Show Summary Details

Page of

PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).

date: 18 January 2020

(p. 683) Index

(p. 683) Index

Aakhus, M. 475
Aalborg43
AARs (Average Abnormal Returns)504
Abbott, P. 497
ABI/INFORM database497
Abraham, G. A. 248
Abraham, R. 641
abstracts497
Acacia3 programme657
academic constituencies398–9
Academy of Management30
Academy of Management Journal35, 48 n.
Accenture7
Accor Group381
accountability362, 365, 422
Accounting Information Systems19
accounting scandals7
ACIS (Australasian Conference on Information Systems)40
Ackerman, P. L. 566
Ackoff, R. 24, 27, 106, 207
ACM (Association for Computing Machinery)4, 21, 28–30, 34, 44, 561, 609
Code of Ethics and Professional Conduct (1992 version)606 see also CACM
ACM/IEEE Software Engineering Code of Ethics and Professional Practice (1999)606
ACM SIGMIS conference (1961–2005)563, 567–8, 579 n.
ACS (Australian Computer Society)609
action research97, 213
Actual domain69
Adam, A. 292, 364, 564, 566–570, 575, 635
Adams, P. 276
Adorno, Theodor74
Adya, M. P. 574–5
Aeschylus243
aesthetics of existence182
affluence586
Afghanistan634
Agar, J. 468, 475, 485
Agarwal, R. 335, 458–9, 506, 662
age576
agency123–4, 131, 177, 186
consumer182
flexibility and129
institutions and142, 145, 150–5, 159
structure and114, 118, 126–7, 296
agency theory146, 150, 153, 159
and the alignment problem419–20, 423–5
aggressive electronic marketing601
agnosis589
Agrawal, M. 503
AHS (American Hospital Supplies)672
Ahuja, M. K. 336, 566
AI (artificial intelligence)23, 281
AIDS (American Institute for Decision Sciences)30, 48 n.
aircraft black boxes460
AIS (Association for Information Systems)36, 39–40, 46
ISWorld Net and49 n.
Social Inclusion SIG578 see also CAIS; JAIS
AITP (Association of Information Technology Professionals)44
AJIS (Australian Journal of Information Systems)41 see also Australasian Journal of Information Systems
Akrich, M. 301
Akshaya telecentre project640
Alavi, M. 551
Alberta149
Alchian, A. 17
Alders, B. 347
(p. 684) aletheia592
alethic truth77, 79
Alford, R. R. 143, 146
Al‐Gahtani, S. S. 651
algorithmic problem‐solving28
alienation201–3, 205–6, 208, 212, 421
helping to eliminate the bases of635, 638, 643
understanding204
alignment329, 333, 336, 346–72, 423–8
and commitment423, 435–7
differing cultural traditions613 see also strategic alignment; structural alignment
all‐electronic mortgages9
Allen, M. W. 575
Al‐Qirim, N. A. 498, 514
Al‐Taitoon, A. 477, 482–3, 490 n.
Alter, S. 17, 72
Alvarez, R. 207, 212
Alvesson, M. 201–2, 293, 311, 313
Amazon.com6, 42, 182
ambidexterity330, 333, 336, 427
AMCIS (Americas Conference on Information Systems)39–40
American Airlines SABRE System383
American Football546–7
American imperialism630–1
American inner‐city ghettos631
Americanization626
Americas Conference on Information Systems561
Americas database online49 n.
amino‐acid sequences92
Amish people595
Analyser strategy356
Andersen Consulting, see Accenture
Anderson, D. & L. A. 337
Andhra Pradesh641–2
Ang, J. S. K. 353
Ang, S. 155, 500, 508
ANT (actor‐network theory)74, 128, 292–3, 296, 298–9, 310–14, 652–3
difficulties with305–9
important concepts301–4
IS and304–5
anthropological approaches153, 214, 298
Antill, L. 73
antisocial behaviour601
antitrust proceedings6
apartheid636, 638
Appadurai, A. 626–7, 630
Apple Computer384, 471
Applegate, L. 42, 45
application hosting6
application programs263
appropriation235, 239–41
reflexive121
Apte, U. 498, 500, 505
Archer, M. 118, 120, 130–1
archetypes364
cultural353
architects472
Argyris, C. D. 17, 210, 418
Aris, J. 47 n.
Aristotle241, 279, 592, 606, 672
Metaphysics275
arms‐length ideal patterns510
Armstrong, D. J. 574
Armstrong, Russell29
Arnold, M. 474
Aron, R. 505
Arrow, K. J. 673
Ashenhurst, Robert29
Ashkenas, R. 337
Asian shanty towns631
ASM (Association for Systems Management)30
ASP (application service provision)156, 505–6, 515–17, 519
Assembler language21
asset remoteness450–1
Association for Information Technology Professionals4
AST (Adaptive Structuration Theory)37, 125–7
Athena Factor, The (USA 2008)562
Atkinson, C. 73
ATMs (Automatic Teller Machines)272–4
attention267, 274–5, 282
calling for268–72, 276
(p. 685) attitude:
natural261, 264, 267, 277, 279, 284
phenomenological264, 267, 279
Aubert, B. A. 505
Audit Commission (UK)109–10
Augustine, Saint275
Aum Shinrikyo631
Australasian Journal of Information Systems41
Australia34, 41, 508, 551
authenticity214
authoritative resources116
autocratic management353–4
automated care planning571
automatic intelligence188
automation21–3, 588
autonomy129
occupational140
autopoiesis128
Avgerou, C. 19, 43, 46, 182, 208, 648–53
Avison, David25, 28, 39, 73, 202, 349, 353, 405–8, 420, 431
axiology70, 73, 75
Aycock, A. 193
Baase, S. 616
Babich, B. 195 n.
baby boomers562
background antecedents353
Backhouse, J. 292, 335
backsourcing38
BAE Systems98
Baets, W. 349, 354, 358–9
Bahli, B. 505
Balaji, S. 514, 516
Balaji, V. 658
Ball, K. 185
Baltic languages287 n.
bandwidth456
Bank of England433
banlieues631
Banville, C. 18–19, 648
Barbalet, J. M. 118
Bardach, E. 17
Bardhan, I. 518
Barley, S. R. 124, 130, 151, 153, 157–9, 541
Barnes, B. 297, 548
Baroudi, J. 43, 200, 203–4, 209, 217, 295, 566, 635–6, 638, 648
Barratt, E. 193
Barrett, M. 662
Barry, A. 304
Barthélemy, J. 500, 506
Bartlett, C. A. 9
Barua, A. 517
Baskerville, R. 45–6, 301, 407, 420, 453–4
Bass, B. 385, 387
Bauman, Z. 174–5, 192
BCS (British Computer Society)21, 29, 34, 38, 609 see also IFIP
Beath, C. M. 347, 349, 354, 357, 380, 405, 503, 514
Beer, S. 106
behavioural technology194
beings‐in‐the‐world239, 243–7, 255, 277–9, 285, 286 n.
characteristic of humans as244
intentionality as262–4
possibilities for action250
Bell, D. 537
Bell, E. 67, 75
Bell, G. 476
Bell, S. 651
Bell Telephones93, 95, 105
Benbasat, I. 17–19, 22, 28, 33–4, 42, 44–5, 155, 218, 285, 349–50, 352–4, 648
Benjamin, Robert29
Bennett, John27
Bentham, Jeremy604
Berg, M. 128, 304
Berger, P. L. 113, 546, 568
Bergeron, F. 350, 356–7
Bernstein, R. J. 114, 240
Bertalanffy, Ludwig von90–1
Berthon, P. 592, 672–3, 678
Best, J. 306, 310
Best, M. L. 639–40
(p. 686) Best, S. 175, 192
best practice329, 382, 395, 399–401, 404, 409, 515, 650–1, 653
qualitative608
Beulen, E. 334, 514
Bhalla, A. 504
Bharti Airtel8
Bhaskar, Roy68–70, 73, 77, 79, 81, 113
Biagioli, M. 314
biblical studies232
Bigelow, J. 90
Bijker, W. E. 295, 298–9, 544
biodiversity586
biology89–90
biotechnologies191, 193
Bjorn‐Andersen, N. 19, 39, 46, 49 n.
Black, L. J. 541
black‐box analytic engines4
Black Hat Conference (2004)449
Blackberries456
Bleicher, J. 231
Bleistein, S. J. 351
blogs553, 616
Bloomfield, B. 175, 186–7, 207, 302, 304
Bloor, D. 297
Bluetooth technology467, 469
Blumenthal, S. 18, 23–4, 26, 48
bodily‐embedded technology471
Boland, R. J. 123, 229–31, 285 n., 304, 329, 333, 335, 338
Bonache, J. 334
books618
Boolean operations460–1
Borgmann, Albert280–1
Borman, M. 518
Bostrom, Robert32, 37
Boudreau, M.‐C. 153, 336, 394–5, 402–3, 410, 648
Boulding, K. E. 91
boundary spanning individuals331, 334, 336
bounded rationality146–7
Bourdieu, P. 113, 122, 292, 310, 548
Bowker, G. C. 304
Boyle, J. 193
BPO (business process outsourcing)497, 503, 515, 517–18
Braa, J. 128, 636–9, 648, 653, 656
Braa, K. 470
Bradford, M. 503
Brandt, P. 72
Braudel, F. 119
breakdown237–9, 243, 250
interpretation and231, 233–4, 236
Brentano, F. 256
Brente, N. 400
Brey, P. 613, 614
Breyman, S. 310
bricolage213, 237, 330, 336–7
bridge349
Brier, T. 349, 354
Brigham, M. 217, 285 n.
