default search action
Susan J. Winter
Person information
- affiliation: University of Maryland College Park, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Elizabeth J. Davidson, Lauri Wessel, Jenifer Sunrise Winter, Susan J. Winter:
Future directions for scholarship on data governance, digital innovation, and grand challenges. Inf. Organ. 33(1): 100454 (2023) - 2022
- [p1]Susan J. Winter, Brian S. Butler:
Responsible Technology Design: Conversations for Success. Perspectives on Digital Humanism 2022: 271-275 - 2020
- [j16]Katie Shilton, Donal Heidenblad, Adam A. Porter, Susan J. Winter, Mary Kendig:
Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation. Sci. Eng. Ethics 26(6): 2911-2926 (2020) - [c12]Joel Chan, Jonathan Brier, Zahra Farhadi, Myeong Lee, Shawn Janzen, Wei-wei Chi, Andrew Fellows, Susan J. Winter:
A theoretical analysis of independent business owners' preferences for informal information sources. ASIST 2020
2010 – 2019
- 2019
- [j15]Susan J. Winter:
Who benefits? Commun. ACM 62(7): 23-25 (2019) - [j14]Susan J. Winter, Elizabeth Sharer, Hari K. Rajagopalan, Connie Marie Gaglio:
ICT and Corporate Image: The Customer's Perspective. Int. J. E Bus. Res. 15(2): 22-43 (2019) - [j13]Susan J. Winter, Carol Saunders:
The Personal in the Policy Cascade. J. Assoc. Inf. Syst. 20(11): 1 (2019) - [c11]Nicholas Berente, Stan Ahalt, James B. Bottum, Dana Brunson, Joel Cutcher-Gershenfeld, James Howison, John Leslie King, Henry Neeman, John Towns, Nancy Wilkins-Diehr, Susan J. Winter:
The Professionalization of Cyberinfrastructure Personnel? PEARC 2019: 87:1-87:6 - 2016
- [j12]Joel Cutcher-Gershenfeld, Karen S. Baker, Nicholas Berente, Dorothy R. Carter, Leslie A. DeChurch, Courtney C. Flint, Gabriel Gershenfeld, Michael Haberman, John Leslie King, Christine R. Kirkpatrick, Eric Knight, Barbara Lawrence, Spenser Lewis, W. Christopher Lenhardt, Pablo Lopez, Matthew S. Mayernik, Charles McElroy, Barbara Mittleman, Victor Nichol, Mark Nolan, Namchul Shin, Cheryl A. Thompson, Susan J. Winter, Ilya Zaslavsky:
Build It, But Will They Come? A Geoscience Cyberinfrastructure Baseline Analysis. Data Sci. J. 15: 8 (2016) - 2014
- [j11]Susan J. Winter, Nicholas Berente, James Howison, Brian Butler:
Beyond the organizational 'container': Conceptualizing 21st century sociotechnical work. Inf. Organ. 24(4): 250-269 (2014) - [c10]Sean P. Goggins, Andrea Wiggins, Susan J. Winter, Brian Butler:
OCData Hackathon @ CSCW 2014: online communities data hackathon. CSCW Companion 2014: 317-318 - [c9]Heikki Topi, Eric K. Clemons, Matthew Lee, Susan Newell, Graeme G. Shanks, Susan J. Winter:
Big Data, Big Decisions: Reflections on AIS's Role in Ethical Guidance and Oversight. ICIS 2014 - 2012
- [j10]Susan J. Winter:
The rise of cyberinfrastructure and grand challenges for eCommerce. Inf. Syst. E Bus. Manag. 10(3): 279-293 (2012) - 2011
- [j9]D. Scott Hunsinger, Michael Alan Smith, Susan J. Winter:
A framework of the use of certifications by hiring personnel in it hiring decisions. Data Base 42(1): 9-28 (2011) - [j8]Steve Sawyer, Susan J. Winter:
Special issue on futures for research on information systems: prometheus unbound? J. Inf. Technol. 26(2): 95-98 (2011) - [j7]Susan J. Winter, Brian S. Butler:
Creating bigger problems: grand challenges as boundary objects and the legitimacy of the information systems field. J. Inf. Technol. 26(2): 99-108 (2011) - [c8]Moez Limayem, Fred Niederman, Sandra Slaughter, Hsinchun Chen, Shirley Gregor, Susan J. Winter:
Senior Scholars' Forum. ICIS 2011
2000 – 2009
- 2009
- [j6]Susan J. Winter, Connie Marie Gaglio, Hari K. Rajagopalan:
The Value of Information Systems to Small and Medium-Sized Enterprises: Information and Communications Technologies as Signal and Symbol of Legitimacy and Competitiveness. Int. J. E Bus. Res. 5(1): 65-91 (2009) - 2008
- [c7]Yuan Niu, Antonis C. Stylianou, Susan J. Winter:
Blowing the Whistle on Unethical Information Techmology Practices: The Role of Machiavellianism, Gender and Computer Liteacy. AMCIS 2008: 269 - [c6]Muhammad Adeel Zaffar, Susan J. Winter:
Minding the IS Soft Skills Gap: Evidence of Discourse Convergence and Organizational Field Structure. ICIS 2008: 69 - 2006
- [c5]Yuan Niu, Susan J. Winter:
The Effect of Task Type and Information Format on Web Searching Performance. ICIS 2006: 52 - 2003
- [j5]Susan J. Winter, Carol Stoak Saunders, Paul J. Hart:
Electronic window dressing: impression management with Websites. Eur. J. Inf. Syst. 12(4): 309-322 (2003) - 2001
- [j4]Susan J. Winter, T. Grandon Gill:
OFFICETECH®: a new paradigm in office services? J. Inf. Technol. 16(1): 23-32 (2001)
1990 – 1999
- 1999
- [c4]Susan J. Winter, T. Grandon Gill:
OFFICETECH: a new paradigm in office services? ICIS 1999: 612-623 - 1998
- [j3]Susan J. Winter, Katherine M. Chudoba, Barbara A. Gutek:
Attitudes toward computers: when do they predict computer use? Inf. Manag. 34(5): 275-284 (1998) - 1997
- [j2]Susan J. Winter, Katherine M. Chudoba, Barbara A. Gutek:
Misplaced resources? Factors associated with computer literacy among end-users. Inf. Manag. 32(1): 29-42 (1997) - [c3]Susan J. Winter, Carol Stoak Saunders, Paul J. Hart:
Electronic window dressing: impression management on the internet. ICIS 1997: 479-480 - 1996
- [j1]Susan J. Winter, S. Lynne Taylor:
The Role of IT in the Transformation of Work: A Comparison of Post-Industrial, Industrial, and Proto-Industrial Organization. Inf. Syst. Res. 7(1): 5-21 (1996) - 1993
- [c2]Susan J. Winter:
The Symbolic Potential of Computer Technology: Differences Among White-Collar Workers. ICIS 1993: 331-344 - 1992
- [c1]Susan J. Winter, Barbara A. Gutek, Katherine M. Chudoba:
Misplaced Resources? Factors Associated with Computer Literacy Among End-Users. ICIS 1992: 149-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint