DR James Backhouse

INTERNATIONAL CONFERENCES- papers presented
 

1.          Halperin, R and Backhouse, J., (2007) “Using Structuration Theory In IS Research: Operationalizing Key Constructs”, International Conference on Information Systems (ICIS) 2007, Research Methodology Track. Montreal 10th-13th December.

2.             Baptista, J., Backhouse, J., and Canhoto, A.I. (2006) Intranet institutionalisation and organisational trust: a longitudinal case study in a UK bank. AOM, Academy of Management, Annual Meeting: Knowledge, Action and the Public Concern, (Atlanta, Georgia, August 11-14, 2006).

3.             Backhouse, J., Hsu, W.Y, and Baptista, J. (2004) "Rating Certificate Authorities: a market approach to the Lemons problem," AMCIS 2004 Americas Conference on Information Systems, August 6-8, New York.

4.             Backhouse, J., Hsu, W.Y, and Baptista, J. (2003) "The Key to Trust" Signalling Quality in the PKI Market". The 11th ECIS European Conference on Information Systems, 16th - 21st June, Naples.

5.             Willison, R. and Backhouse, J. (2003) "Understanding Criminal Opportunity in the IS Context". IRIS 26, August 9 - 12 2003, Finland.

6.             Backhouse, J. (2003) "Security shocks,Opportunity knocks! Criminal Opportunity and the Dishonest Employee" Cambridge Annual Symposium on Economic Crime, September, 2003

7.             Backhouse, J. (2001)"Guarding the Guardians" 19th Cambridge Annual Symposium on Economic Crime, 12th September

8.             Backhouse, J., Hsu, W.Y and Tseng, J. (2001). "A Behavioural Lens on PKI Interoperability". The 4th ICEC International Conference on Electronic Commerce, at Hong Kong.

9.             Backhouse, J., and J. Tseng. (2000) "Searching for Meaning - Performatives and Obligations in Public Key Infrastructures" Language Action Perspective Conference (LAP 2000), 14th-16th September 2000, at Aachen, Germany.

10.         Backhouse, J. (1999) "The logic of security and the insecurity of logic. A social science agenda for information systems security research." Keynote Speech, Verlässliche Informationssysteme. IT-Sicherheit an der Schelle des neuen Jahrtausends. Essen. Germany September 22-24

11.         Backhouse, J. (1999) "Chasing the fiscal dragon. The politics of bank secrecy." 17th Cambridge Annual Symposium on Economic Crime. Jesus College, Cambridge 14-19 September 1999

12.         Silva, L. and Backhouse, J. (1997)  "Becoming part of the furniture: the institutionalization of information systems", IFIP TC8 WG 8.2 International Conference on Information Systems and Qualitative Research, January, Philadelphia, Pennsylvania, United States

13.         Silva, L., Dhillon, G. and Backhouse, J. (1997): "Developing a networked authority: nature and significance of power relationships". In proceedings of the Fifth European Conference on Information Systems (ECIS), Cork, Ireland, June.

14.         Dhillon, G. and Backhouse, J. (1997) "Managing for Secure Organisations: a Critique of Information Systems Security Research Approaches" UKAIS United Kingdom Academy of Information Systems Conference, Chilworth House April 2-4

15.         Silva, L. and Backhouse, J. (1996). "Legitimation and Power: BPR Critical Success Factors." 3rd European Academic Conference on Business Process Redesign, Cranfield University 21-22 February 1996.

16.         Silva, L. and Backhouse, J. (1996). "Push Me, Pull You? Information Systems and Power in Organisations." Thirteenth Annual Computer Software Reliability Workshop: Design for Protecting the User, Burgenstock, Switzerland.

17.         Backhouse, J. and Dhillon, G. (1995) "Electronic thesauruses for clinical terms: a methodological approach." In Proceedings of the 3rd European Conference on Information Systems, ECIS '95. Athens, Greece, 1-3 June

18.         Albadvi, A. and Backhouse, J. (1995) "Dynamic Systems Development Methodology" International Conference on The Social and Political Implications of Information and Communication Technologies (the PICT programme), Queen Elizabeth II Conference Centre, Westminster, May 1995,

19.         Albadvi, A. and Backhouse, J. (1995) "A method for dynamic systems development". In Doukidis, G.; Galliers, R.; Jelassi, T.; Krcmar, H.; Land, F. (eds.), Proceedings of the Third European Conference on Information Systems (ECIS'95, Athens, June 1-3, 1995

20.         Backhouse, J. and Albadvi, A. (1995) "A methodology for determining evolutionary information requirements: using normative analysis from a semiotic perspective of enterprise information model". The Second Scandinavian Research Seminar on Information and Decision Networks, May 1995, Vaxjo University, Sweden

21.         Backhouse, J. (1995) "Protecting corporate information assets." A paper given to the Royal Institute of International Affairs Conference: Managing for fraud prevention The Dorchester Hotel London, 7 March.

22.         Albadvi, A. and Backhouse, J. (1994), "Managing Business Change: Putting Information Systems in Perspective", in Proceedings of the Information and Technology Management Group Conference, Association of Management, Dallas, Macmillan Press

23.         Backhouse, J. and Dhillon, G. (1994) "The use of information technology in organisations: dealing with systemic opportunities and risks". In proceedings of the SISnet conference. Barcelona, 26-28 September

24.         Backhouse, J. and Dhillon, G. (1994) "Corporate computer crime management: a research perspective". In proceedings of tenth IFIP International Symposium on Computer Security, IFIP Sec '94, Curacao (N.A.).

25.         Backhouse, J. and Dhillon, G. (1994) "Responsibility Analysis:  A Basis for Understanding Complex Managerial Situations". 1994 International System Dynamics Conference, Sterling, Scotland, System Dynamics Society. 11th - 15th July

26.         Backhouse, J. (1994) "Security principles for the virtual organisation." In Proceedings of the Twelfth Cambridge Annual Symposium on Economic Crime. Jesus College, Cambridge, UK. September

27.         Backhouse, J. and Pucci, A. (1993) "Supporting legal interpretation: a hypertext tool for semantic analysis", The First European Conference on Information Systems, Henley, UK. March

28.         Backhouse, J. (1993) "A conceptual framework for secure information system". In Proceedings of the Tenth World Conference on Computer Security, Audit and Control COMPSEC '93 London: Elsevier Advanced Technology Publications, Oxford, pp. 158-168 ISBN: 1-85617-211-2

29.         Backhouse, J. (1993) "Computer crime - international control and management" In Proceedings of the Eleventh Cambridge Annual Symposium on Economic Crime, Jesus College. Cambridge, UK September 1993

30.         Stamper, R. and Backhouse, J. (1990) "From database structure to normbase structure" Proceedings of Journées du LIANA-90 Conference, Nantes, France September

31.         Stamper, R., Backhouse, J., Liu, K., Kolkman, M., Ades, Y., and van Slooten, C. (1990). "From database to normbase" Proceedings of the CSCW'90 Conference October Los Angeles

32.         Backhouse, J. (1988) "Simpler and richer cognitive models for information systems development," IFIP International Workshop in Human Factors of Information Systems Analysis and Design, Imperial College, London, 28-29 July

33.         Stamper, R. and Backhouse, J. (1988) "Expert systems - lawyers beware" Law and Computers: 4th International Conference of the Italian Corte Suprema di Cassazione May

34.       Althaus, K, Stamper, R and Backhouse, J. (1987) "Semantic normal form" ASLIB Conference Proceedings, ASLIB Conference Cambridge: Cambridge University Press, March