default search action
James Backhouse
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j17]Leiser Silva, Carol Hsu, James Backhouse, Aidan McDonnell:
Resistance and power in a security certification scheme: The case of c: cure. Decis. Support Syst. 92: 68-78 (2016) - 2014
- [j16]Carol Hsu, James Backhouse, Leiser Silva:
Institutionalizing operational risk management: an empirical study. J. Inf. Technol. 29(1): 59-72 (2014) - 2012
- [j15]Ruth Halperin, James Backhouse:
Risk, trust and eID: Exploring public perceptions of digital identity systems. First Monday 17(4) (2012)
2000 – 2009
- 2009
- [p2]James Backhouse, Ruth Halperin:
Approaching Interoperability for Identity Management Systems. The Future of Identity in the Information Society 2009: 245-268 - 2008
- [c11]James Backhouse, Ruth Halperin:
Security and Privacy Perceptions of E- ID: A Grounded Research. ECIS 2008: 1382-1393 - [p1]Ana Isabel Canhoto, James Backhouse:
General Description of the Process of Behavioural Profiling. Profiling the European Citizen 2008: 47-63 - 2007
- [j14]Gurpreet Dhillon, James Backhouse, Amy W. Ray:
Editorial: JSIS Security and Privacy Special Issue. J. Strateg. Inf. Syst. 16(2): 127-129 (2007) - [c10]Ruth Halperin, James Backhouse:
Using Structuration Theory in IS Research: Operationalizing Key Constructs. ICIS 2007: 127 - 2006
- [j13]James Backhouse:
Interoperability of identity and identity management systems. Datenschutz und Datensicherheit 30(9): 568-570 (2006) - [j12]Robert Willison, James Backhouse:
Opportunities for computer crime: considering systems risk from a criminological perspective. Eur. J. Inf. Syst. 15(4): 403-414 (2006) - [j11]James Backhouse, Carol W. Hsu, Leiser Silva:
Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard. MIS Q. 30(Special Issue): 143-438 (2006) - [c9]John Baptista, James Backhouse, Ana Isabel Canhoto:
Impact Of Intranets On Employee Perception And Behavior: A Case Study In A UK Bank. ICIS 2006: 114 - 2005
- [j10]James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista:
A question of trust. Commun. ACM 48(9): 87-91 (2005) - [c8]Ana Isabel Canhoto, James Backhouse:
Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. ISI 2005: 600-601 - 2004
- [j9]Gurpreet Dhillon, Leiser Silva, James Backhouse:
Computer crime at CEFORMA: a case study. Int. J. Inf. Manag. 24(6): 551-561 (2004) - [c7]James Backhouse, John Baptista, Carol Hsu:
Rating Certificate Authorities: a market approach to the Lemons problem. AMCIS 2004: 173 - 2003
- [j8]James Backhouse, Carol Hsu, Aidan McDonnell:
Toward public-key infrastructure interoperability. Commun. ACM 46(6): 98-100 (2003) - [j7]Leiser Silva, James Backhouse:
The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems. J. Assoc. Inf. Syst. 4: 14 (2003) - [c6]James Backhouse, Carol Hsu, John Baptista, Jimmy C. Tseng:
The key to trust? signalling quality in the PKI market. ECIS 2003: 118-121 - 2002
- [j6]Carol Hsu, James Backhouse:
Information Systems Security Education: Redressing the Balance of Theory and Practice. J. Inf. Syst. Educ. 13(3): 211-218 (2002) - 2001
- [j5]Gurpreet Dhillon, James Backhouse:
Current directions in IS security research: towards socio-organizational perspectives. Inf. Syst. J. 11(2): 127-154 (2001) - 2000
- [j4]Gurpreet Dhillon, James Backhouse:
Information system security management in the new millennium. Commun. ACM 43(7): 125-128 (2000) - [j3]James Backhouse, Edward K. Cheng:
Signalling Intentions and Obliging Behavior Online: An Application of Semiotic and Legal Modeling in E-Commerce. J. Organ. End User Comput. 12(2): 33-42 (2000)
1990 – 1999
- 1997
- [c5]Leiser Silva, Gurpreet Dhillon, James Backhouse:
Developing A Networked Authority: Nature and Significance of Power Relationships. ECIS 1997: 511-525 - 1995
- [j2]James Backhouse, Gurpreet Dhillon:
Managing computer crime: a research outlook. Comput. Secur. 14(7): 645-651 (1995) - [c4]James Backhouse, Gurpreet Dhillon:
Electronic thesaurus for clinical terms: A methodological approach. ECIS 1995: 591-600 - [c3]Amir Albadvi, James Backhouse:
A method for dynamic systems development. ECIS 1995: 851-864 - 1993
- [c2]James Backhouse, Alberto Pucci:
Supporting legal interpretation: A hypertext tool for semantic analysis. ECIS 1993: 141-156 - 1991
- [j1]James Backhouse, Jonathan Liebenau, Frank Land:
On the discipline of information systems. Inf. Syst. J. 1(1): 19-27 (1991)
1980 – 1989
- 1988
- [c1]Ronald K. Stamper, Karl Althans, James Backhouse:
Measur: Method For Eliciting, Analysing and Specifying User Requirements. Computerized Assistance During the Information Systems Life Cycle 1988: 67-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint