default search action
Leiser Silva
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Ariana Polyviou, Nancy Pouloudi, Katerina Pramatari, Leiser O. Silva:
A DNA Helix Analogy for Interdependent Mixed Methods Research: Enabling Cross-Fertilizations and Interim Meta-Inferences. J. Assoc. Inf. Syst. 25(6): 4 (2024) - [c17]Oyebisi Oladeji, Romilla Syed, Leiser Silva:
Social Media Enabled Social Movements in Information Systems Research: A Lakatos Approach to Literature Review. HICSS 2024: 6480-6489 - 2023
- [c16]Oyebisi Oladeji, Romilla Syed, Leiser Silva:
Social Media Enabled Social Movements in Information Systems Research: A Lakatos Approach to Review of Literature. AMCIS 2023 - 2022
- [j28]Romilla Syed, Leiser Silva:
Social Movement Sustainability on Social Media: An Analysis of the Women's March Movement on Twitter. J. Assoc. Inf. Syst. 24(1): 2 (2022) - 2020
- [j27]Vlad Krotov, Leigh Johnson, Leiser Silva:
Tutorial: Legality and Ethics of Web Scraping. Commun. Assoc. Inf. Syst. 47: 22 (2020) - [j26]Joyce H. Y. Lee, Carol Hsu, Leiser Silva:
What Lies Beneath: Unraveling the Generative Mechanisms of Smart Technology and Service Design. J. Assoc. Inf. Syst. 21(6): 3 (2020) - [c15]Romilla Syed, Leiser Silva:
Social Movement and Core-Peripheral Network Mobilization. AMCIS 2020 - [c14]Romilla Syed, Leiser Silva:
Core and Peripheral Users and Social Movement Mobilization. ICIS 2020
2010 – 2019
- 2019
- [c13]Leiser Silva, Romilla Syed:
Social Media and Social movements: a Case of women's March. ECIS 2019 - 2018
- [c12]Vlad Krotov, Leiser Silva:
Legality and Ethics of Web Scraping. AMCIS 2018 - 2017
- [j25]Leiser Silva, Hesam Panahi:
Catch me if you can: Online protests on sites powered by user-generated content. Inf. Manag. 54(1): 103-114 (2017) - [j24]Elham Mousavidin, Leiser Silva:
Theorizing the configuration of modifiable off-the-shelf software. Inf. Technol. People 30(4): 887-909 (2017) - 2016
- [j23]Leiser Silva, Carol Hsu, James Backhouse, Aidan McDonnell:
Resistance and power in a security certification scheme: The case of c: cure. Decis. Support Syst. 92: 68-78 (2016) - 2015
- [j22]Leiser Silva, Elham Mousavidin:
Strategic thinking in virtual worlds: Studying World of Warcraft. Comput. Hum. Behav. 46: 168-180 (2015) - [j21]Kenneth Shemroske, Leiser Silva:
Mechanisms for Understanding Participation in Online File Sharing. Int. J. Inf. Commun. Technol. Hum. Dev. 7(1): 17-36 (2015) - [j20]Juan Rodon, Leiser Silva:
Exploring the Formation of a Healthcare Information Infrastructure: Hierarchy or Meshwork? J. Assoc. Inf. Syst. 16(5): 1 (2015) - 2014
- [j19]Carol Hsu, James Backhouse, Leiser Silva:
Institutionalizing operational risk management: an empirical study. J. Inf. Technol. 29(1): 59-72 (2014) - 2013
- [j18]Niall Hayes, Gianluca Miscione, Leiser Silva, Chris Westrup:
Editorial. Inf. Syst. J. 23(4): 281-285 (2013) - 2012
- [j17]Leiser Silva, H. Kevin Fulk:
From disruptions to struggles: Theorizing power in ERP implementation projects. Inf. Organ. 22(4): 227-251 (2012)
2000 – 2009
- 2009
- [j16]Leiser Silva, Lakshmi Goel, Elham Mousavidin:
Exploring the dynamics of blog communities: the case of MetaFilter. Inf. Syst. J. 19(1): 55-81 (2009) - [j15]Leiser Silva, Chris Westrup:
Development and the promise of technological change. Inf. Technol. Dev. 15(2): 59-65 (2009) - [j14]Jamison M. Day, Iris A. Junglas, Leiser Silva:
Information Flow Impediments in Disaster Relief Supply Chains. J. Assoc. Inf. Syst. 10(8): 1 (2009) - [c11]Elham Mousavidin, Leiser Silva:
Testimonial Knowledge and Trust in Virtual Communities: A Research in Progress of the Case of Wikipedia. AMCIS 2009: 42 - [c10]Kenneth Shemroske, Leiser Silva:
A Proposed Social Mechanism for Community Membership: The Case of Online File Sharing Using Bittorrent. AMCIS 2009: 612 - [c9]Elham Mousavidin, Leiser Silva:
Packaged Software Configuration through the Lens of Social Construction of Technology. HICSS 2009: 1-8 - 2007
- [j13]Leiser Silva, Eugenio Figueroa, Jennifer González-Reinhart:
Interpreting IS alignment: A multiple case study in professional organizations. Inf. Organ. 17(4): 232-265 (2007) - [j12]Leiser Silva:
Epistemological and theoretical challenges for studying power and politics in information systems. Inf. Syst. J. 17(2): 165-183 (2007) - [j11]Leiser Silva:
Post-positivist Review of Technology Acceptance Model. J. Assoc. Inf. Syst. 8(4): 11 (2007) - [j10]Leiser Silva, Rudy Hirshheim:
Fighting Against Windmills: Strategic Information Systems and Organizational Deep Structures. MIS Q. 31(2): 327-354 (2007) - [c8]Michael I. Barrett, Elizabeth J. Davidson, Leiser Silva, Geoff Walsham:
Virtualization and Institutions. Virtuality and Virtualization 2007: 369-372 - 2006
- [j9]James Backhouse, Carol W. Hsu, Leiser Silva:
Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard. MIS Q. 30(Special Issue): 143-438 (2006) - [c7]Leiser Silva, Elham Mousavidin, Lakshmi Goel:
Weblogging: Implementing Communities of Practice. Social Inclusion 2006: 295-316 - 2005
- [j8]Angela Lin, Leiser Silva:
The social and political construction of technological frames. Eur. J. Inf. Syst. 14(1): 49-59 (2005) - [c6]Vlad Krotov, Leiser Silva:
Case Study Research: Science or a Literary Genre? AMCIS 2005: 50 - 2004
- [j7]Gurpreet Dhillon, Leiser Silva, James Backhouse:
Computer crime at CEFORMA: a case study. Int. J. Inf. Manag. 24(6): 551-561 (2004) - [j6]Blake Ives, Michael S. Parks, Jaana Porra, Leiser Silva:
Phylogeny and Power in the IS Domain: A Response to Benbasat and Zmud's Call for Returning to the IT Artifact. J. Assoc. Inf. Syst. 5(3): 4 (2004) - 2003
- [j5]Michael I. Barrett, Leiser Silva, Geoff Walsham:
ICTs, Globalization, and Local Diversity. Commun. Assoc. Inf. Syst. 11: 27 (2003) - [j4]Leiser Silva, James Backhouse:
The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems. J. Assoc. Inf. Syst. 4: 14 (2003) - 2002
- [j3]Leiser Silva, Eugenio Figueroa:
Institutional intervention and the expansion of ICTs in Latin America: The case of Chile. Inf. Technol. People 15(1): 8-25 (2002) - [j2]Leiser Silva:
Outsourcing as an Improvisation: A Case Study in Latin America. Inf. Soc. 18(2): 129-138 (2002) - 2001
- [j1]Leiser Silva:
Risky but Effective Improvisations in Managing Information Systems. Electron. J. Inf. Syst. Dev. Ctries. 5(1): 1-11 (2001) - [c5]Gurpreet Dhillon, Leiser Silva:
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study. Conference on Information Security Management & Small Systems Security 2001: 167-182
1990 – 1999
- 1999
- [c4]Ole Hanseth, Susan V. Scott, Leiser Silva, Edgar A. Whitley:
Re-evaluating Power in Information Rich Organizations: New Theories and Approaches. New Information Technologies in Organizational Processes 1999: 297-298 - 1998
- [c3]Thomas Kern, Leiser Silva:
Mapping the areas of potential conflict in the management of information technology outsourcing. ECIS 1998: 612-627 - 1997
- [c2]Leiser Silva, Gurpreet Dhillon, James Backhouse:
Developing A Networked Authority: Nature and Significance of Power Relationships. ECIS 1997: 511-525 - [c1]Gurpreet Dhillon, Tony Cornford, Ray Hackney, Neil McBride, Leiser Silva:
Panel: Developing An Ethical Agenda for A Networked Workplace. ECIS 1997: 1535-1536
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint