default search action
Peter Marshall
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c42]Desheng Liu, Hong Zhu, ChengZhi Xu, Ian Bayley, David E. Lightfoot, Mark Green, Peter Marshall:
CIDE: An Integrated Development Environment for Microservices. SCC 2016: 808-812 - [c41]ChengZhi Xu, Hong Zhu, Ian Bayley, David E. Lightfoot, Mark Green, Peter Marshall:
CAOPLE: A Programming Language for Microservices SaaS. SOSE 2016: 34-43 - 2015
- [j9]Kritcha Yawised, Peter Marshall:
Social CRM: A Review of the Literature and the Identification of New Research Directions. Int. J. Virtual Communities Soc. Netw. 7(1): 14-20 (2015) - 2014
- [c40]Judy McKay, Peter Marshall, Nick Grainger:
Rethinking Communication in IT Project Management. HICSS 2014: 4315-4324 - [c39]Rajiv Vashist, Judith McKay, Peter Marshall:
Learning at the Boundaries: An Action Agenda for Business Analysts. HICSS 2014: 4536-4545 - 2013
- [c38]Judy McKay, Peter Marshall, Siddhartha Arumugam, Nicholas Grainger:
Setting a Research Agenda for IT Project Management Offices. HICSS 2013: 4364-4373 - 2012
- [j8]Judy McKay, Peter Marshall, Rudy Hirschheim:
The design construct in information systems design science. J. Inf. Technol. 27(2): 125-139 (2012) - [c37]Judy McKay, Peter Marshall, Nick Grainger, Rudy Hirschheim:
Change Implementers' Resistance: Considering Power and Resistance in IT Implementation Projects. ACIS 2012 - [c36]Yaqian Ye, Peter Marshall, Judy McKay:
Power Relations in IS Projects : A Critical Review and a New Research Agenda. ACIS 2012 - 2011
- [c35]Bernard Morris, Peter Marshall:
Business Architecture: The Basis for a Design-Oriented Approach to Business Process Outsourcing. ACIS 2011 - [c34]Rosemary Stockdale, Peter Marshall:
Udderly Fantastic: A Social Website for the Australian Dairy Industry. ACIS 2011 - [c33]Rajiv Vashist, Judy McKay, Peter Marshall:
Revealing a Research Agenda: An Inter-disciplinary Perspective to Strengthen IS Research on Boundary Spanning. ACIS 2011 - [c32]Rajiv Vashist, Judy McKay, Peter Marshall:
How well do we understand boundary practices? empirical evidence from a practice of business analysts. ECIS 2011: 158 - [c31]Judy McKay, Peter Marshall, Nick Grainger, Rudy Hirschheim:
Learning to listen: background conversations in enterprise system implementations. ECIS 2011: 169 - 2010
- [c30]Nicole L. Howard, Peter Marshall, Paul A. Swatman:
Reconceptualising Motivation in Adoption and Acceptance Research: Back to Basics. ACIS 2010 - [c29]Judy McKay, Nick Grainger, Peter Marshall, Rudy Hirschheim:
Artefaction as Communication: Redesigning Communication Models. ACIS 2010 - [c28]Rajiv Vashist, Judy McKay, Peter Marshall:
The Roles and Practices of Business Analysts: A Boundary Practice Perspective. ACIS 2010
2000 – 2009
- 2009
- [j7]Jan Recker, Raymond Young, Fiona Darroch, Peter Marshall, Judy McKay:
ACIS 2007 Panel Report: Lack of Relevance in IS Research. Commun. Assoc. Inf. Syst. 24: 18 (2009) - [c27]Nick Grainger, Judy McKay, Peter Marshall:
Learning from a Strategic Failure. ACIS 2009 - [c26]Bernard Morris, Peter Marshall, Phyl Willson, Judy Young:
Business Architecture: A Suitable Basis for Planning and Designing a Business Process Outsourcing Initiative. ACIS 2009 - [c25]Phyl Willson, Peter Marshall, Judy Young, John McCann:
Evaluating the Economic and Social Impact of the National Broadband Network. ACIS 2009 - 2007
- [c24]Judy McKay, Peter Marshall:
Science, Design, and Design Science: Seeking Clarity to Move Design Science Research Forward in Information Systems. ACIS 2007 - [c23]Kristy de Salas, Peter Marshall, Judy Young:
IS Strategy Formulation in a Financial Services Company: The Dual Lens Approach. PACIS 2007: 109 - 2006
- [c22]Peter Marshall, Kristy de Salas, Judy McKay:
Action Research in Practice: Balancing the Dual Imperatives. ACIS 2006 - 2005
- [j6]Peter Marshall, Judy McKay, Adi Prananto:
Business Value Creation from IT Investments: towards a process theory of IT governance. Australas. J. Inf. Syst. 12(2) (2005) - [c21]Jo-Anne Kelder, Peter Marshall, Andrew Perry:
Social Constructionism with a Twist of Pragmatism: A Suitable Cocktail for Information Systems Research. ACIS 2005 - 2004
- [j5]Peter Marshall, Judy McKay:
Strategic IT Planning, Evaluation and Benefits Management: the basis for effective IT governance. Australas. J. Inf. Syst. 11(2) (2004) - [c20]Peter Marshall, Judy McKay, Adi Prananto:
A Process Model of Business Value Creation from IT investments. ACIS 2004 - [c19]Adi Prananto, Judy McKay, Peter Marshall:
Lessons learned from analysing e-business progression using a stage model in Australian Small Medium Enterprises (SMEs). ACIS 2004 - [c18]Judy McKay, Peter Marshall:
Deriving business value from IT: converting IT expenditures into assets with desired impacts. ECIS 2004: 1186-1198 - [c17]Adi Prananto, Judy McKay, Peter Marshall:
Exploring the perceptions of inhibitors and drivers of e-business progression among SMEs at different stages of e-business maturity. ECIS 2004: 1510-1521 - 2003
- [c16]Adi Prananto, Judy McKay, Peter Marshall:
Perceived and Realisation of Business Value as a Facilitator of E-Business Progression in Australian SMEs. ACIS 2003 - [c15]Adi Prananto, Judy McKay, Peter Marshall:
Spectrum of e-business maturity in australian SMEs: a multiple case studies approach on the applicability of the stages of growth for e-business model. ECIS 2003: 1603-1613 - [c14]Adi Prananto, Judith McKay, Peter Marshall:
A Study of the Progression of E-Business Maturity in Australian SMEs: Some Evidence of the Applicability of the Stages of Growth for E-Business Model. PACIS 2003: 5 - [c13]Judith McKay, Peter Marshall, Lisa Smith:
Steps towards effective IT governance: strategic IS planning, evaluation and benefits management. PACIS 2003: 65 - 2002
- [j4]Peter Marshall, Judy McKay:
Evaluating the Benefits of Electronic Commerce in Small and Medium Enterprises. Australas. J. Inf. Syst. 9(2) (2002) - 2001
- [j3]Judy McKay, Peter Marshall:
The dual imperatives of action research. Inf. Technol. People 14(1): 46-59 (2001) - [j2]Judy McKay, Peter Marshall:
Conceptualising Information Systems Planning Across Strategic Business Networks. J. Glob. Inf. Manag. 9(2): 23-33 (2001) - [c12]Adi Prananto, Judy McKay, Peter Marshall:
Frameworks to Support E-Business Growth Strategy. ECIS 2001: 1254-1263 - [c11]Judith McKay, Peter Marshall:
Shaping a Process Model for Action Research. PACIS 2001: 37 - 2000
- [j1]Peter Marshall, Roger Sor, Judy McKay:
An Industry Case Study of the Impacts of Electronic Commerce on Car Dealerships in Western Australia. J. Electron. Commer. Res. 1(1): 1-12 (2000) - [c10]Peter Marshall, Roger Sor, Judy McKay:
The Impacts of Electronic Commerce in the Automobile Industry: An Empirical Study in Western Australia. CAiSE 2000: 509-521 - [c9]Judy McKay, Peter Marshall:
Quality and Rigour of Action Research in Information Systems. ECIS 2000: 108-115 - [c8]Judith McKay, Peter Marshall, Adi Prananto:
Stages of Maturity for E-Business: The SOG-e Model. PACIS 2000: 3 - [c7]Judith McKay, Peter Marshall:
Rethinking Current Conceptualisations of Action Research. PACIS 2000: 44 - [c6]Peter Marshall, Judith McKay:
Rethinking Information Systems Planning in Strategic Business Networks. PACIS 2000: 83
1990 – 1999
- 1999
- [c5]Janice M. Burn, Peter Marshall, Martyn Wild:
Managing Change in the Virtual Organisation. ECIS 1999: 40-54 - [c4]Peter Marshall, Janice M. Burn, Martyn Wild, Judy McKay:
Virtual Organisations: Structure and Strategic Positioning. ECIS 1999: 482-495 - [c3]Peter Marshall, Zuhair Bandar:
Working Towards Connectionist Modelling of Term Formation. Fuzzy Days 1999: 522-529 - [c2]Janice M. Burn, Peter Marshall, Martyn Wild:
Managing knowledge for strategic advantage in the virtual organisation. SIGCPR 1999: 19-26 - 1994
- [c1]Judy McKay, Peter Marshall, Donald McDermid:
Cognitive mapping for information requirements determination in the learning organization. ECIS 1994: 759-770
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-26 00:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint