Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WiMAX for development., and . Inf. Technol. Dev., 16 (4): 320-328 (2010)Working with activity theory: Context, technology, and information behavior., , and . J. Assoc. Inf. Sci. Technol., 62 (4): 776-788 (2011)Practice, information and the development of a digital platform., , and . ASIST, volume 56 of Proc. Assoc. Inf. Sci. Technol., page 597-598. Wiley, (2019)IS strategy formulation in higher education institutions.. ECIS, page 1045-1052. (1995)Deployment and Use of Mobile Information Systems - A case study of police work., and . MOBIS, volume 191 of IFIP, page 203-228. Springer, (2005)Trust, Power and Inter-Organisational Information Systems: the Case of the Electronic Trading Community Translease., , and . ECIS, page 834-849. Copenhagen Business School, (1999)Beyond Paradigm Closure in Information Systems Research: Theoretical Possibilities for Pluralism., and . ECIS, page 737-759. Cork Publishing Ltd, (1997)Personalised Support for Reflective Learning in Fire Risk Assessment., , and . AIED, volume 200 of Frontiers in Artificial Intelligence and Applications, page 765-766. IOS Press, (2009)Enterprise Resource Planning Implementation: Stories of Power, Politics, and Resistance., and . Realigning Research and Practice in Information Systems Development, volume 194 of IFIP Conference Proceedings, page 149-162. Kluwer, (2001)Cross-Cultural Motivations for Information Sharing in Incident Management at Major Events., , , and . AHFE (19), volume 970 of Advances in Intelligent Systems and Computing, page 649-661. Springer, (2019)