Publications
Export 73 results:
Filters: Author is Edgar A. Whitley [Clear All Filters]
Panel: What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research. ( )11th European Conference on Information Systems. Naples, Italy. Retrieved from ECIS2003PhD.pdf
. (2003). Studying the involved computer user: A phenomenological approach. ( )Proceeding of the Americas Conference on Information Systems. presented at the August 15-17, Indianapolis, Indiana. Retrieved from AMCIS1997.pdf
. (1997). Two approaches to developing expert systems: A consideration of formal and semi-formal domains. AI & Society, 5, 110-127. Retrieved from AISociety1991.pdf
. (1991). Special issue of papers from the First European Conference on Information Systems. Computing and information technology, 1. Retrieved from ./JCITSpecialIssue
. (1994). Confusion, social knowledge and the design of intelligent machines. Journal of experimental and theoretical artificial intelligence, 8, 365-381. Retrieved from JETAI1996.pdf
. (1996). In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge. Information technology and people, 10, 147-163. Retrieved from ITP1997Identity.pdf
. (1997). In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge. OCLC Systems and services, 13, 152-163. Retrieved from ITP1997Identity.pdf
. (1997). Understanding participation in entrepreneurial organisations: Some hermeneutic readings. Journal of information technology, 14, 193-202. Retrieved from JIT1999.pdf
. (1999). Visiting the red-light zones with Claudio. European Journal of Information Systems, 14, 477-479. Retrieved from ./ClaudioSpecialIssue/Whitley.pdf
. (2005). Object lessons and invisible technologies. Journal of information technology, 21, 176-184. Retrieved from JIT2006.pdf
. (2006). Using problem structuring methods to assist in information systems strategy development: A case study. Journal of Computing and Information Technology, 1, 273-284. Retrieved from ./JCITSpecialIssue/Whitley.pdf
. (1994). An alternative perspective on citation classics: Evidence from the first ten years of the European Conference on Information Systems. Information and Management, 44, 441-455. Retrieved from iandm2007.pdf
. (2007). How international postgraduate students tackle writing assignments: An empirical study. International journal of applied linguistics, 156, 329-330. Retrieved from http://dx.doi.org/10.2143/ITL.156.0.2034443
. (2008). Policy discourse and data retention: The technology politics of surveillance in the United Kingdom. Telecommunications Policy, 29, 857-874. Retrieved from TP2005.pdf
. (2005). Departmental influences on policy design: How the UK is confusing identity fraud with other policy agendas. Communications of the ACM, 51, 98-100. Retrieved from CACM2008.pdf
. (2008). Doing the politics of technological decision making: Due process and the debate about identity cards in the UK. European Journal of Information Systems, 17, 668-677. Retrieved from EJIS2008DueProcess.pdf
. (2008). Reflections on the academic policy analysis process and the UK Identity Cards Scheme. The information society, 23, 51-58. Retrieved from TIS2007.pdf
. (2007). Special issue on Heidegger and information technology. Information technology and people, 11. Retrieved from ./heideggerspecialissue/
. (1998). Studying the translations of NHSnet. Journal of End User Computing, 13, 30-40. Retrieved from JEUC2001.pdf
. (2001). The Spring model for knowledge based systems analysis: A case study. Data Base, 23, 1-5. Retrieved from Database1992.pdf
. (1992). Creating and maintaining obligations with emerging technologies: An empirical study of mediated and face-to-face communication. Journal of computing and information technology, 6, 343-353. Retrieved from JCIT1998.pdf
. (1998). What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research. Communications of the AIS, 13, 317-335. Retrieved from CAIS2004.pdf
. (2004). Dotcompetition: Surviving in e-business. LSE Magazine, 12, 12-13. presented at the Winter. Retrieved from LSE2000.pdf
. (2000). Biometric technology in the public sector: Implications of the Identity Cards Bill. Government opportunities.
. (2005). What impact will the Government's identity cards scheme have on society?. eGovernment Monitor.
. (2005).