Andrew McAfee (2006) ‘Enterprise 2.0: The Dawn of Emergent Collaboration’, MIT Sloan Management Review, 47(3), pp. 21–28. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224963703/DD44A2F5F66A40ADPQ/6?accountid=14888.
Andriole, S. (2010) ‘Business impact of Web 2.0 technologies’, Communications of the ACM, 53(12). Available at: https://doi.org/10.1145/1859204.1859225.
Annabi, H. and McGann, S. (2013) ‘Social Media as the Missing Link: Connecting Communities of Practice to Business Strategy’, Journal of Organizational Computing and Electronic Commerce, 23(1–2), pp. 56–83. Available at: https://doi.org/10.1080/10919392.2013.748608.
Aral, S., Dellarocas, C. and Godes, D. (2013) ‘Social Media and Business Transformation: A Framework for Research’, Information Systems Research, 24(1), pp. 3–13. Available at: https://doi.org/10.1287/isre.1120.0470.
Aula, Pekka (2010) ‘Social media, reputation risk and ambient publicity management’, Strategy & Leadership, 38(6), pp. 43–49. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/761420153/8B1E132A12504579PQ/6?accountid=14888.
Avgerou, C. (2001) ‘The significance of context in information systems and organizational change.’, Information Systems Journal, 11(1), pp. 43–63. Available at: https://doi.org/10.1046/j.1365-2575.2001.00095.x.
Banck, B. and Nyström, C.A. (2005) ‘Intranet use: a study of five Swedish organizations’, Journal of Organisational Transformation & Social Change, 2(2), pp. 153–180. Available at: https://arlir.iii.com/nonret~S0&atitle=Intranet+use:+a+study+of+five+Swedish+organizations&title=Journal+of+Organisational+Transformation+&+Social+Change&aufirst=Bjrn&auinit=&aulast=Banck&issn=14779633&eissn=2040056X&coden=&volume=2&issue=2&spage=153&epage=180&quarter=&ssn=&date=2005&sid=&reqtype3.
Baptista, J. et al. (2016) ‘Social Media and the Emergence of Reflexiveness as a New Capability for Open Strategy’, Long Range Planning [Preprint]. Available at: https://doi.org/10.1016/j.lrp.2016.07.005.
Baptista (John), J., Newell, S. and Currie, W. (2010) ‘Paradoxical effects of institutionalisation on the strategic awareness of technology in organisations’, The Journal of Strategic Information Systems, 19(3), pp. 171–183. Available at: https://doi.org/10.1016/j.jsis.2010.07.001.
Beynon-Davies, P. (2011) Significance: exploring the nature of information, systems and technology. Basingstoke: Palgrave Macmillan. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2485241.
Birkinshaw, J. (2016) ‘Reflections on open strategy’, Long Range Planning [Preprint]. Available at: https://doi.org/10.1016/j.lrp.2016.11.004.
Bjelland, Osvald MWood, Robert Chapman (2008) ‘An Inside View of IBM’s “Innovation Jam”’, MIT Sloan Management Review, 50(1), pp. 32–40. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224960315/3A84CF4D6DCB441CPQ/10?accountid=14888.
Butler, T. (2003) ‘An institutional perspective on developing and implementing intranet- and internet-based information systems’, Information Systems Journal, 13(3), pp. 209–231. Available at: https://doi.org/10.1046/j.1365-2575.2003.00151.x.
Chesbrough, H. and Appleyard, M. (2007) ‘Open Innovation and Strategy.’, California Management Review, 50(1), pp. 57–76. Available at: http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=27340265&site=bsi-live.
Clarke, K. and Preece, D. (2005) ‘Constructing and using a company Intranet: “it’s a very cultural thing”’, New Technology, Work and Employment, 20(2), pp. 150–165. Available at: https://doi.org/10.1111/j.1468-005X.2005.00150.x.
Coakes, ElayneBradburn, Anton (no date) ‘What is the value of intellectual capital?’, Knowledge Management Research & Practice, 3(2), pp. 60–68. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/203469989/17353D92383D456BPQ/3?accountid=14888.
Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices (no date). Available at: https://www.researchgate.net/publication/220580381_Corporate_Intranet_Implementation_Managing_Emergent_Technologies_and_Organizational_Practices.
Curry, A. and Stancich, L. (2000) ‘The intranet — an intrinsic component of strategic information management?’, International Journal of Information Management, 20(4), pp. 249–268. Available at: https://doi.org/10.1016/S0268-4012(00)00015-3.
Damsgaard, J. and Scheepers, R. (1999) ‘Power, influence and intranet implementation’, Information Technology & People, 12(4), pp. 333–358. Available at: https://doi.org/10.1108/09593849910301630.
Damsgaard, J. and Scheepers, R. (2000) ‘Managing the crises in intranet implementation: a stage model’, Information Systems Journal, 10(2), pp. 131–149. Available at: https://doi.org/10.1046/j.1365-2575.2000.00076.x.
David Wagner, Gabriele Vollmar, Heinz-Theo Wagner (2014) ‘The impact of information technology on knowledge creation: An affordance approach to social media’, Journal of Enterprise Information Management, 27(1), pp. 31–44. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/1490992058/17BA4981E48D4E77PQ/2?accountid=14888.
Davison, R. and Ou, C. (2017) ‘Digital work in a digitally challenged organization’, Information & Management, 54(1), pp. 129–137. Available at: https://doi.org/10.1016/j.im.2016.05.005.
Denyer, D., Parry, E. and Flowers, P. (2011) ‘"Social”, "Open” and "Participative”? Exploring Personal Experiences and Organisational Effects of Enterprise2.0 Use’, Long Range Planning, 44(5–6), pp. 375–396. Available at: https://doi.org/10.1016/j.lrp.2011.09.007.
Dhillon, G. and Backhouse, J. (2001) ‘Current directions in IS security research: towards socio-organizational perspectives.’, Information Systems Journal, 11(2), pp. 127–153. Available at: https://doi.org/10.1046/j.1365-2575.2001.00099.x.
Dixon, K.R. and Panteli, N. (2010) ‘From virtual teams to virtuality in teams’, Human Relations, 63(8), pp. 1177–1197. Available at: https://doi.org/10.1177/0018726709354784.
Doherty, N., Anastasakis, L. and Fulford, H. (2009) ‘The information security policy unpacked: A critical study of the content of university policies’, International Journal of Information Management, 29(6), pp. 449–457. Available at: https://doi.org/10.1016/j.ijinfomgt.2009.05.003.
Doherty, N. and Fulford, H. (2006) ‘Aligning the information security policy with the strategic information systems plan’, Computers & Security, 25(1), pp. 55–63. Available at: https://doi.org/10.1016/j.cose.2005.09.009.
Drucker, P.F. (1988) ‘The Coming of the New Organization’, Harvard Business Review, 66(1), pp. 45–53. Available at: http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/direct.asp?db=bth&jid=HBR&scope=site.
Duane, A. and Finnegan, P. (2003) ‘Managing empowerment and control in an intranet environment’, Information Systems Journal, 13(2), pp. 133–158. Available at: https://doi.org/10.1046/j.1365-2575.2003.00148.x.
Dubravka  Cecez-Kecmanovic, Debra Moodie, Andy Busuttil, Fiona Plesman (1999) ‘Organisational change mediated by e-mail and Intranet An ethnographic study’, Information Technology & People, 12(1), pp. 9–26. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/222356590/452338D38B514D41PQ/1?accountid=14888.
Faraj, S., Jarvenpaa, S.L. and Majchrzak, A. (2011) ‘Knowledge Collaboration in Online Communities’, Organization Science, 22(5), pp. 1224–1239. Available at: https://doi.org/10.1287/orsc.1100.0614.
Fayard, A.L. and Weeks, J. (2007) ‘Photocopiers and Water-coolers: The Affordances of Informal Interaction’, Organization Studies, 28(5), pp. 605–634. Available at: https://doi.org/10.1177/0170840606068310.
