Publications
Using stakeholder analysis to explore the environment of drug–use management systems. ( )3rd European Conference on Information Systems. Athens, Greece. Retrieved from ECIS1995.pdf-
. (1995). What is meant by tacit knowledge: Towards a better understanding of the shape of actions. ( )8th European Conference on Information Systems. Vienna. Retrieved from ECIS2000Tacit.pdf
. (2000). Cultivating Recalcitrance in Information Systems Research. Realigning Research and Practice in Information Systems Development.
. (2001). Doing Politics Around Electronic Commerce: Opposing the Regulation of Investigatory Powers Bill. Realigning Research and Practice in Information Systems Development.
. (2001). The Footprint of Regulation: How Information Systems are Affecting the Sources of Control in a Global Economy. Information Systems Perspectives and Challenges in the Context of Globalization.
. (2003). Panel: New insights into studying agency and information technology. ( )Information systems research: Relevant theory and informed practice. Boston: Kluwer. Retrieved from IFIP822004.pdf
. (2004). Placing Language in the Foreground: Themes and Methods in Information Technology Discourse. ( )Global and Organizational Discourse about Information Technology. Boston: Kluwer Academic Publishers.
. (2002). Placing Language in the Foreground: Themes and Methods in Information Technology Discourse. ( )Global and Organizational Discourse about Information Technology. Boston: Kluwer Academic Publishers.
. (2002). Placing Language in the Foreground: Themes and Methods in Information Technology Discourse. Global and Organizational Discourse about Information Technology.
. (2002). Re-evaluating Power in Information Rich Organizations: New Theories and Approaches. New Information Technologies in Organizational Processes.
. (1999). Representing Human and Non-human Stakeholders: On Speaking with Authority. Organizational and Social Perspectives on IT.
. (2000). About experiments and style: A critique of laboratory research in information systems. Information technology and people, 13, 161-173. Retrieved from ITP2000.pdf
. (2000). . (1997).
. (1997).
An alternative perspective on citation classics: Evidence from the first ten years of the European Conference on Information Systems. Information and Management, 44, 441-455. Retrieved from iandm2007.pdf
. (2007). Balance, scrutiny and identity cards in the UK. Criminal Justice Matters, 68, 29-30. Retrieved from CJM2007.pdf
. (2007). Becoming engaged with conferences: Reputations and networks. Communications of the AIS, 16, 895-903. Retrieved from CAIS2005.pdf
. (2005). Configuring peer–to–peer software: An empirical study of how users react to the regulatory features of software. European Journal of Information Systems, 13, 95-102. Retrieved from EJIS2004.pdf
. (2004). Confusion, social knowledge and the design of intelligent machines. Journal of experimental and theoretical artificial intelligence, 8, 365-381. Retrieved from JETAI1996.pdf
. (1996). Creating and maintaining obligations with emerging technologies: An empirical study of mediated and face-to-face communication. Journal of computing and information technology, 6, 343-353. Retrieved from JCIT1998.pdf
. (1998). Critically classifying: UK E-government website benchmarking and the recasting of the citizen as customer. Information Systems Journal, 19, 149-173. Retrieved from ISJ2009.pdf
. (2009). Departmental influences on policy design: How the UK is confusing identity fraud with other policy agendas. Communications of the ACM, 51, 98-100. Retrieved from CACM2008.pdf
. (2008). Developing and running expert systems with PESYS. Future Generation Computer Systems, 3, 189-199. Retrieved from FGCS1988.pdf
. (1987). Developing the information and knowledge agenda in information systems: Insights from philosophy. The Information Society, 25, 190-197. Retrieved from TIS2009.pdf
. (2009). . (1996).