default search action
Peter Busch 0001
Person information
- affiliation: Macquarie University, Sydney, NSW, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Taimur Ahad, Peter Busch:
Exploring the factors influencing Mobile-based Ubiquitous System adoption in the Bangladesh RMG sector: A view through DOI and TOE. Electron. J. Inf. Syst. Dev. Ctries. 90(1) (2024) - [c53]Andrew Edwards, Stephen Smith, Peter Busch:
Predictive Tools for House Fire Instance Preparation. AMCIS 2024 - 2023
- [c52]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Abstract Sentence Classification Acceptance. ACIS 2023 - [c51]Artur Rot, Malgorzata Sobinska, Peter Busch:
Programming Teams in Remote Working Environments: an Analysis of Performance and Productivity. ACIT 2023: 376-381 - 2022
- [j9]Bahjat Fakieh, Peter Busch, Yvette Blount:
Australian SME adoption of cloud computing: drivers and challenges. Int. J. Bus. Inf. Syst. 40(4): 514-539 (2022) - [c50]Hijab Alavi, Stephen Smith, Peter Busch:
IT Education vs. Employability Mismatch. ACIS 2022: 8 - [c49]Andrew Edwards, Stephen Smith, Peter Busch, Donald Winchester:
Predictive Technologies for Strategic House Fire Management. ACIS 2022: 10 - [c48]Hassan Hessari, Peter Busch, Stephen Smith:
Supportive leadership and co-worker support for nomophobia reduction: Considering affective commitment and HRM practices. ACIS 2022: 18 - [c47]Yuk Tung Tonnie Lam, Peter Busch, Stephen Smith:
Australia's Embrace of a Cashless Society: A Quantitative Analysis. ACIS 2022: 24 - [c46]Yvonne Bachiller, Peter Busch, Stephen Smith:
Innovation through process automation: Factors for success. ACIS 2022: 33 - 2021
- [j8]Taimur Ahad, Peter Busch, Yvette Blount, Winnie Picoto:
Bangladeshi ready-made garment development via ubiquitous and mobile computing. Electron. J. Inf. Syst. Dev. Ctries. 87(4): 12170 (2021) - [c45]Hijab Alavi, Stephen Smith, Peter Busch, Matthew Mansour:
Australian Undergraduate IT Curricula: Employer Perspectives. ACIS 2021: 35 - [c44]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Intention to Use Abstract Sentence Classification Technology. ACIS 2021: 83 - [c43]Hijab Alavi, Stephen Smith, Peter Busch, Donald Winchester:
Empiricism through Activity Theory: Australian Undergraduate ICT Education. ICIS 2021 - 2020
- [c42]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Thirty Years of ACIS Proceedings: An Archival Analysis. ACIS 2020: 19 - [c41]Yuk Tung Tonnie Lam, Peter Busch, Stephen Smith:
Australia's Embrace of a Cashless Society. ACIS 2020: 70 - [c40]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul, Vincent Pang:
An Activity Theory Investigation of Academic Abstract Sentence Classification. PACIS 2020: 37 - [c39]Andrew Edwards, Stephen Smith, Peter Busch, Donald Winchester, Felix T. C. Tan, Vincent Pang:
Critical Learning from Fires: An Investigation of Complexity in IS-enabled Emergency Management. PACIS 2020: 99 - [c38]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Towards an Academic Abstract Sentence Classification System. RCIS 2020: 562-568
2010 – 2019
- 2019
- [c37]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Emerald 110k: A Multidisciplinary Dataset for Abstract Sentence Classification. ALTA 2019: 120-125 - [c36]Andrew Edwards, Stephen Smith, Peter Busch, Vincent Pang, Donald Winchester:
IS Mediation of Emergency Management: Adding Prediction to the existing Framework of Activities? PACIS 2019: 52 - 2018
- [c35]Yvonne Bachiller, Peter Busch, Manolya Kavakli, Len Hamey:
Survey: Big Data Application in Biomedical Research. ICCAE 2018: 174-178 - [c34]Juan Gonzalez-Dominguez, Peter Busch:
Automated Business Process Discovery and Analysis for the International Higher Education Industry. PKAW 2018: 170-183 - [i1]Ahmed D. Alharthi, Peter Busch, Stephen Smith:
A prototypical Skin Cancer Information System. CoRR abs/1808.04980 (2018) - 2017
- [j7]Farshid Anvari, Deborah Richards, Michael Hitchens, Muhammad Ali Babar, Hien Minh Thi Tran, Peter Busch:
An empirical investigation of the influence of persona with personality traits on conceptual design. J. Syst. Softw. 134: 324-339 (2017) - 2016
- [j6]Raj Man Shrestha, Mehmet A. Orgun, Peter Busch:
Offer acceptance prediction of academic placement. Neural Comput. Appl. 27(8): 2351-2368 (2016) - [c33]Nadasa Chan, Debbie Richards, Peter Busch:
Identifying a Set of Technological Features to Aid Decision-Making for Prospective Live Kidney donors and Recipients. ECIS 2016: Research Paper 159 - [c32]Eui Dong Kim, Peter Busch:
Workflow Interpretation via Social Networks. PKAW 2016: 241-250 - 2015
- [j5]Amara Atif, Deborah Richards, Peter Busch, Ayse Bilgin:
Assuring graduate competency: a technology acceptance model for course guide tools. J. Comput. High. Educ. 27(2): 94-113 (2015) - [c31]Aishwarya Bedekar, Peter Busch, Deborah Richards:
A Review of IT Initiatives in Rural India. AMCIS 2015 - [c30]Kayleigh Rumbelow, Peter Busch, Deborah Richards:
An Australian Ski Resort System. ICEIS (3) 2015: 65-70 - 2014
- [c29]Alis Keshishi, Peter Busch:
Interpreting Overlaps in Business Process Mapping via Organisational Soft Knowledge Flows. PKAW 2014: 209-222 - 2013
- [c28]Ahmed D. Alharthi, Peter Busch, Stephen Smith:
A prototypical Skin Cancer Information System. ACIS 2013: 91 - 2012
- [j4]Krishna Venkitachalam, Peter Busch:
Tacit Knowledge: Review and Possible Research Directions. J. Knowl. Manag. 16(2): 357-372 (2012) - [c27]Amara Atif, Peter Busch, Deborah Richards:
Towards an Ontology-Based Approach to Knowledge Management of Graduate Attributes in Higher Education. PKAW 2012: 229-243 - [c26]Peter Busch, Amireh Amirmazaheri:
Workflow Knowledge Sharing through Social Networks. PKAW 2012: 343-349 - 2011
- [c25]Debbie Richards, Peter Busch:
Knowing-doing gaps in the ICT workplace: gender and culture. ECIS 2011: 68 - [c24]Peter Busch, Peter Fettke:
Business Process Management under the Microscope: The Potential of Social Network Analysis. HICSS 2011: 1-10 - [c23]Debbie Richards, Peter Busch, Dimitra Germanou:
Elearning Promoting Plagiarism Or Honesty? PACIS 2011: 228 - 2010
- [j3]Debbie Richards, Peter Busch, Ayse Bilgin:
The Role of Creativity (and Creative behaviour) in Identifying Entrepreneurs. Int. J. E Entrepreneurship Innov. 1(4): 36-54 (2010) - [c22]Debbie Richards, Peter Busch, Krishna Venkitachalam:
An Analysis by Gender of Differences in Responses to Workplace Scenarios in the Australian ICT Sector. ACIS 2010 - [c21]Peter Busch:
Business Process Management, Social Network Analysis and Knowledge Management: A Triangulation of Sorts? ACIS 2010 - [c20]Ke-Bing Zhang, Mehmet A. Orgun, Peter Anthony Busch, Abhaya C. Nayak:
A Top-Down Approach for Hierarchical Cluster Exploration by Visualization. ADMA (1) 2010: 497-508
2000 – 2009
- 2009
- [c19]Debbie Richards, Peter Busch:
Combining Information Systems and Computer Science Approaches to Identifying Sources of Expertise. ACIS 2009 - [c18]Debbie Richards, Peter Massingham, Peter Busch:
A Knowledge Mapping Approach to Facilitate Strategic Human Resource and Knowledge Management A Knowledge Mapping Approach to facilitate Strategic Human Resource and Knowledge Management. ACIS 2009 - [c17]Deborah Richards, Peter Busch:
Unpacking multiculturalism in the ICT workplace: Differences in responses to workplace situations for English and non-English speaking backgrounds. ECIS 2009: 206-217 - 2008
- [c16]Sri Madhisetty, Peter Anthony Busch, George Feuerlicht, Lee Flax:
Utility Computing and Its Influence on the IT-Industry. Enterprise Information Systems and Web Technologies 2008: 134-140 - [c15]Debbie Richards, Meredith Taylor, Peter Busch:
Expertise Recommendation: A Two-Way Knowledge Communication Channel. ICAS 2008: 35-40 - 2006
- [c14]Peter Busch, Debbie Richards:
Innovation Knowledge Acquisition. Intelligent Information Processing 2006: 259-268 - [c13]Peter Busch, Debbie Richards:
Acquiring Innovation Knowledge. PKAW 2006: 252-257 - 2005
- [c12]Peter Busch, Debbie Richards:
An Approach to Understand, Capture and Nurture Creativity and Innovation Knowledge. ACIS 2005 - [c11]Peter Busch, Debbie Richards:
The application of Social Network Analysis to Knowledge Management. ACIS 2005 - [c10]Peter Busch, François Latouche:
An architecture for WebHelp analysis and development: A case study. ACIS 2005 - [c9]Peter Busch, Debbie Richards:
The Implications of Tacit Knowledge Research for Organizations. Artificial Intelligence and Applications 2005: 344-349 - 2004
- [c8]Peter Busch, Debbie Richards:
Modelling Tacit Knowledge via Questionnaire Data. ICFCA 2004: 321-328 - 2003
- [j2]Debbie Richards, Peter Busch:
Acquiring and Applying Contextualised Tacit Knowledge. J. Inf. Knowl. Manag. 2(2): 179-190 (2003) - [c7]Peter Anthony Busch, Debbie Richards, Christopher N. G. Dampney:
The graphical interpretation of plausible tacit knowledge flows. InVis.au 2003: 37-46 - 2002
- [j1]Kit Dampney, Peter Busch, Debbie Richards:
The Meaning of Tacit Knowledge. Australas. J. Inf. Syst. 10(1) (2002) - [c6]Peter Busch, Debbie Richards, Kit Dampney:
Tacit knowledge characteristics: a research methodology. ACIS 2002 - [c5]Peter Anthony Busch, Debbie Richards, Christopher N. G. Dampney, John Galloway:
Selected Tacit Knowledge Observations Within Two Organisations. VIP 2002: 5-12 - 2001
- [c4]Peter Anthony Busch, Debbie Richards, Christopher N. G. Dampney:
Mapping Tacit Knowledge Flows within Organisation X. ACIS 2001 - [c3]Peter Anthony Busch, Debbie Richards, Christopher N. G. Dampney:
Visual Mapping of Articulable Tacit Knowledge. InVis.au 2001: 37-47 - 2000
- [c2]Peter Anthony Busch, Christopher N. G. Dampney:
Tacit knowledge acquisition and processing within the computing domain: an exploratory study. IRMA Conference 2000: 1014-1015 - [c1]Peter Anthony Busch, Debbie Richards:
Graphically Defining Articulable Tacit Knowledge. VIP 2000: 51-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint