default search action
Melanie Wilson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c14]Zack Ellerby, Josie McCulloch, Melanie Wilson, Christian Wagner:
Exploring How Component Factors and Their Uncertainty Affect Judgements of Risk in Cyber-Security. CRITIS 2019: 31-42 - [i1]Zack Ellerby, Josie McCulloch, Melanie Wilson, Christian Wagner:
Exploring how Component Factors and their Uncertainty Affect Judgements of Risk in Cyber-Security. CoRR abs/1910.00703 (2019) - 2012
- [j7]Nicole A. Vasilevsky, Tenille Johnson, Karen Corday, Carlo Torniai, Matthew H. Brush, Erik Segerdell, Melanie Wilson, Chris Shaffer, David Robinson, Melissa A. Haendel:
Research resources: curating the new eagle-i discovery system. Database J. Biol. Databases Curation 2012 (2012) - 2011
- [c13]Stella Mitchell, Carlo Torniai, Brian Lowe, Jon Corson-Rikert, Melanie Wilson, Mansoor Ahmed, Shanshan Chen, Ying Ding, Nicholas Rejack, Melissa A. Haendel:
Aligning Research Resource and Researcher Representation: The eagle-i and VIVO Use Case. ICBO 2011 - [c12]Carlo Torniai, Matthew H. Brush, Nicole A. Vasilevsky, Erik Segerdell, Melanie Wilson, Tenille Johnson, Karen Corday, Chris Shaffer, Melissa A. Haendel:
Developing an Application Ontology for Biomedical Resource Annotation and Retrieval: Challenges and Lessons Learned. ICBO 2011
2000 – 2009
- 2006
- [j6]Anita Greenhill, Melanie Wilson:
Haven or hell? Telework, flexibility and family in the e-society: a Marxist analysis. Eur. J. Inf. Syst. 15(4): 379-388 (2006) - 2005
- [j5]Melanie Wilson, Debra Howcroft:
Power, politics and persuasion in IS evaluation: a focus on 'relevant social groups'. J. Strateg. Inf. Syst. 14(1): 17-43 (2005) - [c11]Melanie Wilson, Anita Greenhill:
Flexibility and Gender in the E-Society: Marxist Theory Applied to At-Home Telework. ECIS 2005: 560-572 - [c10]Melanie Wilson:
The Ubiquity and Utility of Resistance: Codesign and Personalization of Information Systems. Designing Ubiquitous Information Environments 2005: 321-334 - 2004
- [j4]Melanie Wilson:
A conceptual framework for studying gender in information systems research. J. Inf. Technol. 19(1): 81-92 (2004) - [c9]Melanie Wilson, Anita Greenhill:
Gender & teleworking identities: reconstructing the research agenda. ECIS 2004: 1989-2001 - [c8]Tony Salvador, Jeremy Rose, Edgar A. Whitley, Melanie Wilson:
New Insights into Studying Agency and Information Technology. Relevant Theory and Informed Practice 2004: 653-654 - [c7]Melanie Wilson, Anita Greenhill:
Theory and Action for Emancipation: Elements of a Critical Realist Approach. Relevant Theory and Informed Practice 2004: 667-674 - 2003
- [j3]Debra Howcroft, Melanie Wilson:
Paradoxes of participatory practices: the Janus role of the systems developer. Inf. Organ. 13(1): 1-24 (2003) - 2002
- [j2]Melanie Wilson, Debra Howcroft:
Re-conceptualising failure: social shaping meets IS research. Eur. J. Inf. Syst. 11(4): 236-250 (2002) - [j1]Melanie Wilson:
Making nursing visible? Gender, technology and the care plan as script. Inf. Technol. People 15(2): 139-158 (2002) - [c6]Melanie Wilson:
Rhetoric of Enrollment and Acts of Resistance: Information Technology as Text. Global and Organizational Discourse about Information Technology 2002: 225-248 - 2001
- [c5]Debra Howcroft, Helen J. Richardson, Melanie Wilson:
Now You See it... Now You Don't Myths of the Dot.Com Market. ECIS 2001: 98-108 - [c4]Melanie Wilson:
A New Paradigm for Considering Gender in Information Systems Development Research. Realigning Research and Practice in Information Systems Development 2001: 353-366 - 2000
- [c3]Lara Fournier, Katherine Gorris, Jody Pettit, Melanie Wilson, Elizabeth Wood:
Initial Offering of a Project Management Course in a Medical Informatics Curriculum: 'Release 1.0'. AMIA 2000 - [c2]Melanie Wilson, Debra Howcroft:
The politics of IS evaluation: a social shaping perspective. ICIS 2000: 94-103 - [c1]Melanie Wilson, Debra Howcroft:
The Role of Gender in User Resistance and Information Systems Failure. Organizational and Social Perspectives on IT 2000: 453-472
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint