Publications
The ranking of top IS journals: The perspective from the London School of Economics. European Journal of Information Systems, 17, 163-168. Retrieved from EJIS2008.pdf
. (2008). Qualitative Research in Information Systems. MIS Quarterly, 21, 241-242. Retrieved from www.qual.auckland.ac.nz
. (1997). The qualitative interview in IS research: Examining the craft. Information and Organization, 17, 2-26.
. (2007). Putting the Theory back into Grounded Theory: Guidelines for Grounded Theory Studies in Information Systems. Information Systems Journal, 20, 357-381.
. (2010). . (2015).
Policy discourse and data retention: The technology politics of surveillance in the United Kingdom. Telecommunications Policy, 29, 857-874. Retrieved from TP2005.pdf
. (2005). Phone call elasticity of city travel in Ahmedabad. Travel Behaviour and Society, 2, 15–25. presented at the Jan. doi:10.1016/j.tbs.2014.07.001
. (2015). On the Performance of Latent Semantic Indexing based Information Retrieval. Journal of Computing and Information Technology, 17, 259-264. doi:http://10.2498/cit.1001268
. (2009). Perceived discontinuities and constructed continuities in virtual work. Information Systems Journal, 22, 29-52. presented at the 01/2012. doi:10.1111/j.1365-2575.2011.00371.x
. (2012). Participation in ICT-Enabled Meetings. Journal of Organizational and End User Computing, 23. doi:10.4018/joeuc.2011040102
. (2011). Overflows of Technological Innovation in Emerging Economies: The Case of M-Pesa. Available at SSRN 2617305.
. (2013). Our moral condition in cyberspace. Ethics and Information Technology, 2(3), 147 - 152. presented at the 2000/09/01/. Retrieved from http://dx.doi.org/10.1023/A:1010049320893
. (2000). . (2006).
. (2012).
Open Access Publishing to Nurture the Sprouts of Knowledge and the Future of Information Systems Research. Communications of the Association for Information Systems, 24(30), 509-522. Retrieved from http://aisel.aisnet.org/cais/vol24/iss1/30/
. (2009). Object lessons and invisible technologies. Journal of information technology, 21, 176-184. Retrieved from JIT2006.pdf
. (2006). A note on the effect of term weighting on selecting intrinsic dimensionality of data. Cybernetics and Information Technologies, 9, 5-12.
. (2009). Negotiating "Best Practices" in Package Software Implementation. Information & Organization, 18, 1-28.
. (2008). Narrating the stories of leaked data: The changing role of journalists after Wikileaks and Snowden. Discourse, Context & Media.
. (2017). Narrating the stories of leaked data: The changing role of journalists after Wikileaks and Snowden. Discourse, Context and Media, 19, 13–21. presented at the Oct. doi:10.1016/j.dcm.2017.02.002
. (2017). Narrating the Stories of Leaked Data. Discourse, Context & Media. presented at the Oct. doi:10.1016/j.dcm.2017.02.002
. (2017). . (2016).
Myth, management of the unknown. Culture and Organization, 22, 67–87. presented at the Jan. doi:10.1080/14759551.2015.1092971
. (2016).