Understanding the role of stakeholders during business intelligence implementations: an actor-network theory perspective
暂无分享,去创建一个
[1] Edward Toomer,et al. Qualitative Methods in Management Research , 1989 .
[2] J. Hassard,et al. Symmetrical Absence/Symmetrical Absurdity: Critical Notes on the Production of Actor-Network Accounts , 2004 .
[3] Panagiotis Kanellis,et al. A path to the successful implementation of Business Intelligence: An example from the Hellenic Banking sector , 2010, OR Insight.
[4] Larissa Terpeluk Moss,et al. Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications , 2003 .
[5] G. Walsham. Actor-network theory and IS research: current status and future prospects , 1997 .
[6] Vadlamani Ravi,et al. Feature selection and fuzzy rule-based classifier applied to bankruptcy prediction in banks , 2009, Int. J. Inf. Decis. Sci..
[7] Jayanthi Ranjan. Business justification with business intelligence , 2008 .
[8] Bruno Latour,et al. The Powers of Association , 1984 .
[9] Mark Hammond,et al. e-Business Intelligence: Turning Information into Knowledge into Profit , 2000 .
[10] R. Galliers. Strategic information systems planning: myths, reality and guidelines for successful implementation , 1991 .
[11] Robert Winter,et al. Aligning Process Automation and Business Intelligence to Support Corporate Performance Management , 2004, AMCIS.
[12] Olivia Freeman. Competitor intelligence: information or intelligence? , 1999 .
[13] G. Miller,et al. Business Intelligence Competency Centers: A Team Approach to Maximizing Competitive Advantage , 2006 .
[14] J. Hassard,et al. Actor Network Theory and After , 1999 .
[15] Steve Woolgar,et al. The Machine at Work: Technology, Work and Organization , 1997 .
[16] Andrew Grove,et al. Only the Paranoid Survive , 1996 .
[17] Geoff Walsham,et al. GIS for District-Level Administration in India: Problems and Opportunities , 1999, MIS Q..
[18] B. Latour. Science in action : how to follow scientists and engineers through society , 1989 .
[19] N. Denzin,et al. Collecting and Interpreting Qualitative Materials , 2012 .
[20] Mike Biere. Business intelligence for the enterprise , 2003 .
[21] Celina M. Olszak,et al. Approach to Building and Implementing Business Intelligence Systems , 2007 .
[22] Geoff Walsham,et al. Doing interpretive research , 2006, Eur. J. Inf. Syst..
[23] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[24] B. Latour. Reassembling the Social: An Introduction to Actor-Network-Theory , 2005 .
[25] Kamel Rouibah,et al. PUZZLE: a concept and prototype for linking business intelligence to business strategy , 2002, J. Strateg. Inf. Syst..
[26] Steven Jones,et al. Understanding IS evaluation as a complex social process: a case study of a UK local authority , 2001, Eur. J. Inf. Syst..
[27] John Law,et al. Notes on the theory of the actor-network: Ordering, strategy, and heterogeneity , 1992 .
[28] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[29] M. Callon. Techno-economic Networks and Irreversibility , 1990 .
[30] Bill Doolin,et al. To reveal is to critique: actor–network theory and critical information systems research , 2002, J. Inf. Technol..
[31] C. Bullard. Shaping technology/Building society , 1994 .
[32] Brian P. Bloomfield,et al. Boundary Disputes: : Negotiating the Boundary between the Technical and the Social in the Development of IT Systems , 1994 .
[33] Nilmini Wickramasinghe,et al. Using Actor Network Theory (ANT) as an analytic tool in order to effect superior PACS implementation , 2007, Int. J. Netw. Virtual Organisations.
[34] Anna Sidorova,et al. Understanding Business Process Change Failure: An Actor-Network Perspective , 2006, J. Manag. Inf. Syst..
[35] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[36] Dimitris Karagiannis,et al. Introduction to Business Process Management Systems Concepts , 1996 .
[37] Omar El Sawy,et al. Building an Information System Design Theory for Vigilant EIS , 1992, Inf. Syst. Res..
[38] B. Latour. Aramis, or the Love of Technology , 1993 .
[39] John Law,et al. Power, Discretion and Strategy , 1990 .
[40] James E. Cates,et al. The Ladder of Business Intelligence (LOBI): a framework for enterprise IT planning and architecture , 2005, Int. J. Bus. Inf. Syst..
[41] Vadlamani Ravi,et al. Indian banks' productivity ranking via Data Envelopment Analysis and Fuzzy Multi-Attribute Decision-Making hybrid , 2008, Int. J. Inf. Decis. Sci..
[42] Thanos Papadopoulos,et al. Stakeholder dynamics and the implementation of process innovations: the case of Lean thinking in a UK NHS Hospital Trust , 2009 .
[43] Paulraj Ponniah,et al. Data Warehousing Fundamentals , 2001 .
[44] D. Silverman. Interpreting Qualitative Data: Methods for Analysing Talk, Text and Interaction , 1994 .
[45] Vadlamani Ravi,et al. Privacy preservation in data mining using hybrid perturbation methods: an application to bankruptcy prediction in banks , 2009, Int. J. Data Anal. Tech. Strateg..