Publications
Rhetorical confidence and technological certainty in technology led policy initiatives. Public sector executive. Retrieved from PSE2007.pdf
. (2007). Policy or politics? One year on for the LSE Identity Project. Parliamentary Monitor.
. (2006). . (1996).
Dotcompetition: Surviving in e-business. LSE Magazine, 12, 12-13. presented at the Winter. Retrieved from LSE2000.pdf
. (2000). Biometric technology in the public sector: Implications of the Identity Cards Bill. Government opportunities.
. (2005). What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research. Communications of the AIS, 13, 317-335. Retrieved from CAIS2004.pdf
. (2004). Vive les differences?. European Journal of Information Systems, 16, 20-35. Retrieved from EJIS2007.pdf
. (2007). Visiting the red-light zones with Claudio. European Journal of Information Systems, 14, 477-479. Retrieved from ./ClaudioSpecialIssue/Whitley.pdf
. (2005). Using problem structuring methods to assist in information systems strategy development: A case study. Journal of Computing and Information Technology, 1, 273-284. Retrieved from ./JCITSpecialIssue/Whitley.pdf
. (1994). Understanding participation in entrepreneurial organisations: Some hermeneutic readings. Journal of information technology, 14, 193-202. Retrieved from JIT1999.pdf
. (1999). Two approaches to developing expert systems: A consideration of formal and semi-formal domains. AI & Society, 5, 110-127. Retrieved from AISociety1991.pdf
. (1991). Towards an Understanding of FLOSS: Infrastructures, Materiality and the Digital Business Ecosystem. Science Studies, 20, 13-33. Retrieved from SciStudies2007.pdf
. (2007). Studying the translations of NHSnet. Journal of End User Computing, 13, 30-40. Retrieved from JEUC2001.pdf
. (2001). Stakeholder identification in inter-organizational systems: Gaining insights for drug use management systems. European journal of information systems, 6, 1-14. Retrieved from EJIS1997.pdf
. (1997). The Spring model for knowledge based systems analysis: A case study. Data Base, 23, 1-5. Retrieved from Database1992.pdf
. (1992). Special issue on Time and information technology: Temporal impacts on individuals, organizations, and society. The Information Society, 18. Retrieved from ./timespecialissue/
. (2002). Special issue on Personal Reflections on Claudio Ciborra's life and work. European Journal of Information Systems, 14. Retrieved from ./ClaudioSpecialIssue/
. (2005). Special issue on Heidegger and information technology. Information technology and people, 11. Retrieved from ./heideggerspecialissue/
. (1998). Special issue of papers from the First European Conference on Information Systems. Computing and information technology, 1. Retrieved from ./JCITSpecialIssue
. (1994). The regulation of electronic commerce: learning from the UK's RIP act. Journal of Strategic Information Systems, 11, 31-58. Retrieved from JSIS2002.pdf
. (2002). Regulating Architecture and Architectures of Regulation: Contributions from Information Systems. International Review of Computing Law and Technology, 17, 85-97. Retrieved from IRCLT2003.pdf
. (2003). Reflections on the academic policy analysis process and the UK Identity Cards Scheme. The information society, 23, 51-58. Retrieved from TIS2007.pdf
. (2007). The ranking of top IS journals: The perspective from the London School of Economics. European Journal of Information Systems, 17, 163-168. Retrieved from EJIS2008.pdf
. (2008). Policy discourse and data retention: The technology politics of surveillance in the United Kingdom. Telecommunications Policy, 29, 857-874. Retrieved from TP2005.pdf
. (2005). Object lessons and invisible technologies. Journal of information technology, 21, 176-184. Retrieved from JIT2006.pdf
. (2006).