Protecting organizational competitive advantage: A knowledge leakage perspective A Ahmad, R Bosua, R Scheepers Computers & Security 42, 27-39, 2014 | 312 | 2014 |
Knowledge strategy in organizations: refining the model of Hansen, Nohria and Tierney R Scheepers, K Venkitachalam, MR Gibbs The Journal of Strategic Information Systems 13 (3), 201-222, 2004 | 216 | 2004 |
Managing the crises in intranet implementation: a stage model J Damsgaard, R Scheepers Information Systems Journal 10 (2), 131-149, 2000 | 215 | 2000 |
Managing the crises in intranet implementation: a stage model J Damsgaard, R Scheepers Information Systems Journal 10 (2), 131-149, 2000 | 215 | 2000 |
Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples PB Seddon, R Scheepers European journal of information systems 21 (1), 6-21, 2012 | 196 | 2012 |
Structuration theory and information system development-frameworks for practice J Rose, R Scheepers ECIS 2001 Proceedings, 80, 2001 | 174 | 2001 |
Towards a model to explain knowledge sharing in complex organizational environments R Bosua, R Scheepers Knowledge management research & practice 5 (2), 93-109, 2007 | 148 | 2007 |
Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations R Scheepers, H Scheepers, OK Ngwenyama European Journal of Information Systems 15 (3), 261-268, 2006 | 146 | 2006 |
Corporate intranet implementation: managing emergent technologies and organizational practices JP Bansler, J Damsgaard, R Scheepers, E Havn, J Thommesen Journal of the Association for Information Systems 1 (1), 10, 2000 | 128 | 2000 |
Business analytics and competitive advantage: a review and a research agenda R Sharma, P Reynolds, R Scheepers, PB Seddon, G Shanks Bridging the Socio-technical Gap in Decision Support Systems, 187-198, 2010 | 123 | 2010 |
Power, influence and intranet implementation: a safari of South African organizations J Damsgaard, R Scheepers Information Technology & People 12 (4), 333-358, 1999 | 119 | 1999 |
When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena C Middleton, R Scheepers, VK Tuunainen European Journal of Information Systems 23 (5), 503-512, 2014 | 115 | 2014 |
Incorporating a knowledge perspective into security risk assessments P Shedden, R Scheepers, W Smith, A Ahmad Vine 41 (2), 152-166, 2011 | 113 | 2011 |
Incorporating a knowledge perspective into security risk assessments P Shedden, R Scheepers, W Smith, A Ahmad Vine 41 (2), 152-166, 2011 | 113 | 2011 |
A literature analysis of the use of absorptive capacity construct in IS research S Gao, W Yeoh, SF Wong, R Scheepers International Journal of Information Management 37 (2), 36-42, 2017 | 109 | 2017 |
A model for studying IT outsourcing relationships S Alborz, P Seddon, R Scheepers | 107 | 2003 |
The dependent variable in social media use H Scheepers, R Scheepers, R Stockdale, N Nurdin Journal of Computer Information Systems 54 (2), 25-34, 2014 | 94 | 2014 |
Using Internet technology within the organization: a structurational analysis of intranets R Scheepers, J Damsgaard Proceedings of the 1997 ACM International Conference on Supporting Group …, 1997 | 88 | 1997 |
A process-focused decision framework for analyzing the business value potential of IT investments H Scheepers, R Scheepers Information Systems Frontiers 10, 321-330, 2008 | 86 | 2008 |
Adopting and integrating cyber-threat intelligence in a commercial organisation J Kotsias, A Ahmad, R Scheepers European Journal of Information Systems 32 (1), 35-51, 2023 | 65 | 2023 |