Publications
The Use of Quality Function Deployment in Systems Development: A Case Study. Journal of International Information Management, 4, 63-75.
. (1995). The Use of Research-Based Information System Development Methods. Realigning Research and Practice in Information Systems Development.
. (2001). The Use of Social Theories in 20 Years of WG 8.2 Empirical Research. Information Systems Research. presented at the 2004. Retrieved from http://dx.doi.org/10.1007/1-4020-8095-6_21
. (2004). User Participation in Information System Development: Moderation in All Things. Human, Organizational, and Social Dimensions of Information Systems Development.
. (1993). User Problems Concerning Functional Integration in Thirteen Organizations. Human, Organizational, and Social Dimensions of Information Systems Development.
. (1993). The Uses and Abuses of Evaluative Criteria for Qualitative Research Methods. New Information Technologies in Organizational Processes.
. (1999). Using Adjective Features from User Reviews to Generate Higher Quality and Explainable Recommendations. ( )Shaping the Future of ICT Research. Methods and Approaches. Springer Berlin Heidelberg. doi:10.1007/978-3-642-35142-6_2
. (2012). Using case study research to build theories of IT implementation. Proceedings of the IFIP TC8 WG 8.2 international conference on Information systems and qualitative research. Philadelphia, PA, USA: Chapman & Hall, Ltd.
. (1997). Using Communication Theory for Systems Design: A Model for Eliciting Information Requirements. Human, Organizational, and Social Dimensions of Information Systems Development.
. (1993). Using Group Technologies to Support the Design of "Lights Out" Computing Systems: A Case Study. The Impact of Computer Supported Technologies in Information Systems Development.
. (1992). Using natural language processing for qualitative data analysis. International Journal of Social Research Methodology, 15. presented at the 2012. doi:10.1080/13645579.2011.625764
. (2012). Using Photo-Diary Interviews to Study Cyborgian Identity Performance in Virtual Worlds. ( )Shaping the Future of ICT Research. Methods and Approaches. Springer Berlin Heidelberg. doi:10.1007/978-3-642-35142-6_6
. (2012). Using problem structuring methods to assist in information systems strategy development: A case study. ( )1st European Conference on Information Systems. Henley-on-Thames: Operational Research Society. Retrieved from ECIS1993.pdf
. (1993). Using problem structuring methods to assist in information systems strategy development: A case study. Journal of Computing and Information Technology, 1, 273-284. Retrieved from ./JCITSpecialIssue/Whitley.pdf
. (1994). Using social network analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122.
. (2012). Using Social Network Analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122. presented at the Sep. doi:10.1016/j.jtrangeo.2011.09.005
. (2012). Using stakeholder analysis to explore the environment of drug–use management systems. ( )3rd European Conference on Information Systems. Athens, Greece. Retrieved from ECIS1995.pdf-
. (1995). Using Structuration Theory in Action Research: An Intranet Development Project. Realigning Research and Practice in Information Systems Development.
. (2001). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12. presented at the 12/2011. Retrieved from http://aisel.aisnet.org/jais/vol12/iss12/2/
. (2011). A Value Analysis of Machine Learning-based Usable Privacy. IFIP 8.2 pre-ICIS OASIS Workshop 2022. Copenhagen, Denmark: IFIP Working Group 8.2.
. (2022). Value in triangulation: a comparison of two approaches for combining qualitative and quantitative methods. Proceedings of the IFIP TC8 WG 8.2 international conference on Information systems and qualitative research. Philadelphia, PA, USA: Chapman & Hall, Ltd.
. (1997). A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming. SCIENCE AND PUBLIC POLICY, 38, 332–333. presented at the May.
. (2011). On the Vicissitudes of Cyberspace as Potential-Space. Human Relations, 52(4), 485 - 506. presented at the 1999/04/24/. Retrieved from http://dx.doi.org/10.1023/A:1016961525238
. (1999). Viewing Information Technology Outsourcing Organizations Through a Postcolonial Lens. Social Inclusion: Societal and Organizational Implications for Information Systems. doi:10.1007/0-387-34588-4_25
. (2006).