2009

Lim, W., Sia, S., & Yeow, A. (2009). Managing Risk in a Failing IT Project: A Social Constructionist View. In Proceedings of the 69th Academy of Management Meeting.
Whitley, E. A., & Hosein, I. R. (2009). Global challenges for identity policies. Palgrave Macmillan.
Whitley, E. A., Neyland, D., & Goold, B. (2009). Perceptions of government technology, surveillance and privacy: the UK identity cards scheme. In New Directions in Privacy and Surveillance (pp. 133-156). Willan. Willan2009.pdf
Whitley, E. A., Darking, M. L., Avgerou, C., Willcocks, L., & Lanzara, G. F. (2009). Object lessons and invisible technologies. In Bricolage, Care and Information Systems (p. Forthcoming). Palgrave.
Mosse, B., & Whitley, E. A. (2009). Critically classifying: UK E-government website benchmarking and the recasting of the citizen as customer. Information Systems Journal, 19, Article 2. ISJ2009.pdf
Willcocks, L. P., & Whitley, E. A. (2009). Developing the information and knowledge agenda in information systems: Insights from philosophy. The Information Society, 25, Article 3. TIS2009.pdf
Avital, M., & Te’eni, D. (2009). From Generative Fit to Generative Capacity: Exploring an Emerging Dimension of Information Systems Design and Task Performance. Information Systems Journal, 4(19), 345-367. http://www3.interscience.wiley.com/journal/120174765/abstract
Majchrzak, A., Avital, M., Lyytinen, K., Björk, B.-C., Boland, R., & Crowston, K. (2009). Open Access Publishing to Nurture the Sprouts of Knowledge and the Future of Information Systems Research. Communications of the Association for Information Systems, 24(30), 509-522. http://aisel.aisnet.org/cais/vol24/iss1/30/
Lee, D. J. C., & Myers, M. D. (2009). Making Enterprise Systems Work: The Role of Organizational Defensive Routines . Pacific Asia Journal of the AIS, 1, Article 2.