Author of the publication

Dangerous liaisons? Component-based development and organizational subcultures.

, , , and . IEEE Trans. Engineering Management, 50 (1): 89-99 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaboration Between Academics and Practitioners Using Action Research., , , , and . Realigning Research and Practice in Information Systems Development, volume 194 of IFIP Conference Proceedings, page 467-470. Kluwer, (2001)Editorial., and . J. Strateg. Inf. Syst., 24 (4): 217-218 (2015)Information systems strategy as practice: Micro strategy and strategizing for IS., , and . J. Strateg. Inf. Syst., 23 (1): 1-10 (2014)The importance of rhetoric in conceptualising IS adoption., and . J. Enterp. Inf. Manag., 24 (3): 219-223 (2011)Creating value from a commodity process: a case study of a call center., , , and . J. Enterp. Inf. Manag., 20 (4): 396-413 (2007)What Every Business Student Needs to Know About Information Systems., , , , , , , , , and 29 other author(s). Commun. Assoc. Inf. Syst., (2002)Technology-Use Mediation Revisited: A Symbolic Process Perspective., , , and . ECIS, page 39. (2013)More than providing 'solutions': towards an understanding of customer-oriented citizenship behaviours of IS professionals., , and . Inf. Syst. J., 25 (5): 489-530 (2015)Deriving Value from a Commodity Process: a Case Study of the Strategic Planning and Management of a Call Center., , , and . ECIS, page 503-512. (2005)Aligning Practices in a Pluralistic Healthcare Context using a Performance Improvement System., , , , and . ICIS, Association for Information Systems, (2018)