Publications
On the Vicissitudes of Cyberspace as Potential-Space. Human Relations, 52(4), 485 - 506. presented at the 1999/04/24/. Retrieved from http://dx.doi.org/10.1023/A:1016961525238
. (1999). Virtual Teams and Multiple Media: Structuring Media Use to Attain Strategic Goals. Group Decision and Negotiation, 15(4), 299 - 321. presented at the 2006/07/01/. Retrieved from http://dx.doi.org/10.1007/s10726-006-9044-8
. (2006). Visiting the red-light zones with Claudio. European Journal of Information Systems, 14, 477-479. Retrieved from ./ClaudioSpecialIssue/Whitley.pdf
. (2005). Vive les differences?. European Journal of Information Systems, 16, 20-35. Retrieved from EJIS2007.pdf
. (2007). What do we like about the IS field?. Communications of the AIS, 26, 441-450. Retrieved from http://aisel.aisnet.org/
. (2010). What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research. Communications of the AIS, 13, 317-335. Retrieved from CAIS2004.pdf
. (2004). When success turns into failure: a package-driven business process re-engineering project in the financial services industry. Journal of Strategic Information Systems, 8, 395-417.
. (1999). Will real estate agents survive? The transformation of the real estate industry by information technology. University of Auckland Business Review, 6, 38-50.
. (2004). Biometric technology in the public sector: Implications of the Identity Cards Bill. Government opportunities.
. (2005). Dotcompetition: Surviving in e-business. LSE Magazine, 12, 12-13. presented at the Winter. Retrieved from LSE2000.pdf
. (2000). . (1996).
Policy or politics? One year on for the LSE Identity Project. Parliamentary Monitor.
. (2006). Rhetorical confidence and technological certainty in technology led policy initiatives. Public sector executive. Retrieved from PSE2007.pdf
. (2007). . (1999).
What impact will the Government's identity cards scheme have on society?. eGovernment Monitor.
. (2005). Aligning Goals, Virtuality and Capability: A Virtual Alignment Model. Becoming Virtual. presented at the 2008///. Retrieved from http://dx.doi.org/10.1007/978-3-7908-1958-8_2
. (2008). Base Concepts. Virtual Organizations. presented at the 2005///. Retrieved from http://dx.doi.org/10.1007/0-387-23757-7_2
. (2005). Blockchain as organizational technology. presented at the Feb, University of Zurich. Retrieved from https://www.ifi.uzh.ch/en/studies/phd/colloquium/spring-2019/details-colloquium-spring-2019.html
. (2019). Blockchain Authentication – From Iron Cage to Silicon Enclosure?. presented at the Mar, University of Oxford, United Kingdom.
. (2016). Blockchain infrastructures and their invisible carnivalesque. presented at the Apr, University of Munster.
. (2018). Book review of "A Computer Called LEO: Lyons Teashops and the World's First Office Computer" by Georgina Ferry. Information technology and people. Retrieved from ITP2004b.pdf
. (2004). Book review of "Aramis or the love of technology" by Bruno Latour. Information technology and people. Retrieved from ITP1999a.pdf
. (1999). Book review of "Artificial experts: Social knowledge and intelligent machines" by H M Collins. Journal of the Operational Research Society. Retrieved from JORS1991.pdf
. (1991). Book review of "Building knowledge based systems: Towards a methodology" by John S Edwards. European Journal of Information Systems. Retrieved from EJIS1991.pdf
. (1991). Book review of "Ruling the root: Internet governance and the taming of cyberspace" by Milton L Mueller and "Internet governance in transition: Who is the master of this domain?" by Daniel J Paré.. Information technology and people. Retrieved from ITP2004a.pdf
. (2004).