Andrew McAfee. (2006). Enterprise 2.0: The Dawn of Emergent Collaboration. MIT Sloan Management Review, 47(3), 21–28. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224963703/DD44A2F5F66A40ADPQ/6?accountid=14888
Andriole, S. (2010). Business impact of Web 2.0 technologies. Communications of the ACM, 53(12). https://doi.org/10.1145/1859204.1859225
Annabi, H., & McGann, S. (2013). Social Media as the Missing Link: Connecting Communities of Practice to Business Strategy. Journal of Organizational Computing and Electronic Commerce, 23(1–2), 56–83. https://doi.org/10.1080/10919392.2013.748608
Aral, S., Dellarocas, C., & Godes, D. (2013). Social Media and Business Transformation: A Framework for Research. Information Systems Research, 24(1), 3–13. https://doi.org/10.1287/isre.1120.0470
Aula, Pekka. (2010). Social media, reputation risk and ambient publicity management. Strategy & Leadership, 38(6), 43–49. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/761420153/8B1E132A12504579PQ/6?accountid=14888
Avgerou, C. (2001). The significance of context in information systems and organizational change. Information Systems Journal, 11(1), 43–63. https://doi.org/10.1046/j.1365-2575.2001.00095.x
Banck, B., & Nyström, C. A. (2005). Intranet use: a study of five Swedish organizations. Journal of Organisational Transformation & Social Change, 2(2), 153–180. https://arlir.iii.com/nonret~S0&atitle=Intranet+use:+a+study+of+five+Swedish+organizations&title=Journal+of+Organisational+Transformation+&+Social+Change&aufirst=Bjrn&auinit=&aulast=Banck&issn=14779633&eissn=2040056X&coden=&volume=2&issue=2&spage=153&epage=180&quarter=&ssn=&date=2005&sid=&reqtype3
Baptista, J., Wilson, A., Galliers, R., & Bynghall, S. (2016). Social Media and the Emergence of Reflexiveness as a New Capability for Open Strategy. Long Range Planning. https://doi.org/10.1016/j.lrp.2016.07.005
Baptista (John), J., Newell, S., & Currie, W. (2010). Paradoxical effects of institutionalisation on the strategic awareness of technology in organisations. The Journal of Strategic Information Systems, 19(3), 171–183. https://doi.org/10.1016/j.jsis.2010.07.001
Beynon-Davies, P. (2011). Significance: exploring the nature of information, systems and technology. Palgrave Macmillan. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2485241
Birkinshaw, J. (2016). Reflections on open strategy. Long Range Planning. https://doi.org/10.1016/j.lrp.2016.11.004
Bjelland, Osvald MWood, Robert Chapman. (2008). An Inside View of IBM’s ‘Innovation Jam’. MIT Sloan Management Review, 50(1), 32–40. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224960315/3A84CF4D6DCB441CPQ/10?accountid=14888
Butler, T. (2003). An institutional perspective on developing and implementing intranet- and internet-based information systems. Information Systems Journal, 13(3), 209–231. https://doi.org/10.1046/j.1365-2575.2003.00151.x
Chesbrough, H., & Appleyard, M. (2007). Open Innovation and Strategy. California Management Review, 50(1), 57–76. http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=27340265&site=bsi-live
Clarke, K., & Preece, D. (2005). Constructing and using a company Intranet: ‘it’s a very cultural thing’. New Technology, Work and Employment, 20(2), 150–165. https://doi.org/10.1111/j.1468-005X.2005.00150.x
Coakes, ElayneBradburn, Anton. (n.d.). What is the value of intellectual capital? Knowledge Management Research & Practice, 3(2), 60–68. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/203469989/17353D92383D456BPQ/3?accountid=14888
Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices. (n.d.). https://www.researchgate.net/publication/220580381_Corporate_Intranet_Implementation_Managing_Emergent_Technologies_and_Organizational_Practices
Curry, A., & Stancich, L. (2000). The intranet — an intrinsic component of strategic information management? International Journal of Information Management, 20(4), 249–268. https://doi.org/10.1016/S0268-4012(00)00015-3
Damsgaard, J., & Scheepers, R. (1999). Power, influence and intranet implementation. Information Technology & People, 12(4), 333–358. https://doi.org/10.1108/09593849910301630
Damsgaard, J., & Scheepers, R. (2000). Managing the crises in intranet implementation: a stage model. Information Systems Journal, 10(2), 131–149. https://doi.org/10.1046/j.1365-2575.2000.00076.x
David Wagner, Gabriele Vollmar, Heinz-Theo Wagner. (2014). The impact of information technology on knowledge creation: An affordance approach to social media. Journal of Enterprise Information Management, 27(1), 31–44. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/1490992058/17BA4981E48D4E77PQ/2?accountid=14888
Davison, R., & Ou, C. (2017). Digital work in a digitally challenged organization. Information & Management, 54(1), 129–137. https://doi.org/10.1016/j.im.2016.05.005
Denyer, D., Parry, E., & Flowers, P. (2011). "Social”, "Open” and "Participative”? Exploring Personal Experiences and Organisational Effects of Enterprise2.0 Use. Long Range Planning, 44(5–6), 375–396. https://doi.org/10.1016/j.lrp.2011.09.007
Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal, 11(2), 127–153. https://doi.org/10.1046/j.1365-2575.2001.00099.x
Dixon, K. R., & Panteli, N. (2010). From virtual teams to virtuality in teams. Human Relations, 63(8), 1177–1197. https://doi.org/10.1177/0018726709354784
Doherty, N., Anastasakis, L., & Fulford, H. (2009). The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management, 29(6), 449–457. https://doi.org/10.1016/j.ijinfomgt.2009.05.003
Doherty, N., & Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), 55–63. https://doi.org/10.1016/j.cose.2005.09.009
Drucker, P. F. (1988). The Coming of the New Organization. Harvard Business Review, 66(1), 45–53. http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/direct.asp?db=bth&jid=HBR&scope=site
Duane, A., & Finnegan, P. (2003). Managing empowerment and control in an intranet environment. Information Systems Journal, 13(2), 133–158. https://doi.org/10.1046/j.1365-2575.2003.00148.x
Dubravka  Cecez-Kecmanovic, Debra Moodie, Andy Busuttil, Fiona Plesman. (1999). Organisational change mediated by e-mail and Intranet An ethnographic study. Information Technology & People, 12(1), 9–26. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/222356590/452338D38B514D41PQ/1?accountid=14888
Faraj, S., Jarvenpaa, S. L., & Majchrzak, A. (2011). Knowledge Collaboration in Online Communities. Organization Science, 22(5), 1224–1239. https://doi.org/10.1287/orsc.1100.0614
Fayard, A. L., & Weeks, J. (2007). Photocopiers and Water-coolers: The Affordances of Informal Interaction. Organization Studies, 28(5), 605–634. https://doi.org/10.1177/0170840606068310
Flecker, J. (Ed.). (2016). Space, place and global digital work. Palgrave Macmillan. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3049968
Giovannucci, D., & Ponte, S. (2005). Standards as a new form of social contract? Sustainability initiatives in the coffee industry. Food Policy, 30(3), 284–301. https://doi.org/10.1016/j.foodpol.2005.05.007
Haefliger, S., Monteiro, E., Foray, D., & von Krogh, G. (2011). Social Software and Strategy. Long Range Planning, 44(5–6), 297–316. https://doi.org/10.1016/j.lrp.2011.08.001
Hatum, A. (2013). The new workforce challenge: How today’s leading companies are adapting for the future [Electronic resource]. Palgrave Macmillan. http://0-www.palgraveconnect.com.pugwash.lib.warwick.ac.uk/doifinder/10.1057/9781137302991
Hautz, J., Seidl, D., & Whittington, R. (2017). Open strategy: Dimensions, dilemmas, dynamics. Long Range Planning, 50(3), 298–309. https://doi.org/10.1016/j.lrp.2016.12.001
Holmqvist, B., Andersen, P. B., Klein, H., & Posner, R. (Eds.). (1996). Signs of work: semiosis and information processing in organisations. Walter de Gruyter. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3298203
Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*. Decision Sciences, 43(4), 615–660. https://doi.org/10.1111/j.1540-5915.2012.00361.x
Huang, J., Baptista, J., & Galliers, R. D. (2013). Reconceptualizing rhetorical practices in organizations: The impact of social media on internal communications. Information & Management, 50(2–3), 112–124. https://doi.org/10.1016/j.im.2012.11.003
