Richard L. L. Baskerville
#118,703
Most Influential Person Now
Richard L. L. Baskerville's AcademicInfluence.com Rankings
Download Badge
Communications
Why Is Richard L. L. Baskerville Influential?
(Suggest an Edit or Addition)Richard L. L. Baskerville's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Generalizing Generalizability in Information Systems Research (2003) (1605)
- A critical perspective on action research as a method for information systems research (1996) (1447)
- Investigating Information Systems with Action Research (1999) (1316)
- Special Issue on Action Research in Information Systems: Making is Research Relevant to Practice (2004) (855)
- FEDS: a Framework for Evaluation in Design Science Research (2016) (655)
- Future directions for behavioral information security research (2013) (611)
- Growing systems in emergent organizations (1999) (509)
- A Comprehensive Framework for Evaluation in Design Science Research (2012) (486)
- Grounded action research: a method for understanding IT in practice (1999) (403)
- Strategies for Design Science Research Evaluation (2008) (403)
- The theoretical foundations of knowledge management (2006) (374)
- Controlling action research projects (2001) (366)
- Amethodical systems development: the deferred meaning of systems development methods (2000) (362)
- Agile requirements engineering practices and challenges: an empirical study (2007) (345)
- Information Systems as a Reference Discipline (2002) (345)
- INFORMATION SYSTEMS DEVELOPMENT (2006) (337)
- Fashion Waves in Information Systems Research and Practice (2009) (258)
- The Design Theory Nexus (2008) (254)
- Explanatory Design Theory (2010) (250)
- Design Science Research Contributions: Finding a Balance between Artifact and Theory (2018) (243)
- Efficacy of self-monitored blood pressure, with or without telemonitoring, for titration of antihypertensive medication (TASMINH4): an unmasked randomised controlled trial (2018) (242)
- Soft design science methodology (2009) (240)
- Information design (2011) (227)
- An information security meta‐policy for emergent organizations (2002) (206)
- What design science is not (2008) (206)
- Distinguishing action research from participative case studies (1997) (193)
- Going back to basics in design science: from the information technology artifact to the information systems artifact (2015) (166)
- Short cycle time systems development (2004) (159)
- Incident-centered information security: Managing a strategic balance between prevention and response (2014) (155)
- Is Internet-Speed Software Development Different? (2003) (151)
- Controlling Prototype Development Through Risk Analysis (1996) (146)
- Enterprise resource planning and organizational knowledge: patterns of convergence and divergence (2000) (145)
- Organizational and Social Perspectives on Information Technology (2013) (143)
- Systems Without Method: The Impact of New Technologies on Information Systems Development Projects (1992) (138)
- Genres of Inquiry in Design-Science Research: Justification and Evaluation of Knowledge Production (2015) (133)
- Why the old world cannot publish? Overcoming challenges in publishing high-impact IS research (2007) (127)
- Extensible Architectures: The Strategic Value of Service-Oriented Architecture in Banking (2005) (119)
- Design ethnography in information systems (2015) (110)
- Designing information systems security (1988) (106)
- Theorizing in Design Science Research (2011) (105)
- How Internet software companies negotiate quality (2001) (105)
- Individual information systems as a research arena (2011) (105)
- A longitudinal study of information system threat categories: the enduring problem of human error (2005) (104)
- The Graf stabilisation system: early results in 50 patients (2004) (100)
- A response to the design-oriented information systems research memorandum (2011) (98)
- What Every Business Student Needs to Know About Information Systems (2002) (95)
- Post-agility: What follows a decade of agility? (2011) (90)
- Integrating Security into Agile Development Methods (2005) (89)
- Racing the E-Bomb: How the Internet Is Redefining Information Systems Development Methodology (2001) (86)
- Soft Design Science Research: Extending the Boundaries of Evaluation in Design Science Research (2007) (85)
- A multiple‐theory analysis of a diffusion of information technology case (2001) (84)
- Managing culture creep: Toward a strategic model of user IT culture (2010) (83)
- Aligning Software Processes with Strategy (2006) (80)
- Internet Software Engineering: A Different Class of Processes (2002) (78)
- Activating and Perpetuating Virtual Teams: Now That We're Mobile, Where Do We Go? (2007) (76)
- Durability of online teamworking: patterns of trust (2006) (73)
- Conceptualizing Generalizability: New Contributions and a Reply (2012) (71)
- A Design Theory for Secure Information Systems Design Methods (2006) (71)
- A multiple-theory analysis of a diffusion of information technology case (2001) (65)
- Power and Practice in Information Systems Security Research (2008) (65)
- Growing systems in an emergent organization (2001) (64)
- Distinctions Among Different Types of Generalizing in Information Systems Research (1999) (61)
- Risk analysis as a source of professional knowledge (1991) (57)
- Knowledge capability and maturity in software management (1999) (57)
- Confronting the assumptions underlying the management of knowledge: an agenda for understanding and investigating knowledge management (2000) (57)
- Eating Our Own Cooking: Toward a More Rigorous Design Science of Research Methods (2012) (57)
- Deep structure or emergence theory: contrasting theoretical foundations for information systems development (1998) (54)
- Business Agility and Information Technology Diffusion - IFIP TC8 WG 8.6 International Working Conference May 8-11, 2005, Atlanta, Georgia, USA (2005) (53)
- Conducting action research: high risk and high reward in theory and practice (2001) (52)
- Information Security: Policy, Processes, and Practices (2008) (52)
- Digital First: The Ontological Reversal and New Challenges for Information Systems Research (2020) (52)
- Accommodating Emergent Work Pratices: Ethnographic Choice of Method Fragments (2001) (50)
- Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information (2017) (43)
- The strategic value of SOA: a comparative case study in the banking sector (2010) (42)
- Conflicts between privacy and property: The discourse in personal and organizational knowledge (2007) (42)
- Design Theorizing Individual Information Systems (2011) (42)
- A New Paradigm for Adding Security Into IS Development Methods (2001) (40)
- How integration of cyber security management and incident response enables organizational learning (2020) (40)
- Strategy models for enabling offshore outsourcing: Russian short-cycle-time software development (2005) (38)
- Deferring Generalizability: Four Classes of Generalization in Social Enquir (1996) (38)
- The Ethics of Knowledge Transfers and Conversions: Property or Privacy Rights? (2006) (35)
- A model of emotion and computer abuse (2016) (35)
- Perceptions of risks for diabetes‐related complications in Type 2 diabetes populations: a systematic review (2016) (35)
- Going Back to Basics in Design: From the IT Artifact to the IS Artifact (2013) (33)
- The inflation of academic intellectual capital: the case for design science research in Europe (2011) (33)
- Digital First: The Ontological Reversal and New Challenges for IS Research (2019) (30)
- Information technology diffusion: building positive barriers (1998) (29)
- The High Speed Balancing Game: How Software Companies Cope with Internet Speed (2004) (29)
- Integration of Information Systems and Cybersecurity Countermeasures: An Exposure to Risk Perspective (2018) (29)
- An empirical comparison of a hypertext-based systems analysis case with conventional cases and role playing (1996) (29)
- Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example (2018) (28)
- Information Warfare: A Comparative Framework for Business Information Security (2005) (27)
- A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection (2003) (26)
- Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises - IFIP WG 8.2 International Conference, CreativeSME 2009, Guimarães, Portugal, June 21-24, 2009. Proceedings (2009) (25)
- Evaluation Risks in Design Science Research: A Framework (2008) (24)
- Design Theory Projectability (2014) (24)
- A process model for identifying online customer engagement patterns on Facebook brand pages (2018) (24)
- Semantic database prototypes (1993) (24)
- An emote opportunity model of computer abuse (2014) (23)
- High-Speed Software Development Practices: What Works, What Doesn't (2006) (23)
- Diversity in Modeling Diffusion of Information Technology (2003) (23)
- Artful planning (2006) (23)
- Information Systems Development at Internet Speed : A New Paradigm In The Making! (2002) (23)
- Balancing Quality and Agility in Internet Speed Software Development (2002) (23)
- Action Research For Information Systems (1999) (21)
- Choosing a Design Science Research Methodology (2017) (21)
- How can organizations develop situation awareness for incident response: A case study of management practice (2021) (21)
- Agility in Fours: IT Diffusion, IT Infrastructures, IT Development, and Business (2005) (21)
- Socially self-destructing Systems (2004) (20)
- IS action research: can we serve two masters? (panel session) (1999) (20)
- Judging Qualitative Research in Information Systems: Criteria for Accepting and Rejecting Manuscripts (1995) (20)
- Commentary on Gill and Bhattacherjee: is there an informing crisis? (2009) (19)
- Aesthetics in design science research (2018) (19)
- The Structure of Power in Action Research Projects (2007) (19)
- Projectability in Design Science Research (2019) (18)
- Cybersecurity Incident Response in Organizations: An Exploratory Case Study and Process Model of Situation Awareness (2021) (18)
- The Second-Order Security Dilemma (1996) (18)
- Framing the Information Security Process in Modern Society (2008) (18)
- The enduring contradictions of new software development approaches: a response to ‘Persistent Problems and Practices in ISD’ (2007) (18)
- Transforming Organizations with Information Technology, Proceedings of the IFIP WG8.2 Working Conference on Innformation Technology and New Emergent Forms of Organizations, Ann Arbor, Michigan, USA, 11-13 August 1994 (1994) (16)
- A–Z of nutritional supplements: dietary supplements, sports nutrition foods and ergogenic aids for health and performance–Part 34 (2012) (16)
- Reviving the IT in the IS (2012) (16)
- Information Systems Security Strategy: A Process View (2008) (15)
- Risk attitudes of people with 'manageable' chronic disease: An analysis under prospect theory. (2018) (15)
- A Workshop on Two Techniques for Qualitative Data Analysis: Action Research and Ethnography (1992) (15)
- The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity (2015) (15)
- Using semiotics to analyze representational complexity in social media (2019) (15)
- The translation and adaptation of agile methods: a discourse of fragmentation and articulation (2017) (14)
- Discovery Colloquium: Quality Software Development Internet Speed (2002) (14)
- Trusting Online: Nurturing Trust in Virtual Teams (2001) (14)
- Structural artifacts in method engineering: the security imperative (1996) (14)
- Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online (2020) (14)
- Agile Security For Information Warfare: A Call For Research (2004) (14)
- Perspectives on Information Technology and New Emergent Forms of Organizations (1994) (13)
- For better or worse: how we apply journal ranking lists (2008) (13)
- Third-degree conflicts: information warfare (2010) (13)
- The EJIS editorial organisation and submissions (2009) (13)
- Intravenous iron and chronic obstructive pulmonary disease: a randomised controlled trial (2020) (13)
- A Risk Management Framework for Design Science Research (2011) (12)
- Knowledge Lost and Found: A Commentary on Allen Lee's ‘Retrospect and Prospect’ (2010) (12)
- Preparing for evidence-based management (2009) (12)
- IT diffusion and innovation models: the conceptual domains (1997) (12)
- Strategic Information Security Risk Management (2008) (12)
- Cervical radiculopathy and cervical myelopathy: diagnosis and management in primary care. (2018) (12)
- A taxonomy for analyzing hazards to information systems (1996) (11)
- Panel 8 IS Action Research: Can We Serve Two Masters? (1999) (11)
- The LEO principle: perspectives on 50 years of business computing (2003) (11)
- Unpacking the Duality of Design Science (2011) (11)
- Managing Knowledge Capability And Maturity (1999) (11)
- Designing Organizational Systems (2013) (11)
- Total Information Systems Management (1995) (10)
- Grounding the theory in action research (1995) (10)
- Management Design Theories (2010) (10)
- Changing the challenge: measure what makes you better and be better at what you measure (2008) (10)
- Socio-Technical Change: The Equilibrium Paradox (2018) (10)
- Diffusion and Innovation Theory: Past, Present, and Future Contributions to Academia and Practice (2014) (10)
- A Taxonomy of Classification Approaches in IS Research (2017) (10)
- Extending Security in Agile Software Development Methods (2008) (10)
- Design and Management (2010) (10)
- Bounded Creativity in Design Science Research (2016) (10)
- Hacker Wars: E-Collaboration by Vandals and Warriors (2006) (10)
- Nudging people with Type 2 diabetes towards better self‐management through personalized risk communication: A pilot randomized controlled trial in primary care (2018) (9)
- Requirements Uncertainty in Contract Software Development Projects (2013) (9)
- From Exotic to Mainstream: A 10-year Odyssey from Internet Speed to Boundary Spanning with Scrum (2010) (9)
- The Level Paradox of E-Collaboration: Dangers and Solutions (2011) (9)
- Discovering the significance of Scientific Design Practice: New-Science Wrapped in Old-Science? (2016) (9)
- Science of Business & Information Systems Engineering (2010) (9)
- Educing Theory from Practice (2007) (9)
- Functionality vs. Security in IS: Tradeoff or Equilibrium? (2012) (8)
- Never, Never Together Again: How Postpurchase Affect Drives Consumer Outcomes Within the Context of Online Consumer Support Communities (2019) (8)
- Project Management Strategies for Prototyping Breakdowns (2009) (8)
- Individual - Organizational Bindpoints: A Design Theory for Bring-Your-Own-System (2013) (8)
- Principles for Re-Designing Information Systems for Environmental Sustainability (2016) (8)
- Revising the Socio-Technical Perspective for the 21st Century: New Mechanisms at Work (2020) (8)
- The impact of legislation on the internal audit function (2017) (8)
- RMF4DSR: A Risk Management Framework for Design Science Research (2014) (8)
- The Contributions of Alessandro D'Atri to Organization and Information Systems Studies (2013) (7)
- The Discourse of a Large Scale Organizational Transformation: The Reengineering of IBM, 1989-1994 (2002) (7)
- The Debate in Structural Linguistics: how it may impact the information systems field (1997) (7)
- Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems (2009) (6)
- Pre-Theory Design Frameworks and Design Theorizing (2016) (6)
- Panel—the impact of action research on information systems (1997) (6)
- An eduction model of disciplinary emergence: the ripples of knowledge management (2015) (6)
- Russian High-Speed Software Development: Overcoming the Challenges of Globalization (2003) (6)
- An Editor's Values (2004) (6)
- Establishing Reliability in Design Science Research (2017) (6)
- Design Logic and the Ambiguity Operator (2010) (5)
- Organizational Security Learning from Incident Response (2017) (5)
- Controlling Prototype Development Through Risk Management (1996) (5)
- Information Security: Adapting to Survive (1993) (5)
- Chaos, mitochondria and type 2 diabetes; does type 2 diabetes arise from a metabolic dysrhythmia? (2019) (5)
- Distrusting Online: Social Deviance in Virtual Teamwork (2006) (5)
- The Creativity Passdown Effect: Sharing Design Thinking Processes with Design Theory (2012) (5)
- Eating Our Own Cooking: Toward a Design Science of Research Methods (2012) (5)
- Making better choices: a response to Walsham (2012) (5)
- Inducing Creativity in Design Science Research (2019) (5)
- The Emergence of Design Science Research from Decision Theory (2018) (4)
- Designing Organizational Systems: An Interdisciplinary Discourse (2012) (4)
- Setting Our Research Agendas: Institutional Ecology, Informing Sciences, or Management Fashion Theory? (2011) (4)
- Panel: IT employment and shifting enrolment patterns in information systems (2005) (4)
- The Survivability Principle: IT Enabled Dispersal of Organizational Capital (2006) (4)
- Educing Theory from Practice: Developing Significant Theory from Action Research (2005) (4)
- Finding a Balance between Artifact and Theory (2018) (4)
- Proceedings of the IFIP WG8.2 Working Conference on Information Technology and New Emergent Forms of Organizations: Transforming Organizations with Information Technology (1994) (4)
- Diffusing Best Practices: A Design Science Study Using the Theory of Planned Behavior (2014) (4)
- Tendinopathy in type 2 diabetes: a condition between specialties? (2018) (4)
- A–Z of nutritional supplements: dietary supplements, sports nutrition foods and ergogenic aids for health and performance: Part 42 (2013) (4)
- A design theory for managing software process improvement (2009) (4)
- Shaping the IT Organization — The Impact of Outsourcing and the New Business Model (2003) (4)
- Possibility Theory in Protecting National Information Infrastructure (2005) (4)
- Designing Artifacts for Systems of Information (2014) (4)
- Erratum to Agile requirements engineering practices and challenges: An empirical study [Information Systems Journal 20 (2010) 449-480] (2015) (3)
- Panel: Cricket or Baseball? (2008) (3)
- New organizational forms for information security management (1997) (3)
- Moderating a discourse on the moderating effects in the study of top management support (2011) (3)
- The creativity passdown effect: applying design theory in creating instance design (2015) (3)
- Strategies, systems, and technologies (2008) (3)
- Advances in Information Systems Development: From Discipline and Predictability to Agility and Improvisation (2008) (3)
- Discursive Co-development of Agile Systems and Agile Methods (2013) (3)
- Discourses on the Interaction of Information Systems, Organizations, and Society: Reformation and Transformation (2000) (3)
- Information Systems -- Creativity and Innovation in Small and Medium-Sized Enterprises: IFIP WG 8.2 International Conference, CreativeSME 2009, Guimaraes, ... in Information and Communication Technology (2009) (3)
- Moderating Effects of Requirements Uncertainty on Flexible Software Development Techniques (2010) (2)
- CONCEPTUALIZING GENERALIZABILITY: NEW CONTRIBUTIONS AND A REPLY 1 (2012) (2)
- Design Science Research: A Hands-on Tutorial (2017) (2)
- Encyclopedia of Human-Computer Interaction (2004) (2)
- To Vanquish the Social Monster: The Struggle for Social Inclusion among Peers in the Field of Systems Development (2006) (2)
- Day case adenoidectomy: is it acceptable to parents? (1997) (2)
- Hacker Wars: Cyber Warfare Previews (2008) (2)
- Promising Future Research in Infosec (2008) (2)
- Designing Scientific Creativity (2014) (2)
- The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment (2013) (2)
- Information Security: Going Digital (Invited Lecture) (2018) (2)
- Developing the Prototype Approach in Rapid Systems Modelling (1991) (2)
- The Enterprise as the Experiential Design Platform (2013) (2)
- The Impact of Regulation on the Internal Audit Function (2013) (1)
- Research quality, project failure, and privacy threats: spitting, yelling, and cussing (2008) (1)
- The Uses and Abuses of Evaluative Criteria for Qualitative Research Methods (1999) (1)
- Clinical research from information systems practice (2023) (1)
- Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises (2005) (1)
- organization to change from stable to emergent, new practices for IT support are required. (1999) (1)
- Explaining sociotechnical change: an unstable equilibrium perspective (2022) (1)
- Privacy and Identity Theft Recovery Planning: An Onion Skin Model (2016) (1)
- Information Security and Privacy - Challenges and Outlook (2021) (1)
- Achieving Resilience through Agility (2021) (1)
- Computational Science: A Field of Inquiry for Design Science Research (2022) (1)
- Situation-Awareness in Incident Response: An In-depth Case Study and Process Model (2020) (1)
- Calprotectin as a marker in pharyngeal mucosa and serum, in relation to training in athletes, illness symptoms and cytokines (2012) (1)
- Physical Activity Behaviours in the Workplace and Home in a University College Population (2019) (1)
- Panel: Information systems security standards: The solution or the problem? (2005) (1)
- The impact of implicit bias on business-to-business marketing (2020) (1)
- Vengeance is Mine: A Model of Emotional Appraisal and Computer Abuse (2012) (1)
- Digital Organizational Resilience: A History of Denmark as a Most Digitalized Country (2021) (1)
- A Novel Approach to Collectively Determine Cybersecurity Performance Benchmark Data (2020) (1)
- The Digital Science Field of Design Science Research (2021) (1)
- UNPACKING THE DUALITY OF DESIGN SCIENCE Completed Research Paper (2011) (1)
- Projecting the Future for Design Science Research: An Action-Case Based Analysis (2015) (1)
- Introduction to the Minitrack on Advances in Design Science Research (2018) (1)
- Possibility-based ERM (2012) (1)
- A Framework for Evaluating the Tension between Sharing and Protecting Health Information (2017) (1)
- Discursive Co-Development (2013) (1)
- Interim report on the senior scholars Journal Basket review senior scholar's forum (2016) (1)
- Erklärende Designtheorie (2010) (0)
- Erratum (2015) (0)
- Illness, body mass index and leptin (2008) (0)
- Chapter XI Hacker Wars : Cyber Warfare Previews (2018) (0)
- Security of decision support systems (1989) (0)
- P-20 Biochemical and psychological markers of fatigue and immunodepression in exercise(Free communication (Poster),8^ INTERNATIONAL SOCIETY OF EXERCISE AND IMMUNOLOGY SYMPOSIUM,ISEI2007 INFLAMMATION IN EXERCISE FRIEND OR FOE?) (2009) (0)
- Building Reputation in Emerging Markets through Corporate Social Responsibility (2021) (0)
- Identifying Authorship from Linguistic Text Patterns (2019) (0)
- The Case for Two-Factor Authentication- Evidence from a Systematic Literature Review (2019) (0)
- An Identity Driven Escalation of Commitment to Negative Spillovers (2017) (0)
- The Conceptual Domains of Innovation Models (1998) (0)
- Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online (2018) (0)
- Generative Control Theory for Information Security (2014) (0)
- Collaboration Between Academics and Practitioners Using Action Research (2001) (0)
- Improving IS Practical Significance through Effect Size Measures (2021) (0)
- Artificial Intelligence and Digital Work: The Sociotechnical Reversal (2023) (0)
- Panel: Grand Challenges for Information Systems Research (2006) (0)
- Introduction to the Advances in Design Research for Information Systems Minitrack (2016) (0)
- 4 RACING THE E-BOMB : HOW THE INTERNET IS REDEFINING INFORMATION SYSTEMS DEVELOPMENT METHODOLOGY Abstract (2013) (0)
- The Travel of Privacy Standards and Regulations in Healthcare (2021) (0)
- Examining the Past to Learn about the Future: Applying Secondary Data for the Qualitative Study of Internal Computer Abuse (ICA) (2016) (0)
- Erratum to: Organizational and Social Perspectives on Information Technology (2017) (0)
- User Self-Destruction: Theorizing Behavioral Transitions from Cognitive Absorption to Cognitive Discharge (2019) (0)
- Critically Appraised Topic (CAT): Building a Library of Validated Practices. (2019) (0)
- Explaining online conspiracy theory radicalization: A second‐order affordance for identity‐driven escalation (2023) (0)
- Designing Sustainable Information Systems (2018) (0)
- Russian High-Speed Software Development (2003) (0)
- Panel: Publishing high impact IS research in top journals: Tips and traps (2006) (0)
- From Self-Discovery to Learning Agility in Senior Executives (2013) (0)
- The cybersecurity risk estimation engine: A tool for possibility based risk analysis (2022) (0)
- Managing compliance with privacy regulations through translation guardrails: A health information exchange case study (2023) (0)
- Oral Communications 8P transcriptional disease mechanism for altering muscle pheno- type in human type 2 diabetes (2008) (0)
- Panel: How to model and manage IT diffusion? (1996) (0)
- Organizing Cybersecurity in Action: A Pragmatic Ethical Reasoning Approach (2021) (0)
- Commentaries on retrospect and prospects for IS research (2015) (0)
- Is Design Science Research an answer to the relevance problem (2007) (0)
- Organizational and Social Perspectives on Information Technology, IFIP TC8 WG8.2 International Working Conference on the Social and Organizational Perspective on Research and Practice in Information Technology, June 9-11, 2000, Aalborg, Denmark (2000) (0)
- Becoming a Most Digitalized Country: A History of Digital Organizational Resilience in Denmark (2022) (0)
- Introduction to the Opinion Paper: Bryant's ‘The future of information systems’ (2008) (0)
- The effects of physical activity on glutamate neurotransmission in neuropsychiatric disorders (2023) (0)
- IT Employment and Shifting Enrollment Patterns in IS (2005) (0)
- Information Systems as the Genetic Material of Organizations: The Contributions of Jörg Becker (2019) (0)
- The discourse of large scale organizational transformation : the IBM reengineering case 1989-1994 (2003) (0)
- An Intuitive Risk Communication Tool to Enhance Patient–Provider Partnership in Diabetes Consultation (2021) (0)
- Information systems as a nexus of information technology systems: A new view of information systems practice (2022) (0)
- Editorial Advisory Board (2012) (0)
- Supporting Scenario Generation in Product Design (2008) (0)
- ACCOMMODATING EMERGENT WORK PRACTICES: ETHNOGRAPIDC CHOICE OF MffiTHOD FRAGMENTS (2013) (0)
- Two Techniques for Qualitative Data Analysis: Descriptive Narrative and Generalization (1994) (0)
- Gender and visible minority status: Career advancement in the Canadian information and communications technology sector (2009) (0)
- Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments (2011) (0)
- High-Speed Software Development What Works, What Doesn't (2006) (0)
- THE DESIGN THEORY NEXUS 1 2 By : (2008) (0)
- The Ethics of Online Social Network Forensics (2015) (0)
- The Information Security Standards Marketplace (2006) (0)
- do not impair anaplerosis during exercise in humans Low glycogen and branched-chain amino acid ingestion (2015) (0)
- Co-design Theory Adoptability: How Organizational Change is Co-created by Design Theorists and Theory Adopters (2022) (0)
- Information Security: Going Digital (2018) (0)
- OR9,2 Effects of a rowing-step test on saliva IGF-I levels in athletes (2008) (0)
- Automated Plant Species Identification: Challenges and Opportunities (2020) (0)
- Physical and Mental Fatigue in Female Rowers: 1589 (2007) (0)
- Call for Papers Issue 5/2010: Science of Business and Information Systems Engineering (2011) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Richard L. L. Baskerville?
Richard L. L. Baskerville is affiliated with the following schools:
