Publications
Blockchain infrastructures and their invisible carnivalesque. presented at the Apr, University of Munster.
. (2018). Blockchain Authentication – From Iron Cage to Silicon Enclosure?. presented at the Mar, University of Oxford, United Kingdom.
. (2016). Blockchain as organizational technology. presented at the Feb, University of Zurich. Retrieved from https://www.ifi.uzh.ch/en/studies/phd/colloquium/spring-2019/details-colloquium-spring-2019.html
. (2019). Base Concepts. Virtual Organizations. presented at the 2005///. Retrieved from http://dx.doi.org/10.1007/0-387-23757-7_2
. (2005). Aligning Goals, Virtuality and Capability: A Virtual Alignment Model. Becoming Virtual. presented at the 2008///. Retrieved from http://dx.doi.org/10.1007/978-3-7908-1958-8_2
. (2008). What impact will the Government's identity cards scheme have on society?. eGovernment Monitor.
. (2005). . (1999).
Rhetorical confidence and technological certainty in technology led policy initiatives. Public sector executive. Retrieved from PSE2007.pdf
. (2007). Policy or politics? One year on for the LSE Identity Project. Parliamentary Monitor.
. (2006). . (1996).
Dotcompetition: Surviving in e-business. LSE Magazine, 12, 12-13. presented at the Winter. Retrieved from LSE2000.pdf
. (2000). Biometric technology in the public sector: Implications of the Identity Cards Bill. Government opportunities.
. (2005). Will real estate agents survive? The transformation of the real estate industry by information technology. University of Auckland Business Review, 6, 38-50.
. (2004). When success turns into failure: a package-driven business process re-engineering project in the financial services industry. Journal of Strategic Information Systems, 8, 395-417.
. (1999). What is it like to do an Information Systems PhD in Europe? Diversity in the practice of IS research. Communications of the AIS, 13, 317-335. Retrieved from CAIS2004.pdf
. (2004). What do we like about the IS field?. Communications of the AIS, 26, 441-450. Retrieved from http://aisel.aisnet.org/
. (2010). Vive les differences?. European Journal of Information Systems, 16, 20-35. Retrieved from EJIS2007.pdf
. (2007). Visiting the red-light zones with Claudio. European Journal of Information Systems, 14, 477-479. Retrieved from ./ClaudioSpecialIssue/Whitley.pdf
. (2005). Virtual Teams and Multiple Media: Structuring Media Use to Attain Strategic Goals. Group Decision and Negotiation, 15(4), 299 - 321. presented at the 2006/07/01/. Retrieved from http://dx.doi.org/10.1007/s10726-006-9044-8
. (2006). On the Vicissitudes of Cyberspace as Potential-Space. Human Relations, 52(4), 485 - 506. presented at the 1999/04/24/. Retrieved from http://dx.doi.org/10.1023/A:1016961525238
. (1999). A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming. SCIENCE AND PUBLIC POLICY, 38, 332–333. presented at the May.
. (2011). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12. presented at the 12/2011. Retrieved from http://aisel.aisnet.org/jais/vol12/iss12/2/
. (2011). Using Social Network Analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122. presented at the Sep. doi:10.1016/j.jtrangeo.2011.09.005
. (2012). Using social network analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122.
. (2012). Using problem structuring methods to assist in information systems strategy development: A case study. Journal of Computing and Information Technology, 1, 273-284. Retrieved from ./JCITSpecialIssue/Whitley.pdf
. (1994).