2005 |
10 | EE | Ana Isabel Canhoto,
James Backhouse:
Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff.
ISI 2005: 600-601 |
9 | EE | James Backhouse,
Carol Hsu,
Jimmy C. Tseng,
John Baptista:
A question of trust.
Commun. ACM 48(9): 87-91 (2005) |
2003 |
8 | EE | James Backhouse,
Carol Hsu,
John Baptista,
Jimmy C. Tseng:
The key to trust? signalling quality in the PKI market.
ECIS 2003 |
7 | EE | James Backhouse,
Carol Hsu,
Aidan McDonnell:
Toward public-key infrastructure interoperability.
Commun. ACM 46(6): 98-100 (2003) |
6 | EE | Leiser Silva,
James Backhouse:
The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems.
J. AIS 4: (2003) |
2001 |
5 | EE | Gurpreet Dhillon,
James Backhouse:
Current directions in IS security research: towards socio-organizational perspectives.
Inf. Syst. J. 11(2): 127-154 (2001) |
2000 |
4 | EE | Gurpreet Dhillon,
James Backhouse:
Information system security management in the new millennium.
Commun. ACM 43(7): 125-128 (2000) |
1995 |
3 | EE | James Backhouse,
Gurpreet Dhillon:
Managing computer crime: a research outlook.
Computers & Security 14(7): 645-651 (1995) |
1993 |
2 | | James Backhouse,
Alberto Pucci:
Supporting legal interpretation: A hypertext tool for semantic analysis.
ECIS 1993: 141-156 |
1988 |
1 | | Ronald K. Stamper,
Karl Althans,
James Backhouse:
Measur: Method For Eliciting, Analysing and Specifying User Requirements.
Computerized Assistance During the Information Systems Life Cycle 1988: 67-115 |