Publications
Narrating the stories of leaked data: The changing role of journalists after Wikileaks and Snowden. Discourse, Context and Media, 19, 13–21. presented at the Oct. doi:10.1016/j.dcm.2017.02.002
. (2017). Negotiating "Best Practices" in Package Software Implementation. Information & Organization, 18, 1-28.
. (2008). A note on the effect of term weighting on selecting intrinsic dimensionality of data. Cybernetics and Information Technologies, 9, 5-12.
. (2009). Object lessons and invisible technologies. Journal of information technology, 21, 176-184. Retrieved from JIT2006.pdf
. (2006). Open Access Publishing to Nurture the Sprouts of Knowledge and the Future of Information Systems Research. Communications of the Association for Information Systems, 24(30), 509-522. Retrieved from http://aisel.aisnet.org/cais/vol24/iss1/30/
. (2009). . (2012).
. (2006).
Our moral condition in cyberspace. Ethics and Information Technology, 2(3), 147 - 152. presented at the 2000/09/01/. Retrieved from http://dx.doi.org/10.1023/A:1010049320893
. (2000). Overflows of Technological Innovation in Emerging Economies: The Case of M-Pesa. Available at SSRN 2617305.
. (2013). Participation in ICT-Enabled Meetings. Journal of Organizational and End User Computing, 23. doi:10.4018/joeuc.2011040102
. (2011). Perceived discontinuities and constructed continuities in virtual work. Information Systems Journal, 22, 29-52. presented at the 01/2012. doi:10.1111/j.1365-2575.2011.00371.x
. (2012). On the Performance of Latent Semantic Indexing based Information Retrieval. Journal of Computing and Information Technology, 17, 259-264. doi:http://10.2498/cit.1001268
. (2009). Phone call elasticity of city travel in Ahmedabad. Travel Behaviour and Society, 2, 15–25. presented at the Jan. doi:10.1016/j.tbs.2014.07.001
. (2015). Policy discourse and data retention: The technology politics of surveillance in the United Kingdom. Telecommunications Policy, 29, 857-874. Retrieved from TP2005.pdf
. (2005). . (2015).
Putting the Theory back into Grounded Theory: Guidelines for Grounded Theory Studies in Information Systems. Information Systems Journal, 20, 357-381.
. (2010). The qualitative interview in IS research: Examining the craft. Information and Organization, 17, 2-26.
. (2007). Qualitative Research in Information Systems. MIS Quarterly, 21, 241-242. Retrieved from www.qual.auckland.ac.nz
. (1997). The ranking of top IS journals: The perspective from the London School of Economics. European Journal of Information Systems, 17, 163-168. Retrieved from EJIS2008.pdf
. (2008). Reflections on the academic policy analysis process and the UK Identity Cards Scheme. The information society, 23, 51-58. Retrieved from TIS2007.pdf
. (2007). Regulating Architecture and Architectures of Regulation: Contributions from Information Systems. International Review of Computing Law and Technology, 17, 85-97. Retrieved from IRCLT2003.pdf
. (2003). The regulation of electronic commerce: learning from the UK's RIP act. Journal of Strategic Information Systems, 11, 31-58. Retrieved from JSIS2002.pdf
. (2002). . (2010).
. (2010).