default search action
Neil F. Doherty
Person information
- affiliation: Loughborough University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j31]Michael J. Mortenson, Neil F. Doherty, Stewart Robinson:
Creating a typology of analytics Master's degrees in UK universities: Implications for employers and educators. J. Oper. Res. Soc. 71(9): 1327-1346 (2020)
2010 – 2019
- 2018
- [j30]Neil F. Doherty, Sharul T. Tajuddin:
Towards a user-centric theory of value-driven information security compliance. Inf. Technol. People 31(2): 348-367 (2018) - 2017
- [j29]Clive R. Trusson, Donald Hislop, Neil F. Doherty:
The rhetoric of "knowledge hoarding": a research-based critique. J. Knowl. Manag. 21(6): 1540-1558 (2017) - 2016
- [c16]Khalid Al Rawahi, Crispin R. Coombs, Neil F. Doherty:
The Realization of Public Value through E-government: a Structuration Perspective. ICIS 2016 - [c15]Neil F. Doherty:
Re-envisioning the role of benefits realisation in a world dominated by robots. RCIS 2016: 1-6 - 2015
- [j28]Michael J. Mortenson, Neil F. Doherty, Stewart Robinson:
Operational research from Taylorism to Terabytes: A research agenda for the analytics age. Eur. J. Oper. Res. 241(3): 583-595 (2015) - [c14]Kayode A. Odusanya, Crispin R. Coombs, Neil F. Doherty:
Exploiting Benefits from IS/IT Investments: An IT Culture Perspective. ECIS 2015 - [c13]Kayode Odusanya, Crispin R. Coombs, Neil F. Doherty:
Assessing Individual Benefits Realization Capability: an IT Culture Perspective. ICIS 2015 - [c12]Andrrew Aitken, Crispin R. Coombs, Neil F. Doherty:
Towards Benefit Orientated Business Process Modelling: A Canonical Action Research Study. UKAIS 2015: 11 - 2014
- [j27]Clive R. Trusson, Neil F. Doherty, Donald Hislop:
Knowledge sharing using IT service management tools: conflicting discourses and incompatible practices. Inf. Syst. J. 24(4): 347-371 (2014) - [j26]Bernd Carsten Stahl, Neil F. Doherty, Mark Christopher Shaw, Helge Janicke:
Critical Theory as an Approach to the Ethics of Information Security. Sci. Eng. Ethics 20(3): 675-699 (2014) - [c11]Usman Aslam, Crispin R. Coombs, Neil F. Doherty:
Use of ERP Systems: a Social shaping Perspective. MCIS 2014: 29 - [c10]Usman Aslam, Crispin R. Coombs, Neil F. Doherty:
Re-Conceptualization of Tailoring Types and their Impacts: a Perspective for Contemporary ERP Systems. MCIS 2014: 30 - [c9]Colin Ashurst, Neil F. Doherty:
Benefits-Led IT: Building The Organisational Capability - A Longitudinal Perspective. UKAIS 2014: 14 - [c8]Abdullah Othman, Neil F. Doherty:
Uncovering Business Benefits From Regulatory Compliance Systems. UKAIS 2014: 24 - 2013
- [j25]Neil F. Doherty, Mark Terry:
Improving competitive positioning through complementary organisational resources. Ind. Manag. Data Syst. 113(5): 697-711 (2013) - [c7]Neil F. Doherty, Crispin R. Coombs:
From IT Development to IT Exploitation - Shifting the Research Agenda. UKAIS 2013: 47 - [p2]Neil F. Doherty, Crispin R. Coombs:
IT Exploitation Through Business Transformation: Experiences and Implications. Transforming Field and Service Operations 2013: 3-13 - [p1]Crispin R. Coombs, Neil F. Doherty, Irina Neaga:
Measuring and Managing the Benefits from IT Projects: A Review and Research Agenda. Transforming Field and Service Operations 2013: 257-269 - [e1]Gilbert Owusu, Paul O'Brien, John A. W. McCall, Neil F. Doherty:
Transforming Field and Service Operations, Methodologies for Successful Technology-Driven Business Transformation. Springer 2013, ISBN 978-3-642-44969-7 [contents] - 2012
- [j24]Bernd Carsten Stahl, Neil F. Doherty, Mark Christopher Shaw:
Information security policies in the UK healthcare sector: a critical evaluation. Inf. Syst. J. 22(1): 77-94 (2012) - [j23]Neil F. Doherty, Colin Ashurst, Joe Peppard:
Factors affecting the successful realisation of benefits from systems development projects: findings from three case studies. J. Inf. Technol. 27(1): 1-16 (2012) - [c6]Neil F. Doherty, Colin Ashurst:
The realisation of Benefits from IT Projects: Does Practice makes Perfect? CONF-IRM 2012: 7 - [c5]Usman Aslam, Crispin R. Coombs, Neil F. Doherty:
Benefits Realization from ERP Systems: the Role of Customization. ECIS 2012: 142 - 2011
- [j22]Neil F. Doherty, Leonidas Anastasakis, Heather Fulford:
Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy. Int. J. Inf. Manag. 31(3): 201-209 (2011) - 2010
- [j21]Neil F. Doherty, Donna Champion, Leitao Wang:
An holistic approach to understanding the changing nature of organisational structure. Inf. Technol. People 23(2): 116-135 (2010) - [c4]Neil F. Doherty, Danny McConnell, Fiona E. Ellis-Chadwick:
Exploring the Uptake and Application of Electronic Procurement to Central and Local Government. RCIS 2010: 453-462