Flecker, J. (ed.) (2016) Space, place and global digital work. London: Palgrave Macmillan. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3049968.
Giovannucci, D. and Ponte, S. (2005) ‘Standards as a new form of social contract? Sustainability initiatives in the coffee industry’, Food Policy, 30(3), pp. 284–301. Available at: https://doi.org/10.1016/j.foodpol.2005.05.007.
Haefliger, S. et al. (2011) ‘Social Software and Strategy’, Long Range Planning, 44(5–6), pp. 297–316. Available at: https://doi.org/10.1016/j.lrp.2011.08.001.
Hatum, A. (2013) The new workforce challenge: How today’s leading companies are adapting for the future [electronic resource]. Basingstoke: Palgrave Macmillan. Available at: http://0-www.palgraveconnect.com.pugwash.lib.warwick.ac.uk/doifinder/10.1057/9781137302991.
Hautz, J., Seidl, D. and Whittington, R. (2017) ‘Open strategy: Dimensions, dilemmas, dynamics’, Long Range Planning, 50(3), pp. 298–309. Available at: https://doi.org/10.1016/j.lrp.2016.12.001.
Holmqvist, B. et al. (eds) (1996) Signs of work: semiosis and information processing in organisations. Berlin: Walter de Gruyter. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3298203.
Hu, Q. et al. (2012) ‘Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*’, Decision Sciences, 43(4), pp. 615–660. Available at: https://doi.org/10.1111/j.1540-5915.2012.00361.x.
Huang, J., Baptista, J. and Galliers, R.D. (2013) ‘Reconceptualizing rhetorical practices in organizations: The impact of social media on internal communications’, Information & Management, 50(2–3), pp. 112–124. Available at: https://doi.org/10.1016/j.im.2012.11.003.
Huang, J., Baptista, J. and Newell, S. (2015) ‘Communicational ambidexterity as a new capability to manage social media communication within organizations’, The Journal of Strategic Information Systems, 24(2), pp. 49–64. Available at: https://doi.org/10.1016/j.jsis.2015.03.002.
Jacoby, G.A. and Luqi (2007) ‘Intranet model and metrics’, Communications of the ACM, 50(2), pp. 43–50. Available at: https://doi.org/10.1145/1216016.1216019.
Jacqueline Vischer (1995) ‘Strategic Work-Space Planning’, Sloan Management Review, 37(1). Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/224968966/1FAD2B635774924PQ/8?accountid=14888.
JARVENPAA, S.L. and TANRIVERDI, H. (2003) ‘Leading Virtual Knowledge Networks’, Organizational Dynamics, 31(4), pp. 403–412. Available at: https://doi.org/10.1016/S0090-2616(02)00127-4.
João Baptista (John) (2009) ‘Institutionalisation as a process of interplay between technology and its organisational context of use’, Journal of Information Technology, suppl. Special Issue on Institutional Theory in Information, 24(4), pp. 305–319. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216214069/89BA7B10EA424259PQ/3?accountid=14888.
Kaplan, A.M. and Haenlein, M. (2010) ‘Users of the world, unite! The challenges and opportunities of Social Media’, Business Horizons, 53(1), pp. 59–68. Available at: https://doi.org/10.1016/j.bushor.2009.09.003.
Kappos, A. and Rivard, S. (2008) ‘A Three-Perspective Model of Culture, Information Systems, and Their Development and Use.’, MIS Quarterly, 32(3), pp. 601–634. Available at: http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=33436507&site=bsi-live.
Karyda, M., Kiountouzis, E. and Kokolakis, S. (2005) ‘Information systems security policies: a contextual perspective’, Computers & Security, 24(3), pp. 246–260. Available at: https://doi.org/10.1016/j.cose.2004.08.011.
Kayworth, T. and Whitten, D. (2010) ‘Effective Information Security Requires a Balance of Social and Technology Factors’, MIS Quarterly Executive, 9(3), pp. 163–175. Available at: http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=53382596&site=bsi-live.
