Publications
Book review of "The construction of social reality" by John R Searle. Information technology and people. Retrieved from ITP1999b.pdf
. (1999). Using problem structuring methods to assist in information systems strategy development: A case study. ( )1st European Conference on Information Systems. Henley-on-Thames: Operational Research Society. Retrieved from ECIS1993.pdf
. (1993). Departmental influences on policy design: How the UK is confusing identity fraud with other policy agendas. Communications of the ACM, 51, 98-100. Retrieved from CACM2008.pdf
. (2008). Software Engineering: External programme study guide. London: University of London.
. (1993). What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research. Communications of the AIS, 13, 317-335. Retrieved from CAIS2004.pdf
. (2004). Doing the politics of technological decision making: Due process and the debate about identity cards in the UK. European Journal of Information Systems, 17, 668-677. Retrieved from EJIS2008DueProcess.pdf
. (2008). Proceedings of the First European Conference on Information Systems. Birmingham: Operational Research Society. Retrieved from http://is2.lse.ac.uk/asp/aspecis/ECIS1993.htm
. (1993). The Spring model for knowledge based systems analysis: A case study involving small and medium sized enterprises. ( )Developing and managing expert system programs. Washington, DC: IEEE Computer Society Press. Retrieved from IEEE1991.pdf
. (1991). Visiting the red-light zones with Claudio. European Journal of Information Systems, 14, 477-479. Retrieved from ./ClaudioSpecialIssue/Whitley.pdf
. (2005). Policy discourse and data retention: The technology politics of surveillance in the United Kingdom. Telecommunications Policy, 29, 857-874. Retrieved from TP2005.pdf
. (2005). A Symmetric Analysis of the Border Control Information Systems for People and Trade. ( )16th European Conference on Information Systems. Galway. Retrieved from ECIS2008.pdf
. (2008). Object lessons and invisible technologies. In , Bricolage, Care and Information Systems (p. Forthcoming). Basingstoke: Palgrave.
. (2009). The Spring model for knowledge based systems analysis: A case study. Data Base, 23, 1-5. Retrieved from Database1992.pdf
. (1992). In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge. OCLC Systems and services, 13, 152-163. Retrieved from ITP1997Identity.pdf
. (1997). Book review of "Virtual society? Technology, Cyperbole, Reality" edited by Steve Woolgar. British Journal of Sociology. Retrieved from BJOS2004.pdf
. (2004). Doing Politics Around Electronic Commerce: Opposing the Regulation of Investigatory Powers Bill. Realigning Research and Practice in Information Systems Development.
. (2001). Understanding participation in entrepreneurial organisations: Applying the sociology of translation. ( )6th European conference on information systems. Aix-en-Provence, France: Euro-Arab Management School. Retrieved from ECIS1998.pdf
. (1998). Perceptions and Deceptions: Issues for Information Systems Research. Research methods in information systems. Elsevier Publishers.
. (1985). Discourse, Management Fashions, and ERP Systems. Global and Organizational Discourse about Information Technology.
. (2002). Constituting users in requirements techniques. Proceedings of the IFIP TC8 WG 8.2 international conference on Information systems and qualitative research. Philadelphia, PA, USA: Chapman & Hall, Ltd.
. (1997). From Senses to Sensors. Virtuality and Virtualization. doi:10.1007/978-0-387-73025-7_20
. (2007).