Simon Rogerson

According to our database1, Simon Rogerson authored at least 36 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Ethics omission increases gases emission.
Commun. ACM, 2018

Is professional practice at risk following the Volkswagen and Tesla revelations?: software engineering under scrutiny.
SIGCAS Computers and Society, 2017

The data shadow.
SIGCAS Computers and Society, 2017

J. Inf., Comm, Ethics in Society, 2017

Guest editorial.
J. Inf., Comm, Ethics in Society, 2017

Academic publishing in the information age - an editor's observations.
J. Inf., Comm, Ethics in Society, 2017

Trustworthy publishing.
J. Inf., Comm, Ethics in Society, 2016

Technological dependency.
SIGCAS Computers and Society, 2015

Future vision.
J. Inf., Comm, Ethics in Society, 2015

Ethical assessment of new technologies: a meta-methodology.
J. Inf., Comm, Ethics in Society, 2011

Barriers to e-Government Implementation in Jordan: The Role of Wasta.
IJTHI, 2011

The Evolution of E-learning Management Systems: An Ethical Approach.
IJCEE, 2011

Ethics and information systems - Guest editors' introduction.
Information Systems Frontiers, 2010

A suppliers' perspective on e-commerce: Suppliers responses to consumers' perspectives on e-commerce adoption in developing countries - A Saudi Arabian empirical study.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Organizational Knowledge: Ethics and the Importance of Trust.
Proceedings of the ENTERprise Information Systems - International Conference, 2010

The Key Organisational Issues Affecting E-Government Adoption in Saudi Arabia.
IJEGR, 2009

Understanding Ethical Issues of Emerging AmI Technologies in Europe (A Framework).
Proceedings of the Workshops Proceedings of the 5th International Conference on Intelligent Environments, 2009

Towards morally defensible e-government interactions with citizens.
J. Inf., Comm, Ethics in Society, 2006

Interfaces for electronic voting: focus group evidence.
EG, 2005

Responsible Risk Assessment with Software Development: Creating the Software Development Impact Statement.
CAIS, 2005

Are they really listening?: An investigation into published online privacy policies at the beginning of the third millennium.
IT & People, 2004

The problems of global cultural homogenisation in a technologically dependant world.
J. Inf., Comm, Ethics in Society, 2003

The ethical attitudes of information systems professionals: outcomes of an initial survey.
Telematics and Informatics, 2002

Systems of the Information Society.
Australasian J. of Inf. Systems, 2002

Knowledge Transfer from University to Industry.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Being Ethical in Developing Information Systems: An Issue of Methodology Or Maturity in Judgment?
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

Towards the identification of intelligent systems currently in routine use in medicine and dentistry.
Proceedings of the 2nd International Conference in Fuzzy Logic and Technology, 2001

An ethical review of information systems development - The Australian Computer Society's code of ethics and SSADM.
IT & People, 2000

On code reuse: a response.
ACM SIGSOFT Software Engineering Notes, 1999

Software Engineering Code of Ethics is Approved.
Commun. ACM, 1999

Computer misuse: search for a solution.
Proceedings of the Women and Technology, 1999

Software Engineering Code of Ethics.
Commun. ACM, 1997

Ethics and Information Technology.
Australasian J. of Inf. Systems, 1997

Developing ethical practices to minimise computer misuse.
Proceedings of the Technology and Society at a Time of Sweeping Change: Proceedings of the 1997 International Symposium on Technology and Society, 1997

Strategic Information Systems Planning: Its Adoption and Use.
Inf. Manag. Comput. Security, 1994

Current IS Practices within UK-based Organizations.
Inf. Manag. Comput. Security, 1993