default search action
Alison E. Adam
Person information
- affiliation: University of Salford, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2012
- [j20]Danijela Bogdanovic, Michael Dowd, Eileen Wattam, Alison Adam:
Contesting Methodologies: evaluating focus group and privacy diary methods in a study of on-line privacy. J. Inf. Commun. Ethics Soc. 10(4): 208-221 (2012) - [j19]Alison Adam:
IS and its agenda. J. Inf. Technol. 27(2): 102-103 (2012) - 2010
- [j18]Christopher Bull, Alison Adam:
Customer relationship management information systems (CRM-IS) and the realisation of moral agency. J. Inf. Commun. Ethics Soc. 8(2): 164-177 (2010) - 2008
- [j17]Ben Light, Gordon Fletcher, Alison Adam:
Gay men, Gaydar and the commodification of difference. Inf. Technol. People 21(3): 300-314 (2008) - 2007
- [j16]Alison Adam, Paul Spedding:
Trusting Computers Through Trusting Humans: Software Verification in a Safety-Critical Information System. Int. J. Technol. Hum. Interact. 3(4): 1-14 (2007) - 2006
- [j15]Alison E. Adam, Marie Griffiths, Claire Keogh, Karenza Moore, Helen J. Richardson, Angela Tattersall:
Being an 'it' in IT: gendered identities in IT work. Eur. J. Inf. Syst. 15(4): 368-378 (2006) - [j14]Alison Adam, David Kreps:
Enabling or disabling technologies? A critical approach to web accessibility. Inf. Technol. People 19(3): 203-218 (2006) - 2003
- [j13]Alison E. Adam:
Hacking into Hacking: Gender and the Hacker Phenomenon. SIGCAS Comput. Soc. 33(4): 3 (2003) - 2002
- [j12]Alison Adam:
Exploring the gender question in critical information systems. J. Inf. Technol. 17(2): 59-67 (2002) - 2001
- [j11]Alison Adam:
Computer ethics in a different voice. Inf. Organ. 11(4): 235-261 (2001) - [j10]Alison E. Adam, Helen J. Richardson:
Feminist Philosophy and Information Systems. Inf. Syst. Frontiers 3(2): 143-154 (2001) - [j9]Alison Adam:
Book Reviews: Pornography and the Internet: " The Biggest Dirty Bookshop in History?". SIGCAS Comput. Soc. 31(3): 36-40 (2001) - [j8]Alison E. Adam, Eileen Green:
Equal opportunies online: guest editorial. SIGCAS Comput. Soc. 31(4): 3-4 (2001) - [j7]Alison Adam:
Heroes or Sibyls? Gender and engineering ethics. IEEE Technol. Soc. Mag. 20(3): 39-46 (2001) - 2000
- [j6]Alison Adam:
Deleting the Subject: A Feminist Reading of Epistemology in Artificial Intelligence. Minds Mach. 10(2): 231-253 (2000) - [j5]Alison Adam:
Gender and computer ethics. SIGCAS Comput. Soc. 30(4): 17-24 (2000) - 1996
- [j4]Alison E. Adam:
Constructions of Gender in the History of Artificial Intelligence. IEEE Ann. Hist. Comput. 18(3): 47-53 (1996) - 1995
- [j3]Alison E. Adam:
Woman and Computing in the UK. Commun. ACM 38(1): 43 (1995) - 1993
- [j2]Alison E. Adam:
Gendered Knowledge - Epistemology and Artificial Intelligence. AI Soc. 7(4): 311-322 (1993) - 1990
- [j1]Alison E. Adam:
What Can the History of AI Learn from the History of Science. AI Soc. 4(3): 232-241 (1990)
Conference and Workshop Papers
- 2008
- [c16]Alison Adam, Christopher Bull:
Exploring Macintyre's Virtue Ethics in Relation to Information Systems. ECIS 2008: 623-633 - 2006
- [c15]Beryl Burns, Ben Light, Alison Adam:
Users as professionals: A study of IT deployment and its relationship to professional Autonomy. ECIS 2006: 1548-1559 - [c14]Alison Adam, David Kreps:
Web Accessibility: A Digital Divide for Disabled People? Social Inclusion 2006: 217-228 - 2005
- [c13]Richard L. Baskerville, Alison E. Adam, Helmut Krcmar, Joe Peppard, John R. Venable:
Panel: IT employment and shifting enrolment patterns in information systems. ECIS 2005: 1765-1768 - 2004
- [c12]Alison Adam, Ben Light:
Selling Packaged Software: An Ethical Analysis . ECIS 2004: 1-12 - [c11]Frances Bell, Alison Adam:
The problem of integrating ethics into IS practice. ECIS 2004: 189-199 - [c10]Frances Bell, Alison Adam:
Whatever Happened to Information Systems Ethics? - Caught between the Devil and the Deep Blue Sea. Relevant Theory and Informed Practice 2004: 159-174 - 2001
- [c9]Alison E. Adam:
Gender, Emancipation and Critical Information Systems. ECIS 2001: 139-147 - [c8]Alison E. Adam, Debra Howcroft, Helen J. Richardson:
Absent Friends? The Gender Dimension in Information Systems Research. Realigning Research and Practice in Information Systems Development 2001: 333-352 - 2000
- [c7]Alison E. Adam:
Information Systems. WWC 2000: 102-110 - 1997
- [c6]Alison E. Adam:
Information technology cultures and women's lives. ISTAS 1997: 75-81 - 1994
- [c5]Mohammad Ali Montazeri, Mike Brown, Alison E. Adam:
Cross Structural Similarity for Retrieval of Legal Cases. ICLP Workshop: Legal Application of Logic Programming 1994 - [c4]Alison E. Adam:
Who knows how? Who knows that? Feminist Epistemology and Artificial Intelligence. WWC 1994: 143-156 - 1992
- [c3]Y. Huang, Alison E. Adam:
A Relevancy Knowledge Model of Analogical Reasoning. ECAI 1992: 139-143 - 1990
- [c2]Margaret Bruce, Alison E. Adam:
Expert Systems - A Woman's Perspective. WiC 1990: 51-55 - [c1]Margaret Bruce, Alison E. Adam:
Woman's Career Paths in Artifical Intelligence. WiC 1990: 294-300
Editorship
- 1994
- [e1]Alison E. Adam, Judy Emms, Eileen Green, Jenny Owen:
Woman, Work and Computerization: Breaking Old Boundaries - Building New Forms, Proceedings of the IFIP TC9/WG9.1 Fifth International Conference on Woman, Work and Computerization: Breaking Old Boundaries - Building New Forms, Manchester, UK, 2-5 July, 1994. IFIP Transactions A-57, Elsevier 1994, ISBN 0-444-81927-4 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-28 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint