Publications
Managing expectations of technological systems: A case study of a problematic government project. Spontaneous Generations, 1, 67-77. Retrieved from SG2007.pdf
. (2007). Knowledge acquisition for organisational problem solving: Developing expert systems and beyond. Expert systems with applications, 5, 121-130. Retrieved from ESWA1992.pdf
. (1992). On the interpretative flexibility of hosted ERP systems. Journal of Strategic Information Systems, 14, 167-195. Retrieved from JSIS2005.pdf
. (2005). In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge. OCLC Systems and services, 13, 152-163. Retrieved from ITP1997Identity.pdf
. (1997). In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge. Information technology and people, 10, 147-163. Retrieved from ITP1997Identity.pdf
. (1997). How international postgraduate students tackle writing assignments: An empirical study. International journal of applied linguistics, 156, 329-330. Retrieved from http://dx.doi.org/10.2143/ITL.156.0.2034443
. (2008). . (2008).
The European Information Systems Academy. European Journal of Information Systems, 16, 3-4. Retrieved from EJIS2007Editorial.pdf
. (2007). The environmental contribution of personal computers: A state of the art report. Computers and Society, 25, 6-8. Retrieved from CandS1995.pdf
. (1995). The effects of national culture on ERP implementation: A study of Colombia and Switzerland. Enterprise Information Systems, 1, 301-325. Retrieved from eis2007.pdf
. (2007). The effect of personal computers on the environment: Design, manufacture and use. International journal of manufacturing system design, 2, 219-232. Retrieved from IJMSD1995.pdf
. (1995). Doing the politics of technological decision making: Due process and the debate about identity cards in the UK. European Journal of Information Systems, 17, 668-677. Retrieved from EJIS2008DueProcess.pdf
. (2008). . (1996).
Developing the information and knowledge agenda in information systems: Insights from philosophy. The Information Society, 25, 190-197. Retrieved from TIS2009.pdf
. (2009). Developing and running expert systems with PESYS. Future Generation Computer Systems, 3, 189-199. Retrieved from FGCS1988.pdf
. (1987). Departmental influences on policy design: How the UK is confusing identity fraud with other policy agendas. Communications of the ACM, 51, 98-100. Retrieved from CACM2008.pdf
. (2008). Critically classifying: UK E-government website benchmarking and the recasting of the citizen as customer. Information Systems Journal, 19, 149-173. Retrieved from ISJ2009.pdf
. (2009). Creating and maintaining obligations with emerging technologies: An empirical study of mediated and face-to-face communication. Journal of computing and information technology, 6, 343-353. Retrieved from JCIT1998.pdf
. (1998). Confusion, social knowledge and the design of intelligent machines. Journal of experimental and theoretical artificial intelligence, 8, 365-381. Retrieved from JETAI1996.pdf
. (1996). Configuring peer–to–peer software: An empirical study of how users react to the regulatory features of software. European Journal of Information Systems, 13, 95-102. Retrieved from EJIS2004.pdf
. (2004). Becoming engaged with conferences: Reputations and networks. Communications of the AIS, 16, 895-903. Retrieved from CAIS2005.pdf
. (2005). Balance, scrutiny and identity cards in the UK. Criminal Justice Matters, 68, 29-30. Retrieved from CJM2007.pdf
. (2007). An alternative perspective on citation classics: Evidence from the first ten years of the European Conference on Information Systems. Information and Management, 44, 441-455. Retrieved from iandm2007.pdf
. (2007). . (1997).
. (1997).