DR James Backhouse |
PUBLICATIONS
1. Canhoto, A. and Backhouse, J. (2007)"Profiling under conditions of ambiguity - an application in the financial services industry", Journal of Retailing and Consumer Services, Special Issue on Data Mining Applications in Retailing and Consumer Services, 11 pps, ISSN 0969-6989 2. Backhouse, J., Baptista, J. Hsu, Carol, (2006) "Rating Certificate Authorities: a market approach to the Lemons problem", Journal of Information Systems Security, Vol 2, No. 2, 3-14, ISSN 1551-0123 3. Willison, R. and Backhouse, J., "Opportunities for Computer Crime: Considering Systems Risk from a Criminological perspective", European Journal of Information Systems Vol 15, No.4, 403-414, August, ISSN 0960-085X 4. Backhouse, J. (2006)"Interoperability of Identity and Identity Management Systems" Datenschutz und Datensicherheit, Special Issue on Identity, September, ISSN 0724-4371 5. Backhouse, J. Carol W. Hsu, and Leiser Silva (2006) "Circuits of Power in Creating de jure Standards: Shaping the International IS security Standard". Management of Information Systems Quarterly Special Issue on Standard Making, Vol 30: 413-438, August, ISSN 0276-7783 6. Backhouse, J., Hsu, W.Y., Tseng, J., Baptista, J. (2005) "A Question of Trust - An economic perspective on Quality Standards in the Certification Services Market". Communications of the ACM. September, ISSN 0001-0782 7. Dhillon, G; Silva, L., and Backhouse, J. (2004) "Computer Crime at CEFORMA: a case study". International Journal of Information Management Vol 24, No.6, 551-561, ISSN 0268-4012 8. Angell, I. and Backhouse, J. (2004) "Avoiding the technology trap". The Financial Regulator, 9 (2): 34-38, ISSN 1362-7511 9. Herrera-Vargas, A., and Backhouse, J. (2003) "Mexican Suspicious Transaction Reporting". Journal of Money Laundering Control 6 (4): 331-336, ISSN 1368-5201 10. Backhouse, J., Hsu, W.Y. and A. McDonnell. (2003) "Technical Opinion: Toward Public Key Infrastructure Interoperability". Communications of the ACM 46 (6): 98-100, ISSN 0001-0782 11. Silva, L. and Backhouse, J. (2003) "The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems". Journal of the Association of Information Systems 4: (November) Article 14: 294-336, ISSN 1536-9323 12. Hsu, W.Y. and Backhouse J. (2002) "Information Systems Security Education: Redressing the Balance of Theory and Practice". Journal of Information Systems Education 13 (3): 211-218, ISSN 1055-3096 13. Dhillon, G. and Backhouse, J. (2001) "Current directions in IS security research: toward socio-organizational perspectives". Information Systems Journal 11 (2): 127-153, ISSN 1350-1917 14. Backhouse, J. (2001) "Assessing Certification Authorities: guarding the guardians of secure e-commerce?" Journal of Financial Crime 9 (3): 217-226, ISSN 1359-0790 15. Dhillon, G. and Backhouse, J. (2000) "Information System Security Management in the New Millennium". Communications of the ACM 43 (7): 125-128, ISSN 0001-0782 16. Backhouse, J. and E. Cheng. (2000) "Signalling intentions and obliging behaviour online: an application of semiotic and legal modeling to E-commerce". Journal of End User Computing 12 (2): 33-42, ISSN 1043-6464 17. Backhouse, J., (1998) "Security: The Achilles Heel of Electronic Commerce". Society, 35 (4): 28-31, May, ISSN 0147-2011 18. Backhouse, J. (1996) "The Security of Smart Cards: Some Obstacles Still to be Cleared?" Journal of Financial Crime 3 (4): 353-359, ISSN 0969-6458 19. Backhouse, J. and Dhillon, G. (1996) "Structures of responsibility and security of information systems", European Journal of Information Systems 5 (1): 2-9, ISSN 0960-085X ** 20. Dhillon, G. and Backhouse, J. (1995) "Risks in the Use of Information Technology within Organizations". International Journal of Information Management 16 (1): 65-74, ISSN 0268-4012 21. Backhouse, J. and Dhillon, G. (1995) "Managing computer crime: a research outlook". Computers & Security (14): 645-651, ISSN 0167-4048 22. Backhouse, J. (1995) "Getting the Adjustment Right: Controls and Computer Security". Journal of Financial Crime 3 (1): 56-59, ISSN 0969-6458 23. Backhouse, J., Liebenau, J. and Land, F. (1991) "On the Discipline of Information Systems", Journal of Information Systems, Vol. 1, No. 1, January, pp. 19-27, ISSN 0959-2954 24. Backhouse, J. and Liebenau, J. (1991) "The misguided emphasis on technology in information systems". Computers in Education 1 (1) ISSN 1069-3769
Forthcoming refereed articles accepted for publication: Refereed articles sumitted for review 25. Ruth Halperin and James Backhouse, "Using Structuration Theory In Is Research: Operationalizing Key Constructs" submitted to International Conference on Information Systems (ICIS ) 2007 Methodology Track. 26. Ruth Halperin and James Backhouse, "A Framework For Research On Identity In The Information Society" submitted to International Conference on Information Systems (ICIS ) 2007 General Track.
