Publications
The Spring model for knowledge based systems analysis: A case study. Data Base, 23, 1-5. Retrieved from Database1992.pdf
. (1992). Stages of virtually: Instructor and student. TechTrends, 43(3), 23 - 26. presented at the 1998/04/30/. Retrieved from http://dx.doi.org/10.1007/BF02824051
. (1998). Stakeholder identification in inter-organizational systems: Gaining insights for drug use management systems. European journal of information systems, 6, 1-14. Retrieved from EJIS1997.pdf
. (1997). Studying the translations of NHSnet. Journal of End User Computing, 13, 30-40. Retrieved from JEUC2001.pdf
. (2001). Sustainability of Open Collaborative Communities: Analyzing Recruitment Efficiency. Technology Innovation Management Review, 20–26. presented at the 01/2013. Retrieved from http://timreview.ca/article/646
. (2013). The Technology Environment: Subjectivity, Language, and Machine. International Journal of Technology and Design Education, 15(2), 99 - 110. presented at the 2005/01/01/. Retrieved from http://dx.doi.org/10.1007/s10798-005-8278-0
. (2005). Telemedicine in the Upper Amazon: Interplay with local health care practices. MIS quarterly, 403–425.
. (2007). Telemedicine in the upper Amazon: Interplay with local health care practices. MIS Quarterly: Management Information Systems, 31, 403–425. presented at the Jan. doi:10.2307/25148797
. (2007). . (2013).
The time-image and Deleuze's transcendental experience. Continental Philosophy Review, 35(3), 325 - 345. presented at the 2002/07/01/. Retrieved from http://dx.doi.org/10.1023/A:1022687422795
. (2002). To share or not to share: a critical research perspective on knowledge management systems. European Journal of Information Systems, 21, 496-511. doi:10.1057/ejis.2012.10
. (2012). Towards an Understanding of FLOSS: Infrastructures, Materiality and the Digital Business Ecosystem. Science Studies, 20, 13-33. Retrieved from SciStudies2007.pdf
. (2007). Tribal Governance: The Business of Blockchain Authentication. SSRN Electronic Journal. doi:10.24251/HICSS.2018.566
. (2017). Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya. Latusek, & Gerbasi (Eds.), Trust and Technology, 160–173.
. (2010). Trying To Improve Communication And Collaboration With Information Technology: An Action Research Project Which Failed. Information Technology & People, 12, 317-332.
. (1999). Two approaches to developing expert systems: A consideration of formal and semi-formal domains. AI & Society, 5, 110-127. Retrieved from AISociety1991.pdf
. (1991). Understanding participation in entrepreneurial organisations: Some hermeneutic readings. Journal of information technology, 14, 193-202. Retrieved from JIT1999.pdf
. (1999). The Use of Quality Function Deployment in Systems Development: A Case Study. Journal of International Information Management, 4, 63-75.
. (1995). Using natural language processing for qualitative data analysis. International Journal of Social Research Methodology, 15. presented at the 2012. doi:10.1080/13645579.2011.625764
. (2012). Using problem structuring methods to assist in information systems strategy development: A case study. Journal of Computing and Information Technology, 1, 273-284. Retrieved from ./JCITSpecialIssue/Whitley.pdf
. (1994). Using social network analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122.
. (2012). Using Social Network Analysis to profile people based on their e-communication and travel balance. Journal of Transport Geography, 24, 111–122. presented at the Sep. doi:10.1016/j.jtrangeo.2011.09.005
. (2012). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12. presented at the 12/2011. Retrieved from http://aisel.aisnet.org/jais/vol12/iss12/2/
. (2011). A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming. SCIENCE AND PUBLIC POLICY, 38, 332–333. presented at the May.
. (2011).