Bristol87, 96
British Aircraft Corporation24, 87–8, 98, 100 see also BAE Systems
Brooke, C. 202, 209–11, 217–18, 309
Brooker, W. 27
Brower, R. S. 157, 160
Brown, A. 215
Brown, B. 475
Brown, C. 333
Brown, C. V. 350, 353
Brown, J. S. 160, 330, 335, 400, 455, 539–41, 544, 546, 548
Brown, W. 423, 425–7
browsers680
Brundtland, G. H. 590
Brunsson, N. 404
Bryan, R. W. 355
Bryant, C. G. A. 120–1, 126
Bryman, A. 67, 75
Bucchi, M. 296, 299
Bulkeley, H. 185
Bullen, Chris40–1
bureaucratization140
Burke, C. S. 334
Burn, J. M. 348, 355, 360
Burrell, G. 174, 183, 472–3, 545
Burt, R. S. 359
business intelligence systems362
business units12, 38
competition among10
global11
(p. 687) managers need to control all activities9–10
synergies across/profitability of9
Bustard, D. 73
Bynum, Terrell Ward602–5
Byrd, A. 355
cab drivers476, 481–2, 488
CACM (Communications of the ACM)35, 44, 561
CAIS (Communications of the AIS)39, 44–5
California Management Review44
call centres185, 516
life of workers635, 643
Callinicos, A. 118
Callon, M. 74, 298, 301–3, 308–9
Caminer, D. 47 n.
Campbell, B. 348, 350–4, 363
Canada10, 34, 149, 614, 657
Cannella, A. 419–20, 432, 437–8
Cannon‐Bowers, J. A. 334
capabilities theory634, 648
capability for change332
capacity‐building332
Cape Town636–7
capital and labour struggle208–9
capital transfers624–5
capitalism208–9, 625, 632
capta‐processing systems108–9
captive centres516, 519
Carayon, P. 566
CARD (Computer‐Aided Administration of Registration Department) system641–2
Carlile, P. 541, 548–9
Carlson, E. D. 27
Carmel, E. 335, 497, 506, 515, 662–3
Carr, N. G. 8, 329, 362, 374, 379, 382, 387, 415
Carter, C. 186
Cartesian dualism236, 244, 262
CASE (Computer‐Aided Software Engineering) tools23, 126
Caseley, J. 642
Cash, James38, 43–4
Castells, M. 475, 477, 537, 629–33,648, 653
CATWOE mnemonic102–3
causal ambiguity375
causal analysis126
causal mapping575
causality186, 298
event120
Humean70
CCTV (closed‐circuit television)610
CDA (critical discourse analysis)212
Cecchini, S. 643
Cecez‐Kecmanovic, D. 201–3, 205, 210–11, 213, 215–18
cellphones, see mobile phones
censorship193
central administration398–9
CEO‐CIO relationships350, 354
Cerbone, D. R. 253
certification PMI5
Chae, B. 73
Champion, D. 73
Champy, J. 180
Chan, Yolande E. 10, 13, 347, 349–51, 353–7, 423, 430–1
change management strategy336–8
change perspective37
channel technologies551
chaos theory72
check‐in kiosks382
Checkland, Peter18, 24–6, 33, 68, 72–3, 89, 91, 95, 97, 100, 104, 107–8, 110, 408
chemistry92
Chen, M. 35, 37
Cheon, M. 17, 38, 497–8, 500, 508, 510
Chernobyl301
Chervany, N. L. 25–6
Chiasson, M. W. 154, 214
Chicago Police Force485
Chin, W. W. 33
China44, 662 see also Shanghai
Choe, J. 357
choice(s):
bounded353
customer381–2
determinism vs. 536
irrational145
social208, 301
strategic152
(p. 688) technical301 see also rational choice
Chomsky, Noam79
Choudhury, V. 512, 515
Chouliarki, L. 212
Chung, S. H. 365
Churchman, C. W. 12, 21–2, 24, 26, 28, 47 n., 72
Ciborra, C. U. 128, 213, 281, 285 n., 310, 330, 336–7, 347, 349, 363, 455, 481, 486, 648, 652, 657, 661
Cicourel, A. V. 302
CIO Insight353
CIO magazine5
CIOs (Chief Information Officers)365–6, 418, 424, 426, 432, 578
critical responsibilities359
multiple427
proactive351
relationship between CEO and350, 354
CISR (MIT Center for Information Systems Research)29–30
Citigroup516
Civil Aviation Authority88
civil liberties615
Clark, I. 628
Clark, J. 130
Clark, P. 546
class206, 208, 576
class struggle294
Classical Greek287 n.
classical school358
cleanliness587–8
Clear, T. 607–9
Clegg, S. 174, 182, 186, 293, 314
Clemons, E. 505
CLIC (Client‐Led Information System Creation)73
clients and suppliers512–19
balance of power between511
climate change589
cloning191
CMM (Capability Maturity Model)5
COBIT (Control Objectives for Business and Related Information Technology)5, 444
COBOL21
Cochran, P. L. 418, 429
codes of conduct606, 609
Códoba, J.‐R. 331, 334
cognition275
bounded and shallow589
representationalist approach to281
shared352
cognitive psychology101
Cohen, S. 314
coherence theories76
Cole, S. 310
Coleman, R. J. 26
collaboration214, 350, 359, 366, 434, 436
cross‐cultural662
facilitated362
Internet a tool for553
mobility in473
multiple country653
need for among nation states628
negative implications on governance433
transparency in484–6
collectivism613
Collins, H. 295, 300, 308, 314
Collste, G. 610, 613, 617–18
Colyvas, J. A. 159, 418
combinatorial effects387–8
command‐and‐control processes484, 486
commerce617
commitment179, 404, 420, 426, 429–30
alignment and423, 435–7
high419, 435–7
commodification209
communication191, 427, 631
cellular468
control and603
cultural differences613
disturbed234
face‐to‐face351
high356
high‐context613
horizontal631
instant177, 589
interorganizational454
low‐context613
need for260
processes of92
(p. 689) strategic and frequent353
techniques of176
three principles of183–4
traditional functionalist model of233
understanding and350 see also TCA
communities of practice331, 335–6, 547
competition10, 148
competitive advantage329, 347
impact of IT on32
IT‐enabled374–86
sustained373–93
competitive effects148
competitiveness18, 38, 648, 656
improved535, 538
complementarity380–1
complex systems453–7
rethinking secure management of458–62
complex theory153
complexity72, 107
contractual509
social376
complexity theory653
compliance culture419
comprehensibility79
Computer Economics415
computer (and information) ethics602–6, 610–11, 613, 618
computers5–7, 210, 267–8, 538
advances during Second World War602
development of information processing systems22
ethnographic study of571
gender differences in measures of playfulness566
improperly secured457
Internet‐connected452
large and powerful445
management oversold on advantages and capabilities of27
materials used in production of588
miniaturization of468–9
mobile capabilities of452
new processing options31
personal information on611
police patrol vehicle484
potential risk for networks of457
predictions of total social control by188
Qwerty keyboard549
role in nuclear war603
third‐generation20–1 see also ACM; hardware; software
Concorde project87–8, 96, 98, 100
conferencing technology127
confidence tricks615
confidentiality462
offences against614, 616
conflicts of interest435–7
conformity145, 430–1
conglomerate firms148
consciousness137, 233, 263, 265, 271, 277, 284–5
embodied117, 258
historical285 n.
intensification of624
intentionality of259–60
meaning‐giving260
practical117, 132
purified262, 278
structural unity of261
transcendental262
consensus402, 404
consensus theories77
consequences:
cultural614
innovation649
long‐term631
social629
social and cultural614
unforeseen589
unintended117, 145, 147, 336
constraints117, 124, 129, 153, 159, 179
institutional146
pseudo‐natural201
structural117–18, 122
time‐space192
constructionism202, 212
constructivism:
post‐structuralism and293–6
weak310 see also social constructivism
consulting firms7
contextualist theory652–3
contingencies355–7
(p. 690) contingency theory364, 419–20, 425–8
contract issues37
Contractor, N. S. 130
contracts:
customized service517
fixed‐fee509
higher‐valued509, 511
longer‐term509
shorter‐term509, 511
sound518
time and materials509
control92, 294
absence of601
bad/good179
communication and603
continuous177
externally imposed434
flow of information between people and359
intensive193–4
negative implications on governance433
outsourcing380
panopticon‐like186, 189, 192
paradox of433
power and107–8, 118, 206–7
surveillance and207, 538 see also social control
controversy303, 307–8, 410
convergence303, 308
Cook, S. D. N. 329–30, 335, 400, 455, 539, 541, 544, 546, 548
Cooper, R. 37, 186–7, 207
cooperative/conflictual arrangements333
coordination costs377, 508
Copenhagen38
coping strategies482–3, 485, 554
copyright:
infringements612, 615
legislation662
Cordoba, J. 182
Cornford, D. 47 n.
