Publications
In cyberspace all they see is your words: a review of the relationship between body, behaviour and identity drawn from the sociology of knowledge. OCLC Systems and services, 13, 152-163. Retrieved from ITP1997Identity.pdf
. (1997). Object lessons and invisible technologies. In , Bricolage, Care and Information Systems (p. Forthcoming). Basingstoke: Palgrave.
. (2009). Studying the translations of NHSnet. Journal of End User Computing, 13, 30-40. Retrieved from JEUC2001.pdf
. (2001). Policy Engagement as Rigourous and Relevant Information Systems Research: The Case of the LSE Identity Project. ( )Proceedings of the Fifteenth European Conference on Information Systems. St. Gallen: University of St. Gallen. Retrieved from ECIS2007.pdf
. (2007). Sociology of information systems: External programme study guide. London: University of London.
. (2004). Special issue of papers from the First European Conference on Information Systems. Computing and information technology, 1. Retrieved from ./JCITSpecialIssue
. (1994). Creating and maintaining obligations with emerging technologies: An empirical study of mediated and face-to-face communication. Journal of computing and information technology, 6, 343-353. Retrieved from JCIT1998.pdf
. (1998). Using problem structuring methods to assist in information systems strategy development: A case study. ( )1st European Conference on Information Systems. Henley-on-Thames: Operational Research Society. Retrieved from ECIS1993.pdf
. (1993). Studying the involved computer user: A phenomenological approach. ( )Proceeding of the Americas Conference on Information Systems. presented at the August 15-17, Indianapolis, Indiana. Retrieved from AMCIS1997.pdf
. (1997). Software Engineering: External programme study guide. London: University of London.
. (1993). Understanding participation in entrepreneurial organisations: Some hermeneutic readings. Journal of information technology, 14, 193-202. Retrieved from JIT1999.pdf
. (1999). Dotcompetition: Surviving in e-business. LSE Magazine, 12, 12-13. presented at the Winter. Retrieved from LSE2000.pdf
. (2000). Perceptions of government technology, surveillance and privacy: the UK identity cards scheme. In , New Directions in Privacy and Surveillance (pp. 133-156). Cullompton: Willan. Retrieved from Willan2009.pdf
. (2009). An expert system to assist in filing Income Tax returns: The case of Indian Income Tax. Proceedings of the Fifth International Expert Systems Conference. London: Learned Information. Retrieved from IESC1989.pdf
. (1989). . (1999).
An anti–essentialist reading of intranet development: What is the role of technology?. ( )UKAIS. York: McGraw-Hill. Retrieved from UKAIS1999.pdf
. (1999). An alternative perspective on citation classics: Evidence from the first ten years of the European Conference on Information Systems. Information and Management, 44, 441-455. Retrieved from iandm2007.pdf
. (2007). Reflections on the academic policy analysis process and the UK Identity Cards Scheme. The information society, 23, 51-58. Retrieved from TIS2007.pdf
. (2007). Object lessons and invisible technologies. Journal of information technology, 21, 176-184. Retrieved from JIT2006.pdf
. (2006). Creating and maintaining obligations: An empirical study of mediated and face–to–face communication. ( )5th European conference on information systems. Cork: Cork Publishing Ltd. Retrieved from ECIS1997.pdf
. (1997). Panel: Becoming involved with conferences: Lessons from ECIS. ( )Proceedings of the Thirteenth European Conference on Information Systems. Regensburg, Germany. Retrieved from ECIS2005.pdf
. (2005). Book review of "Aramis or the love of technology" by Bruno Latour. Information technology and people. Retrieved from ITP1999a.pdf
. (1999). Information Systems: Social Technology in Social Systems. ( )2nd European Conference on Information Systems. Nijenrode University, The Netherlands: Nijenrode University Press. Retrieved from ECIS1994.pdf-
. (1994).