DR James Backhouse |
OTHER PUBLICATIONS EU Research Project Reports 1. Backhouse, J and Dyer, B.W. (eds) (2007) "D4.8: Creating the method to incorporate FIDIS research for generic application" for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 29 pps. (to be reviewed July 2007) http://www.fidis.net/fidis-del/period-3-20062007/#c1502 2. Backhouse, J and Dyer, B.W. (eds) (2007) "D4.7: Review and classification for a FIDIS identity management model" for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 28 pps. (to be reviewed July 2007) 3. Backhouse, J. and Halperin, R. (eds) (2007) "Survey on Citizen’s trust in ID systems and authorities". Deliverable 4.4 for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 93 pps. (to be reviewed July 2007) http://www.fidis.net/ 4. Backhouse, J and Dyer, B.W. (eds) (2006) "D4.6: Draft best practice guidelines" for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 34 pps. (to be reviewed July 2007) 5. Backhouse, J. and Vanfleteren, M. (eds) (2005) "Requirements for Interoperability of Identity and Identity Management Systems" Deliverable 4.2 for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 158 pps (Reviewed June 2006) http://www.fidis.net/487.0.html#820 6. Backhouse, J. (2005), Spotlight Project Reports: "New approaches to fighting Money Laundering": Report 1 Research methods and results; Report 2: Guide to producing ML monitoring; Report 3: Recommendations for best-practice processes, AGIS Programme Project: JAI/2004/AGIS/182 (Reviewed September 2005) 7. Canhoto, A. I. and Backhouse, J. (2005). Chapter 4 and Chapter 5: "Tracing the Identity of a Money Launderer and Terrorist Financer" in D2.2 Set of Use Cases and Scenarios. T. Nabath, for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, (Reviewed June 2006) http://www.fidis.net/486.0.html#c813 8. Backhouse, J. (ed.) (2005). D4.1: Structured account of approaches on interoperability of IMS, Deliverable 4.1 for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 77 pps , (Reviewed June 2006) http://www.fidis.net/487.0.html#c820 9. Hildebrandt, M. and Backhouse, J. (eds) (2005) "Descriptive analysis and inventory of profiling practices" for D7.3: Profiling for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 115 pps, (Reviewed June 2006) http://www.fidis.net/487.0.html - 8202
ESRC Research Reports 10. Backhouse, J. (2003), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures- Full Report On Activities And Research Results", March, 8 pps 11. Backhouse, J. (2002), "Technical Progress Report on the Fiducia Project", June, 37 pps 12. Backhouse, J. (2002), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures". Phase 3 Report, Research Framework and Data Collection" June, 56 pps 13. Backhouse, J. (2001), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures". Phase 1 Report, Research Framework and Data Collection" December, 69 pps 14. Backhouse, J. (2000), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures", Proposal submitted to the DTI Management of Information Programme for Fraud Control, Security and Privacy, April, 28 pps
LSE internal reports 15. Hsu C and Backhouse, J. (2000), "On-Line Learning at the LSE: an evaluation report on the trial of an information security course delivered using on-line learning technology". Issued jointly with The Computer Security Research Centre and the Learning and Teaching Technology Group. September. 54 pps. 16. Backhouse J. (1997). "Tangible benefit from intangibles? Distance learning at the LSE - some early thoughts". October. To HEFCE Award, Continuing Education Sub-Ctees. 20 pps.
Other reports 17. N. Gilbert (Ed.) "Dilemmas of Privacy and Surveillance, Challenges of Technological Change", (2007), The Royal Academy of Engineering, 29 Great Peter Street, London, SW1P 3LW, ISBN: 1-903496-32-2, March 18. Willison, R. and Backhouse, J. (2005) Re-conceptualising IS Security: Insights from a Criminological Perspective. Department of Information Systems, London School of Economics and Political Science, working paper No. 132 19. Willison, R. and Backhouse, J. (2005) Opportunities for Computer Abuse: Considering Systems Risk from the Offender's Perspective. Department of Informatics, Copenhagen Business School, working paper No. 10 20. Backhouse, J. and Dhillon, G., (1995) "Computer fraud: its management and control". Research and discussion paper no. CSRC/95/1. Computer Security Research Centre, London School of Economics and Political Science, London, UK. 21. Backhouse, J. (1995) "From Information Security to Information Valuation". Paper 4 for the Value of Information Project, LSE December 1995 22. Backhouse, J. (1992) "Information systems and structures of responsibility" LSE Information Systems Working Paper 47, May 23. Stamper, R. and Backhouse, J. 1990 "Technical Survey of the LEGOL/NORMA Projects", LEGOL/NORMA Paper L98 24. Liebenau, J. and Backhouse, J. (1989) "Information systems and the misguided emphasis on technology," LSE Information Systems Working Paper 1 25. Backhouse, J. and Liebenau, J. (1989) "A proposed curriculum for Master's degree information systems," LSE Information Systems Working Paper 2 26. Backhouse, J. (1988) "Principles and Process of Semantic Analysis" Information Systems Department Discussion Paper.
Published abstract 27. Canhoto, A and Backhouse, J. (2005)"Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff" in ISI, Lecture Notes in Computer Science, IEEE, Vol. 3495, pp. 600-601, Springer, ISBN 3-540-25999-6
Magazine Articles 28. Backhouse, J. (1999) "Security: The Achilles Heel of Electronic Commerce?" SOCIETY - NEW BRUNSWICK, 35 (4). 28-31. 29. Backhouse, J. (1997). "Security: The Achilles Heel of Electronic Commerce?" LSE Magazine, Summer 1997, pp 8-10. 30. Backhouse, J. (1997) "Safety Net?" Parliamentary Review, 58-59, November Issue, Westminster Publications Ltd, London, UK 31. Backhouse, J. (1997) "Information at Risk". The Economist - Information Strategy. 3 (1): 33-35 ISBN 13656325 32. Backhouse, J. and Liebenau, J. (1989) "A need for discipline [in the study of information systems". Times Higher Education Supplement, 31 March
Book reviews 33. Backhouse, J. (2001) on Fred Piper et al. Digital Signatures Security and Control in Information Systems Control Journal, 2. 9-10. 34. Backhouse, J. (1998) "Faustian Deals in the ether on Technology and Privacy: The New Landscape MIT Press, Times Higher Education Supplement March 1st 35. Backhouse, J. (1998) on Toigo, Jon, Disaster Recover Planning: for computers and communication resources John Wiley in Computing Reviews February 36. Backhouse, J. (1992) on Devlin, K (1991) Logic and Information Cambridge University Press, Cambridge in Times Higher Education Supplement Unpublished Thesis37. Backhouse, J. (1991). "The use of semantic analysis in the development of information systems", University of London, London. 257 pp
|