default search action
Judy McKay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j13]Shah Jahan Miah, John G. Gammack, Judy McKay:
A Metadesign Theory for Tailorable Decision Support. J. Assoc. Inf. Syst. 20(5): 4 (2019) - 2017
- [j12]Michelle Ye, Kristy de Salas, Nadia Ollington, Judy McKay:
Applying Turner's Three-Process Theory of Power to the Study of Power Relations in a Troubled Information Systems Implementation. Australas. J. Inf. Syst. 21 (2017) - 2016
- [c35]Shah Jahan Miah, Judy McKay:
A New conceptualisation of Design Science Research for DSS Development Research. PACIS 2016: 384 - 2014
- [c34]Judy McKay, Peter Marshall, Nick Grainger:
Rethinking Communication in IT Project Management. HICSS 2014: 4315-4324 - [c33]Nicholas Grainger, Judy McKay:
Enterprise System Implementation Failure: A Strategic Response? ICIS 2014 - 2013
- [c32]Judy McKay, Peter Marshall, Siddhartha Arumugam, Nicholas Grainger:
Setting a Research Agenda for IT Project Management Offices. HICSS 2013: 4364-4373 - 2012
- [j11]Judy McKay, Peter Marshall, Rudy Hirschheim:
The design construct in information systems design science. J. Inf. Technol. 27(2): 125-139 (2012) - [c31]Judy McKay, Peter Marshall, Nick Grainger, Rudy Hirschheim:
Change Implementers' Resistance: Considering Power and Resistance in IT Implementation Projects. ACIS 2012 - [c30]Shubhankar Thatte, Nick Grainger, Judy McKay:
Feral Practices. ACIS 2012 - [c29]Yaqian Ye, Peter Marshall, Judy McKay:
Power Relations in IS Projects : A Critical Review and a New Research Agenda. ACIS 2012 - 2011
- [c28]Rajiv Vashist, Judy McKay, Peter Marshall:
Revealing a Research Agenda: An Inter-disciplinary Perspective to Strengthen IS Research on Boundary Spanning. ACIS 2011 - [c27]Rajiv Vashist, Judy McKay, Peter Marshall:
How well do we understand boundary practices? empirical evidence from a practice of business analysts. ECIS 2011: 158 - [c26]Judy McKay, Peter Marshall, Nick Grainger, Rudy Hirschheim:
Learning to listen: background conversations in enterprise system implementations. ECIS 2011: 169 - 2010
- [c25]Judy McKay, Nick Grainger, Peter Marshall, Rudy Hirschheim:
Artefaction as Communication: Redesigning Communication Models. ACIS 2010 - [c24]Rajiv Vashist, Judy McKay, Peter Marshall:
The Roles and Practices of Business Analysts: A Boundary Practice Perspective. ACIS 2010
2000 – 2009
- 2009
- [j10]Jan Recker, Raymond Young, Fiona Darroch, Peter Marshall, Judy McKay:
ACIS 2007 Panel Report: Lack of Relevance in IS Research. Commun. Assoc. Inf. Syst. 24: 18 (2009) - [j9]Catherine Lang, Denny Meyer, Sarah Niner, Judy McKay, Sue Lewis:
The Impact of Gender and Pedagogical Factors on Female Pass Rates. Commun. Assoc. Inf. Syst. 25: 28 (2009) - [c23]Nargiza Bekmamedova, Artem Vorobiev, Judy McKay:
Establishing the Trust-Control Balance in Client-Vendor Outsourcing Relationships: Empirical Evidence from Two IS Outsourcing Projects. ACIS 2009 - [c22]Nick Grainger, Judy McKay, Peter Marshall:
Learning from a Strategic Failure. ACIS 2009 - 2008
- [c21]Nargiza Bekmamedova, Adi Prananto, Judy McKay, Artem Vorobiev:
Towards Better Understanding of the Relationship between Formal Controls and Trust in IS Outsourcing. ACIS 2008 - [c20]Nargiza Bekmamedova, Adi Prananto, Judy McKay, Artem Vorobiev:
Towards a Conceptualisation of Trust in IS Outsourcing. ICIS 2008: 152 - 2007
- [j8]Sue Lewis, Catherine Lang, Judy McKay:
An Inconvenient Truth: the invisibility of Women in ICT. Australas. J. Inf. Syst. 15(1) (2007) - [c19]Nick Grainger, Judy McKay:
ERP: More than Just a System The Role of ERP in Mergers and Acquisitions. ACIS 2007 - [c18]Judy McKay, Peter Marshall:
Science, Design, and Design Science: Seeking Clarity to Move Design Science Research Forward in Information Systems. ACIS 2007 - [c17]Catherine Lang, Judy McKay, Sue Lewis:
