Cookies?
Library Header Image
LSE Research Online LSE Library Services

"Backhouse, James"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 41.

Article

Hsu, Carol, Backhouse, James and Silva, Leiser (2014) Institutionalizing operational risk management: an empirical study. Journal of Information Technology, 29 (1). pp. 59-72. ISSN 0268-3962

Halperin, Ruth and Backhouse, James (2008) A roadmap for research on identity in the information society. Identity in the Information Society, 1 (1). ISSN 1876-0678

Backhouse, James, Koops, B.-J. and Matyas, V. (2008) Identity in the Information Society - special issue, edited by J. Backhouse, B.-J. Koops, V. Matyas. Identity in the Information Society, 1 (1). pp. 1-228. ISSN 1876-0678

Backhouse, James and Canhoto, Ana (2007) Profiling under conditions of ambiguity: an application in the financial services industry. Journal of Retailing and Consumer Services, 14 (6). pp. 408-419. ISSN 0969-6989

Backhouse, James (2006) Interoperability of identity and identity management systems. Datenschutz und Datensicherheit . ISSN 1614-0702

Backhouse, James, Hsu, Carol W. Y. and Silva, Leiser (2006) Circuits of power in creating de jure standards: shaping an international information systems security standard. MIS Quarterly, 30 (supple). pp. 413-438. ISSN 0276-7783

Willison, Robert and Backhouse, James (2006) Opportunities for computer crime : considering systems risk from a criminological perspective. European Journal of Information Systems, 15 (4). pp. 403-414. ISSN 0960-085x

Backhouse, James, Baptista, Joao and Hsu, Carol W. Y. (2006) Rating certificate authorities: a market approach to the Lemons problem. Journal of Information Systems Security, 2 (2). pp. 3-14. ISSN 1551-0123

Backhouse, James, Hsu, Carol W. Y., Tseng, Jimmy C. and Baptista, Joao (2005) A question of trust. Communications of the ACM, 48 (9). pp. 87-91. ISSN 0001-0782

Dhillon, Gurpreet, Silva, Leiser and Backhouse, James (2004) Computer crime at CEFORMA: a case study. International Journal of Information Management, 24 (6). pp. 551-561. ISSN 0268-4012

Backhouse, James and Angell, Ian (2004) Anti-money laundering - avoiding the technology trap. Financial Regulator, 9 (2). pp. 34-38. ISSN 1362-7511

Backhouse, James, Hsu, Carol W. Y. and McDonnell, Aidan (2003) Technical opinion: toward public key infrastructure interoperability. Communications of the ACM, 46 (6). pp. 98-100. ISSN 0001-0782

Backhouse, James and Herrera-Vargas, Antonio (2003) Mexican suspicious transaction reporting. Journal of Money Laundering Control, 6 (4). pp. 331-336. ISSN 1368-5201

Silva, Leiser and Backhouse, James (2003) The circuits-of-power framework for studying power in institutionalization of information systems. Journal of the Association for Information Systems, 4 . pp. 294-336. ISSN 1536-9323

Backhouse, James (2002) Assessing certification authorities: guarding the guardians of secure e-commerce? Journal of Financial Crime, 9 (3). pp. 217-226. ISSN 1359-0790

Hsu, Carol W. Y. and Backhouse, James (2002) Information systems security education: redressing the balance of theory and practice. Journal of Information Systems Education, 13 (3). pp. 211-218. ISSN 1055-3096

Dhillon, Gurpreet and Backhouse, James (2001) Current directions in IS security research : towards socio-organizational perspectives. Information Systems Journal, 11 (2). pp. 127-154. ISSN 1350-1917

Dhillon, Gurpreet and Backhouse, James (2000) Information system security management in the new millennium [technical opinion]. Communications of the ACM, 43 (7). pp. 125-128. ISSN 0001-0782

Backhouse, James and Cheng, Edward K. (2000) Signalling intentions and obliging behaviour online: an application of semiotic and legal modelling to e-commerce. Journal of End User Computing, 12 (2). pp. 33-42. ISSN 1063-2239

Backhouse, James (1998) Security: the achilles heel of electronic commerce. Society, 35 (4). pp. 28-31. ISSN 0147-2011

Backhouse, James and Dhillon, Gurpreet (1996) Structures of responsibility and security of information systems. European Journal of Information Systems, 5 (1). pp. 2-9. ISSN 0960-085x

Backhouse, James (1996) The security of smart cards: some obstacles still to be cleared? Journal of Financial Crime, 3 (4). pp. 353-359. ISSN 1359-0790

Dhillon, Gurpreet and Backhouse, James (1995) Risks in the use of information technology within organizations. International Journal of Information Management, 16 (1). pp. 65-74. ISSN 0268-4012

Backhouse, James (1995) Getting the adjustment right: controls and computer security. Journal of Financial Crime, 3 (1). pp. 56-59. ISSN 1359-0790