Kietzmann, J.H. et al. (2011) ‘Social media? Get serious! Understanding the functional building blocks of social media’, Business Horizons, 54(3), pp. 241–251. Available at: https://doi.org/10.1016/j.bushor.2011.01.005.
Kitchin, R. (1998) ‘Towards geographies of cyberspace’, Progress in Human Geography, 22(3), pp. 385–406. Available at: https://doi.org/10.1191/030913298668331585.
Knapp, K. et al. (2009) ‘Information security policy: An organizational-level process model’, Computers & Security, 28(7), pp. 493–508. Available at: https://doi.org/10.1016/j.cose.2009.07.001.
Kolb, D. (2008) ‘Exploring the Metaphor of Connectivity: Attributes, Dimensions and Duality’, Organization Studies, 29(1), pp. 127–144. Available at: https://doi.org/10.1177/0170840607084574.
Kolb, D., Caza, A. and Collins, P. (2012) ‘States of Connectivity: New Questions and New Directions’, Organization Studies, 33(2), pp. 267–273. Available at: https://doi.org/10.1177/0170840611431653.
Kolkowska, E. and Dhillon, G. (2013) ‘Organizational power and information security rule compliance’, Computers & Security, 33, pp. 3–11. Available at: https://doi.org/10.1016/j.cose.2012.07.001.
Kossek, E., Lautsch, B. and Eaton, S. (2006) ‘Telecommuting, control, and boundary management: Correlates of policy use and practice, job control, and work–family effectiveness’, Journal of Vocational Behavior, 68(2), pp. 347–367. Available at: https://doi.org/10.1016/j.jvb.2005.07.002.
von Krogh, G. (2012) ‘How does social software change knowledge management? Toward a strategic research agenda’, The Journal of Strategic Information Systems, 21(2), pp. 154–164. Available at: https://doi.org/10.1016/j.jsis.2012.04.003.
Lai, V.S. (2001) ‘Intraorganizational communication with intranets’, Communications of the ACM, 44(7), pp. 95–100. Available at: https://doi.org/10.1145/379300.379324.
Lai, Y. and Burchell, B. (2008) ‘Distributed work: communication in an “officeless firm”’, New Technology, Work and Employment, 23(1–2), pp. 61–76. Available at: https://doi.org/10.1111/j.1468-005X.2008.00203.x.
Leonardi, P.M., Huysman, M. and Steinfield, C. (2013) ‘Enterprise Social Media: Definition, History, and Prospects for the Study of Social Technologies in Organizations’, Journal of Computer-Mediated Communication, 19(1), pp. 1–19. Available at: https://doi.org/10.1111/jcc4.12029.
Mackenzie, M. (2010) ‘Manager communication and workplace trust: Understanding manager and employee perceptions in the e-world’, International Journal of Information Management, 30(6), pp. 529–541. Available at: https://doi.org/10.1016/j.ijinfomgt.2010.04.001.
Maitland, A. and Thomson, P. (2011) Future work: how businesses can adapt and thrive in the new world of work. Basingstoke, Hampshire: Palgrave Macmillan. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2537477.
Majchrzak, A. and Malhotra, A. (2013) ‘Towards an information systems perspective and research agenda on crowdsourcing for innovation’, The Journal of Strategic Information Systems, 22(4), pp. 257–268. Available at: https://doi.org/10.1016/j.jsis.2013.07.004.
Martini, A., Corso, M. and Pellegrini, L. (2009) ‘An empirical roadmap for intranet evolution’, International Journal of Information Management, 29(4), pp. 295–308. Available at: https://doi.org/10.1016/j.ijinfomgt.2008.10.001.
Mazmanian, M., Orlikowski, W. and Yates, J. (2013) ‘The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals’, Organization Science, 24(5), pp. 1337–1357. Available at: https://doi.org/10.1287/orsc.1120.0806.
Mennie, P. (2015a) Social media risk and governance: managing enterprise risk. 1st Edition. Philadelphia, PA: Kogan Page. Available at: http://lib.myilibrary.com/browse/open.asp?id=837922&entityid=https://idp.warwick.ac.uk/idp/shibboleth.
Mennie, P. (2015b) Social media risk and governance: managing enterprise risk. London: KoganPage. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb2866389.
Mohajerani, A., Baptista, J. and Nandhakumar, J. (2015) ‘Exploring the role of social media in importing logics across social contexts: The case of IT SMEs in Iran’, Technological Forecasting and Social Change, 95, pp. 16–31. Available at: https://doi.org/10.1016/j.techfore.2014.06.008.
Murgolo-Poore, M., Pitt, L. and Ewing, M. (2002) ‘Intranet effectiveness: a public relations paper-and-pencil checklist’, Public Relations Review, 28(1), pp. 113–123. Available at: https://doi.org/10.1016/S0363-8111(02)00114-5.
Newell, S., Scarbrough, H. and Swan, J. (2001) ‘From Global Knowledge Management to Internal Electronic Fences: Contradictory Outcomes of Intranet Development.’, British Journal of Management, 12(2), pp. 97–111. Available at: https://doi.org/10.1111/1467-8551.00188.
Nosworthy, J. (2000) ‘Implementing Information Security In The 21st Century — Do You Have the Balancing Factors?’, Computers & Security, 19(4), pp. 337–347. Available at: https://doi.org/10.1016/S0167-4048(00)04021-9.
Orlikowski, W.J. (2007) ‘Sociomaterial Practices: Exploring Technology at Work’, Organization Studies, 28(9), pp. 1435–1448. Available at: https://doi.org/10.1177/0170840607081138.
R Phelps, M Mok (1999) ‘Managing the risks of intranet implementation: an empirical study of user satisfaction’, Journal of Information Technology, 14(1), pp. 39–52. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216214002/13B932C547B54C7DPQ/3?accountid=14888.
Rice, R. et al. (2017) ‘Organizational Media Affordances: Operationalization and Associations with Media Use’, Journal of Communication, 67(1), pp. 106–130. Available at: https://doi.org/10.1111/jcom.12273.
Richard Baskerville, Mikko Siponen (2002) ‘An information security meta-policy for emergent organizations’, Logistics Information Management, 15(5), pp. 337–346. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/220030046/FAF05147A38D4ED2PQ/4?accountid=14888.
Roberta Lamb, Elizabeth Davidson (no date) ‘Understanding Intranets in the Context of End-User Computing’, Database for Advances in Information Systems, 36(1), pp. 64–85. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/196635756/F1434F4CF4BD4CECPQ/8?accountid=14888.
Scheepers, R. (2003) ‘Key roles in intranet implementation: the conquest and the aftermath.’, Journal of Information Technology, 18(2), pp. 103–119. Available at: https://doi.org/10.1080/0268396032000101162.
Siponen, M.T. (2000) ‘A conceptual foundation for organizational information security awareness’, Information Management & Computer Security, 8(1), pp. 31–41. Available at: https://doi.org/10.1108/09685220010371394.
Smithson, Steve (1998) ‘Analysing information systems evaluation: Another look at an old problem’, European Journal of Information Systems; Basingstoke, 7(3), pp. 158–174. Available at: https://0-www-tandfonline-com.pugwash.lib.warwick.ac.uk/doi/abs/10.1057/palgrave.ejis.3000304.
von Solms, R. (1998) ‘Information security management (1): why information security is so important’, Information Management & Computer Security, 6(4), pp. 174–177. Available at: https://doi.org/10.1108/EUM0000000004533.
Sotirios Paroutis, Alya Al Saleh (2009) ‘Determinants of knowledge sharing using Web 2.0 technologies’, Journal of Knowledge Management, 13(4), pp. 52–63. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/230323798/DF80BE80A9524E22PQ/4?accountid=14888.
Stieger, D. et al. (2012) ‘Democratizing Strategy: How Crowdsourcing Can Be Used for Strategy Dialogues’, California Management Review, 54(4), pp. 44–68. Available at: https://doi.org/10.1525/cmr.2012.54.4.44.