Seven factors that influence ICT student achievement. ITiCSE 2007: 221-225 - 2006
- [c16]Catherine Lang, Judy McKay, Sue Lewis:
Declining popularity increases lack of diversity: extending the discourse of the discipline. ACIS 2006 - [c15]Peter Marshall, Kristy de Salas, Judy McKay:
Action Research in Practice: Balancing the Dual Imperatives. ACIS 2006 - [c14]Suzanne Zyngier, Frada Burstein, Judy McKay:
The Role of Knowledge Management Governance in the Implementation of Strategy. HICSS 2006 - 2005
- [j7]Peter Marshall, Judy McKay, Adi Prananto:
Business Value Creation from IT Investments: towards a process theory of IT governance. Australas. J. Inf. Syst. 12(2) (2005) - 2004
- [j6]Peter Marshall, Judy McKay:
Strategic IT Planning, Evaluation and Benefits Management: the basis for effective IT governance. Australas. J. Inf. Syst. 11(2) (2004) - [c13]Peter Marshall, Judy McKay, Adi Prananto:
A Process Model of Business Value Creation from IT investments. ACIS 2004 - [c12]Adi Prananto, Judy McKay, Peter Marshall:
Lessons learned from analysing e-business progression using a stage model in Australian Small Medium Enterprises (SMEs). ACIS 2004 - [c11]Joze Kuzic, Judy McKay:
Pitfalls of Electronic Commerce in Large Corporations. ECIS 2004: 975-985 - [c10]Judy McKay, Peter Marshall:
Deriving business value from IT: converting IT expenditures into assets with desired impacts. ECIS 2004: 1186-1198 - [c9]Adi Prananto, Judy McKay, Peter Marshall:
Exploring the perceptions of inhibitors and drivers of e-business progression among SMEs at different stages of e-business maturity. ECIS 2004: 1510-1521 - [c8]Helana Scheepers, Judy McKay:
An empirical assessment of the business value derived from implementing mobile technology: a case study of two organisations. ECIS 2004: 1693-1705 - 2003
- [c7]Adi Prananto, Judy McKay, Peter Marshall:
Perceived and Realisation of Business Value as a Facilitator of E-Business Progression in Australian SMEs. ACIS 2003 - [c6]Adi Prananto, Judy McKay, Peter Marshall:
Spectrum of e-business maturity in australian SMEs: a multiple case studies approach on the applicability of the stages of growth for e-business model. ECIS 2003: 1603-1613 - 2002
- [j5]Peter Marshall, Judy McKay:
Evaluating the Benefits of Electronic Commerce in Small and Medium Enterprises. Australas. J. Inf. Syst. 9(2) (2002) - 2001
- [j4]Judy McKay, Peter Marshall:
The dual imperatives of action research. Inf. Technol. People 14(1): 46-59 (2001) - [j3]Judy McKay, Peter Marshall:
Conceptualising Information Systems Planning Across Strategic Business Networks. J. Glob. Inf. Manag. 9(2): 23-33 (2001) - [c5]Adi Prananto, Judy McKay, Peter Marshall:
Frameworks to Support E-Business Growth Strategy. ECIS 2001: 1254-1263 - 2000
- [j2]Peter Marshall, Roger Sor, Judy McKay:
An Industry Case Study of the Impacts of Electronic Commerce on Car Dealerships in Western Australia. J. Electron. Commer. Res. 1(1): 1-12 (2000) - [c4]Peter Marshall, Roger Sor, Judy McKay:
The Impacts of Electronic Commerce in the Automobile Industry: An Empirical Study in Western Australia. CAiSE 2000: 509-521 - [c3]Judy McKay, Peter Marshall:
Quality and Rigour of Action Research in Information Systems. ECIS 2000: 108-115
1990 – 1999
- 1999
- [c2]Peter Marshall, Janice M. Burn, Martyn Wild, Judy McKay:
Virtual Organisations: Structure and Strategic Positioning. ECIS 1999: 482-495 - 1998
- [j1]Judy McKay:
Using Cognitive Mapping to Achieve Shared Understanding in Information Requirements Determination. Aust. Comput. J. 30(4): 139-145 (1998) - 1994
- [c1]Judy McKay, Peter Marshall, Donald McDermid:
Cognitive mapping for information requirements determination in the learning organization. ECIS 1994: 759-770
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-25 23:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint