James Backhouse

According to our database1, James Backhouse authored at least 30 papers between 1988 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Resistance and power in a security certification scheme: The case of c: cure.
Decis. Support Syst., 2016

2014
Institutionalizing operational risk management: an empirical study.
J. Inf. Technol., 2014

2012
Risk, trust and eID: Exploring public perceptions of digital identity systems.
First Monday, 2012

2009
Approaching Interoperability for Identity Management Systems.
Proceedings of the Future of Identity in the Information Society, 2009

2008
Security and Privacy Perceptions of E- ID: A Grounded Research.
Proceedings of the 16th European Conference on Information Systems, 2008

General Description of the Process of Behavioural Profiling.
Proceedings of the Profiling the European Citizen, Cross-Disciplinary Perspectives, 2008

2007
Editorial: JSIS Security and Privacy Special Issue.
J. Strateg. Inf. Syst., 2007

Using Structuration Theory in IS Research: Operationalizing Key Constructs.
Proceedings of the International Conference on Information Systems, 2007

2006
Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard.
MIS Q., 2006

Opportunities for computer crime: considering systems risk from a criminological perspective.
Eur. J. Inf. Syst., 2006

Interoperability of identity and identity management systems.
Datenschutz und Datensicherheit, 2006

Impact Of Intranets On Employee Perception And Behavior: A Case Study In A UK Bank.
Proceedings of the International Conference on Information Systems, 2006

2005
A question of trust.
Commun. ACM, 2005

Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Computer crime at CEFORMA: a case study.
Int. J. Inf. Manag., 2004

Rating Certificate Authorities: a market approach to the Lemons problem.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems.
J. Assoc. Inf. Syst., 2003

Toward public-key infrastructure interoperability.
Commun. ACM, 2003

The key to trust? signalling quality in the PKI market.
Proceedings of the 11th European Conference on Information Systems, 2003

2002
Information Systems Security Education: Redressing the Balance of Theory and Practice.
J. Inf. Syst. Educ., 2002

2001
Current directions in IS security research: towards socio-organizational perspectives.
Inf. Syst. J., 2001

2000
Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce.
J. Organ. End User Comput., 2000

Information system security management in the new millennium.
Commun. ACM, 2000

1997
Developing A Networked Authority: Nature and Significance of Power Relationships.
Proceedings of the Fifth European Conference on Information Systems, 1997

1995
Managing computer crime: a research outlook.
Comput. Secur., 1995

Electronic thesaurus for clinical terms: A methodological approach.
Proceedings of the Third European Conference on Information Systems, 1995

A method for dynamic systems development.
Proceedings of the Third European Conference on Information Systems, 1995

1993
Supporting legal interpretation: A hypertext tool for semantic analysis.
Proceedings of the First European Conference on Information Systems, 1993

1991
On the discipline of information systems.
Inf. Syst. J., 1991

1988
Measur: Method For Eliciting, Analysing and Specifying User Requirements.
Proceedings of the Computerized Assistance During the Information Systems Life Cycle, 1988


  Loading...