default search action
Carl Adams
Person information
- affiliation: University of Portsmouth, Portsmouth, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2016
- [j12]Muhammad Yusuf, Carl Adams, Kate Dingley:
Digital Citizen Participation within Schools in the United Kingdom and Indonesia: An Actor-Network Theory (ANT) Perspective. Inf. 7(4): 69 (2016) - 2014
- [j11]Abraheem Alsaeed, Carl Adams, Rich Boakes:
The Need for Policies to Overcome eGov Implementation Challenges. Int. J. Electron. Gov. Res. 10(3): 66-79 (2014) - 2010
- [j10]Qi-Ying Su, Carl Adams:
Consumers' Attitudes Toward Mobile Commerce: A Model to Capture the Cultural and Environment Influences. Int. J. E Serv. Mob. Appl. 2(1): 1-25 (2010) - [j9]Carl Adams, Simon Mouatt:
Evolution of Electronic and Mobile Business and Services: Government Support for E/M-Payment Systems. Int. J. E Serv. Mob. Appl. 2(2): 58-0 (2010) - 2009
- [j8]Asad Ahmad Khan, Mo Adda, Carl Adams:
Convergence of terrestrial and satellite mobile communication systems: an operator's perspective. Int. J. Mob. Commun. 7(3): 308-329 (2009) - [j7]Carl Adams:
Temporal Stakeholder and Event Analysis (TSEA). A Tool for Exploring Technological Evolution and Impact within Organisations. J. Decis. Syst. 18(1): 75-97 (2009) - [j6]Qi-Ying Su, Carl Adams:
Mobile Commerce Adoption: A Novel Buyer-User-Service Payer Metric. J. Electron. Commer. Organ. 7(4): 59-72 (2009) - 2006
- [j5]C. J. Fitch, Carl Adams:
Managing mobile provision for community healthcare support: issues and challenges. Bus. Process. Manag. J. 12(3): 299-310 (2006) - 2005
- [j4]Carl Adams:
Supporting structures for evolving systems development: a case study. Int. J. Inf. Technol. Manag. 4(4): 423-442 (2005) - [j3]Vasilios Katos, Carl Adams:
Modelling corporate wireless security and privacy. J. Strateg. Inf. Syst. 14(3): 307-321 (2005) - 2003
- [j2]Carl Adams, David E. Avison:
Dangers inherent in the use of techniques: identifying framing influences. Inf. Technol. People 16(2): 203-234 (2003) - 1995
- [j1]Michael A. Eierman, Fred Niederman, Carl Adams:
DSS theory: A model of constructs and relationships. Decis. Support Syst. 14(1): 1-26 (1995)
Conference and Workshop Papers
- 2023
- [c20]Carl Adams, Mohsen Eslamnejad, Anita Khadka, Andrew M'manga, Heather Shaw, Yuchen Zhao:
Auditing AI Systems: A Metadata Approach. SGAI Conf. 2023: 241-246 - 2022
- [c19]Simona Ciobotaru, Carl Adams, Craig John Robert Collie, Karen Shalev Greene:
Sharing Missing Persons Appeals on Social Media: Assessing Community Engagement on Facebook and Twitter. SIGMIS-CPR 2022: 9:1-9:9 - 2017
- [c18]Maysoun Ibrahim, Ali El Zaart, Carl Adams:
Stakeholders Engagement in Smart Sustainable Cities: A Proposed Model. ICCA 2017: 342-347 - [c17]Sukaina Al Nasrawi, Ali El Zaart, Carl Adams:
The Anatomy of Smartness of Smart Sustainable Cities: An Inclusive Approach. ICCA 2017: 348-353 - 2015
- [c16]Morgan Eldred, Alice Good, Carl Adams:
Simulation as a Service - A Case Study of Provisioning Scientific Simulation Software via a Cloud Service. ESaaSA@CLOSER 2015: 37-44 - [c15]Morgan Eldred, Alice Good, Carl Adams:
A Case Study on Data Protection and Security Decisions in Cloud HPC. CloudCom 2015: 564-568 - 2014
- [c14]Morgan Eldred, Carl Adams, Alice Good:
Trust Challenges in a High Performance Cloud Computing Project. CloudCom 2014: 1045-1050 - 2011
- [c13]Carl Adams:
Social Networking and Extending Social Capacity. ICIS 2011 - 2010
- [c12]Carl Adams:
The Move towards a M3/MB Business Model. MCIS 2010: 1 - [c11]Carl Adams, Simon Mouatt:
The Information Revolution, Information Systems and the 6th Kondratieff Cycle. MCIS 2010: 3 - 2008
- [c10]Kyriakos Kentzoglanakis, Matthew Poole, Carl Adams:
Incorporating Heuristics in a Swarm Intelligence Framework for Inferring Gene Regulatory Networks from Gene Expression Time Series. ANTS Conference 2008: 323-330 - 2007
- [c9]Carl Adams:
Challenges for Creativity and Innovation in Mobile and Transient Virtual Environments. Organizational Dynamics of Technology-Based Innovation 2007: 445-449 - [c8]Adesina Iluyemi, Jim S. Briggs, Carl Adams:
Mobile Information System, Health Work and Community Health Workers in Less Developed Countries. WETICE 2007: 208-212 - 2006
- [c7]Carl Adams, Tineke Fitch:
Social Inclusion and the Shifting Role of Technology: Is Age the New Gender in Mobile Access? Social Inclusion 2006: 203-215 - 2005
- [c6]Qi-Ying Su, Carl Adams:
Will B2C e-commerce developed in one cultural environment be suitable for another culture: a cross-cultural study between amazon.co.uk (UK) and dangdang.com (China). ICEC 2005: 236-243 - [c5]Carl Adams, Vasilios Katos:
Privacy Challenges for Location Aware Technologies. MOBIS 2005: 303-310 - 2004
- [c4]Jiajun Jim Chen, Carl Adams:
Short-range wireless technologies with mobile payments systems. ICEC 2004: 649-656 - [c3]Carl Adams, Tineke Fitch:
Mobile support for community healthcare: A Janus view. MOBIS 2004: 341-349 - [c2]Carl Adams, David E. Avison:
Reflection on Development Techniques Using the Psychology Literature: Over Two Decades of Bias and Conceptual Blocks. Relevant Theory and Informed Practice 2004: 493-510 - 2002
- [c1]Carl Adams, David E. Avison:
Macro Analysis of Techniques to Deal with Uncertainty in Information Systems Development: Mapping Representational Framing Influences. Soft-Ware 2002: 280-299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint