LSE creators

Number of items: 44.
Article
  • Silva, Leiser, Hsu, Carol, Backhouse, James, McDonnell, Aidan (2016). Resistance and power in a security certification scheme: the case of c:cure. Decision Support Systems, 92, 68-78. https://doi.org/10.1016/j.dss.2016.09.014
  • Hsu, Carol, Backhouse, James, Silva, Leiser (2014). Institutionalizing operational risk management: an empirical study. Journal of Information Technology, 29(1), 59-72. https://doi.org/10.1057/jit.2013.15
  • Halperin, Ruth, Backhouse, James (2012). Risk, trust and eID: exploring public perceptions of digital identity systems. First Monday, 17(4). https://doi.org/10.5210/fm.v17i4.3867
  • Halperin, Ruth, Backhouse, James (2008). A roadmap for research on identity in the information society. Identity in the Information Society, 1(1). https://doi.org/10.1007/s12394-008-0004-0
  • Backhouse, James, Koops, B.-J., Matyas, V. (2008). Identity in the Information Society - special issue, edited by J. Backhouse, B.-J. Koops, V. Matyas. Identity in the Information Society, 1(1), 1-228.
  • Backhouse, James, Canhoto, Ana (2007). Profiling under conditions of ambiguity: an application in the financial services industry. Journal of Retailing and Consumer Services, 14(6), 408-419. https://doi.org/10.1016/j.jretconser.2007.02.006
  • Backhouse, James (2006). Interoperability of identity and identity management systems. Datenschutz und Datensicherheit,
  • Backhouse, James, Hsu, Carol W. Y., Silva, Leiser (2006). Circuits of power in creating de jure standards: shaping an international information systems security standard. MIS Quarterly: Management Information Systems, 30(supple), 413-438.
  • Willison, Robert, Backhouse, James (2006). Opportunities for computer crime : considering systems risk from a criminological perspective. European Journal of Information Systems, 15(4), 403-414. https://doi.org/10.1057/palgrave.ejis.3000592
  • Backhouse, James, Baptista, Joao, Hsu, Carol W. Y. (2006). Rating certificate authorities: a market approach to the Lemons problem. Journal of Information Systems Security, 2(2), 3-14.
  • Backhouse, James, Hsu, Carol W. Y., Tseng, Jimmy C., Baptista, Joao (2005). A question of trust. Communications of the ACM, 48(9), 87-91. https://doi.org/10.1145/1081992.1081994
  • Dhillon, Gurpreet, Silva, Leiser, Backhouse, James (2004). Computer crime at CEFORMA: a case study. International Journal of Information Management, 24(6), 551-561. https://doi.org/10.1016/j.ijinfomgt.2004.08.009
  • Backhouse, James, Angell, Ian (2004). Anti-money laundering - avoiding the technology trap. Financial Regulator, 9(2), 34-38.
  • Backhouse, James, Hsu, Carol W. Y., McDonnell, Aidan (2003). Technical opinion: toward public key infrastructure interoperability. Communications of the ACM, 46(6), 98-100. https://doi.org/10.1145/777313.777345
  • Backhouse, James, Herrera-Vargas, Antonio (2003). Mexican suspicious transaction reporting. Journal of Money Laundering Control, 6(4), 331-336.
  • Silva, Leiser, Backhouse, James (2003). The circuits-of-power framework for studying power in institutionalization of information systems. Journal of the Association for Information Systems, 4, 294-336.
  • Backhouse, James (2002). Assessing certification authorities: guarding the guardians of secure e-commerce? Journal of Financial Crime, 9(3), 217-226. https://doi.org/10.1108/eb026020
  • Hsu, Carol W. Y., Backhouse, James (2002). Information systems security education: redressing the balance of theory and practice. Journal of Information Systems Education, 13(3), 211-218.
  • Dhillon, Gurpreet, Backhouse, James (2001). Current directions in IS security research : towards socio-organizational perspectives. Information Systems Journal, 11(2), 127-154.
  • Dhillon, Gurpreet, Backhouse, James (2000). Information system security management in the new millennium [technical opinion]. Communications of the ACM, 43(7), 125-128. https://doi.org/10.1145/341852.341877
  • Backhouse, James, Cheng, Edward K. (2000). Signalling intentions and obliging behaviour online: an application of semiotic and legal modelling to e-commerce. Journal of End User Computing, 12(2), 33-42.
  • Backhouse, James (1998). Security: the achilles heel of electronic commerce. Society, 35(4), 28-31. https://doi.org/10.1007/BF02686379
  • Backhouse, James, Dhillon, Gurpreet (1996). Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1), 2-9. https://doi.org/10.1057/ejis.1996.7
  • Backhouse, James (1996). The security of smart cards: some obstacles still to be cleared? Journal of Financial Crime, 3(4), 353-359. https://doi.org/10.1108/eb025734
  • Dhillon, Gurpreet, Backhouse, James (1995). Risks in the use of information technology within organizations. International Journal of Information Management, 16(1), 65-74. https://doi.org/10.1016/0268-4012(95)00062-3
  • Backhouse, James (1995). Getting the adjustment right: controls and computer security. Journal of Financial Crime, 3(1), 56-59. https://doi.org/10.1108/eb025670
  • Backhouse, James, Dhillon, G (1995). Managing computer crime: a research outlook. Computers and Security, 14(7), 645-651. https://doi.org/10.1016/0167-4048(95)00024-0
  • Backhouse, James, Liebenau, Jonathan, Land, Frank (1991). On the discipline of information systems. Information Systems Journal, 1(1), 19-27. https://doi.org/10.1111/j.1365-2575.1991.tb00024.x
  • Backhouse, James, Liebenau, Jonathan (1991). The misguided emphasis on technology in information systems. Computers in Education, 1(1).
  • Book
  • Liebenau, Jonathan, Backhouse, James (1990). Understanding information: an introduction. Palgrave Macmillan.
  • Chapter
  • Backhouse, James, Halperin, Ruth (2009). Approaching interoperability for identity management. In Rannenberg, Kai, Royer, Denis, Deuker, André (Eds.), Future of Identity in the Information Society: Challenges and Opportunities (pp. 245-272). Springer Berlin / Heidelberg.
  • Backhouse, James (2008). Behavioural biometric profiling and ambient intelligence – a reply. In Hildebrandt, M., Gutwirth, S. (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 104-106). Springer Berlin / Heidelberg.
  • Canhoto, Ana, Backhouse, James (2008). General description of the process of behavioural profiling. In Hildebrandt, M., Gutwirth, S. (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 47-63). Springer Berlin / Heidelberg.
  • Backhouse, James, Hsu, Carol, Baptista, John, Tseng, Jimmy C (2006). Spotting lemons in the PKI market: engendering trust by signalling quality. In Shaw, M.J. (Ed.), E-Commerce and the Digital Economy (pp. 247-257). M.E. Sharpe, Inc..
  • Backhouse, James, Bener, Ayse, Chauvidul-Aw, Narisa (2005). Risk management in cyberspace. In Mansell, Robin, Collins, Brian S. (Eds.), Trust and Crime in Information Societies (pp. 349-379). Edward Elgar.
  • Backhouse, James, Cheng, Edward K. (2002). Signalling intentions and obliging behavior online: an application of semiotic and legal modelling to e-commerce. In Fazlollahi, Bijan (Ed.), Strategies for E-Commerce Success (pp. 68-88). IRM Press.
  • Backhouse, James (1997). Cyberlaundering: the electronic dimension. In Bosworth-Davies, Rowan (Ed.), The Impact of International Money Laundering Legislation (pp. 153-170). FT Finance.
  • Silva, Leiser, Backhouse, James (1997). Becoming part of the furniture: the institutionalization of information systems. In Lee, Allen S., Liebenau, Jonathan, DeGross, Janice I. (Eds.), Information Systems and Qualitative Research (pp. 389-414). Chapman and Hall.
  • Backhouse, James, Dhillon, Gurpreet (1997). Managing for secure organizations: a review of information systems security research approaches. In Avison, David (Ed.), Key Issues in Information Systems: Proceedings of the 2nd Ukais Conference, University of Southampton, 2-4 April 1997 (pp. 377-390). McGraw-Hill Publishing Company.
  • Dhillon, Gurpreet, Backhouse, James (1995). Computer fraud: its management and control. In Reuvid, Jonathan (Ed.), The Regulation and Prevention of Economic Crime Internationally (pp. 81-89). Kogan Page (Firm).
  • Althaus, K., Backhouse, James (1989). A legal expert system. In Doukidis, Georgios, Land, Frank, Miller, G. (Eds.), Knowledge Based Management Support Systems: Computerized Assistance in the Information Systems Life Cycle (pp. 313-326). Ellis Horwood Publisher.
  • Conference or Workshop Item
  • Backhouse, James, Halperin, Ruth (2008-06-09 - 2008-06-11) Security and privacy perceptions of E-ID: a grounded research [Paper]. 16th European Conference on Information Systems, Galway, Ireland, IRL.
  • Backhouse, James (1999-09-14 - 1999-09-19) Chasing the fiscal dragon: the politics of bank secrecy [Paper]. 17th Cambridge Symposium on Economic Crime, Cambridge, United Kingdom, GBR.
  • Thesis
  • Backhouse, James (1991). The use of semantic analysis in the development of information systems [Doctoral thesis]. London School of Economics and Political Science. picture_as_pdf