Author of the publication

Twenty Years of Applying Grounded Theory in Information Systems: A Coding Method, Useful Theory Generation Method, or an Orthodox Positivist Method of Data Analysis ?

, , , , and . Relevant Theory and Informed Practice, volume 143 of IFIP, page 649-650. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reflections on the use of grounded theory in interpretive information systems research., and . ECIS, page 833-845. (2003)Twenty Years of Applying Grounded Theory in Information Systems: A Coding Method, Useful Theory Generation Method, or an Orthodox Positivist Method of Data Analysis ?, , , , and . Relevant Theory and Informed Practice, volume 143 of IFIP, page 649-650. Springer, (2004)IEEE Standard for Encrypted Storage.. Computer, 37 (11): 110-112 (2004)Ethically Situated Information Systems Development., , , and . Aust. Comput. J., 31 (3): 66-71 (1999)A pseudo top-hat mathematical morphological approach to edge detection in dark regions., , , and . Pattern Recognit., 35 (1): 199-210 (2002)Systems development as a research act., and . JIT, 14 (1): 83-94 (1999)Effective elicitation and dissemination of situated knowledge: exploration of an agent based approach., , and . SMC, page 1740-1747. IEEE, (2001)Understanding IS evaluation as a complex social process: a case study of a UK local authority., and . Eur. J. Inf. Syst., 10 (4): 189-203 (2001)Creativity and Problem-Solving: Closing The Skills Gap., , and . J. Comput. Inf. Syst., 57 (1): 39-48 (2017)A Host Interface Architecture for High-Speed Networks., , , , , , and . HPN, volume C-14 of IFIP Transactions, page 31-46. North-Holland, (1992)