default search action
Rens Scheepers
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios:
The virtue of brevity. Inf. Syst. J. 34(2): 287-292 (2024) - 2023
- [j26]James Kotsias, Atif Ahmad, Rens Scheepers:
Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur. J. Inf. Syst. 32(1): 35-51 (2023) - 2022
- [j25]Sultana Lubna Alam, Kristijan Mirkovski, Rens Scheepers, Dilal Saundage:
Setting Priorities for Exploiting and Exploring Digital Capabilities in a Crisis. MIS Q. Executive 21(4): 6 (2022)
2010 – 2019
- 2018
- [j24]Rens Scheepers, Mary C. Lacity, Leslie P. Willcocks:
Cognitive Automation as Part of Deakin University's Digital Strategy. MIS Q. Executive 17(2): 4 (2018) - 2017
- [j23]Shijia Gao, William Yeoh, Siew Fan Wong, Rens Scheepers:
A literature analysis of the use of Absorptive Capacity construct in IS research. Int. J. Inf. Manag. 37(2): 36-42 (2017) - 2016
- [j22]Piya Shedden, Atif Ahmad, Wally Smith, Heidi Tscherning, Rens Scheepers:
Asset Identification in Information Security Risk Assessment: A Business Practice Approach. Commun. Assoc. Inf. Syst. 39: 15 (2016) - 2015
- [j21]Peter B. Seddon, Rens Scheepers:
Generalization in IS research: a critique of the conflicting positions of Lee & Baskerville and Tsang & Williams. J. Inf. Technol. 30(1): 30-43 (2015) - [c34]Atif Ahmad, Heidi Tscherning, Rachelle Bosua, Rens Scheepers:
Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model. ICIS 2015 - 2014
- [j20]Atif Ahmad, Rachelle Bosua, Rens Scheepers:
Protecting organizational competitive advantage: A knowledge leakage perspective. Comput. Secur. 42: 27-39 (2014) - [j19]Catherine A. Middleton, Rens Scheepers, Virpi Kristiina Tuunainen:
When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena. Eur. J. Inf. Syst. 23(5): 503-512 (2014) - [j18]Jenny Waycott, Rens Scheepers, Hilary Davis, Steve Howard, Liz Sonenberg:
The individual in multiple interacting activity systems: IT-supported diabetes management. Inf. Technol. People 27(4): 463-481 (2014) - [j17]Helana Scheepers, Rens Scheepers, Rosemary Stockdale, Nurdin Nurdin:
The Dependent Variable in Social Media Use. J. Comput. Inf. Syst. 54(2): 25-34 (2014) - 2013
- [j16]Rens Scheepers, Catherine A. Middleton:
Personal ICT Ensembles and Ubiquitous Information Systems Environments: Key Issues and Research Implications. Commun. Assoc. Inf. Syst. 33: 22 (2013) - 2012
- [j15]Peter B. Seddon, Rens Scheepers:
Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples. Eur. J. Inf. Syst. 21(1): 6-21 (2012) - [c33]Prithvi Jyoti Bhattacharya, Peter B. Seddon, Rens Scheepers:
Enterprise Systems for Innovation in Products and Processes: Beyond Operational Efficiency. ACIS 2012 - [c32]Maral Mayeh, Rens Scheepers, Michael Valos:
Understanding the Role of Social Media Monitoring in Generating External Intelligence. ACIS 2012 - [c31]Craig M. Parker, Rens Scheepers:
Applying King et al.'s taxonomy to frame the IS discipline's engagement in green IS discourse. ACIS 2012 - [c30]Jay Zeal, Stephen P. Smith, Rens Scheepers:
Revisiting Social Influence in the Ubiquitous Computing Era. HICSS 2012: 889-898 - 2011
- [j14]George Hobbs, Rens Scheepers:
Agility in Information Systems: Enabling Capabilities for the IT Function. Pac. Asia J. Assoc. Inf. Syst. 2(4): 2 (2011) - [c29]Rens Scheepers, Hilary Davis, Liz Sonenberg, Steve Howard:
