Items where Author is "Backhouse, James"

Number of items: 43.
Article
  • Anti-money laundering - avoiding the technology trap. Backhouse, James; Angell, Ian
  • Assessing certification authorities: guarding the guardians of secure e-commerce? Backhouse, James
  • Circuits of power in creating de jure standards: shaping an international information systems security standard. Backhouse, James; Hsu, Carol W. Y.; Silva, Leiser
  • Computer crime at CEFORMA: a case study. Dhillon, Gurpreet; Silva, Leiser; Backhouse, James
  • Current directions in IS security research : towards socio-organizational perspectives. Dhillon, Gurpreet; Backhouse, James
  • Getting the adjustment right: controls and computer security. Backhouse, James
  • Identity in the Information Society - special issue, edited by J. Backhouse, B.-J. Koops, V. Matyas. Backhouse, James; Koops, B.-J.; Matyas, V.
  • Information system security management in the new millennium [technical opinion]. Dhillon, Gurpreet; Backhouse, James
  • Information systems security education: redressing the balance of theory and practice. Hsu, Carol W. Y.; Backhouse, James
  • Institutionalizing operational risk management: an empirical study. Hsu, Carol; Backhouse, James; Silva, Leiser
  • Interoperability of identity and identity management systems. Backhouse, James
  • Managing computer crime: a research outlook. Backhouse, James; Dhillon, G
  • Mexican suspicious transaction reporting. Backhouse, James; Herrera-Vargas, Antonio
  • On the discipline of information systems. Backhouse, James; Liebenau, Jonathan; Land, Frank
  • Opportunities for computer crime : considering systems risk from a criminological perspective. Willison, Robert; Backhouse, James
  • Profiling under conditions of ambiguity: an application in the financial services industry. Backhouse, James; Canhoto, Ana
  • Rating certificate authorities: a market approach to the Lemons problem. Backhouse, James; Baptista, Joao; Hsu, Carol W. Y.
  • Resistance and power in a security certification scheme: the case of c:cure. Silva, Leiser; Hsu, Carol; Backhouse, James; McDonnell, Aidan
  • Risk, trust and eID: exploring public perceptions of digital identity systems. Halperin, Ruth; Backhouse, James
  • Risks in the use of information technology within organizations. Dhillon, Gurpreet; Backhouse, James
  • Security: the achilles heel of electronic commerce. Backhouse, James
  • Signalling intentions and obliging behaviour online: an application of semiotic and legal modelling to e-commerce. Backhouse, James; Cheng, Edward K.
  • Structures of responsibility and security of information systems. Backhouse, James; Dhillon, Gurpreet
  • Technical opinion: toward public key infrastructure interoperability. Backhouse, James; Hsu, Carol W. Y.; McDonnell, Aidan
  • The circuits-of-power framework for studying power in institutionalization of information systems. Silva, Leiser; Backhouse, James
  • The misguided emphasis on technology in information systems. Backhouse, James; Liebenau, Jonathan
  • A question of trust. Backhouse, James; Hsu, Carol W. Y.; Tseng, Jimmy C.; Baptista, Joao
  • A roadmap for research on identity in the information society. Halperin, Ruth; Backhouse, James
  • The security of smart cards: some obstacles still to be cleared? Backhouse, James
  • Book
  • Understanding information: an introduction. Liebenau, Jonathan; Backhouse, James
  • Chapter
  • Approaching interoperability for identity management. Backhouse, James; Halperin, Ruth
  • Becoming part of the furniture: the institutionalization of information systems. Silva, Leiser; Backhouse, James
  • Behavioural biometric profiling and ambient intelligence – a reply. Backhouse, James
  • Computer fraud: its management and control. Dhillon, Gurpreet; Backhouse, James
  • Cyberlaundering: the electronic dimension. Backhouse, James
  • General description of the process of behavioural profiling. Canhoto, Ana; Backhouse, James
  • Managing for secure organizations: a review of information systems security research approaches. Backhouse, James; Dhillon, Gurpreet
  • Risk management in cyberspace. Backhouse, James; Bener, Ayse; Chauvidul-Aw, Narisa
  • Signalling intentions and obliging behavior online: an application of semiotic and legal modelling to e-commerce. Backhouse, James; Cheng, Edward K.
  • Spotting lemons in the PKI market: engendering trust by signalling quality. Backhouse, James; Hsu, Carol; Baptista, John; Tseng, Jimmy C
  • A legal expert system. Althaus, K.; Backhouse, James
  • Conference or Workshop Item
  • Chasing the fiscal dragon: the politics of bank secrecy. Backhouse, James
  • Security and privacy perceptions of E-ID: a grounded research. Backhouse, James; Halperin, Ruth