Protecting organizational competitive advantage: A knowledge leakage perspective A Ahmad, R Bosua, R Scheepers Computers & Security 42, 27-39, 2014 | 298 | 2014 |
Knowledge strategy in organizations: refining the model of Hansen, Nohria and Tierney R Scheepers, K Venkitachalam, MR Gibbs The Journal of Strategic Information Systems 13 (3), 201-222, 2004 | 212 | 2004 |
Managing the crises in intranet implementation: a stage model J Damsgaard, R Scheepers Information Systems Journal 10 (2), 131-149, 2000 | 209 | 2000 |
Managing the crises in intranet implementation: a stage model J Damsgaard, R Scheepers Information Systems Journal 10 (2), 131-149, 2000 | 209 | 2000 |
Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples PB Seddon, R Scheepers European journal of information systems 21, 6-21, 2012 | 190 | 2012 |
Structuration theory and information system development-frameworks for practice J Rose, R Scheepers ECIS 2001 Proceedings, 80, 2001 | 171 | 2001 |
Towards a model to explain knowledge sharing in complex organizational environments R Bosua, R Scheepers Knowledge management research & practice 5 (2), 93-109, 2007 | 148 | 2007 |
Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations R Scheepers, H Scheepers, OK Ngwenyama European Journal of Information Systems 15 (3), 261-268, 2006 | 146 | 2006 |
Corporate intranet implementation: managing emergent technologies and organizational practices JP Bansler, J Damsgaard, R Scheepers, E Havn, J Thommesen Journal of the Association for Information Systems 1 (1), 10, 2000 | 126 | 2000 |
Power, influence and intranet implementation: a safari of South African organizations J Damsgaard, R Scheepers Information Technology & People 12 (4), 333-358, 1999 | 117 | 1999 |
Business Analytics and Competitive Advantage: A Review and a Research Agenda. R Sharma, P Reynolds, R Scheepers, PB Seddon, GG Shanks DSS, 187-198, 2010 | 116 | 2010 |
Incorporating a knowledge perspective into security risk assessments P Shedden, R Scheepers, W Smith, A Ahmad Vine 41 (2), 152-166, 2011 | 114 | 2011 |
Incorporating a knowledge perspective into security risk assessments P Shedden, R Scheepers, W Smith, A Ahmad Vine 41 (2), 152-166, 2011 | 114 | 2011 |
When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena C Middleton, R Scheepers, VK Tuunainen European Journal of Information Systems 23 (5), 503-512, 2014 | 110 | 2014 |
A model for studying IT outsourcing relationships S Alborz, P Seddon, R Scheepers | 109 | 2003 |
A literature analysis of the use of absorptive capacity construct in IS research S Gao, W Yeoh, SF Wong, R Scheepers International Journal of Information Management 37 (2), 36-42, 2017 | 100 | 2017 |
The dependent variable in social media use H Scheepers, R Scheepers, R Stockdale, N Nurdin Journal of Computer Information Systems 54 (2), 25-34, 2014 | 91 | 2014 |
Using Internet technology within the organization: a structurational analysis of intranets R Scheepers, J Damsgaard Proceedings of the 1997 ACM International Conference on Supporting Group …, 1997 | 86 | 1997 |
A process-focused decision framework for analyzing the business value potential of IT investments H Scheepers, R Scheepers Information Systems Frontiers 10, 321-330, 2008 | 84 | 2008 |
Asset identification in information security risk assessment: A business practice approach P Shedden, A Ahmad, W Smith, H Tscherning, R Scheepers Communications of the Association for Information Systems 39 (1), 15, 2016 | 59 | 2016 |