Roger Clarke

Orcid: 0000-0001-6266-1793

According to our database1, Roger Clarke authored at least 124 papers between 1982 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Responsible application of artificial intelligence to surveillance: What prospects?
Inf. Polity, 2022

Research opportunities in the regulatory aspects of electronic markets.
Electron. Mark., 2022

A Reconsideration of the Foundations of Identity Management.
Proceedings of the 35th Bled eConference - Digital Restructuring and Human (Re)action, June 26, 2022

2021
A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation.
Proceedings of the 34th Bled eConference: Digital Support from Crisis to Progressive Change, June 27, 2021

A Platform for a Pragmatic Metatheoretic Model for Information Systems Practice and Research.
Proceedings of the Australasian Conference on Information Systems, 2021

2020
Research Perspectives: Through Whose Eyes? The Critical Concept of Researcher Perspective.
J. Assoc. Inf. Syst., 2020

Researcher perspective in the IS discipline: an empirical study of articles in the basket of 8 journals.
Inf. Technol. People, 2020

Researcher perspectives in Electronic Markets.
Electron. Mark., 2020

A Post Publication review of "The challenges involved in establishing a research technique".
Australas. J. Inf. Syst., 2020

The Challenges Involved in Establishing a Research Technique.
Australas. J. Inf. Syst., 2020

RegTech Opportunities in the Platform-Based Business Sector.
Proceedings of the 33rd Bled eConference: Enabling Technology for a Sustainable Society, 2020

2019
Why the world wants controls over Artificial Intelligence.
Comput. Law Secur. Rev., 2019

Principles and business processes for responsible AI.
Comput. Law Secur. Rev., 2019

Regulatory alternatives for AI.
Comput. Law Secur. Rev., 2019

Beyond De-Identification Record Falsification to Disarm Expropriated Data-Sets.
Proceedings of the 32nd Bled eConference: Humanizing Technology for a Sustainable Society, 2019

2018
Assertion, belief, and context.
Synth., 2018

The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security.
Comput. Law Secur. Rev., 2018

Guidelines for the responsible application of data analytics.
Comput. Law Secur. Rev., 2018

Towards Responsible Data Analytics: A Process Approach.
Proceedings of the 31st Bled eConference: Digital Transformation: Meeting the Challenges, 2018

2017
Can small users recover from the cloud?
Comput. Law Secur. Rev., 2017

IS Research and Policy: Notes From the 2015 ICIS Senior Scholar's Forum.
Commun. Assoc. Inf. Syst., 2017

Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot.
Proceedings of the 30th Bled eConference: Digital Transformation, 2017

2016
On the Ontological Quality and Logical Quality of Conceptual-Modeling Grammars: The Need for a Dual Perspective.
Inf. Syst. Res., 2016

Big data, big risks.
Inf. Syst. J., 2016

A framework for analysing technology's negative and positive impacts on freedom and privacy.
Datenschutz und Datensicherheit, 2016

Not Only Horses Wear Blinkers: The Missing Perspectives in IS Research.
CoRR, 2016

Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives.
Comput. Law Secur. Rev., 2016

Appropriate regulatory responses to the drone epidemic.
Comput. Law Secur. Rev., 2016

Practicable Backup Arrangements for Small Organisations and Individuals.
Australas. J. Inf. Syst., 2016

Big Data Prophylactics.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Quality Assurance for Security Applications of Big Data.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

An Empirical Assessment of Researcher Perspectives.
Proceedings of the 29th Bled eConference: Digital Economy, 2016

2015
Surfing the third wave of computing: A framework for research into eObjects.
Comput. Law Secur. Rev., 2015

The prospects of easier security for small organisations and consumers.
Comput. Law Secur. Rev., 2015

Does SaaS Backup Pass the Fitness-for-Purpose Test?
IEEE Cloud Comput., 2015

Measures to Improve Public Acceptance of Smart Metering System.
Proceedings of the Fourth International Workshop on Requirements Engineering for Sustainable Systems, 2015

Consumer Concerns About Smart Meters.
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2015

Quasi-Empirical Scenario Analysis and Its Application to Big Data Quality.
Proceedings of the 28th Bled eConference: s#eWellBeing, 2015

2014
The Regulation of Point of View Surveillance: A Review of Australian Law.
IEEE Technol. Soc. Mag., 2014

Persona missing, feared drowned: the digital persona concept, two decades later.
Inf. Technol. People, 2014

The regulation of civilian drones' impacts on public safety.
Comput. Law Secur. Rev., 2014

The regulation of civilian drones' impacts on behavioural privacy.
Comput. Law Secur. Rev., 2014

What drones inherit from their ancestors.
Comput. Law Secur. Rev., 2014

Understanding the drone epidemic.
Comput. Law Secur. Rev., 2014

Architecture and Data Flow Model for Consumer-Oriented Smart Meter Design.
Proceedings of the Information Systems Development: Transforming Organisations and Society through Information Systems, 2014

The Prospects for Consumer-Oriented Social Media.
Proceedings of the 27th Bled eConference: eEcosystems, 2014

2013
Data Risks in the Cloud.
J. Theor. Appl. Electron. Commer. Res., 2013

Morning dew on the Web in Australia: 1992-1995.
J. Inf. Technol., 2013

Electronic interaction research 1988 - 2012 through the lens of the Bled eConference.
Electron. Mark., 2013

Big Data's Big Unintended Consequences.
Computer, 2013

Location and tracking of mobile devices: Überveillance stalks the streets.
Comput. Law Secur. Rev., 2013

Improving the Semantics of Conceptual-Modeling Grammars: A New Perspective on an Old Problem.
Proceedings of the International Conference on Information Systems, 2013

A Framework for Risk Analysis in Smart Grid - Perspective Based Approach.
Proceedings of the Critical Information Infrastructures Security, 2013

The Supervisor's Dilemma: Is Reconciliation Possible between the Candidate's Needs and the Supervisor's Integrity?
Proceedings of the 26th Bled eConference: eTrust: eInnovation: Challenges and Impacts for Individuals, 2013

2012
The Challenging World of Privacy Advocacy.
IEEE Technol. Soc. Mag., 2012

How reliable is cloudsourcing? A review of articles in the technical media 2005-11.
Comput. Law Secur. Rev., 2012

Is Use of Optional Attributes and Associations in Conceptual Modeling Always Problematic? Theory and Empirical Tests.
Proceedings of the International Conference on Information Systems, 2012

A Framework for the Evaluation o f CloudSourcing Proposals.
Proceedings of the 25th Bled eConference: eTrust: eDependability: Reliable and Trustworthy eStructures, 2012

2011
Cyborg Rights.
IEEE Technol. Soc. Mag., 2011

You are where you've been: the privacy implications of location and tracking technologies.
J. Locat. Based Serv., 2011

The Cloudy Future of Consumer Computing.
Proceedings of the 24th Bled eConference: eFuture Creating Solutions for the Individual, 2011

2010
What is Überveillance? (And What Should Be Done About It?).
IEEE Technol. Soc. Mag., 2010

"The Ravens Paradox" is a misnomer.
Synth., 2010

Privacy and consumer risks in cloud computing.
Comput. Law Secur. Rev., 2010

A best practice model for e-consumer protection.
Comput. Law Secur. Rev., 2010

Civil Society Must Publish Standards Documents.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

User Requirements for Cloud Computing Architecture.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective.
Proceedings of the 23rd Bled eConference: eTrust: Implications for the Individual, 2010

2009
Privacy impact assessment: Its origins and development.
Comput. Law Secur. Rev., 2009

Journal Self-Citation XI: Regulation of "Journal Self-Referencing" - The Substantive Role of the AIS Code of Research Conduct.
Commun. Assoc. Inf. Syst., 2009

Journal Self-Citation XIX: Self-Plagiarism and Self-Citation - A Practical Guide Based on Underlying Principles.
Commun. Assoc. Inf. Syst., 2009

A Citation Analysis of Australian Information Systems Researchers: Towards a New ERA?
Australas. J. Inf. Syst., 2009

An eCommerce Perspective on Carbon Trading.
Proceedings of the 22nd Bled eConference: eEnablement:Facilitating an Open, 2009

2008
Web 2.0 as Syndication.
J. Theor. Appl. Electron. Commer. Res., 2008

Privacy Impact Assessments: International experience as a basis for UK Guidance.
Comput. Law Secur. Rev., 2008

An Exploratory Study of Information Systems Researcher Impact.
Commun. Assoc. Inf. Syst., 2008

A Risk Assessment Framework for Mobile Payments.
Proceedings of the 21st Bled eConference: eCollaboration: Overcoming Boundaries Through Multi-Channel Interaction, 2008

2007
The cost profiles of alternative approaches to journal publishing.
First Monday, 2007

2006
P2P's Significance for eBusiness: Towards a Research Agenda.
J. Theor. Appl. Electron. Commer. Res., 2006

Plagiarism by Academics: More Complex Than It Seems.
J. Assoc. Inf. Syst., 2006

Google's gauntlets - Challenges to 'old world corps', consumers and the law.
Comput. Law Secur. Rev., 2006

Key Aspects of the History of the Information Systems Discipline in Australia.
Australas. J. Inf. Syst., 2006

