations in electronically mediated communication}, year = {1996}, publisher = {University of Hohenheim}, address = {Lisbon, Portugal}, url = {SISnet1996.pdf}, author = {Lucas D. Introna and Edgar A. Whitley}, editor = {Helmut Krcmar and B Schwarzer} } @article {886, title = {Dialectical Hermeneutics: A Theoretical Framework for the Implementation of Information Systems}, journal = {Information Systems Journal}, volume = {5}, number = {1}, year = {1995}, pages = {51-70}, author = {Michael D. Myers} } @article {514, title = {The effect of personal computers on the environment: Design, manufacture and use}, journal = {International journal of manufacturing system design}, volume = {2}, number = {3}, year = {1995}, pages = {219-232}, isbn = {0218-3382}, url = {IJMSD1995.pdf}, author = {Yoni Perl and Edgar A. Whitley} } @article {513, title = {The environmental contribution of personal computers: A state of the art report}, journal = {Computers and Society}, volume = {25}, number = {4}, year = {1995}, pages = {6-8}, isbn = {0095-2737}, url = {CandS1995.pdf}, author = {Yoni Perl and Edgar A. Whitley} } @proceedings {915, title = {The Implementation of an Information System in Mental Health: An Ethnographic Study}, year = {1995}, month = {27-29 September }, pages = {779-792}, address = {Perth, Australia}, author = {Michael D. Myers and Leslie Young} } @article {903, title = {Is The IT Industry In New Zealand Successful? A Comparison Of IT Industry Success In Three Small Developed Countries}, journal = {New Zealand Journal of Computing}, volume = {6}, number = {1 (A)}, year = {1995}, pages = {23-31}, author = {Michael D. Myers and Ein-Dor, Phillip and K.S. Raman} } @proceedings {870, title = {Judging Qualitative Research in Information Systems: Criteria for Accepting and Rejecting Manuscripts}, year = {1995}, month = {10-13 December 1}, address = {Amsterdam, The Netherlands}, author = {Allen S. Lee and Richard Baskerville and Jonathan Liebenau and Michael D. Myers} } @article {854, title = {Scholarship and practice: the contribution of ethnographic research methods to bridging the gap}, journal = {Information Technology \& People}, volume = {8}, number = {3}, year = {1995}, pages = {13-27}, author = {Harvey, Lynda and Michael D. Myers} } @article {906, title = {The Use of Quality Function Deployment in Systems Development: A Case Study}, journal = {Journal of International Information Management}, volume = {4}, number = {1}, year = {1995}, pages = {63-75}, author = {Michael D. Myers and Kambiz Maani} } @proceedings {459, title = {Using stakeholder analysis to explore the environment of drug{\textendash}use management systems}, year = {1995}, pages = {307-319}, address = {Athens, Greece}, isbn = {960-306-128-X}, url = {ECIS1995.pdf-}, author = {Athanasia Pouloudi and Edgar A. Whitley}, editor = {Georgios I. Doukidis and Robert D. Galliers and Tawfik Jelassi and Helmut Krcmar and F Land} } @article {883, title = {A disaster for everyone to see: an interpretive analysis of a failed IS project}, journal = {Accounting, Management and Information Technologies}, volume = {4}, number = {4}, year = {1994}, pages = {185-201}, keywords = {interpretive research, case study, implementation, New Zealand, hermeneutics}, author = {Michael D. Myers} } @article {884, title = {Implementing information systems with stakeholder analysis: A case study}, journal = {Journal of International Information Management}, volume = {3}, number = {1}, year = {1994}, pages = {19-25}, author = {Michael D. Myers} } @proceedings {480, title = {Information Systems: Social Technology in Social Systems}, year = {1994}, pages = {771-776}, publisher = {Nijenrode University Press}, address = {Nijenrode University, The Netherlands}, isbn = {90{\textendash}73314{\textendash}24{\textendash}0}, url = {ECIS1994.pdf-}, author = {Edgar A. Whitley and Susan Darking}, editor = {Walter Baets} } @article {879, title = {Information Technology, Morals and Ethics: An Aristotelian Dilemma}, journal = {New Zealand Journal of Computing}, volume = {5}, number = {2}, year = {1994}, pages = {7-12}, author = {Miller, Leigh and Michael D. Myers} } @proceedings {851, title = {IT Industry Success in Small Developed Countries}, year = {1994}, month = {14-16 December 1}, address = {Vancouver, Canada}, author = {Ein-Dor, Phillip and Michael D. Myers and K.S. Raman} } @proceedings {885, title = {Quality in Qualitative Research in Information Systems}, year = {1994}, month = {27-29 September }, pages = {763-766}, address = {Melbourne, Australia}, author = {Michael D. Myers} } @inbook {845, title = {Scholarship and practice: the contribution of ethnographic research methods to bridging the gap}, booktitle = {Business Process Re-Engineering: Information Systems Opportunities and Challenges}, year = {1994}, note = {IFIP Transactions A: Computer Science and Technology, Vol. A-54}, pages = {239-248}, publisher = {North Holland}, organization = {North Holland}, address = {Amsterdam}, author = {Lynda Davies and Michael D. Myers}, editor = {B.C. Glasson and I.T. Hawryszkiewycz and B.A. Underwood and R.A. Weber} } @article {521, title = {Special issue of papers from the First European Conference on Information Systems}, journal = {Computing and information technology}, volume = {1}, number = {4}, year = {1994}, isbn = {1330-1136}, url = {./JCITSpecialIssue}, author = {Edgar A. Whitley} } @inbook {438, title = {Spreadsheet module}, booktitle = {Manual for training in research and innovation management}, year = {1994}, publisher = {World Scientific}, organization = {World Scientific}, address = {Singapore}, isbn = {981-02-1653-X981-02-1653-X}, author = {Edgar A. Whitley}, editor = {Augusto Forti} } @proceedings {905, title = {The Use of Quality Function Deployment in Systems Development: A Case Study}, year = {1994}, month = {27-29 September }, pages = {469-478}, address = {Melbourne, Australia}, author = {Michael D. Myers and Kambiz Maani} } @article {528, title = {Using problem structuring methods to assist in information systems strategy development: A case study}, journal = {Journal of Computing and Information Technology}, volume = {1}, number = {4}, year = {1994}, pages = {273-284}, isbn = {1330-1136}, url = {./JCITSpecialIssue/Whitley.pdf}, author = {Edgar A. Whitley and Doukaki, Ioulia} } @article {DBLP:conf/ifip8-2/KleinH93, title = {The Application of Neohumanist Principles in Information Systems Development}, year = {1993}, pages = {263-280}, author = {Heinz K. Klein and Rudy Hirschheim} } @article {DBLP:conf/ifip8-2/Fitzgerald93, title = {Approaches to the Development of Executive Information Systems and the Contrast with Traditional Systems Development}, year = {1993}, pages = {339-351}, author = {Guy Fitzgerald} } @article {DBLP:conf/ifip8-2/FischerDVA93, title = {Boiling the Frog or Seducing the Fox: Organizational Aspects of Implementing CASE Technology}, year = {1993}, pages = {419-437}, author = {Sven Fischer and Marc Doodeman and Tsvi Vinig and Jan Achterberg} } @article {DBLP:conf/ifip8-2/Stary93, title = {Dynamic Modeling of Collaboration Among Rational Agents: Redefining the Research Agenda}, year = {1993}, pages = {219-239}, author = {Christian Stary} } @article {DBLP:conf/ifip8-2/KendallA93, title = {Emancipatory Research Themes in Information Systems Development: Human, Organizational and Social Aspects}, year = {1993}, pages = {1-12}, author = {Julie E. Kendall and Avison, David} } @article {DBLP:conf/ifip8-2/ParkinVC93, title = {End-User Computing: A Study of Three Management Models}, year = {1993}, pages = {353-373}, author = {P. V. Parkin and June M. Verner and Narciso Cerpa} } @article {DBLP:conf/ifip8-2/Iivari93, title = {From a Macro Innovation Theory of IS Diffusion to a Micro Innovation Theory of IS Adoption: An Application to CASE Adoption}, year = {1993}, pages = {295-320}, author = {Juhani Iivari} } @article {DBLP:conf/ifip8-2/WillcocksL93, title = {How Do Organizations Evaluate and Control Information Systems Investments? Recent UK Survey Evidence}, year = {1993}, pages = {15-39}, author = {Leslie P. Willcocks and Stephanie Lester} } @article {DBLP:conf/ifip8-2/TrauthDM93, title = {The Influence of Societal Factors on the Diffusion of Electronic Data Interchange in the Netherlands}, year = {1993}, pages = {323-337}, author = {Eileen M. Trauth and Frank E. J. M. Derksen and Hein M. J. Mevissen} } @article {DBLP:conf/ifip8-2/Morley93, title = {Information Systems Development Methods and User Participation: A Contingency Approach}, year = {1993}, pages = {127-142}, author = {Chantal Morley} } @proceedings {911, title = {The Infusion of Information Technologies into Traditional Societies: Lessons for IS Research}, year = {1993}, month = {6-8 December 199}, address = {Olrando, Florida}, author = {Michael D. Myers and Conrad Shayo and Barbara Gutek and Heinz Klein} } @article {DBLP:conf/ifip8-2/GoldkuhlR93, title = {Joint Elicitation of Problems: Important Aspects of Change Analysis}, year = {1993}, pages = {107-125}, author = {G{\"o}ran Goldkuhl and Annie R{\"o}stlinger} } @article {DBLP:conf/ifip8-2/Benjamin93, title = {Managing Information Technology Enabled Change}, year = {1993}, pages = {381-397}, author = {Robert I. Benjamin} } @article {DBLP:conf/ifip8-2/MillettP93, title = {Measuring Success in Expert System Developments}, year = {1993}, pages = {41-59}, author = {D. Millett and P. Powell} } @article {DBLP:conf/ifip8-2/Little93, title = {The Organizational Context of Systems Development}, year = {1993}, pages = {439-454}, author = {S. E. Little} } @article {DBLP:conf/ifip8-2/Heiskanen93, title = {Organizational Metaphors and Information Systems Practice: A Case Example of Implementation Strategy Formulation}, year = {1993}, pages = {399-417}, author = {Ari Heiskanen} } @article {DBLP:conf/ifip8-2/Sauer93, title = {Partial Abandonment as a Strategy for Avoiding Failure}, year = {1993}, pages = {143-167}, author = {Chris Sauer} } @article {DBLP:conf/ifip8-2/GronlundG93, title = {Participatory Information Systems: Information Systems as Venues for Participation}, year = {1993}, pages = {193-217}, abstract = {Without abstract}, author = {Ake Gr{\"o}nlund and Bai Guohua} } @article {DBLP:conf/ifip8-2/Rapley93, title = {A Plausible Impossibility: Supporting Top Executives with Information Systems}, year = {1993}, pages = {375-380}, author = {Keith Rapley} } @book {435, title = {Proceedings of the First European Conference on Information Systems}, year = {1993}, publisher = {Operational Research Society}, organization = {Operational Research Society}, address = {Birmingham}, isbn = {0903440 07 5}, url = {http://is2.lse.ac.uk/asp/aspecis/ECIS1993.htm}, author = {Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/LedingtonH93, title = {The Social Context of Information Systems Development: An Appreciative Field Perspective}, year = {1993}, pages = {455-473}, author = {Paul Ledington and Jon Heales} } @booklet {572, title = {Software Engineering: External programme study guide}, year = {1993}, publisher = {University of London}, edition = {Second edition}, address = {London}, isbn = {0718711386}, author = {Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/JonesN93, title = {Structured Development? A Structurational Analysis of the Development of an Executive Information System}, year = {1993}, pages = {475-496}, author = {Matthew Jones and Joe Nandhakumar} } @article {DBLP:conf/ifip8-2/FrietasB93, title = {A Study of End-Users{\textquoteright} Behavior by Means of an Automated Assessment Method (or a Behavior Typology of End-Users)}, year = {1993}, pages = {83-106}, author = {Henrique Frietas and Bernard Ballaz} } @article {DBLP:conf/ifip8-2/GuimaraesM93, title = {User Participation in Information System Development: Moderation in All Things}, year = {1993}, pages = {171-192}, author = {Tor Guimaraes and James D. McKeen} } @article {DBLP:conf/ifip8-2/KaasbollBB93, title = {User Problems Concerning Functional Integration in Thirteen Organizations}, year = {1993}, pages = {61-81}, author = {Jens Kaasb{\o}ll and Kristin Braa and Tone Bratteteig} } @article {DBLP:conf/ifip8-2/Tan93, title = {Using Communication Theory for Systems Design: A Model for Eliciting Information Requirements}, year = {1993}, pages = {241-262}, author = {Margaret Tan} } @proceedings {481, title = {Using problem structuring methods to assist in information systems strategy development: A case study}, year = {1993}, pages = {464-474}, publisher = {Operational Research Society}, address = {Henley-on-Thames}, isbn = {0903440 07 5}, url = {ECIS1993.pdf}, author = {Edgar A. Whitley and Doukaki, Ioulia}, editor = {Edgar A. Whitley} } @book {926, title = {Australian and New Zealand Cases in Information Systems}, year = {1992}, note = {Distributed in Australia by Addison-Wesley Publishing Co.}, publisher = {Pagination Publishers}, organization = {Pagination Publishers}, address = {Auckland}, author = {Sheffield, James and Michael D. Myers and Ross Jeffery and Michael Lawrence and Colin Freeman} } @article {DBLP:conf/ifip8-2/Curtis92, title = {The CASE for Process}, year = {1992}, pages = {333-343}, author = {Bill Curtis} } @article {DBLP:conf/ifip8-2/TrienekensK92, title = {Customer Orientation as a Basis for Computer Supported Technologies in Software Production}, year = {1992}, pages = {315-330}, author = {Jos J. M. Trienekens and Rob J. Kusters} } @article {DBLP:conf/ifip8-2/DaviesN92, title = {An Ethnographic Study of Configuration Management and Documentation Practices}, year = {1992}, pages = {179-192}, author = {Lynda Davies and Susan Nielsen} } @article {DBLP:conf/ifip8-2/KerolaO92, title = {Hypertext System as an Intermediary Agent in Case Environments}, year = {1992}, pages = {289-313}, author = {Pentti Kerola and Harri Oinas-Kukkonen} } @article {DBLP:conf/ifip8-2/Sumner92, title = {The Impact of Computer-Assisted Software Engineering on Systems Development}, year = {1992}, pages = {43-60}, author = {Mary Sumner} } @article {DBLP:conf/ifip8-2/WynekoopSC92, title = {The Implementation of Case Tools: An Innovation Diffusion Approach}, year = {1992}, pages = {25-41}, author = {Judy L. Wynekoop and James A. Senn and Sue A. Conger} } @article {DBLP:conf/ifip8-2/JarkeP92, title = {Information Systems Quality and Quality Informations Systems}, year = {1992}, pages = {345-375}, author = {Matthias Jarke and Klaus Pohl} } @article {518, title = {Knowledge acquisition for organisational problem solving: Developing expert systems and beyond}, journal = {Expert systems with applications}, volume = {5}, number = {1,2}, year = {1992}, pages = {121-130}, isbn = {0957-4174/92}, url = {ESWA1992.pdf}, author = {Angeliki Poulymenakou and Tony Cornford and Edgar A. Whitley} } @article {DBLP:conf/ifip8-2/Klenke92, title = {Leadership Processes in Computer Mediated Work Groups: Implications of Information Systems Development and Leadership Studies}, year = {1992}, pages = {115-132}, author = {Karin Klenke} } @article {DBLP:conf/ifip8-2/JonesW92, title = {The Limits of the Knowable: Organizational and Design Knowledge in Systems Development}, year = {1992}, pages = {195-213}, author = {Matthew Jones and Geoff Walsham} } @article {DBLP:conf/ifip8-2/Gray92, title = {New Directions for Group Decision Support Systems}, year = {1992}, pages = {377-392}, author = {Paul Gray} } @book {925, title = {New Zealand Cases in Information Systems}, year = {1992}, note = {Distributed in Australia by Addison-Wesley Publishing Co.