Consumer Health ICT And The Patient In The Middle: Adopter And/Or Influencer? PACIS 2011: 165 - 2010
- [c28]Prithvi Jyoti Bhattacharya, Peter B. Seddon, Rens Scheepers:
Enabling Strategic Transformations with Enterprise Systems: Beyond Operational Efficiency. ICIS 2010: 55 - [c27]Jay Zeal, Stephen P. Smith, Rens Scheepers:
Conceptualizing Social Influence in the Ubiquitous Computing Era: Technology Adoption and Use in Multiple Use Contexts. ICIS 2010: 261 - [c26]Rajeev Sharma, Peter Reynolds, Rens Scheepers, Peter B. Seddon, Graeme G. Shanks:
Business Analytics and Competitive Advantage: A Review and a Research Agenda. DSS 2010: 187-198
2000 – 2009
- 2009
- [j13]Helana Scheepers, Rens Scheepers, Julie Fisher:
Electronic Commerce publications and research in Australia: Implications of the Research Quality Framework. Australas. J. Inf. Syst. 15(2) (2009) - [c25]Piya Shedden, Wally Smith, Rens Scheepers, Atif Ahmad:
Towards a Knowledge Perspective in Information Security Risk Assessments - an Illustrative Case Study. ACIS 2009 - [c24]Joanne Sullivan, Rens Scheepers, Catherine A. Middleton:
Conceptualizing User Satisfaction in the Ubiquitous Computing Era. ICIS 2009: 103 - [c23]George Hobbs, Rens Scheepers:
Identifying Capabilites for the IT Function to Create Agility in Information Systems. PACIS 2009: 20 - 2008
- [j12]Helana Scheepers, Rens Scheepers:
A process-focused decision framework for analyzing the business value potential of IT investments. Inf. Syst. Frontiers 10(3): 321-330 (2008) - [j11]Hanne Westh Nicolajsen, Rens Scheepers:
Communicating Content Through Configurable Media. Scand. J. Inf. Syst. 20(1): 2 (2008) - [c22]Joanne Sullivan, Rens Scheepers, Catherine A. Middleton:
Living the Good Life: How Content Providers can Better Conceptualize the Content Requirements of the Ubiquitous Technology User. ACIS 2008 - 2007
- [j10]Julie Fisher, Helana Scheepers, Rens Scheepers:
E-Commerce Research in Australia: Inviting a Comparative Analysis. Scand. J. Inf. Syst. 19(1): 2 (2007) - [c21]Phillip Freeman, Peter B. Seddon, Rens Scheepers:
Explaining Organisational Investments in CRM Point Solutions. ECIS 2007: 203-214 - 2006
- [j9]Rens Scheepers, Helana Scheepers, Ojelanki K. Ngwenyama:
Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations. Eur. J. Inf. Syst. 15(3): 261-268 (2006) - [j8]Rens Scheepers:
A conceptual framework for the implementation of enterprise information portals in large organizations. Eur. J. Inf. Syst. 15(6): 635-647 (2006) - [c20]Jayantha Rajapakse, Peter B. Seddon, Rens Scheepers:
Why ERP Systems Fail to Generate Intended Benefits in Developing-country Organisations. ACIS 2006 - [c19]Peter B. Seddon, Rens Scheepers:
Other-Settings Generalizability in IS Research. ICIS 2006: 70 - 2005
- [c18]Iain Morrison, Rens Scheepers, Peter Viola:
The Adoption of Web Services Based Architectures in Australian Organisations: An Exploratory Study. ACIS 2005 - [c17]Shawn Alborz, Peter B. Seddon, Rens Scheepers:
The Quality-of-Relationship Construct in IT Outsourcing. PACIS 2005: 93 - 2004
- [j7]Rens Scheepers, Krishna Venkitachalam, Martin R. Gibbs:
Knowledge strategy in organizations: refining the model of Hansen, Nohria and Tierney. J. Strateg. Inf. Syst. 13(3): 201-222 (2004) - [c16]Rachelle Bosua, Rens Scheepers, Gabriele Lakomski:
