default search action
Marie Griffiths
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j5]Gordon Fletcher, Marie Griffiths:
Digital transformation during a lockdown. Int. J. Inf. Manag. 55: 102185 (2020)
2010 – 2019
- 2018
- [c11]Marie Griffiths, Aleksej Heinze, Alex Fenton, Gordon Fletcher:
Digital Business Evolution: lessons from a decade of KTP industry projects. UKAIS 2018: 30 - [e2]Laurence D. Brooks, Rachel McLean, Marie Griffiths:
Social Transformation - Proceedings of the 23rd UK Academy for Information Systems Conference, UKAIS 2018, St. Anne's College, Oxford, UK, March 20-21, 2018. 2018, ISBN 978-0-9560272-5-2 [contents] - 2016
- [c10]Jessica Blaynee, David Kreps, Maria Kutar, Marie Griffiths:
Collaborative HCI and UX: Longitudinal Diary Studies as a means of Uncovering Barriers to Digital Adoption. BCS HCI 2016 - [e1]David Kreps, Gordon Fletcher, Marie Griffiths:
Technology and Intimacy: Choice or Coercion - 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings. IFIP Advances in Information and Communication Technology 474, Springer 2016, ISBN 978-3-319-44804-6 [contents] - 2015
- [j4]David Kreps, Jessica Blaynee, Maria Kutar, Marie Griffiths:
KTP and RRI: the perfect match. SIGCAS Comput. Soc. 45(3): 332-336 (2015) - [c9]Leena Janahi, Marie Griffiths, Hesham Al-Ammal:
A conceptual model for IT governance in public sectors. FGCT 2015: 1-9 - [c8]Maria Kutar, Marie Griffiths, Jamie Wood:
Ecstasi Project: Using Technology to Encourage Creativity in the Assessment Process. UKAIS 2015: 32 - 2014
- [c7]Marie Griffiths, Leena Janahi, Hesham Al-Ammal:
IT Governance from Theory to Practice: The Importance of Accountability. BCS International IT Conferenc 2014 - [c6]Marie Griffiths, Rachel McLean:
Unleashing Corporate Communications: Social Media And Conversations With Customers. UKAIS 2014: 51
2000 – 2009
- 2009
- [j3]Marie Griffiths, Ben Light:
An investigation into resistance practices at an SME consultancy. J. Enterp. Inf. Manag. 22(1/2): 119-136 (2009) - 2008
- [j2]Marie Griffiths, Ben Light:
Social networking and digital gaming media convergence: Classification and its consequences for appropriation. Inf. Syst. Frontiers 10(4): 447-459 (2008) - [c5]Ben Light, Marie Griffiths, Ryan Ellis McGarrie:
Antisocial Behaviour Orders: Unanticipated Directions in Social Network Site Development. ECIS 2008: 2160-2172 - [c4]Ben Light, Kathy McGrath, Marie Griffiths:
More Than Just Friends? Facebook, Disclosive Ethics and the Morality of Technology. ICIS 2008: 193 - 2007
- [c3]Marie Griffiths, Ben Light:
Risky Business: When a CRM Vendor Masqueraded as an ERP Specialist. ECIS 2007: 913-924 - 2006
- [j1]Alison E. Adam, Marie Griffiths, Claire Keogh, Karenza Moore, Helen J. Richardson, Angela Tattersall:
Being an 'it' in IT: gendered identities in IT work. Eur. J. Inf. Syst. 15(4): 368-378 (2006) - [c2]Marie Griffiths, Ben Light:
User resistance strategies and the problems of blanket prescriptions: A case study of resistance successes. ECIS 2006: 2184-2193 - [c1]Marie Griffiths, Claire Keogh, Karenza Moore, Helen J. Richardson, Angela Tattersall:
Inclusion Through the Ages? Gender, ICT Workplaces, and Life Stage Experiences in England. Social Inclusion 2006: 153-168
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint