{"id":83,"date":"2018-03-01T22:05:00","date_gmt":"2018-03-01T22:05:00","guid":{"rendered":"http:\/\/marcschmalz.com\/blog\/?page_id=83"},"modified":"2023-10-11T19:45:15","modified_gmt":"2023-10-11T19:45:15","slug":"reading-list","status":"publish","type":"page","link":"http:\/\/marcschmalz.com\/blog\/phd-process\/reading-list\/","title":{"rendered":"Reading List"},"content":{"rendered":"<div>This is my current reading list, with links (<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/>) to blog posts for those that have them.<\/div>\n<div><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Adams, A., &amp; Cox, A. L. (2008). Questionnaires, in-depth interviews and focus groups. In P. Cairns &amp; A. L. Cox (Eds.), <em>Research Methods for Human Computer Interaction,\u00a0<\/em>17\u201334. Cambridge, UK:Cambridge University Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Andersson, \u00c5. E. (2006). The economics of experiences, the arts and entertainment. Cheltenham, UK\u202f; Northampton, MA: Edward Elgar.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Baccarini, D., Salm, G., &amp; Love, P. E. D. (2004). Management of risks in information technology projects. <em>Industrial Management &amp; Data Systems, 104<\/em>(4), 286\u2013295. <a href=\"https:\/\/doi.org\/10.1108\/02635570410530702\">https:\/\/doi.org\/10.1108\/02635570410530702<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Barki, H., Rivard, S., &amp; Talbot, J. (1993). Toward an assessment of software development risk. <em>Journal of Management Information Systems, 10<\/em>(2), 203\u2013225.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Barki, H., Rivard, S., &amp; Talbot, J. (2001). An Integrative Contingency Model of Software Project Risk Management. <em>Journal of Management Information Systems, 17<\/em>(4), 37\u201369.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Bechky, B. A. (2006). Gaffers, gofers, and grips: Role-based coordination in temporary organizations. <em>Organization Science, 17<\/em>(1), 3\u201321.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\"><span style=\"text-indent: -4em; font-size: 1.5rem;\">Belk, R. W. (1988). Possessions and the Extended Self. <\/span><i style=\"text-indent: -4em; font-size: 1.5rem;\">Journal of Consumer Research<\/i><span style=\"text-indent: -4em; font-size: 1.5rem;\">, <\/span><i style=\"text-indent: -4em; font-size: 1.5rem;\">15<\/i><span style=\"text-indent: -4em; font-size: 1.5rem;\">(2), 139\u2013168.<a href=\"http:\/\/marcschmalz.com\/blog\/?p=147&amp;preview=true\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/span><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">B\u00e9rub\u00e9, J., &amp; Gauthier, J.-B. (2017). Compromise between creative activities and project management activities: a contingency factor. The Journal of Modern Project Management, 5(2).<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Birks, D. F., Fernandez, W., Levina, N., &amp; Nasirin, S. (2012). Grounded theory method in information systems research: its nature, diversity and opportunities. European Journal of Information Systems, 22(1), 1. <a href=\"https:\/\/doi.org\/10.1057\/ejis.2012.48\">https:\/\/doi.org\/10.1057\/ejis.2012.48<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Boehm, B., &amp; Turner, R. (2003). Using risk to balance agile and plan-driven methods. <em>Computer, 36<\/em>(6), 57\u201366.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Boehm, B. W. (1991). Software risk management: principles and practices. <em>IEEE Software, 8<\/em>(1), 32\u201341.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Brinkmann, S. (2014). Unstructured and semi-structured interviewing. In <em>The Oxford Handbook of Qualitative Research<\/em>. Oxford Handbooks Online.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Burke, P. J., &amp; Stets, J. E. (2009). <em>Identity Theory<\/em> (1st ed.). Oxford\u202f; New York: Oxford University Press.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/burke-stets-2009-identity-theory\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Carter, M., &amp; Grover, V. (2015). Me, my self, and I(T):\u00a0 Conceptualizating information technology identity and its implications. <em>MIS Quarterly, 39<\/em>(4), 931\u2013957.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Cecez-Kecmanovic, D., Kautz, K., &amp; Abrahall, R. (2014). Reframing success and failure of information systems: A performative perspective. <em>MIS Quarterly, 38<\/em>(2), 561.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Charette, R. N. (1996). Large-scale project management is risk management. <em>Software, IEEE, 13<\/em>(4), 110\u2013117. <a href=\"https:\/\/doi.org\/10.1109\/52.526838\">https:\/\/doi.org\/10.1109\/52.526838<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Charette, R. N. (1996). The mechanics of managing IT risk. <em>Journal of Information Technology, 11<\/em>(4), 373\u2013378. <a href=\"https:\/\/doi.org\/10.1057\/jit.1996.10\">https:\/\/doi.org\/10.1057\/jit.1996.10<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Charmaz, K. (2006). Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. SAGE.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Clancy, T. (1995). The Standish Group Report. Chaos Report. Retrieved from https:\/\/www4.in.tum.de\/lehre\/vorlesungen\/vse\/WS2004\/1995_Standish_Chaos.pdf<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Clayton, S. D., &amp; Opotow, S. (Eds.). (2003). <em>Identity and the natural environment: the psychological significance of nature<\/em>. Cambridge, Mass: MIT Press.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/clayton-optow-2003-identity-and-the-natural-environment\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Cooke-Davies, T. (2002). The \u201creal\u201d success factors on projects. <em>International Journal of Project Management, 20<\/em>(3), 185\u2013190.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Coyle, S., &amp; Conboy, K. (2009). A case study of risk management in agile systems development. ECIS 2009 Proceedings.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Cule, P. (2000). Strategies for Heading Off is Project Failure. <em>Information Systems Management, 17<\/em>(2), 65.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Deuze, M., Martin, C. B., &amp; Allen, C. (2007). The professional identity of gameworkers. <em>Convergence, 13<\/em>(4), 335\u2013353. <a href=\"https:\/\/doi.org\/10.1177\/1354856507081947\">https:\/\/doi.org\/10.1177\/1354856507081947<\/a>\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/deuze-2007-professional-identity-of-gameworkers\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Dillman, D. A., Smyth, J. D., &amp; Christian, L. M. (2014). Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method. New York, UNITED STATES: John Wiley &amp; Sons, Incorporated.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Dittmar, H. (2008). Consumer Culture, Identity and Well-Being: The Search for the \u201cGood Life\u201d and the \u201cBody Perfect.\u201d New York, NY: Psychology Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Dovey, J., &amp; Kennedy, H. W. (2006). Game cultures: computer games as new media. Maidenhead, Berkshire, England; New York, NY: Open University Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Elliott, B. (2007). Anything is possible: Managing feature creep in an innovation rich environment. In 2007 IEEE International Engineering Management Conference (pp. 304\u2013307). Lost Pines, TX, USA: IEEE.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Field, T. (1997). When bad things happen to good projects. <em>CIO, 11<\/em>(2), 54\u201362.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Fields, T. (2010). Distributed Game Development: Harnessing Global Talent to Create Winning Games. Oxford: Focal Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Floyd, C., Mehl, W.-M., Resin, F.-M., Schmidt, G., &amp; Wolf, G. (1989). Out of Scandinavia: Alternative Approaches to Software Design and System Development. Human\u2013Computer Interaction, 4(4), 253\u2013350. <a href=\"https:\/\/doi.org\/10.1207\/s15327051hci0404_1\">https:\/\/doi.org\/10.1207\/s15327051hci0404_1<\/a>\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/floyd-1989-scandinavian-approach\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Glaser, B. G. (2006). <em>The discovery of grounded theory: strategies for qualitative research<\/em>. New Brunswick, N.J.: Aldine Transaction.Gregor, S. (2006). The Nature of Theory in Information Systems. <em>MIS Quarterly, 30<\/em>(3), 611\u2013642.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Hesmondhalgh, D. (2006). Bourdieu, the media and cultural production. <em>Media, Culture &amp; Society, 28<\/em>(2), 211\u2013231. <a href=\"https:\/\/doi.org\/10.1177\/0163443706061682\">https:\/\/doi.org\/10.1177\/0163443706061682<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Hesmondhalgh, D. (2012). <em>The Cultural Industries<\/em> (3rd ed.). London: SAGE Publishing.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/symbol-creators\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Hijazi, H., Khdour, T., &amp; Alarabeyyat, A. (2012). A review of risk management in different software development methodologies. <em>International Journal of Computer Applications, 45<\/em>(7), 8\u201312.<\/div>\n<div>Jones, C. (1994). Assessment and control of software risks. Englewood Cliffs, NJ: Yourdon Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Keil, M., Cule, P. E., Lyytinen, K., &amp; Schmidt, R. C. (1998). A Framework for Identifying Software Project Risks. <em>Commun. ACM, 41<\/em>(11), 76\u201383. <a href=\"https:\/\/doi.org\/10.1145\/287831.287843\">https:\/\/doi.org\/10.1145\/287831.287843<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Keil, M., Tiwana, A., &amp; Bush, A. (2002). Reconciling user and project manager perceptions of IT project risk: a Delphi study1. <em>Information Systems Journal, 12<\/em>(2), 103\u2013119. <a href=\"https:\/\/doi.org\/10.1046\/j.1365-2575.2002.00121.x\">https:\/\/doi.org\/10.1046\/j.1365-2575.2002.00121.x<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Kerr, A. (2006). <em>The business and culture of digital games: gamework\/gameplay<\/em>. London\u202f; Thousand Oaks, Calif.: SAGE.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Kerr, A. (2017). <em>Global games: production, circulation and policy in the networked era<\/em>. London\u202f; New York: Routledge\/Taylor &amp; Francis Group.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Kilduff, M., Funk, J. L., &amp; Mehra, A. (1997). Engineering Identity in a Japanese Factory. Organization Science, 8(6), 579\u2013592.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Kreiner, G. E., &amp; Ashforth, B. E. (2004). Evidence toward an expanded model of organizational identification. Journal of Organizational Behavior, 25(1), 1\u201327.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Lang, K., Shang, R., &amp; Vragov, R. (2015). Consumer Co-creation of Digital Culture Products: Business Threat or New Opportunity? Journal of the Association for Information Systems, 16(9).<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Leidner, D. E., &amp; Kayworth, T. (2006). Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict. MIS Quarterly, 30(2), 357\u2013399.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Lin, C.-P., &amp; Bhattacherjee, A. (2010). Extending technology usage models to interactive hedonic technologies: a theoretical model and empirical test. <em>Information Systems Journal, 20<\/em>(2), 163\u2013181. <a href=\"https:\/\/doi.org\/10.1111\/j.1365-2575.2007.00265.x\">https:\/\/doi.org\/10.1111\/j.1365-2575.2007.00265.x<\/a>\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/lin-bhattacherjee-a-tam-for-games\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Mi\u00e8ge, B. (1989). <em>The capitalization of cultural production<\/em>. New York, NY\u202f: International General.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Moynihan, T. (1997). How experienced project managers assess risk. IEEE Software, 14(3), 35\u201341.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Murdock, G. (2011). Political economies as moral economies: Commodities, gifts, and public goods. In J. Wasko, G. Murdock, &amp; H. Sousa (Eds.), The Handbook of Political Economy of Communications (pp. 11\u201340). Wiley-Blackwell. <a href=\"https:\/\/doi.org\/10.1002\/9781444395402.ch1\">https:\/\/doi.org\/10.1002\/9781444395402.ch1<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Nandhakumar, J., Panourgias, N. S., &amp; Scarbrough, H. (2013). From Knowing It to \u201cGetting It\u201d: Envisioning Practices in Computer Games Development. <em>Information Systems Research, 24<\/em>(4), 933\u2013955. <a href=\"https:\/\/doi.org\/10.1287\/isre.2013.0482\">https:\/\/doi.org\/10.1287\/isre.2013.0482<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Neves, F. G., Borgman, H., &amp; Heier, H. (2016). Success Lies in the Eye of the Beholder: The Mismatch Between Perceived and Real IT Project Management Performance. In <em>2016 49th Hawaii International Conference on System Sciences (HICSS)<\/em> (pp. 5878\u20135887). <a href=\"https:\/\/doi.org\/10.1109\/HICSS.2016.745\">https:\/\/doi.org\/10.1109\/HICSS.2016.745<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Nidumolu, S. (1995). The Effect of Coordination and Uncertainty on Software Project Performance: Residual Performance Risk as an Intervening Variable. <em>Information Systems Research, 6<\/em>(3), 191\u2013219.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/nidumolu-1995-residual-performance-risk\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Nowlis, S. M., &amp; Simonson, I. (1996). The Effect of New Product Features on Brand Choice. Journal of Marketing Research, 33(1), 36\u201346.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Paul, J. (2007). Tolerance of Escalating Commitment to Troubled Projects. AMCIS 2007 Proceedings.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Rai, A., Maruping, L. M., &amp; Venkatesh, V. (2009). Offshore Information Systems Project Success: The Role of Social Embeddedness and Cultural Characteristics. <em>MIS Quarterly, 33<\/em>(3), 617-A7.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Reifer, D. (2002). Ten deadly risks in Internet and intranet software development. IEEE Software, 19(2), 12\u201314.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Ropponen, J., &amp; Lyytinen, K. (2000). Components of software development risk: how to address them? A project manager survey. IEEE Transactions on Software Engineering, 26(2), 98\u2013112.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Rossi, P. H., Wright, J. D., &amp; Anderson, A. B. (2013). Handbook of Survey Research. Academic Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Sadler, D. (1997). The Global Music Business as an Information Industry: Reinterpreting Economies of Culture. <em>Environment and Planning A, 29<\/em>(11), 1919\u20131936. <a href=\"https:\/\/doi.org\/10.1068\/a291919\">https:\/\/doi.org\/10.1068\/a291919<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Sch\u00e4fer, M. T., &amp; Sch\u00e4fer, M. T. (2014). Bastard Culture!: How User Participation Transforms Cultural Production. Amsterdam, Netherlands: Amsterdam University Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Schiller, D. (1994). From Culture to Information and Back Again: Commoditization as a Route to Knowledge. <em>Critical Studies in Mass Communication, 11<\/em>(1), 93.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Schmalz, M., Finn, A., &amp; Taylor, H. (2014). Risk Management in Video Game Development Projects. In <em>2014 47th Hawaii International Conference on System Sciences,<\/em>\u00a0pp. 4325\u20134334. <a href=\"https:\/\/doi.org\/10.1109\/HICSS.2014.534\">https:\/\/doi.org\/10.1109\/HICSS.2014.534<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Schmidt, R., Lyytinen, K., Keil, M., &amp; Cule, P. (2001). Identifying Software Project Risks: An International Delphi Study. <em>Journal of Management Information Systems, 17<\/em>(4), 5\u201336.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Schreier, J. (2017). <em>Blood, sweat, and pixels: The triumphant, turbulent stories behind how video games are made<\/em>. HarperCollins.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Schwartz, S. J., Luyckx, K., &amp; Vignoles, V. L. (Eds.). (2011). <em>Handbook of Identity Theory and Research<\/em>. New York: Springer-Verlag. Retrieved from http:\/\/www.springer.com\/us\/book\/9781441979872<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Scott, J. E., &amp; Vessey, I. (2002). Managing Risks in Enterprise Systems Implementations. <em>Communications of the ACM, 45<\/em>(4), 74\u201381. <a href=\"https:\/\/doi.org\/10.1145\/505248.505249\">https:\/\/doi.org\/10.1145\/505248.505249<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Shmueli, O., Pliskin, N., &amp; Fink, L. (2013). The Planning Fallacy as an Explanation for Over-Requirement in Software Development. <em>International Research Workshop on IT Project Management 2013<\/em>.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Shmueli, O., Pliskin, N., &amp; Fink, L. (2014). Behavioural Effects in Software Development: An Experimental Investigation. <em>ECIS 2014 Proceedings<\/em>.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Shmueli, O., Pliskin, N., &amp; Fink, L. (2015). Explaining over-requirement in software development projects: An experimental investigation of behavioral effects. <em>International Journal of Project Management, 33<\/em>(2), 380\u2013394.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Shmueli, O., Pliskin, N., &amp; Fink, L. (n.d.). The Dark Side of Emotional Involvement in Software Development: A Behavioral Economics Perspective. <em>Asia Pacific Journal of Information Systems, 26<\/em>(2), 322\u2013337.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Shmueli, O., &amp; Ronen, B. (2017). Excessive software development: Practices and penalties. <em>International Journal of Project Management, 35<\/em>(1), 13\u201327.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Storey, J. (2015). Cultural Theory and Popular Culture: An Introduction. London, UK: Routledge.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Sumner, M. (2000). Risk factors in enterprise-wide\/ERP projects. <em>Journal of Information Technology, 15<\/em>(4), 317\u2013327. <a href=\"https:\/\/doi.org\/10.1080\/02683960010009079\">https:\/\/doi.org\/10.1080\/02683960010009079<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Sutton-Smith, B. (2001). <em>The ambiguity of play<\/em>. Cambridge, Mass.: Harvard Univ. Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Swann, W. B. (2011). Self-verification theory. In Handbook of theories of social psychology (Vol. 2, pp. 23\u201342).<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Swann, W. B., &amp; Buhrmester, M. D. (2012). Self-verification The search for coherence. In M. R. Leary &amp; J. P. Tangney (Eds.), <em>Hanbook of Self and Identity<\/em> (Second Edition).\u00a0New York\u202f; London: Guilford Press.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/swann-buhrmester-2014-self-verification-the-search-for-coherence\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Taylor, H. (2004). Risk factors in vendor-driven IT projects. <em>AMCIS 2004 Proceedings<\/em>, 108.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Taylor, H. (2005). Congruence between risk management theory and practice in Hong Kong vendor-driven IT projects. <em>International Journal of Project Management, 23<\/em>(6), 437\u2013444. <a href=\"https:\/\/doi.org\/10.1016\/j.ijproman.2005.02.001\">https:\/\/doi.org\/10.1016\/j.ijproman.2005.02.001<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Taylor, H. (2006). Risk management and problem resolution strategies for IT projects: prescription and practice. <em>Project Management Quarterly, 37<\/em>(5), 49.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Taylor, H. A. (2004). Risk management and tacit knowledge in IT projects: making the implicit explicit. Queensland University of Technology.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Tian, K., &amp; Belk, R. W. (2005). Extended Self and Possessions in the Workplace. Journal of Consumer Research, 32(2), 297\u2013310.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Vignoles, V.L., Schwartz, S.J. and Luyckx, K., (2011). Introduction: Toward an integrative view of identity. In\u00a0<em>Handbook of identity theory and research<\/em>\u00a0(pp. 1-27). Springer New York.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/vignoles-et-al-2011-introduction-toward-an-integrative-view-of-identity\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-164 size-full\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Wallace, L., &amp; Keil, M. (2004). Software Project Risks and Their Effect on Outcomes. <em>Communications of the ACM, 47<\/em>(4), 68\u201373. <a href=\"https:\/\/doi.org\/10.1145\/975817.975819\">https:\/\/doi.org\/10.1145\/975817.975819<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Wallace, L., Keil, M., &amp; Rai, A. (2004a). How Software Project Risk Affects Project Performance: An Investigation of the Dimensions of Risk and an Exploratory Model. <em>Decision Sciences, 35<\/em>(2), 289\u2013321. <a href=\"https:\/\/doi.org\/10.1111\/j.00117315.2004.02059.x\">https:\/\/doi.org\/10.1111\/j.00117315.2004.02059.x<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Wallace, L., Keil, M., &amp; Rai, A. (2004b). Understanding software project risk: a cluster analysis. <em>Information &amp; Management, 42<\/em>(1), 115\u2013125. <a href=\"https:\/\/doi.org\/10.1016\/j.im.2003.12.007\">https:\/\/doi.org\/10.1016\/j.im.2003.12.007<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Wasko, J. (1994). <em>Hollywood in the information age: beyond the silver screen<\/em>. Cambridge: Polity.\u00a0<a href=\"http:\/\/marcschmalz.com\/blog\/hollywood-in-the-information-age\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164\" src=\"http:\/\/marcschmalz.com\/blog\/wp-content\/uploads\/notes.png\" alt=\"\" width=\"18\" height=\"18\" \/><\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Wasko, J., Murdock, G., &amp; Sousa, H. (2011). Introduction: The Political Economy of Communications: Core Concerns and Issues. In J. Wasko, G. Murdock, &amp; H. Sousa (Eds.), <em>The Handbook of Political Economy of Communications<\/em> (pp. 1\u201310). Wiley-Blackwell. <a href=\"https:\/\/doi.org\/10.1002\/9781444395402.ch\">https:\/\/doi.org\/10.1002\/9781444395402.ch<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Whitley, E. A., Gal, U., &amp; Kjaergaard, A. (2014). Who do you think you are? A review of the complex interplay between information systems, identification and identity. <em>European Journal of Information Systems, 23<\/em>(1), 17\u201335.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Whitson, J. R. (2017). Voodoo software and boundary objects in game development: How developers collaborate and conflict with game engines and art tools. <em>New Media &amp; Society<\/em>. <a href=\"https:\/\/doi.org\/10.1177\/1461444817715020\">https:\/\/doi.org\/10.1177\/1461444817715020<\/a><\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Williams, D., &amp; Williams, D. (2009). Exploring Software project characteristics on Scope Creep. <em>SAIS 2009 Proceedings<\/em>.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Williams, R. (1981). <em>Culture<\/em>. London: Fontana.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Williams, R. (1998). The Analysis of Culture. In <em>Cultural Theory and Popular Culture: A Reader<\/em> (2nd ed, pp. 48\u201356). Athens, GA: University of Georgia Press.<\/div>\n<div class=\"\" style=\"padding-left: 4em; text-indent: -4em;\">Yin, R. K. (2009). Case Study Research: Design and Methods (Fourth Edition). Los Angeles, CA: SAGE.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is my current reading list, with links () to blog posts for those that have them. Adams, A., &amp; Cox, A. L. (2008). Questionnaires, in-depth interviews and focus groups. In P. Cairns &amp; A. L. Cox (Eds.), Research Methods <a class=\"more-link\" href=\"http:\/\/marcschmalz.com\/blog\/phd-process\/reading-list\/\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":541,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-83","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/pages\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":15,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/pages\/83\/revisions"}],"predecessor-version":[{"id":252,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/pages\/83\/revisions\/252"}],"up":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/pages\/541"}],"wp:attachment":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/media?parent=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}