Huang, J., Baptista, J., & Newell, S. (2015). Communicational ambidexterity as a new capability to manage social media communication within organizations. The Journal of Strategic Information Systems, 24(2), 49–64. https://doi.org/10.1016/j.jsis.2015.03.002
Jacoby, G. A. & Luqi. (2007). Intranet model and metrics. Communications of the ACM, 50(2), 43–50. https://doi.org/10.1145/1216016.1216019
Jacqueline Vischer. (1995). Strategic Work-Space Planning. Sloan Management Review, 37(1). http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224968966/1FAD2B635774924PQ/8?accountid=14888
JARVENPAA, S. L., & TANRIVERDI, H. (2003). Leading Virtual Knowledge Networks. Organizational Dynamics, 31(4), 403–412. https://doi.org/10.1016/S0090-2616(02)00127-4
João Baptista (John). (2009). Institutionalisation as a process of interplay between technology and its organisational context of use. Journal of Information Technology, Suppl. Special Issue on Institutional Theory in Information, 24(4), 305–319. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216214069/89BA7B10EA424259PQ/3?accountid=14888
Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68. https://doi.org/10.1016/j.bushor.2009.09.003
Kappos, A., & Rivard, S. (2008). A Three-Perspective Model of Culture, Information Systems, and Their Development and Use. MIS Quarterly, 32(3), 601–634. http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=33436507&site=bsi-live
Karyda, M., Kiountouzis, E., & Kokolakis, S. (2005). Information systems security policies: a contextual perspective. Computers & Security, 24(3), 246–260. https://doi.org/10.1016/j.cose.2004.08.011
Kayworth, T., & Whitten, D. (2010). Effective Information Security Requires a Balance of Social and Technology Factors. MIS Quarterly Executive, 9(3), 163–175. http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=53382596&site=bsi-live
Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241–251. https://doi.org/10.1016/j.bushor.2011.01.005
Kitchin, R. (1998). Towards geographies of cyberspace. Progress in Human Geography, 22(3), 385–406. https://doi.org/10.1191/030913298668331585
Knapp, K., Morris, F., Marshall, T., & Byrd, T. (2009). Information security policy: An organizational-level process model. Computers & Security, 28(7), 493–508. https://doi.org/10.1016/j.cose.2009.07.001
Kolb, D. (2008). Exploring the Metaphor of Connectivity: Attributes, Dimensions and Duality. Organization Studies, 29(1), 127–144. https://doi.org/10.1177/0170840607084574
Kolb, D., Caza, A., & Collins, P. (2012). States of Connectivity: New Questions and New Directions. Organization Studies, 33(2), 267–273. https://doi.org/10.1177/0170840611431653
Kolkowska, E., & Dhillon, G. (2013). Organizational power and information security rule compliance. Computers & Security, 33, 3–11. https://doi.org/10.1016/j.cose.2012.07.001
Kossek, E., Lautsch, B., & Eaton, S. (2006). Telecommuting, control, and boundary management: Correlates of policy use and practice, job control, and work–family effectiveness. Journal of Vocational Behavior, 68(2), 347–367. https://doi.org/10.1016/j.jvb.2005.07.002
Lai, V. S. (2001). Intraorganizational communication with intranets. Communications of the ACM, 44(7), 95–100. https://doi.org/10.1145/379300.379324
Lai, Y., & Burchell, B. (2008). Distributed work: communication in an ‘officeless firm’. New Technology, Work and Employment, 23(1–2), 61–76. https://doi.org/10.1111/j.1468-005X.2008.00203.x
Leonardi, P. M., Huysman, M., & Steinfield, C. (2013). Enterprise Social Media: Definition, History, and Prospects for the Study of Social Technologies in Organizations. Journal of Computer-Mediated Communication, 19(1), 1–19. https://doi.org/10.1111/jcc4.12029
Mackenzie, M. (2010). Manager communication and workplace trust: Understanding manager and employee perceptions in the e-world. International Journal of Information Management, 30(6), 529–541. https://doi.org/10.1016/j.ijinfomgt.2010.04.001
Maitland, A., & Thomson, P. (2011). Future work: how businesses can adapt and thrive in the new world of work. Palgrave Macmillan. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2537477
Majchrzak, A., & Malhotra, A. (2013). Towards an information systems perspective and research agenda on crowdsourcing for innovation. The Journal of Strategic Information Systems, 22(4), 257–268. https://doi.org/10.1016/j.jsis.2013.07.004
Martini, A., Corso, M., & Pellegrini, L. (2009). An empirical roadmap for intranet evolution. International Journal of Information Management, 29(4), 295–308. https://doi.org/10.1016/j.ijinfomgt.2008.10.001
Mazmanian, M., Orlikowski, W., & Yates, J. (2013). The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals. Organization Science, 24(5), 1337–1357. https://doi.org/10.1287/orsc.1120.0806
Mennie, P. (2015a). Social media risk and governance: managing enterprise risk (1st Edition). Kogan Page. http://lib.myilibrary.com/browse/open.asp?id=837922&entityid=https://idp.warwick.ac.uk/idp/shibboleth
Mennie, P. (2015b). Social media risk and governance: managing enterprise risk. KoganPage. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2866389
Mohajerani, A., Baptista, J., & Nandhakumar, J. (2015). Exploring the role of social media in importing logics across social contexts: The case of IT SMEs in Iran. Technological Forecasting and Social Change, 95, 16–31. https://doi.org/10.1016/j.techfore.2014.06.008
Murgolo-Poore, M., Pitt, L., & Ewing, M. (2002). Intranet effectiveness: a public relations paper-and-pencil checklist. Public Relations Review, 28(1), 113–123. https://doi.org/10.1016/S0363-8111(02)00114-5
Newell, S., Scarbrough, H., & Swan, J. (2001). From Global Knowledge Management to Internal Electronic Fences: Contradictory Outcomes of Intranet Development. British Journal of Management, 12(2), 97–111. https://doi.org/10.1111/1467-8551.00188
Nosworthy, J. (2000). Implementing Information Security In The 21st Century — Do You Have the Balancing Factors? Computers & Security, 19(4), 337–347. https://doi.org/10.1016/S0167-4048(00)04021-9
Orlikowski, W. J. (2007). Sociomaterial Practices: Exploring Technology at Work. Organization Studies, 28(9), 1435–1448. https://doi.org/10.1177/0170840607081138
R Phelps, M Mok. (1999). Managing the risks of intranet implementation: an empirical study of user satisfaction. Journal of Information Technology, 14(1), 39–52. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216214002/13B932C547B54C7DPQ/3?accountid=14888
Rice, R., Evans, S., Pearce, K., Sivunen, A., Vitak, J., & Treem, J. (2017). Organizational Media Affordances: Operationalization and Associations with Media Use. Journal of Communication, 67(1), 106–130. https://doi.org/10.1111/jcom.12273
Richard Baskerville, Mikko Siponen. (2002). An information security meta-policy for emergent organizations. Logistics Information Management, 15(5), 337–346. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/220030046/FAF05147A38D4ED2PQ/4?accountid=14888
Roberta Lamb, Elizabeth Davidson. (n.d.). Understanding Intranets in the Context of End-User Computing. Database for Advances in Information Systems, 36(1), 64–85. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/196635756/F1434F4CF4BD4CECPQ/8?accountid=14888
Scheepers, R. (2003). Key roles in intranet implementation: the conquest and the aftermath. Journal of Information Technology, 18(2), 103–119. https://doi.org/10.1080/0268396032000101162
Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31–41. https://doi.org/10.1108/09685220010371394
Smithson, Steve. (1998). Analysing information systems evaluation: Another look at an old problem. European Journal of Information Systems; Basingstoke, 7(3), 158–174. https://0-www-tandfonline-com.pugwash.lib.warwick.ac.uk/doi/abs/10.1057/palgrave.ejis.3000304
Sotirios Paroutis, Alya Al Saleh. (2009). Determinants of knowledge sharing using Web 2.0 technologies. Journal of Knowledge Management, 13(4), 52–63. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/230323798/DF80BE80A9524E22PQ/4?accountid=14888
Stieger, D., Matzler, K., Chatterjee, S., & Ladstaetter-Fussenegger, F. (2012). Democratizing Strategy: How Crowdsourcing Can Be Used for Strategy Dialogues. California Management Review, 54(4), 44–68. https://doi.org/10.1525/cmr.2012.54.4.44
Symon, G., & Pritchard, K. (2015). Performing the Responsive and Committed Employee through the Sociomaterial Mangle of Connection. Organization Studies, 36(2), 241–263. https://doi.org/10.1177/0170840614556914
Tavakoli, A., Schlagwein, D., & Schoder, D. (2017). Open strategy: Literature review, re-analysis of cases and conceptualisation as a practice. The Journal of Strategic Information Systems. https://doi.org/10.1016/j.jsis.2017.01.003
Thomson, M. E., & von Solms, R. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6(4), 167–173. https://doi.org/10.1108/09685229810227649
Townsend, A. M., DeMarie, S. M., & Hendrickson, A. R. (1998). Virtual teams: Technology and the workplace of the future. Academy of Management Perspectives, 12(3), 17–29. https://doi.org/10.5465/AME.1998.1109047
Treem, J., & Leonardi, P. (2012). Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association. SSRN Electronic Journal. https://ssrn.com/abstract=2129853
Turkle, S. (n.d.). Alone together: why we expect more from technology and less from each other (Third edition). Basic Books.
Turkle, S. (2016). Reclaiming conversation: the power of talk in a digital age. Penguin Books. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3451851
Vaast, E., & Kaganer, E. (2013). Social media affordances and governance in the workplace: An examination of organizational policies. Journal of Computer-Mediated Communication, 19(1), 78–101. https://doi.org/10.1111/jcc4.12032
Vasilis Serafeimidis, Steve Smithson. (2000). Information systems evaluation in practice: a case study of organizational change. Journal of Information Technology, 15(2), 93–105. http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216207257/D85B1888CF824254PQ/2?accountid=14888
Vodanovich, S., Sundaram, D., & Myers, M. (2010). Digital Natives and Ubiquitous Information Systems. Information Systems Research, 21(4), 711–723. https://doi.org/10.1287/isre.1100.0324
von Krogh, G. (2012). How does social software change knowledge management? Toward a strategic research agenda. The Journal of Strategic Information Systems, 21(2), 154–164. https://doi.org/10.1016/j.jsis.2012.04.003
von Solms, R. (1998). Information security management (1): why information security is so important. Information Management & Computer Security, 6(4), 174–177. https://doi.org/10.1108/EUM0000000004533
Wajcman, J., Bittman, M., & Brown, J. E. (2008). Families without Borders: Mobile Phones, Connectedness and Work-Home Divisions. Sociology, 42(4), 635–652. https://doi.org/10.1177/0038038508091620
Wajcman, J., & Rose, E. (2011). Constant Connectivity: Rethinking Interruptions at Work. Organization Studies, 32(7), 941–961. https://doi.org/10.1177/0170840611410829
Wanda Orlikowski. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations. Organization Science, 3(3), 398–427. http://0-www.jstor.org.pugwash.lib.warwick.ac.uk/stable/2635280?seq=1#page_scan_tab_contents
Watson, M. A., & Lopiano, G. R. (2016). Should We Fire Him for That Post? Harvard Business Review, 94(3), 103–107. http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/direct.asp?db=bth&jid=HBR&scope=site
White, M. (2011). The intranet management handbook. Information Today. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3182495
Whittington, R., Cailluet, L., & Yakis-Douglas, B. (2011). Opening Strategy: Evolution of a Precarious Profession. British Journal of Management, 22(3), 531–544. https://doi.org/10.1111/j.1467-8551.2011.00762.x
Yi, C. (Ed.). (2016). The impact of ICT on work. Springer. http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3016199
Zammuto, R., Griffith, T., Majchrzak, A., Dougherty, D., & Faraj, S. (2007). Information Technology and the Changing Fabric of Organization. Organization Science, 18(5), 749–762. http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=27156594&site=bsi-live