Cornford, T. 571
correspondence theories76–7
corruption642–3, 657
opportunities for640
overcoming657
cost‐benefit analysis421
cost savings503, 508, 516, 518
Costa Rica662
Cougar, Daniel29
Council of Europe Convention on Cybercrime (2001)614–15
counter‐surveillance471
Cousins, K. C. 155, 480
Cox, K. 351
Coyne, R. 282
CPSR (Computer Professionals for Social Responsibility)603
CPU‐intensive applications21
Cragg, P. 354–5
Craib, I. 120
credit cards189
crime485, 614–16
critical analysis210, 212, 311, 313
critical engagement637–9
critical intention200–2
critical realism73–5, 77, 128, 292, 313
critical research74, 199, 201, 204–6, 212, 215
approaches and validity of203
central concern of208
core defining feature of202
defining feature of216
epistemological and ontological assumptions of218
Habermasian conception of217
important and sometimes necessary aspect of207
intrinsic problems related to217
ongoing and central theme within200
practice‐oriented213
self‐application of219–20
significant problems for202
social constructivist view of211
critical social theory635
critical theory73, 199, 214, 217–18, 313
action research and links to213
applying182
CRM (Customer Relationship Management) systems362, 384
Cross, J. 496, 514
Cross, R. 547
cross‐functional projects337
Crossan, M. 332, 336
(p. 691) Croteau, A. 357
crowding effects148
CSISR (critical social information systems research)199–228 see also CDA
Cuban, L. 588, 678
Cuff, D. 379
Cullen, S. 501, 508
Culnan, M. 17, 31
cultural barriers563
cultural‐cognitive factors152, 155–6
cultural differences613, 653
cultural diversity625–6
cultural persistence140
cultural studies304
culture351, 613–14, 617, 653–4 see also multiculturalism
Cummings, L. L. 155
Currie, Wendy L. 4, 156, 334, 505, 537
Cussins, C. 304
customer satisfaction589
customer service381–2
customization335, 381, 383, 385, 395, 399, 403, 405–11
cyberfeminism577
cybernetics72, 90–1, 602
cyberspace174, 193, 282
cyborgs177, 471
Dabla, A. 642
Dahlbom, B. 470
Daily, C. 419–20, 422, 432, 437–8
Dale, K. 472–3
Dalton, D. 419–20, 432, 437–8
Dandeker, C. 188, 190
Dankbarr, B. 537–8
Darfur634
DASDs (direct‐access storage devices)22
Dasein244–5, 263
data breaches416, 431
data cleaning408–9
data collection417, 460–1, 477, 610
empirical480
health636–8
language‐oriented212
data corruption447
data entry672
errors452
data matching610
data‐mining19
data processing22–3, 25
need to extend the notion of26
skills and education required for entry‐level position34
data‐sharing processes462
data storage22, 451, 463
email as backup for456
greater capacity450
data transfer380
data types451–2
Database (journal)44
Database for Advances in Information Systems, The (journal)561
databases49 n., 176, 188, 409, 444, 483, 485, 497, 499
breaking into462
integrated454
networked189
sabotage of191
shared394
datalogical problem23
Datamation (periodical)48 n.
Davenport, T. H. 6, 43, 381, 513, 517–18, 552
David, R. J. 148
Davies, L. 183, 184
Davis, F. D. 651
Davis, G. 404
Davis, G. B. 12, 16, 18–21, 25–7, 29, 31, 33–4, 38–9, 41, 48
Davis, G. F. 148
Day, G. S. 589
D'Costa, A. P. 663
Dearden, J. 27
Dearnley, P. A. 406, 408
DeCecco, J. P. 567
decentralized approach427–8, 636, 638
decision‐making27–8, 178, 362, 402–3, 419, 426, 435, 437
collaborative, trust‐based436
command‐and‐control processes484
delegating responsibility for420
efficient and effective456
(p. 692) ethical418
governance structures and425
outsourcing507–8
paradoxical359
research on IT support for48 n.
self‐interested417, 424–5, 430, 436
sustainable428
Decision Support Systems, see DSS
Decision Support Systems (journal)41
DeCock, C. 120
deconstruction213, 279–80, 294
decoupling420, 430–2, 435–7
Dedrick, J. 655
deduction70
Deetz, S. 179, 190, 201, 293, 311, 313
Defender strategy356
Defert, D. 194
deflationary theories77
deforestation587, 594
DeGross, Janice33, 43–4, 49 n.
deinstitutionalization139, 142, 147–8, 156, 159–61
causes of150
jolts which precipitate149
potential for150
De Jong, B. 353, 358, 364
De Laat, P. B. 612
De Landa, M. 188
Deleuze, G. 177–8, 191
Dell Online380
DeLone, W. H. 32
De Loof, L. A. 505
Delta Airlines503
DeMarco, T. 17
demographics561–2, 576, 617
De Moor, A. 74
Demsetz, H. 17
‘denaturalization’312
Denford, J. S. 352, 355
Denmark34
Dennis, Alan37
density‐dependency model148
Dent‐Micalleff, A. D. 376, 379, 387
dependent variables141, 498–9, 510–11
Derrida, J. 279–80
DeSanctis, G. 33, 37, 45, 113, 125–6, 128–32, 153, 429, 455, 650
desertification594
Desouza, K. C. 329, 335, 337
determinism118, 120, 203
choice vs. 536
objections to130
social310
technological301–2, 304, 314, 335
Dexter, A. S. 42
DfA (Design for All) approach608
diagramming techniques459
dialogue242, 248–51
Diana, Princess of Wales266
Dibbern, J. 47 n., 515
Dickson, Gary21, 25–6, 34–5, 38, 48 n.
Diekmann, K. A. 148
differentiations308–9, 380
competitive381
digital convergence469–70
digital divides209–10, 561, 634–5, 640–1, 650
Digital Equipment Corporation469
digital libertarianism193
digital rights management206
Dilthey, Wilhelm232–3
DiMaggio, P. 138–45, 149, 151–2, 154, 160, 430
dimensions of structure114–15 see also domination; legitimation; signification
Direct Line538
DiRomualdo, A. 503
disciplinary technologies184
discourse analysis153, 191
critical212
discourse ethics214–16, 248
discursive closure213
discursive justification79
discursive practice237
discursive production293–4
discursive theories77
disembedding mechanisms121, 124, 132
disruptive transformation649, 656–7, 659, 661, 663–4
(p. 693) distancing/distanciation229–31, 235, 244, 249, 255, 280 see also breakdown
diversified firms148
D‐N (deductive‐nomological) method70
DNA structure89, 92
Dobson, P. J. 128
dogmatism243, 297
Doherty, N. F. 337
dollar billionaires628
domains71
intransitive77, 79
moral78
normative78
ontological75, 302
propositional truth78
reflective action69–70
transcendental consciousness262
transitive77
Domberger, S. 509
domination115, 125–6, 143, 190, 200–1, 248, 307–8
helping to eliminate the bases of635, 638, 643
informatics of193
reproduction through discourses294
Donner, J. 474–5, 641
Doolin, B. 153, 184–5, 205–7, 211, 310, 314
Doremus, P. N. 625
dot‐com crash (2000)7, 42
Dourish, P. 476
Dovey, K. 337
Dow Chemical Company12
DPMA (Data Processing Management Association)30, 33–4 see also AITP
Dretske, F. 79
Dreyfus, H. 175, 177, 244, 259, 262–3, 277, 281–2, 311, 547
driving licences191, 657
Drori, I. 358–9
Drucker, P. 537
Drummond, H. 292, 433
DSS (Decision Support Systems)18–19, 21, 25, 27–8, 37, 41, 72
mathematical framework for48 n. see also GDSS
duality of structure116–17, 309
Duguid, P. 160, 540, 548
Duncombe, R. A. 654
durée119
Durkheim, Emile114, 139
Duster, T. 309
Dynabook469
dynamic affordance455
dynamic capabilities334, 374, 376–8, 538
Earl, Michael330–2, 335, 350, 352, 505–6
East Asia625
Eastman Kodak6
eBay42
EBSCOHost database497
e‐business72
ECIS (European Conference on Information Systems)39–40, 578
ecofeminism577
ecology304, 587, 590
e‐commerce19, 42, 44
economic downturn361, 518
economic growth634
economic performance:
applying knowledge to work tasks crucial for536
IT effect on32
economies of scale427, 508
ecosystems586
Edelman, L. F. 334, 336, 338
edge of chaos72
Edinburgh297
education28–30, 33–4, 38, 44, 588
computer639
continuing191
higher, gender equity issues in562
IS‐intensive588
laptops improve677–8
promise of587
Edwards, B. R. 350, 354
Edwards, J. R. 349
effect timing388
efficiency154, 307, 333, 445, 449, 452, 594–5, 627, 674
(p. 694) alignment between knowledge, truth and312
attempts to coordinate and control activity to promote145
best practices emphasize400
citizen services657
cooperation and146
cost504, 510
development of335
important tool for achieving655
managing mobile workers486–9
maximizing109
optimum590
organizational concern for468
outsourcing promises380
promise of587
security and450
e‐government services639, 641–3, 655, 657
Egyptian craftswomen661
EHR (electronic health record) systems453–4
EID Parry640
eidetic reduction261–2, 273
Ein‐Dor, Philip39
Einsteinian physics89
Eisenberg, E. M. 130
Eisenhardt, K. M. 417, 423
EJIS (European Journal on Information Systems40–1, 46
EJISDC (E‐Journal on Information Systems in Developing Countries)44, 649
Eklin, M. 509
El Sawy, Omar41
Elam, M. 304
electro‐mechanical cases90–1
electronic journals39 see also EJIS ; EJISDC
electronic readers618
electronic snooping601
electronic tagging191
electronic voting610
Elgesem, D. 610
Elia, J. P. 567
Eliot, S. 420
Elkington, John417, 590
email127, 351, 467, 481–2, 538, 543, 551, 616, 639
creative uses of456
filters483
mobile access to456
overused552
spoof615
widespread diffusion of545
emancipation203–5, 207–9, 211, 220
goals conducive to201
issue of norms and rules deemed supportive of216
lack of206, 210, 218
obstacles to212
promoting199–202, 213, 215, 217
emergent properties92, 98, 454
emergent use445, 453, 456
intended454–5
unintended455
Emery, F. E. 21, 24, 32–3
Emery, J. 27
empirical research124, 183, 211, 217, 219
apparent lack of218
role of theory and its relationship to119–21
empiricism71, 73–4, 76–7, 284, 294
major relativistic implications for70
EMS model37
encryption444, 450, 453
end‐to‐end alignment362
energy consumption587–8
England:
North West563
South484
ENIAC computer12
Enlightenment594–5
Enron7, 418–20, 429–30
Enterprise 2.0 technologies552–4
Enterprise Systems335, 394–414
entrepreneurship151, 156, 159
environment and technology586–7
environmental jolts148–9
environmental problems588
EOQ (economic order quantity)4
EPC (Electronic Product Code)449–50
(p. 695) epistemology67, 70–1, 73–7, 79, 81, 90, 107, 203, 214, 218, 539–43, 546, 571
critical572, 574
hermeneutic313
interpretive569
rethinking572–3
Epplerm M. 334, 337
equity argument562
Erden, Z. 331, 334
Ericsson, Lars Magnus468
Erlebnis233, 242–3, 250
ERP (enterprise resource planning) systems7, 334–5, 384, 454, 516, 651
Escobar, A. 648
e‐Seva project642
Ess, C. 613–4
essentialism278–9, 293–5, 300, 302, 312
gender567–8, 575, 577
social or political305
Ethernet22
ethics390 n., 429, 601–22, 635
discourse214–16, 248
health304
identity card schemes643–4 see also computer (and information) ethics
ethnicity574, 576
ethnocentricity294
ethnography121, 157, 159, 193, 570–1
ethnomethodology114, 147, 154, 279, 281, 298, 306, 548
ETICA (FP7 European‐funded project)616
etymology264–5, 268–71
Euro currency launch (2002)7
European Commission‐Information Society and Media608, 618
European Common Market96
European Conference on e‐Government40
European Conference on Information Systems561
European Journal of Information Systems561
European Union (Commission on Women's Rights and Equal Opportunities)563
Evans, R. 314
Evaristo, J. R. 335
event causality120
Everest, G. 26
Ewald, F. 194
excessive transformations359
exclusion631, 638
existential phenomenology264, 279, 284, 285 n.
