DR James Backhouse

OTHER PUBLICATIONS
 

EU Research Project Reports

1.            Backhouse, J and Dyer, B.W. (eds) (2007) "D4.8: Creating the method to incorporate FIDIS research for generic application" for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 29 pps. (to be reviewed July 2007)

http://www.fidis.net/fidis-del/period-3-20062007/#c1502

2.          Backhouse, J and Dyer, B.W. (eds) (2007) "D4.7: Review and classification for a FIDIS identity management model" for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 28 pps. (to be reviewed July 2007)

3.            Backhouse, J. and Halperin, R. (eds) (2007) "Survey on Citizen’s trust in ID systems and authorities". Deliverable 4.4 for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 93 pps. (to be reviewed July 2007)

http://www.fidis.net/

4.            Backhouse, J and Dyer, B.W. (eds) (2006) "D4.6: Draft best practice guidelines" for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 34 pps. (to be reviewed July 2007)

5.          Backhouse, J. and Vanfleteren, M. (eds) (2005) "Requirements for Interoperability of Identity and Identity Management Systems" Deliverable 4.2 for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 158 pps (Reviewed June 2006)

http://www.fidis.net/487.0.html#820

6.            Backhouse, J. (2005), Spotlight Project Reports: "New approaches to fighting Money Laundering": Report 1 Research methods and results; Report 2: Guide to producing ML monitoring; Report 3: Recommendations for best-practice processes, AGIS Programme Project: JAI/2004/AGIS/182 (Reviewed September 2005)

http://www.spotlight.uk.com/

7.             Canhoto, A. I. and Backhouse, J. (2005). Chapter 4 and Chapter 5: "Tracing the Identity of a Money Launderer and Terrorist Financer" in D2.2 Set of Use Cases and Scenarios. T. Nabath, for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, (Reviewed June 2006)

http://www.fidis.net/486.0.html#c813

8.          Backhouse, J. (ed.) (2005). D4.1: Structured account of approaches on interoperability of IMS, Deliverable 4.1 for Work Package 4: Interoperability of Identity and Identity Systems for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 77 pps , (Reviewed June 2006)

http://www.fidis.net/487.0.html#c820

9.         Hildebrandt, M. and Backhouse, J. (eds) (2005) "Descriptive analysis and inventory of profiling practices" for D7.3: Profiling for the EU FIDIS (Future of Identity in the Information Society) Network of Excellence, 115 pps, (Reviewed June 2006)

http://www.fidis.net/487.0.html - 8202

 

ESRC Research Reports

10.        Backhouse, J. (2003), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures- Full  Report On Activities And Research Results", March, 8 pps

11.         Backhouse, J. (2002), "Technical Progress Report on the Fiducia Project", June, 37 pps

12.       Backhouse, J. (2002), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures".   Phase 3 Report, Research Framework and Data Collection" June, 56 pps

13.       Backhouse, J. (2001), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures". Phase 1 Report, Research Framework and Data Collection" December, 69 pps

14.       Backhouse, J. (2000), "The Fiducia Project: Modelling Risks In Interoperable Key Infrastructures",  Proposal submitted to the DTI Management of Information Programme for Fraud Control, Security and Privacy, April, 28 pps

 

LSE internal reports

15.         Hsu C and Backhouse, J. (2000), "On-Line Learning at the LSE: an evaluation report on the trial of an information security course delivered using on-line learning technology". Issued jointly with The Computer Security Research Centre and the Learning and Teaching Technology Group. September. 54 pps.

16.      Backhouse J. (1997). "Tangible benefit from intangibles? Distance learning at the LSE - some early thoughts". October. To HEFCE Award, Continuing Education Sub-Ctees. 20 pps.

 

Other reports

17.         N. Gilbert (Ed.) "Dilemmas of Privacy and Surveillance, Challenges of Technological Change", (2007), The Royal Academy of Engineering, 29 Great Peter Street, London, SW1P 3LW, ISBN: 1-903496-32-2, March

18.         Willison, R. and Backhouse, J.  (2005) Re-conceptualising IS Security: Insights from a Criminological Perspective.  Department of Information Systems, London School of Economics and Political Science, working paper No. 132

19.         Willison, R. and Backhouse, J.  (2005) Opportunities for Computer Abuse: Considering Systems Risk from the Offender's Perspective.  Department of Informatics, Copenhagen Business School, working paper No. 10

20.         Backhouse, J. and Dhillon, G., (1995) "Computer fraud: its management and control". Research and discussion paper no. CSRC/95/1. Computer Security Research Centre, London School of Economics and Political Science, London, UK.

21.       Backhouse, J. (1995) "From Information Security to Information Valuation". Paper 4 for the Value of Information Project, LSE December 1995

22.       Backhouse, J. (1992) "Information systems and structures of responsibility" LSE Information Systems Working Paper 47, May

23.   Stamper, R. and Backhouse, J. 1990 "Technical Survey of the LEGOL/NORMA Projects", LEGOL/NORMA Paper L98

24.        Liebenau, J. and Backhouse, J. (1989) "Information systems and the misguided emphasis on technology," LSE Information Systems Working Paper 1

25.         Backhouse, J. and Liebenau, J. (1989) "A proposed curriculum for Master's degree information systems," LSE Information Systems Working Paper 2

26.         Backhouse, J. (1988) "Principles and Process of Semantic Analysis" Information Systems Department Discussion Paper.

 

Published abstract

27.         Canhoto, A and Backhouse, J. (2005)"Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff" in ISI, Lecture Notes in Computer Science, IEEE, Vol. 3495, pp. 600-601, Springer, ISBN 3-540-25999-6

 

Magazine Articles

28.      Backhouse, J. (1999) "Security: The Achilles Heel of Electronic Commerce?" SOCIETY - NEW BRUNSWICK, 35 (4). 28-31.

29.       Backhouse, J. (1997). "Security: The Achilles Heel of Electronic Commerce?" LSE Magazine, Summer 1997, pp 8-10.

30.      Backhouse, J. (1997) "Safety Net?" Parliamentary Review, 58-59, November Issue, Westminster Publications Ltd, London, UK

31.       Backhouse, J. (1997) "Information at Risk". The Economist - Information Strategy. 3 (1): 33-35 ISBN 13656325

32.       Backhouse, J. and Liebenau, J. (1989) "A need for discipline [in the study of information systems". Times Higher Education Supplement, 31 March

 

Book reviews

33.      Backhouse, J. (2001) on Fred Piper et al. Digital Signatures Security and Control in Information Systems Control Journal, 2. 9-10.

34.       Backhouse, J. (1998) "Faustian Deals in the ether on Technology and Privacy: The New Landscape MIT Press, Times Higher Education Supplement March 1st

35.      Backhouse, J. (1998) on Toigo, Jon, Disaster Recover Planning: for computers and communication resources John Wiley in Computing Reviews February

36.     Backhouse, J. (1992) on Devlin, K (1991) Logic and Information Cambridge University Press, Cambridge in Times Higher Education Supplement

Unpublished Thesis

37.      Backhouse, J. (1991). "The use of semantic analysis in the development of information systems",    University of London, London. 257 pp