Books 1. Liebenau, J. and Backhouse, J. (1990). Understanding Information: An Introduction. Macmillan Information System Series, Basingstoke and London, Macmillan Press, ISBN 0333536800
Chapters 2. Backhouse, J., Hsu, W.Y., Baptista, J. and Tseng, J. et al. (2006), Ch.14 "Spotting Lemons in the PKI Market: Engendering Trust by Signalling Quality", E-Commerce and the Digital Economy. M. J. Shaw (ed.) Armonk NY, M.E. Sharpe Inc.: 304. ISBN 0-7656-1150-3 3. Backhouse, J. with Bener, A., Chauvidul, N., Wamala, F. and Willison, R. (2005), Chapter 11 "Risk Management in Cyberspace". in Trust and Crime in Information Societies, R. Mansell and B. Collins (eds.), Edward Elgar, Cheltenham, UK and Northampton, MA, USA, January, pp 349-379 ISBN 1845421779 4. Backhouse, J. and Cheng, E. (2002), "Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce". Fazlollahi, B. (ed.) Strategies for eCommerce Success, IRM Press, Chapter 5, ISBN 193177708X 5. Dhillon, G. and Backhouse, J. (1997) "Managing for secure organizations: a review of information systems security research approaches". Key issues in information systems. D. Avison (ed.) McGraw-Hill. pp 377-390 ISBN 007709417-4 6. Silva, L. and Backhouse, J. (1997), "Becoming part of the furniture: The institutionalisation of information systems," Information Systems and Qualitative Research, Lee. A.S. , J. Liebenau, and J. De Gross, Eds. Chapman and Hall, Ltd London, UK, pp 389-414 ISBN 0412823608 7. Backhouse, J. (1997) "Cyberlaundering: the electronic dimension" The Impact of International Money Laundering Legislation, R. B. Davies (ed.), FT Financial Publishing, London, pp 153-170 ISBN 1853346756 8. Dhillon, G. and Backhouse, J. (1995), "Computer fraud: its management and control.," The regulation and prevention of economic crime internationally, J. Reuvid, (ed.) London, UK: Kogan Page, pp 81-89, ISBN 0749415398 9. Althaus, K. and Backhouse, J. (1988),"A legal expert system," in Knowledge Based Management Support Systems: Computerized Assistance in the Information Systems Life Cycle, G. Doukidis, F. Land, and G. Miller, (eds.) Chichester: Ellis Horwood, pp 313-326, ISBN 0745805310 10. Stamper, R., Althaus, K., and Backhouse, J. (1988), "MEASUR: Method For Eliciting, Analysing and Specifying User Requirements" in Olle, T.W., Verrijn-Stuart, A.A. and Bhabuta, L. (eds.) Proceedings of the IFIP WG 8.1 Working Conference on Computerized Assistance During the Information Systems Life Cycle, CRIS 88, Egham, England, 19-22 September, North Holland:, Amsterdam, pp 67-115, ISBN 0444705120
|