A Pilot Study of the Effectiveness of Privacy Policy Statements.
Proceedings of the 19th Bled eConference: eValues, 2006

A major impediment to B2C success is...the concept 'B2C'.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
A proposal for an open content licence for research paper (Pr)ePrints.
First Monday, 2005

2004
Viewpoint Paper: e-Consent: The Design And Implementation of Consumer Consent Mechanisms in an Electronic Environment.
J. Am. Medical Informatics Assoc., 2004

Open Source Software And Open Content As Models For eBusiness.
Proceedings of the 17th Bled eConference: eGlobal, 2004

2003
Information Privacy in a Globally Networked Society: Implications for IS Research.
Commun. Assoc. Inf. Syst., 2003

Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper.
Proceedings of the 16th Bled eConference: eTransformation, 2003

2002
If e-Business is Different, then so is Research in e-Business.
Proceedings of the Seeking Success in E-Business, 2002

eConsent: A Critical Element of Trust in eBusiness.
Proceedings of the 15th Bled eConference: eReality: Constructing the eEconomy, 2002

2001
Person location and person tracking - Technologies, risks and policy implications.
Inf. Technol. People, 2001

Research Ethics in Information Systems: Would a Code of Practice Help?
Commun. Assoc. Inf. Syst., 2001

The Fundamental Inadequacies of Conventional Public Key Infrastructure.
Proceedings of the 9th European Conference on Information Systems, 2001

Towards a Taxonomy of B2B e-Commerce Schemes.
Proceedings of the 14th Bled eConference: e-Everything: e-Commerce, 2001

2000
Privacy in Electronic Media: Identification, Authentication and Anonymity in a Legal Context.
Comput. Law Secur. Rev., 2000

IS research ethics: defining ethical, barely ethical, and unethical behavior (panel).
Proceedings of the Twenty-First International Conference on Information Systems, 2000

Technological Protections for Digital Copyright Objects.
Proceedings of the 8th European Conference on Information Systems, 2000

Notes for the workshop on freedom and privacy by design.
Proceedings of the Tenth Conference on Computers, 2000

1999
Freedom of Information? The Internet as Harbinger of the New Dark Ages.
First Monday, 1999

Internet Privacy Concerns Confirm the Case for Intervention.
Commun. ACM, 1999

1997
Evaluation Or Justification? The Application of Cost/benefit Analysis to Computer Matching Schemes.
Proceedings of the Fifth European Conference on Information Systems, 1997

1996
Guest Editors' Introduction.
Int. J. Electron. Commer., 1996

1995
The Challgenge of Information Infrastructure and Electronic Commerce.
Proceedings of the Second Pacific Asia Conference on Information Systems, 1995

Beyond the Jungle: How Can the Various Schools of Thought in Strategic Information Systems Contribute to Organizational Strategy in Low-Competitive Contexts?
Proceedings of the Sixteenth International Conference on Information Systems, 1995

1994
The Digital Persona and Its Application to Data Surveillance.
Inf. Soc., 1994

Electronic Support for the Practice of Research.
Inf. Soc., 1994

Asimov's Laws of Robotics: Implications for Information Technology - Part 2.
Computer, 1994

1993
The strategic intent of on-line trading systems: a case study in national livestock marketing.
J. Strateg. Inf. Syst., 1993

Research Programme in Supra-organizational Systems.
Electron. Mark., 1993

Asimov's Laws of Implications for Information Technology - Part 1.
Computer, 1993

Privacy and Accuracy Issues for Information Systems in the 1990s and Beyond.
Proceedings of the Fourteenth International Conference on Information Systems, 1993

1992
A contingency model of EDI's impact on industry sectors.
J. Strateg. Inf. Syst., 1992

Case Study - Cardomat/Migros - An Open EFT/POS System.
Aust. Comput. J., 1992

Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm.
Proceedings of the Education and Society, 1992

Ethics, Vulnerability and Information Technology (IT).
Proceedings of the Education and Society, 1992

1990
Electronic banking.
Comput. Law Secur. Rev., 1990

Consumer EFTS in Australia - Part II - Security issues.
Comput. Law Secur. Rev., 1990

Social Implications of IT - the Professional's Role.
Aust. Comput. J., 1990

1989
An introduction to consumer efts with particular reference to Australia.
Comput. Law Secur. Rev., 1989

Who is liable for software errors? Proposed new product liability law in Australia.
Comput. Law Secur. Rev., 1989

1988
Legal Aspects of Knowledge-Based Technology.
J. Inf. Technol., 1988

1982
Teleprocessing Monitors and Program Structure.
Aust. Comput. J., 1982

Background to Program Generators for Commercial Applications.
Aust. Comput. J., 1982


  Loading...