Publications
Export 137 results:
Filters: Author is Edgar A. Whitley [Clear All Filters]
Developing the information and knowledge agenda in information systems: Insights from philosophy. The Information Society, 25, 190-197. Retrieved from TIS2009.pdf
. (2009). Developing expert systems. Bromley: Chartwell-Bratt.
. (1988). Developing and running expert systems with PESYS. Future Generation Computer Systems, 3, 189-199. Retrieved from FGCS1988.pdf
. (1987). Departmental influences on policy design: How the UK is confusing identity fraud with other policy agendas. Communications of the ACM, 51, 98-100. Retrieved from CACM2008.pdf
. (2008). Cultivating Recalcitrance in Information Systems Research. Realigning Research and Practice in Information Systems Development.
. (2001). Critically classifying: UK E-government website benchmarking and the recasting of the citizen as customer. Information Systems Journal, 19, 149-173. Retrieved from ISJ2009.pdf
. (2009). Creating and maintaining obligations with emerging technologies: An empirical study of mediated and face-to-face communication. Journal of computing and information technology, 6, 343-353. Retrieved from JCIT1998.pdf
. (1998). Creating and maintaining obligations: An empirical study of mediated and face–to–face communication. ( )5th European conference on information systems. Cork: Cork Publishing Ltd. Retrieved from ECIS1997.pdf
. (1997). Confusion, social knowledge and the design of intelligent machines. Journal of experimental and theoretical artificial intelligence, 8, 365-381. Retrieved from JETAI1996.pdf
. (1996). Configuring peer–to–peer software: An empirical study of how users react to the regulatory features of software. ( )11th European Conference on Information Systems. Naples, Italy: Winner of best conference paper prize. Retrieved from ECIS2003.pdf
. (2003). Configuring peer–to–peer software: An empirical study of how users react to the regulatory features of software. European Journal of Information Systems, 13, 95-102. Retrieved from EJIS2004.pdf
. (2004). Change? What really happens when new information systems are introduced. ( )IS Research at the beginning of the Millenium: Searching for artifacts, metaphors and methodologies. Charlotte, NC: IFIP 8.2. Retrieved from IFIP821999b.pdf
. (1999). The challenge of building public technology infrastructure: issues of governance and sustainability in a digital business ecosystem. ( )Proceedings of the Fourteenth European Conference on Information Systems. Goteborg. Retrieved from ECIS2006Mary.pdf
. (2006). . (2008).
Book review of "Virtual society? Technology, Cyperbole, Reality" edited by Steve Woolgar. British Journal of Sociology. Retrieved from BJOS2004.pdf
. (2004). Book review of "The shape of actions" by Harry Collins and Martin Kusch. The Times Higher Education Supplement. London. Retrieved from THES2000.pdf
. (2000). Book review of "The construction of social reality" by John R Searle. Information technology and people. Retrieved from ITP1999b.pdf
. (1999). Book review of "Ruling the root: Internet governance and the taming of cyberspace" by Milton L Mueller and "Internet governance in transition: Who is the master of this domain?" by Daniel J Paré.. Information technology and people. Retrieved from ITP2004a.pdf
. (2004). Book review of "Building knowledge based systems: Towards a methodology" by John S Edwards. European Journal of Information Systems. Retrieved from EJIS1991.pdf
. (1991). Book review of "Artificial experts: Social knowledge and intelligent machines" by H M Collins. Journal of the Operational Research Society. Retrieved from JORS1991.pdf
. (1991). Book review of "Aramis or the love of technology" by Bruno Latour. Information technology and people. Retrieved from ITP1999a.pdf
. (1999). Book review of "A Computer Called LEO: Lyons Teashops and the World's First Office Computer" by Georgina Ferry. Information technology and people. Retrieved from ITP2004b.pdf
. (2004). Biometric technology in the public sector: Implications of the Identity Cards Bill. Government opportunities.
. (2005). Becoming engaged with conferences: Reputations and networks. Communications of the AIS, 16, 895-903. Retrieved from CAIS2005.pdf
. (2005). Balance, scrutiny and identity cards in the UK. Criminal Justice Matters, 68, 29-30. Retrieved from CJM2007.pdf
. (2007).