expert systems17, 121, 132
explicit knowledge79, 540–6
Exploitative paradigm595
exploration and exploitation330–8
external reality78, 202
externalization3, 5–9, 11–13
extranets42
Facebook553, 680
factor‐based view37, 477
factor models352
facts589 see also social facts
Fairclough, N. 212
Fairweather, N. B. 614
fallibilism77
falsification70
FAOR (Functional Analysis of Office Requirements)25
fax machines657
Fäy, L. E. 253
feedback systems90–1
Feenberg, A. 175, 192, 206–7, 215, 310–11
Feeny, D. F. 350, 354, 379–80, 384, 497, 503, 514–15, 517–18
Feldman, M. S. 335
feminism571, 576–7, 631, 633
Fernandez, P. 509
Ferry, G. 47 n.
Feyerabend, P. 241
Fiebig, D. G. 509
financial attributes499–500
financial services sector156
Finland34
Finnegan, P. 332
Fisher, J. 503
Fiss, P. C. 431
fit349, 350, 674
(p. 696) Fitzgerald, G. 28, 33, 37–8, 405–8, 420, 431, 496, 514
fixed‐line telephones475
flexible project teams331
Flores, F. 230–1, 281–2, 285 n.
Florida, R. 562
Florin, J. 503
Floyd, S. W. 351, 355
folksonomies553
Foods International487
foreground/leadership behaviours353–4
foreign exchange trading482–3
Forrester, J. 24, 106
Forrester Report (2009)594
formative contexts128
FORTRAN21
Fortunati, L. 475
Foucault, Michel71, 74, 174–98, 207, 214, 217, 247, 292–3, 310, 314, 334, 545, 648
Fournier, V. 311–12
Fourth World631, 633
France96
Frankfurt School213–14
fraudulent websites615
freelance outsourcing497, 519
Frenkel, K. A. 566
Friedland, R. 143, 146
Friedman, A. 47 n.
Fried, C. 610
Fry, T. 276
FST (feminist standpoint theory)575–7
Fulk, J. 650
Fuller, L. L. 401–2
functionalism106–7, 114, 123, 145, 147, 216
rational158
fusion349
Gable, G. 46, 49 n.
Gadamer, H.‐G. 231, 233–4, 238–44, 247, 249
Galbraith, J. R. 9–10
Galletta, Dennis39
Gallivan, M. 500, 503–4, 567
Gallupe, B. 351–2
Galvin, J. E. 336
game theorists146
Gandhi, M. K. (Mahatma)633
Gane, C. 17
Garfinkel, H. 114, 147, 298, 408, 548
Garud, R. 151
Gates, Bill6, 469
GDSS (Group Decision Support Systems)36–7, 45, 125
Ge, L. 518
GE (General Electric)10
Gefen, D. 566
Geisteswissenschaften232–3
gender292, 560–85
gender discrimination312, 635, 643
laws about576
gender stereotypes205, 567, 570, 574
generalization286 n.
genetics89, 92
data advances611
profiles611
screening191
geography304
George, J. 39, 47 n.
Gerard, R. W. 91
Germanic languages287 n.
Germany517, 625
Gerstein, M. 337
Gerstner, Lou6
Gestalt19
Gestell280, 592
gesture262
Geyer, D. 500
Gherardi, S. 540
Giacomazzi, F. 333
Gibbons, M. 537, 539
Gibbs, M. R. 331
Gill, A. 75
Ginzberg, M. J. 17
Gioia, D. A. 120
Giuliani, Rudy474
Glendinning, S. 253, 255–6
(p. 697) global account management10
global financial crisis (2009)625
Global Village concept613, 616–18
global warming589, 597, 632, 681
globalization9, 22, 42–3, 332, 578, 595, 602, 616
and human development623–46
knowledge537
goals145–6, 208, 402, 422
ambiguous140
common545
conducive to emancipation201
conscious176
higher‐level351
human development636
key154
noble219
parties identifying with each other's510
sinister677
strategic351, 519
universal650
Goffman, E. 472
Goles, T. 336, 360
Gollakota, K. 640
Goo, J. 510–11, 518
Goodhue, D. L. 380
Google383
Gopal, A. 33, 214, 498, 509, 511, 514–16
Gordon, C. 181
Gorry, G. 18, 26, 31
Gotterbarn, D. 605–9
Gourlay, S. 543–4
governance11
contractual185, 507–12, 518
decision making and425
democratic forms210
multi‐theoretic approach to415–43
need for standardization of185
relational185, 507, 509–12, 518
shared365
solid362
governmentality185, 188
Govindarajan, V. 332, 335
GPS (global positioning systems)451–2, 459–60, 463, 471, 487
Graeser, V. 337
Gramsci, Antonio206
Granovetter, M. 432
Greece182
Green, N. 475
green issues362, 586–600, 635, 676–7
Greenaway, K. E. 423, 430–1
Greenhill, A. 564, 566, 571
Greenwood, R. 122, 145, 147, 149, 157–9
Gregor, S. 46, 49 n.
Gregory, R. 26
Gregson, N. 119
Grey, C. 311–12, 644
Grey, S. 513–14
Griffin, R. 73
Griffiths, P. 332
Grint, K. 175, 180, 300
groupthink433–4
Grover, V. 17, 37–8, 335, 337, 497–8, 500, 508, 510
GSM (Global System for Mobile Communications)468–9
GST (General Systems Theory)71–2
Gu, B. 424, 428
Guatemala653
Gupta, A. 515
Gupta, A. K. 332, 335
Gupta, Y. P. 357
Gurbaxani, V. 378–9, 503, 655
Gurwitsch, A. 286 n.
Gutenberg Bible107
Guynes, C. S. 356
Guzzini, S. 312
Gwillim, D. 337
Gyandoot project642–3
Habermas, Jürgen74–5, 77–9, 81, 176, 182, 193–4, 199–200, 214–17, 248, 311, 314, 658
Habib, L. 571
habitualization141, 159
habitus292, 310
hackers447, 449, 451, 615
potential rewards for450
random462
(p. 698) software company response when uncovered445
systems attractive to452 see also malware; spyware; Trojan horses; viruses
Hacking, I. 311–12
Hall, Arthur93, 95, 105
Hall, H. 264
Hall, J. 500
Hall, T. 515
Hamilton, S. 16, 18, 31
Hammer, Michael6, 180
Hammond, M. 273
Han, H. 508
handheld scanners450–1
Handy, C. 337
Hansen, M. 379
Hansen, M. T. 331, 336, 546
Hanseth, O. 128–9, 292, 296, 304, 310, 330, 336
harassment601, 615
Haraway, D. 175, 177, 193
hardware26, 36, 263, 376
decrease in cost of22
incompatible20
standardized software and382 see also ATMs; laptops; mainframes; minicomputers; microprocessors; notebooks; palmtops; PCs; PDAs; scanners
Hardy, C. 143, 151, 186
harmony349
ethical613–14
Harper, R. 475
Harré, R. 118, 309
Harris, M. 300–1
Harris, R. W. 658
Harris, S. 304
Hart, S. L. 586, 593
Harvard Business Review8, 10
Harvard Business School32, 38, 179
Harvey, L. 184, 199, 206
Harvey, L. J. 306
Hassanin, L. 661
Hassard, J. 304, 313–15
Hasselbladh, H. 152–3, 158
Hatfield Polytechnic29
Hatt, G. 304
Hawken, P. 594
Hayles, K. 175, 192
Haynes, M. 89
HCI (Human‐Computer Interaction)28, 476–7
He, Z. 73
He, Z.‐L. 336
healthcare148–9, 448–9, 453, 457, 500, 608, 618, 653
Heath, C. 473
Hedberg, C. 128, 636–9
Heeks, R. 640–1, 648, 650, 654, 660–2
Hegel, G. W. F. 22, 242–3
hegemony:
commodification serves as means of209
ideology and205–6, 208, 212
Heidegger, M. 119, 176–7, 195 n., 204, 231, 233, 239, 243–7, 250, 254–6, 259, 262–8, 271–5, 277–83, 285 n., 286 n., 310, 586, 592–3, 597
Heikkila, J. 18
Heim, M. 266
Heinen, S. 37
Heinzl, A. 515
Heiskanen, A. 17, 509
Hellens, L. A. von568
Henderson, J. C. 333, 346, 349, 352, 354–5, 358, 365
Heng, M. 74
Henley Management College40
Henshall, D. 215
hereditary traits611
hermeneutic circle241–3, 249
hermeneutics71, 117, 120, 229–52, 280, 283, 311
critical73, 247
Hess, D. 310
Hewitt517
HICSS (Hawaiian International Conference on System Sciences)48 n.
hidden costs505
Hill, C. E. 653, 660
Hilmer, F. 503
Hinings, B. 122
Hinings, C. R. 144–5, 147, 149, 159
(p. 699) Hippel, E. von334
Hirschheim, R. 3, 12, 18–19, 24, 32–3, 36–8, 44, 46, 47 n., 72–4, 201, 212, 215, 314, 336, 359–60, 496, 503, 505, 608, 648
Hirst, P. 628
HISP (Health Information Systems Programme)636–9, 643, 653
historicity233, 254, 261, 279, 311
totality and204
history304
Hjorth, L. 475
HM Revenue and Customs (UK)416
Hoffer Gittell, J. 484
Hofstede, G. 653
holistic thinking71–3, 89–90
Holmer‐Nadesan, M. 128
Holmström, J. 296, 310
Holwell, S. 18, 73, 95, 97, 107–8, 110
homogeneity of organizations140, 144, 148
homogenization/homogeneity381, 552, 567–8, 577
cultural613
global617, 626–7
inevitability of625
Hongladarom, S. 613–14
Horst, H. 475, 477
Howard, J. 310
Howarth, J. 273
Howcroft, D. A. 74, 200–1, 203, 205, 210, 216, 218, 292, 310, 335, 404, 406, 430, 564, 566–70, 570, 572–3, 575, 635, 664
HP (Hewlett‐Packard)517
Hu, Q. 156
Huang, H. 563, 567–8, 576, 578
Huang, J. 454
Huber, George27, 32, 41
Hudson, R. 185
Hughes, T. P. 298–9, 544
Hulbert, J. 592, 673
Hulland, J. 374, 377, 379, 381
human development623–4, 632–6, 643–4
human error416, 447
Human Genome project191, 209
human movement472–3
Human Resources Management Journal561
humanism294
Hume, David70
Humphreys, A. 182
Hunt, G. E. 353
Hussein, H. 354–5
Husserl, Edmund24, 107, 254, 256–64, 266, 273, 277–9, 285–6
Huynh, M. 73–4, 201, 210
Huyskens, C. 517
Hyatt Hotels381
Hyderabad641
hypothetico‐deductive method70
Iacono, C. S. 202, 387
Iacovou, C. L. 505, 508, 515
IBM5–6, 8, 346, 469, 517
introduction of PCs30–1
organizational dimensions10
services science7
IBM 360 series computers20–2
IBM Global Business Systems6
ICEX358–9
Ichijo, K. 330, 334
ICI Ltd94
Petrochemical Division103
ICIS (International Conference on Information Systems)30, 34–5, 39–41, 44–5, 48 n.
doctoral consortia34
ICOIS (International Conference on Outsourcing of Information Services)40
ICTs (information and communication technologies)209, 335, 337, 551–3, 561, 624
central role in societal transformations629
deeply implicated in global changes633
ethics and601–22
hiring personnel335
mobile312
social study of174–98
standardization of334–5
strategic impact and use of329
under‐representations of women in the sector563
unintended consequences arising from implementations336
(p. 700) ideal patterns510
idealism73, 278
transcendental262
identity189
caller483
class577
communal631
compromising416
cultural577
gender568, 572–3
national577
identity card schemes635, 643–4
identity theft601, 607
ideology184, 193, 207, 209–11, 213, 589
critique of212
hegemony and205–6, 208, 212
libertarian613
neoliberal625–6
oppressive217
political613
IEEE (Institute of Electrical and Electronics Engineers)449, 606
IETF (Internet Engineering Task Force)449
IFIP (International Federation for Information Processing)21, 29, 34, 38, 578
Administrative Data Processing Group (IAG)29
8th International Working Conference (WG9.4)649
Technical Committee for Education (TC3)29
Technical Committee of Information Systems (TC8)23, 30, 39, 48 n.
Working Group (8.2)33, 43–5, 48 n.
Igbaria, M. 566
Ihde, Don266, 282–3
Iivari, J. 23, 33–4, 46, 73
IKEA mission statement101, 103
Ilharco, F. M. 253, 285 n., 286 n., 287 n.
illegality418
imagination627
diversity of630
IMIS (Institute for the Management of Information Systems)609
imitability and rarity376
improvisation332, 336, 455, 474, 487
incentive alignment428
inclusion578, 618–19
incommensurability70–1, 238
apparent313
independent variables141, 152, 498, 510
India8, 516, 634, 636, 653, 662–3
e‐government programmes641–3
offshoring of IS jobs44
telecentre projects639–40
individualism297, 613, 627
and acceptability608
individuation182
Indo‐Aryan languages287 n.
induction70
industrial waste containers485–6
industrialization593
industry356, 500, 594
infological approach21, 23, 26
information age629–32
Information and Management (journal)35
Information & Organization (journal)41, 46
information asymmetry424, 428, 436
information integrity462
information management3–15, 330
information overload362
Information Society602, 611, 613–5, 619
potential benefits601
Information Systems Audit444
Information Systems Frontiers (journal)44
Information Systems Journal49 n., 635
Information Technologies and International Development (journal)649
Information Technology for Development (journal)649
Information Technology & People (journal)570, 578
information theory108
informational politics631
INFORMS (Institute for Operations Research and the Management Sciences)39, 41, 49 n.
infrared radiation188
infrastructure advancements:
conferences34–5, 40
journals35, 40–1, 44
professional societies30, 38–40
(p. 701) infrastructure costs516
Ingarden, R. 283
innovation22, 144, 301–4, 333, 336, 427, 455, 546, 647–71
conceptualizing as a process142
continuous339, 363, 562
cycle of383
diagnosis or decision about unrealism of307
diffusion of33, 142–3, 156
efforts to improve535
improvisation332
interorganizational470
knowledge and538–9
mindless155
nature of672–3
radical598
role of governmental institutions in155
technical rationality underpinning182
inquiry systems22
insourcing37, 519
highly specific assets505
institutional change147–51
institutional economics17, 146
institutional entrepreneurship151, 156, 159
institutional logics144
institutional theory137
foundations of138–51
information systems research and153–7
understanding the commitment problem429–32
institutionalism123, 137–73, 652
institutionalization292, 401, 404
of science296
instrumentalism77
integrated circuits20, 22
integrated data processing26
integration333, 349
automated400
social119
supply‐chain380
system119
technology and organizations28
Intel11, 22
intellectual property539, 611–12
intentionality259–60, 262–4, 271
political310
interaction:
cross‐cultural654
face‐to‐face119, 121, 309
human‐nature595
institutions and globalized economic agents629
mediated589
mobilization of473–4
unmediated589 see also HCI
interactional burden484
interactionist approach33
interconnectivity468
intéressement303
interestedness297
intermediaries302, 308, 643
International Conference on Electronic Commerce40
International Conference on Information Systems561
International Society for the Systems Sciences91
international trade630
Internet108, 155, 178, 182, 191, 193, 469, 590, 613, 678
advances in shopping618
attacks on applications452
browsing640
commercialization of41–3
connection657
cultural clashes on617
medical services and activities via617–18
positive view of613
rural access to619
software for151
standard applications hosted and rented over516
tool for collaboration553
used to liberate and oppress women577
wireless access467
interoperability384, 469–70
interorganizational systems453–5
agreement on security measures448
information‐sharing446
innovation470
(p. 702) relevant data457
interpretation235, 269, 280, 305
as appropriation of meaning239–41
breakdown and231, 233–4, 236
Erlebnis and242–3
language and237–9
grammatical232
obscure texts236–7
phenomenological285
psychological232
shared613
understanding and245–9, 254
interpretive flexibility299–300
interpretivism68, 70, 73, 75, 157, 211–12, 294
criticism often levelled at285
structuration theory and295
intersubjectivity278–9, 311–12
intranets42, 552
Introna, L. D. 175, 181–2, 208–10, 217, 230–1, 253, 281–2, 285 n., 286 n., 287 n.
inventory tags445–6, 448
I/O‐intensive operations21
iPhones471, 538, 680
iPods672, 680
Irani, Z. 347
Iraq634
IRIS (Information Systems Research in Scandinavia)34, 48 n.
irrationality404
ISCOL Ltd94–5, 98
ISD (IS development) process28, 46, 72
ISDC (Information Systems in Developing Countries)647–71
ISDOS project22–3, 48 n.
ISI Web of Knowledge76
ISO (International Standards Organization)444
isomorphism144, 148, 154, 157, 161
institutional140, 430
mimetic140
structural152
ISR (Information Systems Research) journal41, 46
Israeli‐Arab conflict634
ISWorld Net40, 46, 49 n.