Backhouse, James and Dhillon, G (1995) Managing computer crime: a research outlook. Computers and Security, 14 (7). pp. 645-651. ISSN 0167-4048

Backhouse, James, Liebenau, Jonathan and Land, Frank (1991) On the discipline of information systems. Information Systems Journal, 1 (1). pp. 19-27. ISSN 1350-1917

Backhouse, James and Liebenau, Jonathan (1991) The misguided emphasis on technology in information systems. Computers in Education, 1 (1). ISSN 1069-3769

Book Section

Backhouse, James and Halperin, Ruth (2009) Approaching interoperability for identity management. In: Rannenberg, Kai, Royer, Denis and Deuker, André, (eds.) Future of Identity in the Information Society: Challenges and Opportunities. Springer-Verlag, Heidelberg, Germany, pp. 245-272. ISBN 9783540884804

Backhouse, James (2008) Behavioural biometric profiling and ambient intelligence – a reply. In: Hildebrandt, M. and Gutwirth, S., (eds.) Profiling the European Citizen: Cross-Disciplinary Perspectives. Springer-Verlag, Heidelberg, Germany, pp. 104-106. ISBN 9781402069130

Canhoto, Ana and Backhouse, James (2008) General description of the process of behavioural profiling. In: Hildebrandt, M. and Gutwirth, S., (eds.) Profiling the European Citizen: Cross-Disciplinary Perspectives. Springer-Verlag, Heidelberg, Germany, pp. 47-63. ISBN 9781402069130

Backhouse, James, Hsu, Carol, Baptista, John and Tseng, Jimmy C (2006) Spotting lemons in the PKI market: engendering trust by signalling quality. In: Shaw, M.J., (ed.) E-Commerce and the Digital Economy. Advances in management information systems. M.E. Sharpe, Armonk, NY, pp. 247-257. ISBN 0765611503

Backhouse, James, Bener, Ayse and Chauvidul-Aw, Narisa (2005) Risk management in cyberspace. In: Mansell, Robin and Collins, Brian S., (eds.) Trust and Crime in Information Societies. Edward Elgar, Cheltenham, UK, pp. 349-379. ISBN 1845421779

Backhouse, James and Cheng, Edward K. (2002) Signalling intentions and obliging behavior online: an application of semiotic and legal modelling to e-commerce. In: Fazlollahi, Bijan, (ed.) Strategies for E-Commerce Success. IRM Press, Harrisburg, PA, pp. 68-88. ISBN 9781931777087

Backhouse, James (1997) Cyberlaundering: the electronic dimension. In: Bosworth-Davies, Rowan, (ed.) The Impact of International Money Laundering Legislation. FT Finance, a division of Pearson Professional, London, UK, pp. 153-170. ISBN 9781853346750

Silva, Leiser and Backhouse, James (1997) Becoming part of the furniture: the institutionalization of information systems. In: Lee, Allen S., Liebenau, Jonathan and DeGross, Janice I., (eds.) Information Systems and Qualitative Research. IFIP advances in information and communication technology. Chapman and Hall, London, UK, pp. 389-414. ISBN 9780412823602

Backhouse, James and Dhillon, Gurpreet (1997) Managing for secure organizations: a review of information systems security research approaches. In: Avison, David, (ed.) Key Issues in Information Systems: Proceedings of the 2nd Ukais Conference, University of Southampton, 2-4 April 1997. McGraw-Hill, Maidenhead, UK, pp. 377-390. ISBN 9780077094171

Dhillon, Gurpreet and Backhouse, James (1995) Computer fraud: its management and control. In: Reuvid, Jonathan, (ed.) The Regulation and Prevention of Economic Crime Internationally. Kogan Page, London, UK, pp. 81-89. ISBN 9780749415396

Althaus, K. and Backhouse, James (1989) A legal expert system. In: Doukidis, Georgios, Land, Frank and Miller, G., (eds.) Knowledge Based Management Support Systems: Computerized Assistance in the Information Systems Life Cycle. Ellis Horwood, Chichester, UK, pp. 313-326. ISBN 9780745805313

Conference or Workshop Item

Backhouse, James and Halperin, Ruth (2008) Security and privacy perceptions of E-ID: a grounded research. In: 16th European Conference on Information Systems, 9-11 June 2008, Galway, Ireland.

Backhouse, James (1999) Chasing the fiscal dragon: the politics of bank secrecy. In: 17th Cambridge Symposium on Economic Crime, Sept 14-19 1999, Jesus College, Cambridge.

Book

Liebenau, Jonathan and Backhouse, James (1990) Understanding information: an introduction. Information systems . Palgrave Macmillan, London, UK. ISBN 9780333536803

This list was generated on Wed Jul 30 12:14:19 2014 BST.