}, publisher = {Pagination Publishers}, organization = {Pagination Publishers}, edition = {2nd}, address = {Auckland}, author = {Sheffield, James and Michael D. Myers} } @article {DBLP:conf/ifip8-2/WanningerD92, title = {Phased System Design, Development, and Implementation: Process and Technology}, year = {1992}, pages = {133-149}, author = {Lester A. Wanninger Jr. and Gary W. Dickson} } @article {DBLP:conf/ifip8-2/BeckerMN92, title = {A Preliminary Study on the Group Dynamics of the Cleanroom Systems Development Process}, year = {1992}, pages = {97-114}, author = {Shirley A. Becker and Eugene G. McGuire and Fred Niederman} } @article {DBLP:conf/ifip8-2/HeymO92, title = {A Reference Model for Information Systems Development}, year = {1992}, pages = {215-239}, author = {Michael Heym and Hubert {\"O}sterle} } @article {DBLP:conf/ifip8-2/LyytinenK92, title = {Research Themes Encompassing Computer Supported Technologies for Information Systems Development}, year = {1992}, pages = {1-21}, author = {Kalle Lyytinen and Kenneth E. Kendall} } @article {537, title = {The Spring model for knowledge based systems analysis: A case study}, journal = {Data Base}, volume = {23}, number = {2}, year = {1992}, pages = {1-5}, isbn = {0095-0033}, url = {Database1992.pdf}, author = {Edgar A. Whitley and Angeliki Poulymenakou and Tony Cornford} } @article {DBLP:conf/ifip8-2/BaskervilleTT92, title = {Systems Without Method: The Impact of New Technologies on Information Systems Development Projects}, year = {1992}, pages = {241-269}, author = {Richard Baskerville and Julie Travis and Duane P. Truex} } @article {DBLP:conf/ifip8-2/AaenSST92, title = {A Tale of Two Countries: Case Experiences and Expectations}, year = {1992}, pages = {61-93}, author = {Ivan Aaen and Aila Siltanen and Carsten S{\o}rensen and Veil-Pekka Tahvanainen} } @article {DBLP:conf/ifip8-2/AvisonGS92, title = {A Tool Kit for Soft Systems Methodology}, year = {1992}, pages = {273-287}, author = {Avison, David and Paul A. Golder and H. U. Shah} } @article {DBLP:conf/ifip8-2/VicianDPJ92, title = {Using Group Technologies to Support the Design of "Lights Out" Computing Systems: A Case Study}, year = {1992}, pages = {151-178}, author = {Chelley Vician and Gerardine DeSanctis and Marshall Scott Poole and Brad M. Jackson} } @booklet {575, title = {Book review of "Artificial experts: Social knowledge and intelligent machines" by H M Collins}, howpublished = {Journal of the Operational Research Society}, volume = {42}, number = {12}, year = {1991}, pages = {1123-1124}, isbn = {0160-5682}, url = {JORS1991.pdf}, author = {Edgar A. Whitley} } @booklet {574, title = {Book review of "Building knowledge based systems: Towards a methodology" by John S Edwards}, howpublished = {European Journal of Information Systems}, volume = {1}, number = {4}, year = {1991}, pages = {298}, isbn = {0960-085X}, url = {EJIS1991.pdf}, author = {Edgar A. Whitley} } @proceedings {882, title = {Decision Support for the New Zealand Army: The Laws of Armed Conflict Expert System}, year = {1991}, month = {June 3-5 1991}, pages = {97-99}, publisher = {TIMS College on Information Systems, The Institute of Management Sciences}, address = {Manhattan Beach, California}, author = {Michael D. Myers} } @proceedings {444, title = {Knowledge acquisition for SMESPRIT: An expert system to advise small and medium sized enterprises about their use of information technology}, year = {1991}, address = {Barcelona}, url = {ESBC1991.pdf}, author = {Tony Cornford and Angeliki Poulymenakou and Edgar A. Whitley} } @proceedings {881, title = {The Laws of Armed Conflict Expert System: Giving Legal Advice to Army Commanders}, year = {1991}, month = {December 16-19}, publisher = {Pergamon Press}, address = {Orlando, Florida}, author = {Michael D. Myers} } @proceedings {487, title = {The Spring model for knowledge based systems analysis: A case study involving small and medium sized enterprises}, year = {1991}, pages = {346-351}, publisher = {IEEE Computer Society Press}, address = {Washington, DC}, isbn = {{\textendash}8186{\textendash}2250{\textendash}4}, url = {IEEE1991.pdf}, author = {Edgar A. Whitley and Angeliki Poulymenakou and Tony Cornford}, editor = {Jerald Feinstein and Elias M. Awad and Larry Medsker and Efrain Turban} } @article {520, title = {Two approaches to developing expert systems: A consideration of formal and semi-formal domains}, journal = {AI \& Society}, volume = {5}, number = {2}, year = {1991}, pages = {110-127}, isbn = {0951{\textendash}5666}, url = {AISociety1991.pdf}, author = {Edgar A. Whitley} } @mastersthesis {569, title = {Embedding expert systems in semi-formal domains: Examining the boundaries of the knowledge base}, year = {1990}, school = {London School of Economics and Political Science}, address = {London}, author = {Edgar A. Whitley} } @proceedings {471, title = {Expert systems: True support for the process of decision making}, year = {1990}, pages = {123-140}, publisher = {ACM Press}, address = {Orlando, Florida}, isbn = {0-8979-416-3}, url = {SIGBDP1990Support.pdf}, author = {Edgar A. Whitley}, editor = {Elias M. Awad} } @proceedings {466, title = {Knowledge acquisition to facilitate organisational problem solving}, year = {1990}, pages = {181-188}, publisher = {ACM Press}, address = {Orlando, Florida}, isbn = {0-8979-416-3}, url = {SIGBDP1990Facilitate.pdf}, author = {Angeliki Poulymenakou and Tony Cornford and Edgar A. Whitley}, editor = {Elias M. Awad} } @proceedings {465, title = {Pragmatic considerations for effective knowledge acquisition: The case of business expert systems}, year = {1990}, pages = {237-246}, publisher = {ACM Press}, address = {Orlando, Florida}, isbn = {0-8979-416-3}, url = {SIGBDP1990Pragmatic.pdf}, author = {Angeliki Poulymenakou and Tony Cornford and Edgar A. Whitley}, editor = {Elias M. Awad} } @proceedings {482, title = {An expert system to assist in filing Income Tax returns: The case of Indian Income Tax}, year = {1989}, pages = {115-129}, publisher = {Learned Information}, address = {London}, isbn = {0 904 93371 7}, url = {IESC1989.pdf}, author = {Edgar A. Whitley and Georgios I. Doukidis and Ashwajit Singh} } @book {434, title = {Developing expert systems}, year = {1988}, publisher = {Chartwell-Bratt}, organization = {Chartwell-Bratt}, address = {Bromley}, isbn = {0-86238-196-7}, author = {Georgios I. Doukidis and Edgar A. Whitley} } @article {500, title = {Developing and running expert systems with PESYS}, journal = {Future Generation Computer Systems}, volume = {3}, number = {3}, year = {1987}, pages = {189-199}, isbn = {0167-739X}, url = {FGCS1988.pdf}, author = {Georgios I. Doukidis and Edgar A. Whitley} } @article {Nissen, title = {{Acquiring Knowledge of Information Systems: Research in a Methodological Quagmire}}, year = {1985}, pages = {37{\textendash}51}, publisher = {Elsevier Publishers}, author = {Hans-Erik Nissen} } @article {Lowe, title = {{Comment on Klein and Lyytinen}}, year = {1985}, pages = {153{\textendash}156}, publisher = {Elsevier Publishers}, author = {Tony Lowe} } @article {cooper, title = {{Comment on Sandberg}}, year = {1985}, pages = {87{\textendash}93}, publisher = {Elsevier Publishers}, author = {David Cooper} } @article {espejo, title = {{Comment on Vitalari}}, year = {1985}, pages = {259{\textendash}262}, publisher = {Elsevier Publishers}, author = {Raul Espejo} } @article {bjorn-andersen, title = {{Conference Review: IS Research? A Doubtful Science}}, year = {1985}, pages = {265{\textendash}268}, publisher = {Elsevier Publishers}, author = {Niels Bjorn-Andersen} } @article {Pettigrew, title = {{Contextualist Research and the Study of Organizational Change Processes}}, year = {1985}, pages = {53{\textendash}72}, publisher = {Elsevier Publishers}, author = {Andrew Pettigrew} } @article {lyytinen, title = {{The Critical Theory of Jurgen Habermas as a Basis for a Theory of Information Systems}}, year = {1985}, pages = {207{\textendash}226}, publisher = {Elsevier Publishers}, author = {Kalle Lyytinen and Heinz Klein} } @article {kendall, title = {{Development, Application and Enrichment of STROBE: Refinement of an Observational Tool for the Information Analyst}}, year = {1985}, pages = {111{\textendash}121}, publisher = {Elsevier Publishers}, author = {Kenneth Kendall and Julie Kendall} } @article {galliers, title = {{In Search of a Paradigm for Information Systems Research}}, year = {1985}, pages = {271{\textendash}286}, publisher = {Elsevier Publishers}, author = {Galliers, Robert} } @article {Hirschheim, title = {{Information Systems Epistemology: An Historical Perspective}}, year = {1985}, pages = {9{\textendash}33}, publisher = {Elsevier Publishers}, author = {Rudy Hirschheim} } @article {Fitzgerald, title = {{Information Systems Research Methodology: An Introduction to the Debate}}, year = {1985}, pages = {1{\textendash}7}, publisher = {Elsevier Publishers}, author = {Guy Fitzgerald and Rudy Hirschheim and Enid Mumford and Trevor Wood-Harper} } @article {vitalari, title = {{The Need for Longitudinal Designs in the Study of Computing Environments}}, year = {1985}, pages = {235{\textendash}258}, publisher = {Elsevier Publishers}, author = {Nicholas Vitalari} } @article {white, title = {{Perceptions and Deceptions: Issues for Information Systems Research}}, year = {1985}, pages = {227{\textendash}234}, publisher = {Elsevier Publishers}, author = {Kathy Brittain White} } @article {boland, title = {{Phenomenology: A Preferred Approach to Research on Information Systems}}, year = {1985}, pages = {181{\textendash}190}, publisher = {Elsevier Publishers}, author = {Boland, Richard} } @article {klein, title = {{The Poverty of Scientism in Information Systems}}, year = {1985}, pages = {123{\textendash}151}, publisher = {Elsevier Publishers}, author = {Heinz Klein and Kalle Lyytinen} } @article {jenkins, title = {{Research Methodologies and MIS Research}}, year = {1985}, pages = {97{\textendash}109}, publisher = {Elsevier Publishers}, author = {A. Milton Jenkins} } @article {wood1985research, title = {{Research methods in information systems: using action research}}, year = {1985}, pages = {161{\textendash}180}, publisher = {Elsevier Publishers}, author = {Trevor Wood-Harper} } @article {mumford, title = {{Researching People Problems: Some Advice to a Student}}, year = {1985}, pages = {303{\textendash}309}, publisher = {Elsevier Publishers}, author = {Enid Mumford} } @article {antill, title = {{Selection of a Research Method}}, year = {1985}, pages = {191{\textendash}204}, publisher = {Elsevier Publishers}, author = {Lyn Antill} } @article {sandberg, title = {{Socio-Technical Design, Trade Union Strategies and Action Research}}, year = {1985}, pages = {73{\textendash}86}, publisher = {Elsevier Publishers}, author = {Ake Sandberg} } @article {flensburg, title = {{Two Research Methodologies for Studying User Development of Data Systems}}, year = {1985}, pages = {287{\textendash}302}, publisher = {Elsevier Publishers}, author = {Per Flensburg} }