Organizational identity and information systems: how organizational ICT reflect who an organization is
暂无分享,去创建一个
[1] Wanda J. Orlikowski,et al. Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.
[2] Gerardine DeSanctis,et al. Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .
[3] B. Gray,et al. Bargaining Power, Management Control, and Performance in United States-China Joint Ventures: A Compa , 1994 .
[4] W. Staples. Policing Contingencies , 2004 .
[5] Roderick M. Kramer,et al. Members' Responses to Organizational Identity Threats: Encountering and Countering the Business Week Rankings , 1996 .
[6] Kevin G. Corley,et al. Organizational Identity, Image, and Adaptive Instability , 2000 .
[7] Rhonda K. Reger,et al. REFRAMING THE ORGANIZATION: WHY IMPLEMENTING TOTAL QUALITY IS EASIER SAID THAN DONE , 1994 .
[8] M. Tremblay. The Key Informant Technique: A Nonethnographic Application , 1957 .
[9] Kalle Lyytinen,et al. The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry , 2008, Eur. J. Inf. Syst..
[10] R. Baldwin. Technology's Impact on Faculty Life and Work , 1998 .
[11] Olof Brunninge. Organisational Self-understanding and the Strategy Process : Strategy Dynamics in Scania and Handelsbanken , 2005 .
[12] W. P. Barnett,et al. MODELING INTERNAL ORGANIZATIONAL CHANGE , 1995 .
[13] W. Orlikowski. Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .
[14] Elaine Byrne,et al. The role of identity in health information systems development: A case analysis from Mozambique , 2005 .
[15] Caroline A. Bartel. Social Comparisons in Boundary-Spanning Work: Effects of Community Outreach on Members' Organizational Identity and Identification , 2001 .
[16] T. D. Wilson,et al. Review of: Kling, R., Rosenbaum, H. & Sawyer, S. Understanding and communicating social informatics: a framework for studying and teaching the human contexts of information and communication technologies. Medford, NJ: Information Today, Inc., 2005 , 2006, Information Research.
[17] M. Schultz,et al. Responding to Organizational Identity Threats: Exploring the Role of Organizational Culture , 2006 .
[18] Carol Stoak Saunders,et al. Electronic window dressing: impression management with Websites , 2003, Eur. J. Inf. Syst..
[19] Wanda J. Orlikowski,et al. Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.
[20] Wanda J. Orlikowski,et al. Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000, Theory in CSCW.
[21] Yasmin Merali,et al. The role of boundaries in knowledge processes , 2002, Eur. J. Inf. Syst..
[22] Carsten Sørensen,et al. Tales from the police: Rhythms of interaction with mobile technologies , 2005, Inf. Organ..
[23] Frantz Rowe,et al. Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions , 2012, J. Strateg. Inf. Syst..
[24] Mary Tripsas,et al. Technology, Identity, and Inertia through the Lens of 'The Digital Photography Company' , 2008, Organ. Sci..
[25] David A. Whetten,et al. Albert and Whetten Revisited: Strengthening the Concept of Organizational Identity , 2006 .
[26] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[27] Elena Karahanna,et al. Antecedents of IS Strategic Alignment: A Nomological Network , 2009, Inf. Syst. Res..
[28] A. Stinchcombe. Information and Organizations , 2019 .
[29] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[30] Bongsug Chae,et al. The surface of emergence in systems development: agency, institutions, and large-scale information systems , 2005, Eur. J. Inf. Syst..
[31] M. Markus,et al. The Magic Bullet Theory in IT-Enabled Transformation , 1997 .
[32] Annemette Kjærgaard,et al. Identity in information systems , 2009, ECIS.
[33] L. Stern,et al. Conducting Interorganizational Research Using Key Informants , 1993 .
[34] Matthew R. Jones,et al. Giddens's Structuration Theory and Information Systems Research , 2008, MIS Q..
[35] Kevin G. Corley,et al. Identity Ambiguity and Change in the Wake of a Corporate Spin-off , 2004 .
[36] C. Speier,et al. The Hidden Minefields in the Adoption of Sales Force Automation Technologies , 2002 .
[37] D. Richman. The Changing Boundaries between Federal and Local Law Enforcement , 1999 .
[38] Wanda J. Orlikowski. Learning from Notes: Organizational Issues in Groupware Implementation , 1993, Inf. Soc..
[39] Gareth R. Jones,et al. The role of information technology in the organization: a review, model, and assessment , 2001 .
[40] Rob Kling,et al. Reconceptualizing Users as Social Actors in Information Systems Research , 2003, MIS Q..
[41] Marc Berg,et al. Viewpoint Paper: Some Unintended Consequences of Information Technology in Health Care: The Nature of Patient Care Information System-related Errors , 2003, J. Am. Medical Informatics Assoc..
[42] Jane Fedorowicz,et al. A collaborative network for first responders: Lessons from the CapWIN case , 2007, Gov. Inf. Q..
[43] Donald R. Cressey,et al. The Criminal Violation of Financial Trust , 1950 .
[44] Jeremy Rose,et al. EVALUATING THE CONTRIBUTION OF STRUCTURATION THEORY TO THE INFORMATION SYSTEMS DISCIPLINE , 2001 .
[45] Anthony M. Cresswell,et al. Information systems development as emergent socio-technical change: a practice approach , 2005, Eur. J. Inf. Syst..
[46] Jane Fedorowicz,et al. The formation of inter-organizational information sharing networks in public safety: Cartographic insights on rational choice and institutional explanations , 2009, Inf. Polity.
[47] Paul Shrivastava,et al. Organizational Frames of Reference , 1984 .
[48] Jane Fedorowicz,et al. Design principles for public safety response mobilization , 2006, DG.O.
[49] M. Diamond. Organizational Identity , 1988 .
[50] J. Dutton,et al. Keeping An Eye on the Mirror: Image and Identity In Organizational Adaptation , 1991 .
[51] Wanda J. Orlikowski,et al. Technology and Institutions: What Can Research on Information Technology and Research on Organizations Learn from Each Other? , 2001, MIS Q..
[52] Celia V. Harquail,et al. Organizational images and member identification. , 1994 .
[53] J. Dutton,et al. KEEPING AN EYE ON THE MIRROR : IMAGE AND IDENTITY IN ORGANIZATIONAL ADAPTATION , 2005 .
[54] W. S. Robinson. The Logical Structure of Analytic Induction , 1951 .
[55] Alison Mackey,et al. A Social Actor Conception of Organizational Identity and Its Implications for the Study of Organizational Reputation , 2002 .
[56] Davide Ravasi,et al. We are what we do (and how we do it): Organizational technologies and the construction of organizational identity , 2010 .
[57] Davide Ravasi,et al. Key Issues in Organizational Identity and Identification Theory , 2003 .
[58] Stephen M. Shortell,et al. Beauty is in the Eye of the Beholder: The Impact of Organizational Identification, Identity, and Image on the Cooperative Behaviors of Physicians , 2002 .
[59] P. Leonardi,et al. What’s Under Construction Here? Social Action, Materiality, and Power in Constructivist Studies of Technology and Organizing , 2010 .
[60] Table of Contents. , 2021, The FEBS journal.
[61] Ping Wang,et al. Chasing the Hottest IT: Effects of Information Technology Fashion on Organizations , 2010, MIS Q..
[62] Blaize Horner Reich,et al. IT alignment: what have we learned? , 2007, J. Inf. Technol..
[63] B. Glaser. The Constant Comparative Method of Qualitative Analysis , 1965 .
[64] R. Yin. Case Study Research: Design and Methods , 1984 .
[65] Tom Postmes,et al. More than a Metaphor: Organizational Identity Makes Organizational Life Possible , 2003 .
[66] Leiser Silva,et al. Fighting Against Windmills: Strategic Information Systems and Organizational Deep Structures , 2007, MIS Q..
[67] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[68] Daniel M. Cable,et al. Organizational Identity and Firm Performance: What Happens When Leaders Disagree About "Who We Are?" , 2006, Organ. Sci..
[69] Amanda Hoey,et al. Techno-cops: information technology and law enforcement , 1998, Int. J. Law Inf. Technol..
[70] Sten Jönsson. Institutions and Organizations , 1997 .
[71] Jane Fedorowicz,et al. A taxonomy for public safety networks , 2007, DG.O.
[72] Dennis A. Gioia,et al. Identity, Image, and Issue Interpretation: Sensemaking during Strategic Change in Academia. , 1996 .
[73] Kevin G. Corley,et al. Guiding Organizational Identity Through Aged Adolescence , 2006 .
[74] M. Lynne Markus,et al. Technochange management: using IT to drive organizational change , 2004, J. Inf. Technol..
[75] C. Hill,et al. The Performance of Incumbent firms in the Face of Radical Technological Innovation , 2003 .