Symon, G. and Pritchard, K. (2015) ‘Performing the Responsive and Committed Employee through the Sociomaterial Mangle of Connection’, Organization Studies, 36(2), pp. 241–263. Available at: https://doi.org/10.1177/0170840614556914.
Tavakoli, A., Schlagwein, D. and Schoder, D. (2017) ‘Open strategy: Literature review, re-analysis of cases and conceptualisation as a practice’, The Journal of Strategic Information Systems [Preprint]. Available at: https://doi.org/10.1016/j.jsis.2017.01.003.
Thomson, M.E. and von Solms, R. (1998) ‘Information security awareness: educating your users effectively’, Information Management & Computer Security, 6(4), pp. 167–173. Available at: https://doi.org/10.1108/09685229810227649.
Townsend, A.M., DeMarie, S.M. and Hendrickson, A.R. (1998) ‘Virtual teams: Technology and the workplace of the future.’, Academy of Management Perspectives, 12(3), pp. 17–29. Available at: https://doi.org/10.5465/AME.1998.1109047.
Treem, J. and Leonardi, P. (2012) ‘Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association’, SSRN Electronic Journal [Preprint]. Available at: https://ssrn.com/abstract=2129853.
Turkle, S. (2016) Reclaiming conversation: the power of talk in a digital age. New York, New York: Penguin Books. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3451851.
Turkle, S. (no date) Alone together: why we expect more from technology and less from each other. Third edition. New York: Basic Books.
Vaast, E. and Kaganer, E. (2013) ‘Social media affordances and governance in the workplace: An examination of organizational policies’, Journal of Computer-Mediated Communication, 19(1), pp. 78–101. Available at: https://doi.org/10.1111/jcc4.12032.
Vasilis Serafeimidis, Steve Smithson (2000) ‘Information systems evaluation in practice: a case study of organizational change’, Journal of Information Technology, 15(2), pp. 93–105. Available at: http://0-search.proquest.com.pugwash.lib.warwick.ac.uk/docview/216207257/D85B1888CF824254PQ/2?accountid=14888.
Vodanovich, S., Sundaram, D. and Myers, M. (2010) ‘Digital Natives and Ubiquitous Information Systems’, Information Systems Research, 21(4), pp. 711–723. Available at: https://doi.org/10.1287/isre.1100.0324.
Wajcman, J., Bittman, M. and Brown, J.E. (2008) ‘Families without Borders: Mobile Phones, Connectedness and Work-Home Divisions’, Sociology, 42(4), pp. 635–652. Available at: https://doi.org/10.1177/0038038508091620.
Wajcman, J. and Rose, E. (2011) ‘Constant Connectivity: Rethinking Interruptions at Work’, Organization Studies, 32(7), pp. 941–961. Available at: https://doi.org/10.1177/0170840611410829.
Wanda Orlikowski (1992) ‘The Duality of Technology: Rethinking the Concept of Technology in Organizations’, Organization Science, 3(3), pp. 398–427. Available at: http://0-www.jstor.org.pugwash.lib.warwick.ac.uk/stable/2635280?seq=1#page_scan_tab_contents.
Watson, M.A. and Lopiano, G.R. (2016) ‘Should We Fire Him for That Post?’, Harvard Business Review, 94(3), pp. 103–107. Available at: http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/direct.asp?db=bth&jid=HBR&scope=site.
White, M. (2011) The intranet management handbook. Medford, N.J.: Information Today. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3182495.
Whittington, R., Cailluet, L. and Yakis-Douglas, B. (2011) ‘Opening Strategy: Evolution of a Precarious Profession’, British Journal of Management, 22(3), pp. 531–544. Available at: https://doi.org/10.1111/j.1467-8551.2011.00762.x.
Yi, C. (ed.) (2016) The impact of ICT on work. Singapore: Springer. Available at: http://encore.lib.warwick.ac.uk/iii/encore/record/C__Rb3016199.
Zammuto, R. et al. (2007) ‘Information Technology and the Changing Fabric of Organization.’, Organization Science, 18(5), pp. 749–762. Available at: http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db=bth&AN=27156594&site=bsi-live.