Follow
Rens Scheepers
Rens Scheepers
Professor of Information Systems
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Protecting organizational competitive advantage: A knowledge leakage perspective
A Ahmad, R Bosua, R Scheepers
Computers & Security 42, 27-39, 2014
2962014
Knowledge strategy in organizations: refining the model of Hansen, Nohria and Tierney
R Scheepers, K Venkitachalam, MR Gibbs
The Journal of Strategic Information Systems 13 (3), 201-222, 2004
2112004
Managing the crises in intranet implementation: a stage model
J Damsgaard, R Scheepers
Information Systems Journal 10 (2), 131-149, 2000
2092000
Managing the crises in intranet implementation: a stage model
J Damsgaard, R Scheepers
Information Systems Journal 10 (2), 131-149, 2000
2092000
Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples
PB Seddon, R Scheepers
European journal of information systems 21, 6-21, 2012
1892012
Structuration theory and information system development-frameworks for practice
J Rose, R Scheepers
ECIS 2001 Proceedings, 80, 2001
1712001
Towards a model to explain knowledge sharing in complex organizational environments
R Bosua, R Scheepers
Knowledge management research & practice 5 (2), 93-109, 2007
1482007
Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations
R Scheepers, H Scheepers, OK Ngwenyama
European Journal of Information Systems 15 (3), 261-268, 2006
1462006
Corporate intranet implementation: managing emergent technologies and organizational practices
JP Bansler, J Damsgaard, R Scheepers, E Havn, J Thommesen
Journal of the Association for Information Systems 1 (1), 10, 2000
1252000
Power, influence and intranet implementation: a safari of South African organizations
J Damsgaard, R Scheepers
Information Technology & People 12 (4), 333-358, 1999
1171999
Business Analytics and Competitive Advantage: A Review and a Research Agenda.
R Sharma, P Reynolds, R Scheepers, PB Seddon, GG Shanks
DSS, 187-198, 2010
1162010
Incorporating a knowledge perspective into security risk assessments
P Shedden, R Scheepers, W Smith, A Ahmad
Vine 41 (2), 152-166, 2011
1142011
Incorporating a knowledge perspective into security risk assessments
P Shedden, R Scheepers, W Smith, A Ahmad
Vine 41 (2), 152-166, 2011
1142011
When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena
C Middleton, R Scheepers, VK Tuunainen
European Journal of Information Systems 23 (5), 503-512, 2014
1092014
A model for studying IT outsourcing relationships
S Alborz, P Seddon, R Scheepers
1062003
A literature analysis of the use of absorptive capacity construct in IS research
S Gao, W Yeoh, SF Wong, R Scheepers
International Journal of Information Management 37 (2), 36-42, 2017
982017
The dependent variable in social media use
H Scheepers, R Scheepers, R Stockdale, N Nurdin
Journal of Computer Information Systems 54 (2), 25-34, 2014
912014
Using Internet technology within the organization: a structurational analysis of intranets
R Scheepers, J Damsgaard
Proceedings of the 1997 ACM International Conference on Supporting Group …, 1997
861997
A process-focused decision framework for analyzing the business value potential of IT investments
H Scheepers, R Scheepers
Information Systems Frontiers 10, 321-330, 2008
842008
Asset identification in information security risk assessment: A business practice approach
P Shedden, A Ahmad, W Smith, H Tscherning, R Scheepers
Communications of the Association for Information Systems 39 (1), 15, 2016
582016
The system can't perform the operation now. Try again later.
Articles 1–20