IT (information technology)23, 30, 72, 210, 330, 346–93
advancement in21
best‐of‐breed applications4
challenges for managers42
competitive implications of17
cross‐cultural research in43
cultural barriers of women in563
diffusion of33, 156
ecology of586–600
effect on economic performance32
experiments to develop a knowledge base about25
externalization of3, 5–9, 11–13
gender and563
globalization and human development623–46
hermeneutics and failed implementations231
history of4
in‐house services3, 7–13
information services become emphasized over562
institutional theory of137–73
local shortages of skilled labour7
management function10
mobile467–95
monitoring the deliverability of systems31
multi‐theoretic approach to governance415–43
NHS use of302
organizational application of41
organizational impact of32
outsourcing6–8, 36–7, 47 n., 379–80, 438, 496–528
paradoxes of587–91
problems in implementation37
professionalism of4–5, 11–12, 609–10
role in changing temporal and spatial character of organizations119
role of governmental institutions in innovation155
shared provision of services10
socially shaped as ‘men's work’568
sophisticated111 see also ICTs
(p. 703) IT Financial Management Association5
IT Governance Institute5
Italic language family287 n.
ITIL (IT Infrastructure Library)5, 10–11
Jacobs, R. 503
Jagun, A. 640–1
Jain, S. 151
JAIS (Journal of the AIS)39, 44–5
Janson, M. 210, 215
Japan127, 613–14, 625–6
Yoseba quarters631 see also Tokyo
Jarvenpaa, S. L. 332, 336, 377, 434, 474, 482, 516, 651, 656
Jary, D. 120–1, 126
Java technology151
Jenkin, T. A. 351
Jenkins, Gwilym94
Jensen, R. 641
Jepperson, R. L. 139, 146
Jepsen, Mary Lou677
Jessup, L. 569
Jeyaraj, A. 498
JGIM (Journal of Global Information Management)41
Jia, R. Q. 352
JIS (Journal of Information Systems)41
JIT (just‐in‐time) manufacturing186–7
Johansson, Jesper49 n.
Johnson, Deborah601, 604, 609, 611–12
joint ventures12
Jones, M. 292
Jones, M. R. 122, 124, 126, 128–9, 131
Jordan657
Joshi, K. D. 567, 574
Journal of Applied Behavioral Science153
Journal of Electronic Commerce Research44
Journal of Information, Communication & Ethics in Society578
Journal of Information Technology41, 46, 539
Journal of Management Information Systems35, 566
Journal of Management Studies539
Journal of Mixed Methods Research75
Journal of Systems Management48 n.
JSIS (Journal of Strategic Information Systems)41, 46
JSTOR database497
judgements274
conflicting237
Junglas, I. 19
Jurison, J. 505
justification76–8
discursive79
Kaarst‐Brown, M. L. 212, 353
Kahn, S. A. 48 n.
Kaiser, K. M. 574–5
Kallinikos J. 152–3, 158
Kanawattanachai, P. 334
Kang, J. 379
Kant, Immanuel22, 73–4, 216, 255, 257, 604, 607
Kanungo, S. 640, 656, 658
Karahanna, E. 477
Karimi, J. 357, 426
Karsten, H. 122, 124, 126, 128–9, 131
Kashmeery, A. 613–14
Katz, J. E. 473, 475
Katz, N. 484
Katz, S. 567
Kawalek, P. 407
Kay, Alan469
Kay, R. 353
Kayworth, T. 653
KCI (knowledge‐constitutive interests) theory77
Kearns, G. S. 337, 347
Keat, R. 273
Keen, Peter17, 27, 31, 34–5
Kellner, D. 175, 192
Kemerer, C. 18
Kerala640–1
Kern, T. 505–6, 508, 516–17
Kim, J. 500, 503–4
Kim, Y. 500, 508, 510–11
King, Bill39, 41
King, J. 18, 34, 45, 47 n.
(p. 704) King, J. L. 154–5, 157
King, M. 286 n., 354–5
King, W. R. 346, 349
kiosk technology382, 386, 640, 642
Kishore, R. 503, 514
Klein, H. K. 3, 12, 18–19, 33, 38, 44, 46, 73, 199–202, 208, 210, 215, 217–18, 231, 314, 407, 453, 608, 648
Kleinknecht, A. 336
Kling, R. 23, 33, 300
Knights, D. 123, 175, 186–7, 189, 292, 305, 310
Knorr‐Cetina, K. 298–9, 302, 305, 308–9, 549
know‐how542, 545, 651
knowledge:
capture and transfer of329–30
construction of312
consumer as an object of182
efficiency and312
epistemological74, 79, 81
experiential79, 82
exploitation/exploration of333–6
impossible to separate power from294
information ubiquity can be accompanied by decrease in589
intransitive object of77
knowing and546–7
major IS journals and181
objective71, 295
organizational28–9
performative78–9, 82
power and177–9, 182–3, 292
professional4, 185, 536
propositional79, 81–2
reflexive appropriation of121
repressions and distortions in78
scientific298
situated330, 577
social theory of311
sociology of71
specialized609
structural perspectives on542–3
truth and68, 77–81, 312
valid70, 76, 400 see also explicit knowledge; tacit knowledge; also under following entries prefixed ‘knowledge’
knowledge acquisition187
knowledge‐based theory of the firm330, 537
knowledge creation338, 538, 542–3, 546, 549–51
knowing and329
role of communities of practice crucial in336
knowledge‐intensive organizations180, 537
knowledge management67–8, 72, 76, 329, 334–5, 362, 535–59, 681
knowledge process outsourcing519
knowledge sharing330, 332–6, 338, 350, 352–3, 361, 542, 545, 554
across specialist functions or disciplines548
barriers to548
improved354, 535
individuals who are relatively homogeneous552
organizations lose opportunities for539
social and cultural conditions necessary for536
ways to achieve365
knowledge transfer536, 546, 551
knowledgeability117–18, 130, 536, 538
Kockelmans, J. J. 244, 262
Kodak6, 37
Kogut, B. 625
Koh, C. 508
Kolb, D. 17
Konana, P. 518
Konno, N. 543
Konsynski, B. 37
Korpela, M. 651
Kotlarsky, J. 332, 334–5, 514–16
Kotnour, T. 334, 338
Kozar, K. 26
Kraemer, K. 378–9, 655
Kreijger, J. 505, 516
Kriebel, Charles41
Krishnan, M. 498, 509
Krishna, S. 641–2, 649, 654, 662
Krogh, G. von330–1, 334
Kroon, V. 356
Kuhn, K. 574
(p. 705) Kuhn, T. S. 70, 297
Kumar, A. 658
Kumar, K. 45, 337
Kumar, R. 639–40
Kumaraswamy, A. 151
Kuriyan, R. 640
Kvasny, L. 205, 292, 564, 566, 571, 576
Kwan, C. 607–9
labour force:
gender and562–3, 566, 578
interdependence of630
labour process theory186
Lacity, Mary C. 5, 37, 47 n., 48 n., 331, 335, 380, 496–8, 501, 503, 505–10, 512–19
Lacroux, F. 72
Lagrange, J. 194
Lancaster University24, 87, 94–5, 98
Land, Frank12, 21, 24, 32, 40, 43, 47 n., 651
Landry, M. 18–19, 648
Lands End Custom initiative385
Lang, K. R. 474, 482
Langefors, B. 12, 18, 21, 23–4, 26, 48 n.
Langer, Monika286 n.
language94, 262, 269, 536–7, 642
abstract139
common353, 428
competent‐speaker notion79
constitutive powers emphasized293
everyday88–90, 106, 108, 237–9, 246
interdependence of action and191
meaning and71
mobile phones and development of475
referent and77
language‐based research213
language‐games247
incommensurability of238
very primitive237, 246
language‐oriented methodologies212–13
Lanzara, G. F. 128
Lapp reindeer301
laptops42, 263–4, 424, 678
one‐per‐child initiative588, 675–7
LAS (location aware systems)459, 463
Latin (language)287 n.
Latin America631, 653
Latour, Bruno74, 295, 298, 300–3, 306–10, 314, 401, 548
Lave, J. 331, 335–6, 408, 540
Law, J. 295, 298, 304–5, 314–15
Lawlor, L. 280
Lawrence, P. 44
Lawrence, T. B. 143, 151, 159, 161
Layder, D. 117–18
layered structure92
layoffs6, 499
lead‐lag models360, 364
leadership:
autocratic353–4
indecisive354
Learmonth, G. 32, 672
learning338, 476, 678
action17
cross‐project334, 336
initiatives detrimental to588
rote410
situated406
Lederer, A. L. 332, 335, 347, 349, 354
Lee, A. 33, 43–5, 496
Lee, A. S. 201, 203, 230–1, 311
Lee, C. 17
Lee, J. 508, 510–11
Lee, N. 67, 314–15
Leede, J. 347
Leedy, P. D. 254
Lefebvre, H. 473
legacy systems7
legacy thinking405, 408–9
legitimacy145, 153–4, 207, 218–20
appearance of conformity presumed to be sufficient for430
effort to obtain as a discipline568–9
problem‐solving205
legitimation115, 125–6, 148, 156, 186
Lehoux, P. 304
Leiba‐O'Sullivan, S. 186
Leibniz, G. W. 22, 261
Leidner, D. E. 332, 334–5, 377, 501, 512, 651, 653, 656
leisure588
LEO (Lyons Electronic Office)6, 12, 20, 39
(p. 706) Lévi‐Strauss, C. 330, 336–7
Levina, N. 511, 513–15
Levinas, E. 256, 280
Levy, D. L. 348
Lewin, K. 17
Lewis, B. R. 355, 365
Lewis, M. 433–4
Li, D. 26
Liang, H. 155–6
Licoppe, C. 475
Liebenau, J. 33, 43–4
Liedtka, S. 500
Lientz, B. P. 337
lifestyle611
Light, B. 577
Lightfoot, G. 313
Likert scale230
Lilley, S. 313
Lindblom, C. 336–7
Linder, J. 503
Ling, R. 468, 472–5
Lings, I. 67
linguistics70, 212, 269
linkage349
LinkedIn553
Linstone, H. 73
Linux676, 678
Lioliou, Eleni185, 195 n.
listening259–60
living standards634
LL Bean website385
loan associations148
local mobility473
location information448–9, 451–2
explicit, derivable or implied460
periodic transmission of463 see also LAS
Loch, K. D. 653, 660
Locke, John22
Loebbecke, C. 39, 517
logical models445–6, 457–9, 462–4
logistics technology487
Loh, L. 496, 499–500, 503
London:
ambulance system109
black cabs481–2, 488
financial markets482
Longaigh, S. N. 332
longue durée119
Looise, J. C. de347
Lotus Notes127, 455
Lounsbury, M. 158, 431
Lovins, A. B. & L. H. 594
Lowe, A. 310
LSE (London School of Economics)21, 29
Lubin, John29
Lucas, H. 19, 44
Lucas, H. C. 26
Luckmann, T. 113, 278, 546, 568
Luff, P. 473
Luftman, J. 349, 351–2, 354, 359
Luhmann, N. 128
Lukes, Steven186
Lynch, M. 310
Lyon, D. 175–6, 188–90
Lyotard, J. F. 548
Lyytinen, K. 16–19, 23, 33–4, 42, 45–6, 47 n., 201, 208, 215, 337, 400, 469–71, 489
McAfee, A. 551–4
Macann, C. 286 n.
McBride, N. 72
McDonald, M. 519
McFarlan, W. 18, 32, 38, 42, 358
McGrath, Kathy208
McGrath, R. G. 375
Macintosh, N. W. 123
McKeen, J. D. 349, 508, 515
McKenney, James29, 38, 42
MacKenzie, D. 299, 310
McKiernan, P. 333
McKinley, A. 175, 186–7
McKinney, V. R. 566
McLean, C. 313
McLean, E. R. 32, 346
McLeod, L. 205, 211
McLoughlin, I. 300–1
McLuhan, M. 266, 275
McMaster, T. 304
MacMillan, I. C. 375
Madhya Pradesh (Dhar district)642
Madon, S. 640, 648–50, 652–3, 658, 663
(p. 707) Magill, S. L. 350, 353
Maguire, S. 143, 151, 210
mainframes6, 21–2, 30, 93, 469, 680
reliance on31
Makimoto, T. 472, 476, 480
Malamud, O. 588, 678
malicious activities447, 450, 464 see also malware
Maller, V. 47 n.
Malone, T. W. 9
malware445, 453, 456
Management Datamatics/Management Informatics (journal)35
management science22, 97, 99 see also TIMS
Management Science (journal)35, 49 n., 566
Management Studies185–93
managerialism210, 293, 305, 311–13
Manchester44, 483
Manchester Business School33
Mandela, Nelson633, 636
Maner, Walter604
Mann, C. L. 655
Mann, Steve471
Manners, D. 472, 476, 480
Manovich, L. 266
Mao, J. 516
Marcon, T. 214
Marcuse, H. 212
Marini, M. M. 568
market entry rates148
market share32
Marketing Science (journal)49 n.
Markus, M. L. 9, 18, 32, 37, 43–5, 295, 355, 383, 404, 416
Marples, C. G. 337
Marriott International381
Marshall, J. D. 590
Martocchio, J. 566
Marx, Karl73, 114, 189, 213
Marxism17, 74, 208, 294
Mason, R. 16, 18, 26, 31, 38
Mason, R. M. 157, 160
material technology194
Matta, N. 337
Mayhew, P. J. 406, 408
Mazmanian, M. 476
meaning‐making229–52, 285
meaningfulness229, 233, 246–7, 259
meanings260, 262
already inscribed284
attribution system25
fixed294
fundamental, attempt to uncover273
hidden311
precise88
shared88, 254, 613
specific and non‐standard116
subjective254
medicine617–18
megacities631
Melville, N. 378–9
men and masculinity577
Mendelow, A. L. 349, 354
Mensch, J. R. 279–80
mentoring575
Merali, Y. 333
mergers and acquisitions9, 12, 333
Merleau‐Ponty, M. 256, 261–2, 264, 266, 269, 286 n.
Merriam Webster Dictionary269–70
MERS (mortgage loans organization)9
Merton, Robert296–7
meta‐level theory91
metaphors212–13, 248, 269, 300, 472, 548, 637, 639, 660
metaphysics279–80
methodological dualism301–2
Mexico630–1
Meyer, J. W. 139, 142–5, 147, 149, 400, 430, 434
Michell, V. 514
micro‐macro events303, 305–10, 313
micro‐mobility473
microprocessors20, 22
Microsoft6, 445, 469
desktop‐centric view rendered obsolete151
European pressure on384
Windows384, 676
microwave technology188
Middle Ages232, 269
middlemen516
(p. 708) Miles, R. E. 356
Mill, John Stuart604
Millar, V. 18, 32
Millennium Development Goals (UN 2009)634, 648
Miller, A. 610
Miller, D. 375, 475, 477
Miller, G. 101
Miller, K. 609
Miller, P. 175, 185
Mingers, J. 18, 68, 70, 72–76, 78, 154, 176, 216, 286 n., 292
minicomputers31
Ministries of Education676
Mintzberg, H. 230, 335, 337, 347, 484
Miranda, S. 500, 510–11
mirrors273–4
misalignment351–2, 361, 420, 423, 428–9, 435
incentive424
Miscione, G. 652–3
MISQ (MIS Quarterly)30, 35, 39, 45–6, 48 n., 181, 566
MISQ Executive (journal)44
MISQ Review374
MISRC (University of Minnesota Management Information Systems Research25, 29, 35
MIT (Massachusetts Institute of Technology)29–30, 349, 449, 602–3
Mitchell, G. 183–4
Mitev, N. 74, 203, 210, 292, 306, 310, 313
Mithas, S. 518
Mitroff, I. 16, 18, 20, 26, 31, 47–8 nn., 73, 297
Mobile Data Terminal (police vehicles)484–5
mobile phones42, 266, 450, 460, 471, 473–4, 476, 487, 489, 538
convergence of PDAs and469–70
customized481–2
display of caller's identity483
first‐generation networks468
GPS‐enabled451
harassment using615
Internet‐enabled480
number globally467, 640–1
RFID‐reader‐enabled485
role played in customer acquisition and retention641
social aspects of use475 see also GSM
mobile systems42, 446–7, 449, 452, 464, 467–95
dynamic storage capacity450
wireless devices457
mobility472–4
enterprise467–8, 476–7, 480, 486, 488–9
model building101
modelling techniques459
Modgil, C. & J. 130
modularity383
Mohanty, J. 257–8, 287 n.
Mojsilovic, A. 499–500, 504
Montealegre, R. 155
Monteiro, E. 128–9, 292, 296, 304, 310, 636–7, 648, 653, 660
Moor, James602, 604–5, 610–11, 613–14, 616
Moore, Gordon22, 33
Moore, J. E. 574
moral norms604
moral relativism307
Moran, Dermot253, 256, 262–3, 278
Morgan, A. 576
Morgan, G. 175, 186, 545
Morgan, Howard29
Morgan (J.P.)503
Morpheus movie swapping612
morphogenetic approach118, 130
Morris, M. 566
Mortgage Bankers Association of America9
motherhood576
motivation37, 404–7
lack of409
movie files612
Mowshowitz, A. 189
Mozambique636
‘muddling through’336–7
Mukhopadhyay, T. 498, 509
Mulkay, M. 297
multiculturalism630, 633
multidimensional organizations10–11
multidivisional form9–10
(p. 709) multifunctional information appliances675–6
multimethodology75
multinational corporations359, 381, 625, 631
global employment in630
multi‐stage models152
Multiview25, 73
Mumford, Enid12, 20, 24, 32–3, 215, 404, 406, 408–9, 421, 427, 430
Munir, K. 292
Munro, I. 175, 191–2
Murdoch, J. 304
Murray, F. 175, 187, 189, 292, 305, 310
Mursu, A. 651
music231, 237, 239–40
illicit copying/downloads of612, 615
listening to259–60
Myers, G. 304
Myers, M. D. 39, 44–6, 200, 202, 230–1, 295, 306, 311, 420, 653
MySpace553
Nadler, D. 332, 337
Naidu, Chandrababu642
Nakatsu, R. 505, 508, 515
Nam, K. 500
Nance, K. L. 613
Nandhakumar, J. 124, 306, 472
Napster612
nation‐state role627–9
National Academy of Sciences (US)562–3
National Audit Office (UK)416
National Science Foundation (US)563
nationality576
natural step590
naturalist view71
Naumann, David49 n.
nearshoring497, 519
neo‐institutionalism144–8, 154–5, 158–9, 161, 168
limitations of151–3
Nestlé11–13
net effect385–6
Netherlands34
netsourcing516–17
network society175, 192
network spanners359
network technologies551
networks22, 303, 307, 310, 629, 673, 677
cross‐border630
electronic615
global630
greased data that can easily slip across611
mobile468
public452–3
social547
society and economy as648
stabilized308
networks of action model653
Nevo, D. 335
New, C. 117
new technologies42, 93, 192, 455
application of357
evaluating the competitive potential of378
most socially pervasive question raised by189
new world order633
New York272, 482
New York University30
Newell, A. 48 n.
Newell, S. 4, 7, 10, 330, 334–8, 381, 401, 405–6, 411, 427, 431, 453–4, 545
Newkirk, H. E. 332, 335
Newman, M. 17, 212, 509
Newtonian physics70, 89
NGOs (nongovernmental organizations)657–8, 664
Ngwenyama, O. K. 201, 203, 211, 306, 311, 505, 655
NHS (UK National Health Service)105, 302
work‐integrated training of professionals478
Nicholson, B. 662
Nicolini, D. 400, 540
Niedzviecki, H. 471
Nielsen, S. H. 568, 575
Nietzsche, F. W. 175, 195 n.
Nishida, Kitaro543
Nissen, H. E. 38, 44
noema258, 261, 278, 286 n.
noesis and259–60
Nohria, N. 331, 336
Nolan, R. L. 18, 31, 48 n.
non‐linearity454, 474
non‐substitutability375
importance as barrier to erosion389
Norris, G. 337
North Africans631
North Staffordshire Polytechnic29
Norwegian health sector304
notebooks450, 467, 469, 471, 473
Nowotny, H. 537–9
nuclear war603
Nunamaker, J. 29, 37–8
nursing work/nurses304, 571
Nygaard, K. 17
objectification141
objectivism234–5
objectivity211
judgement of297
obscurantism277
observation70–1, 297–8
anthropological214
O'Callaghan, A. 73
O'Donnell, S. W. 332
off‐premises trading482–3
off‐the‐shelf packages/services4, 383, 404
offshore outsourcing8, 44, 497, 504–5, 515–16, 518
OGC (Open Geospatial Consortium)449
Oh, W. 500, 503–4
Oklahoma bombing (1995)631
Oliver, C. 139, 143, 149–50, 430
OLPC (One Laptop Per Child) project588, 675–7
Olsen, Ken469
Olsen, M. H. 32
Olson, D. L. 73
Olson, M. 16, 32, 404
OMA (Open Mobile Alliance)449
one‐dimensionality257, 259
one‐to‐one alignment362
ontological phenomenology283
ontological security119
ontology70–1, 73, 75–6, 78, 81, 90, 107, 274–5, 543
constructionist202–3
Heideggerian283
inconsistent117
objectivist202, 311
social science294
OPDT (Oxford Paperback Dictionary & Thesaurus)269
open architectures31
open communications511
standards‐based449–50
open programming environments383
openness678
operating systems263
Operational Research Society40
operations research16–17, 24, 26–7, 48 n., 93, 106, 180
oppression201, 203, 205, 207–10, 212, 215, 217, 219, 577
acquiescence to206
Oracle444, 516
O'Reilly, C. 330, 332–3, 336–7
organisms89
self‐reproduction90
Organization Science (journal)49 n.
organizational change32, 158, 182, 305, 410–11, 537, 567, 647, 651
ES implementations as major form of401
important norm in facilitating402
managing12, 17
political processual model of187
organizational size356
organizational structure144–7
organizational value chain366
Orlitzky, M. 422
Orthodox Judaism613
OS (Organization Studies)157, 174, 180, 472
IS and153, 158, 180–1
MS and185–93
Osborne, Harold S. 468
Osei‐Bryson, K.‐M. 505
Oshri, I. 332, 334–5, 514–16
(p. 711) outsourcing5–8, 36–7, 185, 438, 496–516, 539
growth of47 n., 379–80
non‐essential services362 see also ASP; BPO
Oxford Handbook of Information and Communications Technologies, The561
Oza, N. 513–15
Pacific Asia Conference on Information Systems561
PACIS (Pacific‐Asia Conference on Information Systems)39–40, 49 n.
Pagach, D. 503
Palen, L. 475
Palmer, J. W. 355
Palmer, R. E. 231–3
palmtops266, 268
Panopticon concept176, 186, 188–93
PANs (Personal Area Networks)467, 469
paperless office promise587
Papp, R. 349, 354
paradigms71–3, 75, 297, 595, 598, 629
coexisting70
embodied281
paradoxical decisions359
Pare, G. 356
parenthood576
Pareto principle366
Parks, M. 72
Parliamentary Office of Science and Technology615
Parmenides275
Parsons, Talcott114
particularism297
partnership37
passwords:
management techniques444
stealing or hacking462
pathology348
patriarchy/patriarchalism577, 631
Paulo Amaral, M. N. 313
PCs (personal computers)36, 42, 266, 272, 380, 680
introduction of30–1
PDAs (personal digital assistants)42, 450, 471, 487–8
convergence of mobile phones and469–70
Peak, D. 356
Pearson, J. M. 352
Peirce, C. S. 77
Pennsylvania34, 40
Penrose, E. T. 338
Peppard, J. 332, 334
perception260
objective70
performance monitoring185
performativity77–9, 82, 312–13
Perlow, L. A. 484
Perrow, C. 141, 454
personal characteristics576
personal information189
ability to restrict access to or control610
control of610
digitized611
Pettigrew, A. M. 652–3
Pfeffer, J. 401–3, 420, 545
phenomenology71, 107, 114, 154, 179, 211, 214, 253–91
existential204
genetic285 n.
neo‐institutional theorists sympathetic to147
Philadelphia34, 43
philosophy106
and IS research68–71
language114
philosophy of science73, 77, 297
Philosophy of Science (journal)91
philosophy of technology175
particularistic177
phishing615
phonetic alphabet275
physics70, 89, 241
Piccoli, Gabriele13, 373–4, 378–81, 384–5, 387–8, 405
Pickering, A. 297
Pierson, C. 128–9
Pinch, T. 295, 298–9, 544
Pingry, D. 587–8
Pinsonneault, A. 123–4, 357
piracy212
(p. 712) Pisano, G. 332, 542
Pitt, L. 592, 672–3, 678, 680
Pittsburgh40
planned change models17
platform technologies552
Plato91, 273, 278
plug‐and‐play systems458
PMI (Project Management Institute)5
Polanyi, M. 542–4
police483–6, 631
political activism207, 213
political power186, 310
major dimension of311
political theory215
politics17, 37, 187, 210
Polt, R. 254–5, 286 n.
Pondicherry640
Pool, I. D. S. 475
Poole, M. S. 33, 37, 113, 125–6, 128–32, 153, 429, 455
poor people588, 624, 639–43
Pop‐Eleches, C. 588, 678
Popper, Karl70
Poppo, L. 509–11, 518
population increase586
pornography615, 617
Porpora, D. 117–18
Porra, J. 72, 210, 213
Porter, M. E. 18, 32, 330, 333, 680
positivism68, 70–1, 73, 75, 106–7, 157, 232, 258, 260, 284, 295, 309
critique by qualitative researchers230
dominance of230
naive truth theories implied in211
objections/opposition to130, 218
rejected233, 293
post‐colonialism209, 213
post‐structuralism71, 114, 292, 297, 577
and constructivism293–6
as social critique311–13
Poster, M. 176, 188–91
postmodernism71, 178, 189, 191, 213, 217, 292, 294, 311, 313
esoteric312
feminism and577
Poulter, J. 89, 100, 107
poverty634
extreme657
vision of eradicating648
Powell, T. C. 376, 379, 387
Powell, W. W. 138–41, 143–5, 149, 151–4, 158–60, 418, 430
power248, 293, 308–9, 359
asymmetries of635
control and107–8, 118, 206–7
disciplinary192
impossible to separate knowledge from294
influence and402
knowledge and177–9, 182–3, 292, 400
military188
panoptic189–91
power shared631
social642–3
technologies of176 see also political power
power relations177, 180, 184–5, 191–2
intensification of176, 193
oppressive206
Pozzebon, M. 123–4, 211
PQR formula102–4
practice lens127–8
practice‐oriented methodologies213
practice perspectives541, 546–9, 552, 554 see also communities of practice
prejudices240–1, 247–51
present‐at‐handness254–5
Price, A. 594
prisons191
privacy212, 435, 603
compromising416
impact of RFID technology on476
right to421, 610–11, 613
serious issues of471
threat to191
problem of order119
problem‐solving205
algorithmic28
problématisation303, 314
problem‐solving ethical604
process‐based view37
process models141, 156, 352
common problem identified in152
(p. 713) firm foundation for designing158
immature151
processual approach358
Procter & Gamble12–13
Global Business Services11
Proctor, R. 589
productivity18, 32, 36, 589
professional associations4, 609–10
professionalization/professionalism3–5, 11–12, 607, 609–10
normative pressures stem largely from140
scientific work296
programmability678–9
programmable tags450
programming languages21
buffer overloading615–16
progressive transformation649, 655–62
Prohibition (US 1930s)485
property ownership611–12
offences related to infringements of615
property rights615
propositions76–9, 82
Prospector strategy356
Proto‐Indo‐European language287 n.
Prusack, L. 43
PSA (professional services automation)156
PSL/PSA (Problem Statement Language/Problem Statement Analyzer)23
public‐choice theory146
public networks452–3
publication617–18
pull systems460–1, 463
punctuated equilibrium models360–1, 364
push systems460–1, 463, 484
Pyburn, P. J. 350–1
Quaddus, M. 551
Quan, J. 156
Quesenberry, J. 563, 567–8, 576
Quick Response technology355
Quinby, L. 193
Quinn, J. B. 503, 508
Rabinow, P. 175–6, 311
race205–6, 574, 576
discrimination312
racism601
radar188
radical insight254
radio188, 484
two‐way468, 485
Rafaeli, A. 335
Raina, M. 643
Rainer, A. 513–14
Rainer, R. K. 365
Ramanujam, V. 337
Ramiller, N. 17–18, 155–6
RAND Corporation93, 106
Ranganathan, C. 514, 516
Ranson, S. 122
Rao, H. R. 503, 514
Rao, S. S. 640
Rapoport, A. 91
rational‐actor models152
rational choice137, 145–7, 150
rationalist ethics604
rationality137, 292, 298
institutional isomorphism and140
managerial218
modernist71
neo‐institutionalism and145
privileging294
purposive208–9, 211, 217
technical182 see also bounded rationality
rationalization139–40, 144, 153, 176
social construction of152
rationalized beliefs152–3
Ray, Amy W. 453
Ray, I. 640
Ray, R. 424, 428
Raymond, L. 337, 349–50, 356
RBV (resource‐based view)348, 364, 374–89
Rea, K. P. 337
Reactor strategy356
Reagan, Ronald603
Real domain69–70
realism:
critical73–5, 77,