Distributed Cognition and IT support for Knowledge Work in Breakdowns: Match or Mismatch? ACIS 2004 - [c15]Shawn Alborz, Peter B. Seddon, Rens Scheepers:
Impact of Configuration on IT Outsourcing Relationships. AMCIS 2004: 447 - [c14]Krishna Venkitachalam, Rens Scheepers:
Formulating an organizational knowledge strategy: the influence of existing IT infrastructure. ECIS 2004: 1924-1935 - [c13]Helana Scheepers, Rens Scheepers:
The Implementation of Mobile Technology in Organizations: Expanding Individual Use Contexts. ICIS 2004: 171-182 - 2003
- [j6]Jan Karlsbjerg, Jan Damsgaard, Rens Scheepers:
A Taxonomy of Intranet Implementation Strategies: To Make or To Buy? J. Glob. Inf. Manag. 11(3): 39-62 (2003) - [j5]Rens Scheepers:
Key roles in intranet implementation: the conquest and the aftermath. J. Inf. Technol. 18(2): 103-119 (2003) - [c12]Rens Scheepers, Helana Scheepers:
Contexts of Relevance in Explanatory Case Studies in Information Systems: Ubiquitous Information Technology Implementation in Organizations. ICIS 2003: 25-35 - [c11]Krishna Venkitachalam, Rens Scheepers, Martin R. Gibbs:
Supporting Knowledge Strategy in Consulting Organizations: Codification, Personalization or Both. PACIS 2003: 85 - [c10]Shawn Alborz, Peter B. Seddon, Rens Scheepers:
A Model for Studying IT Outsourcing Relationships. PACIS 2003: 90 - 2002
- [c9]Rachelle Bosua, Rens Scheepers:
IT support for Communities of Practice in Organizational Settings. ACIS 2002 - [c8]Vivienne Farrell, Rens Scheepers, Philip Joyce:
Models of Trust in Business-to-Consumer Electronic Commerce. E-Business: Multidisciplinary Research and Practice 2002: 51-67 - 2001
- [j4]Jan Damsgaard, Rens Scheepers:
Harnessing Intranet Technology for Organisational Knowledge Creation. Australas. J. Inf. Syst. 9(1) (2001) - [c7]Rens Scheepers:
Supporting the Online Consumer Decision Process: Electronic Commerce in a Small Australian Retailer. ACIS 2001 - [c6]Jeremy Rose, Rens Scheepers:
Structuration Theory and Information System Development - Frameworks for Practice. ECIS 2001: 217-231 - [c5]Jan Damsgaard, Rens Scheepers:
Using Intranet technology to foster organizational knowledge creation. ECIS 2001: 674-686 - 2000
- [j3]Jan Damsgaard, Rens Scheepers:
Managing the crises in intranet implementation: a stage model. Inf. Syst. J. 10(2): 131-150 (2000) - [j2]Jorgen P. Bansler, Jan Damsgaard, Rens Scheepers, Erling C. Havn, Jacob Thommesen:
Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices. J. Assoc. Inf. Syst. 1: 10 (2000)
1990 – 1999
- 1999
- [j1]Jan Damsgaard, Rens Scheepers:
Power, influence and intranet implementation: A safari of South African organizations. Inf. Technol. People 12(4): 333-358 (1999) - [c4]Jan Damsgaard, Rens Scheepers:
A Stage Model of Intranet Technology. Implementation and Management. ECIS 1999: 99-116 - [c3]Jørgen P. Bansler, Erling C. Havn, Jacob Thommesen, Jan Damsgaard, Rens Scheepers:
Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices. ECIS 1999: 750-757 - [c2]Rens Scheepers:
Key Role Players in the Initiation and Implementation of Intranet Technology. New Information Technologies in Organizational Processes 1999: 175-196 - 1997
- [c1]Rens Scheepers, Jan Damsgaard:
Using Internet technology within the organization: a structurational analysis of intranets. GROUP 1997: 9-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint