Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning to listen: background conversations in enterprise system implementations., , , and . ECIS, (2011)Deriving business value from IT: converting IT expenditures into assets with desired impacts., and . ECIS, page 1186-1198. (2004)Conceptualising Information Systems Planning Across Strategic Business Networks., and . J. Glob. Inf. Manag., 9 (2): 23-33 (2001)An Inconvenient Truth: the invisibility of Women in ICT., , and . Australas. J. Inf. Syst., (2007)An empirical assessment of the business value derived from implementing mobile technology: a case study of two organisations., and . ECIS, page 1693-1705. (2004)Frameworks to Support E-Business Growth Strategy., , and . ECIS, page 1254-1263. (2001)Cognitive mapping for information requirements determination in the learning organization., , and . ECIS, page 759-770. Nijenrode University Press, (1994)Strategic IT Planning, Evaluation and Benefits Management: the basis for effective IT governance., and . Australas. J. Inf. Syst., (2004)Business Value Creation from IT Investments: towards a process theory of IT governance., , and . Australas. J. Inf. Syst., (2005)The Role of Knowledge Management Governance in the Implementation of Strategy., , and . HICSS, IEEE Computer Society, (2006)