2000 – 2009
- 2009
- [j20]Neil F. Doherty, Leonidas Anastasakis, Heather Fulford:
The information security policy unpacked: A critical study of the content of university policies. Int. J. Inf. Manag. 29(6): 449-457 (2009) - [j19]Neil F. Doherty, Mark Terry:
The role of IS capabilities in delivering sustainable improvements to competitive positioning. J. Strateg. Inf. Syst. 18(2): 100-116 (2009) - 2008
- [j18]Colin Ashurst, Neil F. Doherty, Joe Peppard:
Improving the impact of IT development projects: the benefits realization capability model. Eur. J. Inf. Syst. 17(4): 352-370 (2008) - 2007
- [r2]Heather Fulford, Neil F. Doherty:
Information Security Policy Research Agenda. Encyclopedia of Information Ethics and Security 2007: 377-383 - 2006
- [j17]Neil F. Doherty, Heather Fulford:
Aligning the information security policy with the strategic information systems plan. Comput. Secur. 25(1): 55-63 (2006) - [j16]Neil F. Doherty, Crispin R. Coombs, John Loan-Clarke:
A re-conceptualization of the interpretive flexibility of information technologies: redressing the balance between the social and the technical. Eur. J. Inf. Syst. 15(6): 569-582 (2006) - 2005
- [j15]Neil F. Doherty, Malcolm King:
From technical to socio-technical change: tackling the human and organizational aspects of systems development projects. Eur. J. Inf. Syst. 14(1): 1-5 (2005) - [j14]Neil F. Doherty, Heather Fulford:
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis. Inf. Resour. Manag. J. 18(4): 21-39 (2005) - [r1]Neil F. Doherty, Malcolm King:
Managing the Organisational Impacts of Information Systems. Encyclopedia of Information Science and Technology (IV) 2005: 1880-1886 - 2003
- [j13]Neil F. Doherty, Malcolm King, Omar Al-Mushayt:
The impact of inadequacies in the treatment of organizational issues on information systems development projects. Inf. Manag. 41(1): 49-62 (2003) - [j12]Heather Fulford, Neil F. Doherty:
The application of information security policies in large UK-based organizations: an exploratory investigation. Inf. Manag. Comput. Secur. 11(3): 106-114 (2003) - [j11]Neil F. Doherty, Fiona E. Ellis-Chadwick:
The relationship between retailers' targeting and e-commerce strategies: an empirical analysis. Internet Res. 13(3): 170-182 (2003) - [j10]Neil F. Doherty, Graham Doig:
An analysis of the anticipated cultural impacts of the implementation of data warehouses. IEEE Trans. Engineering Management 50(1): 78-88 (2003) - 2002
- [j9]Laurie McAulay, Neil F. Doherty, Natasha Keval:
The stakeholder dimension in information systems evaluation. J. Inf. Technol. 17(4): 241-255 (2002) - 2001
- [j8]Neil F. Doherty, Malcolm King:
An investigation of the factors affecting the successful treatment of organisational issues in systems development projects. Eur. J. Inf. Syst. 10(3): 147-160 (2001) - [j7]Crispin R. Coombs, Neil F. Doherty, John Loan-Clarke:
The Importance of User Ownership and Positive User Attitudes in the Successful Adoption of Community Information Systems. J. Organ. End User Comput. 13(4): 5-16 (2001) - [c3]Graham Doig, Neil F. Doherty, Chris Marples:
An In-Depth Investigation into the Impact of Information Quality Upon the Perceived Value of Information. IQ 2001: 138-152
1990 – 1999
- 1999
- [j6]Neil F. Doherty, Ivor Perry:
The uptake and application of work flow management systems in the UK financial services sector. J. Inf. Technol. 14(2): 149-160 (1999) - [j5]Neil F. Doherty, Chris Marples, A. Suhaimi:
The relative success of alternative approaches to strategic information systems planning: an empirical analysis. J. Strateg. Inf. Syst. 8(3): 263-283 (1999) - [c2]Neil F. Doherty, Chris Marples, A. Suhaimi:
A Statistical Evaluation of Earl's Five Approaches to Strategic Information Systems Planning. ECIS 1999: 117-128 - 1998
- [j4]Neil F. Doherty, Malcolm King:
The consideration of organizational issues during the systems development process: An empirical analysis. Behav. Inf. Technol. 17(1): 41-51 (1998) - [j3]Neil F. Doherty, Malcolm King:
The importance of organisational issues in systems development. Inf. Technol. People 11(2): 104-123 (1998) - [c1]Neil F. Doherty, Ivor Perry:
The uptake and application of workflow management systems in the UK financial services sector. ECIS 1998: 422-435 - 1995
- [j2]Neil F. Doherty, J. Saker, I. G. Smith:
Marketing development in the public library sector: an empirical analysis. J. Inf. Sci. 21(6): 449-458 (1995) - 1994
- [j1]Neil F. Doherty, A. K. Kochhar:
MIDAS: an application of model-based reasoning for the diagnosis of hydraulic systems. Knowl. Based Syst. 7(2): 127-134 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint