Publications

Export 1120 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Young, M. - L., Kuo, F. - Y., & Myers, M. D.. (2012). To share or not to share: a critical research perspective on knowledge management systems. European Journal of Information Systems, 21, 496-511. doi:10.1057/ejis.2012.10
Elisberg, T., & Baskerville, R.. (2006). To Vanquish the Social Monster: The Struggle for Social Inclusion among Peers in the Field of Systems Development. Social Inclusion: Societal and Organizational Implications for Information Systems. doi:10.1007/0-387-34588-4_24
Avison, D., Golder, P. A., & Shah, H. U.. (1992). A Tool Kit for Soft Systems Methodology. The Impact of Computer Supported Technologies in Information Systems Development.
De Vries, W. T., & Miscione, G.. (2012). The tool that has to build itself: The case of Dutch geo-data. In (Vol. 7443 LNCS, pp. 137–148). presented at the Sep. doi:10.1007/978-3-642-33489-4_12
Jackson, P., & Klobas, J.. (2008). Tools and Capabilities for Becoming Virtual. Becoming Virtual. presented at the 2008///. Retrieved from http://dx.doi.org/10.1007/978-3-7908-1958-8_14
Sewchurran, K., & Brown, I.. (2011). Toward an Approach to Generate Forward-Looking Theories Using Systems Concepts. (M. Chiasson, Henfridsson, O., Karsten, H., & DeGross, J. I., Eds.)Researching the Future in Information Systems. Springer Berlin Heidelberg. doi:10.1007/978-3-642-21364-9_2
Markus, L. M. (2000). Toward an Integrated Theory of IT-related Risk Control. Organizational and Social Perspectives on IT.
Dwivedi, Y. K., Levine, L., Williams, M. D., Singh, M., Wastell, D. G., & Bunker, D.. (2010). Toward an Understanding of the Evolution of IFIP WG 8.6 Research. (J. Pries-Heje, Venable, J., Bunker, D., Russo, N. L., & DeGross, J. I., Eds.)Human Benefit through the Diffusion of Information Systems Design Science Research. Springer.
Tong, Y., Xu, L., & Pan, S. L.. (2008). Toward Understanding the Capability Cycle of Software Process Improvement: A Case Study of a Software Service Company. Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century. presented at the 2008. Retrieved from http://dx.doi.org/10.1007/978-0-387-09768-8_33
Costello, P., & Moreton, R.. (2009). Towards a Model of Technology Adoption: A Conceptual Model Proposition. Information Systems – Creativity and Innovation in Small and Medium-Sized Enterprises. Springer. doi:http://dx.doi.org/10.1007/978-3-642-02388-0_20
Vaidya, R., Myers, M. D., & Gardner, L.. (2011). Tracing ‘Reality’ in the Design – Reality Gap: A Stakeholder Practice Based Model for IS Implementation in Developing Countries. In 11th International Conference on Social Implications of Computers in Developing Countries (pp. 181-194). International Federation of Information Processing. Retrieved from http://www.ifipwg94.org/
Lings, B., & Lundell, B.. (2004). On Transferring a Method into a Usage Situation. Information Systems Research. presented at the 2004. Retrieved from http://dx.doi.org/10.1007/1-4020-8095-6_29
Vuokko, R., & Karsten, H.. (2008). Transforming Work Practices in a Complex Environment. Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century. presented at the 2008. Retrieved from http://dx.doi.org/10.1007/978-0-387-09768-8_10
Sawyer, S., & Southwick, R.. (1997). Transitioning to client/server: using a temporal framework to study organizational change. Proceedings of the IFIP TC8 WG 8.2 international conference on Information systems and qualitative research. Philadelphia, PA, USA: Chapman & Hall, Ltd.
Miscione, G., Ziolkowski, R., Zavolokina, L., & Schwabe, G.. (2018). Tribal Governance: The Business of Blockchain Authentication. In . presented at the Jan, Urban Centre for Computation and Data.
Miscione, G. (2018). Tribal governance, the necessity of strategizing-as-practice. In . presented at the Jul, Tallinn, Estonia.
Morawczynski, O., & Miscione, G.. (2010). Trustworthy mobile transactions: A longitudinal study of M-PESA in Kenya. In Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives (pp. 160–173). presented at the Dec. doi:10.4018/978-1-61520-901-9.ch010
Morawczynski, O., & Miscione, G.. (2010). Trustworthy mobile transactions: a longitudinal study on M-PESA in Kenya. Latusek, & Gerbasi (Eds.), Trust and Technology, 160–173.
Introna, L., & Whittaker, L.. (2004). Truth, Journals, and Politics: The Case of the MIS Quarterly. Information Systems Research. presented at the 2004. Retrieved from http://dx.doi.org/10.1007/1-4020-8095-6_7
Webb, B. (2004). Truth to Tell?. Information Systems Research. presented at the 2004. Retrieved from http://dx.doi.org/10.1007/1-4020-8095-6_47

Pages