Roger Clarke
Orcid: 0000-0001-6266-1793
According to our database1,
Roger Clarke
authored at least 127 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Australas. J. Inf. Syst., 2024
2023
Proceedings of the Australasian Conference on Information Systems, 2023
Proceedings of the Australasian Conference on Information Systems, 2023
2022
Inf. Polity, 2022
Electron. Mark., 2022
Proceedings of the 35th Bled eConference - Digital Restructuring and Human (Re)action, June 26, 2022
2021
A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation.
Proceedings of the 34th Bled eConference: Digital Support from Crisis to Progressive Change, June 27, 2021
A Platform for a Pragmatic Metatheoretic Model for Information Systems Practice and Research.
Proceedings of the Australasian Conference on Information Systems, 2021
2020
Research Perspectives: Through Whose Eyes? The Critical Concept of Researcher Perspective.
J. Assoc. Inf. Syst., 2020
Researcher perspective in the IS discipline: an empirical study of articles in the basket of 8 journals.
Inf. Technol. People, 2020
A Post Publication review of "The challenges involved in establishing a research technique".
Australas. J. Inf. Syst., 2020
Australas. J. Inf. Syst., 2020
Proceedings of the 33rd Bled eConference: Enabling Technology for a Sustainable Society, 2020
2019
Comput. Law Secur. Rev., 2019
Proceedings of the 32nd Bled eConference: Humanizing Technology for a Sustainable Society, 2019
2018
The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security.
Comput. Law Secur. Rev., 2018
Comput. Law Secur. Rev., 2018
Proceedings of the 31st Bled eConference: Digital Transformation: Meeting the Challenges, 2018
2017
Commun. Assoc. Inf. Syst., 2017
Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot.
Proceedings of the 30th Bled eConference: Digital Transformation, 2017
2016
On the Ontological Quality and Logical Quality of Conceptual-Modeling Grammars: The Need for a Dual Perspective.
Inf. Syst. Res., 2016
A framework for analysing technology's negative and positive impacts on freedom and privacy.
Datenschutz und Datensicherheit, 2016
Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives.
Comput. Law Secur. Rev., 2016
Comput. Law Secur. Rev., 2016
Australas. J. Inf. Syst., 2016
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Proceedings of the 29th Bled eConference: Digital Economy, 2016
2015
Comput. Law Secur. Rev., 2015
Comput. Law Secur. Rev., 2015
Proceedings of the Fourth International Workshop on Requirements Engineering for Sustainable Systems, 2015
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2015
Proceedings of the 28th Bled eConference: s#eWellBeing, 2015
2014
IEEE Technol. Soc. Mag., 2014
Inf. Technol. People, 2014
Comput. Law Secur. Rev., 2014
Comput. Law Secur. Rev., 2014
Proceedings of the Information Systems Development: Transforming Organisations and Society through Information Systems, 2014
Proceedings of the 27th Bled eConference: eEcosystems, 2014
2013
Electronic interaction research 1988 - 2012 through the lens of the Bled eConference.
Electron. Mark., 2013
Comput. Law Secur. Rev., 2013
Improving the Semantics of Conceptual-Modeling Grammars: A New Perspective on an Old Problem.
Proceedings of the International Conference on Information Systems, 2013
Proceedings of the Critical Information Infrastructures Security, 2013
The Supervisor's Dilemma: Is Reconciliation Possible between the Candidate's Needs and the Supervisor's Integrity?
Proceedings of the 26th Bled eConference: eTrust: eInnovation: Challenges and Impacts for Individuals, 2013
2012
Comput. Law Secur. Rev., 2012
Is Use of Optional Attributes and Associations in Conceptual Modeling Always Problematic? Theory and Empirical Tests.
Proceedings of the International Conference on Information Systems, 2012
Proceedings of the 25th Bled eConference: eTrust: eDependability: Reliable and Trustworthy eStructures, 2012
2011
You are where you've been: the privacy implications of location and tracking technologies.
J. Locat. Based Serv., 2011
Proceedings of the 24th Bled eConference: eFuture Creating Solutions for the Individual, 2011
2010
IEEE Technol. Soc. Mag., 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010
Proceedings of the 23rd Bled eConference: eTrust: Implications for the Individual, 2010
2009
Comput. Law Secur. Rev., 2009
Journal Self-Citation XI: Regulation of "Journal Self-Referencing" - The Substantive Role of the AIS Code of Research Conduct.
Commun. Assoc. Inf. Syst., 2009
Journal Self-Citation XIX: Self-Plagiarism and Self-Citation - A Practical Guide Based on Underlying Principles.
Commun. Assoc. Inf. Syst., 2009
A Citation Analysis of Australian Information Systems Researchers: Towards a New ERA?
Australas. J. Inf. Syst., 2009
Proceedings of the 22nd Bled eConference: eEnablement:Facilitating an Open, 2009
2008
Comput. Law Secur. Rev., 2008
Commun. Assoc. Inf. Syst., 2008
Proceedings of the 21st Bled eConference: eCollaboration: Overcoming Boundaries Through Multi-Channel Interaction, 2008
2007
First Monday, 2007
2006
J. Theor. Appl. Electron. Commer. Res., 2006
Comput. Law Secur. Rev., 2006
Australas. J. Inf. Syst., 2006
Proceedings of the 19th Bled eConference: eValues, 2006
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006
2005
First Monday, 2005
2004
Viewpoint Paper: e-Consent: The Design And Implementation of Consumer Consent Mechanisms in an Electronic Environment.
J. Am. Medical Informatics Assoc., 2004
Proceedings of the 17th Bled eConference: eGlobal, 2004
2003
Commun. Assoc. Inf. Syst., 2003
Proceedings of the 16th Bled eConference: eTransformation, 2003
2002
If e-Business is Different, then so is Research in e-Business.
Proceedings of the Seeking Success in E-Business, 2002
Proceedings of the 15th Bled eConference: eReality: Constructing the eEconomy, 2002
2001
Inf. Technol. People, 2001
Commun. Assoc. Inf. Syst., 2001
Proceedings of the 9th European Conference on Information Systems, 2001
Proceedings of the 14th Bled eConference: e-Everything: e-Commerce, 2001
2000
Privacy in Electronic Media: Identification, Authentication and Anonymity in a Legal Context.
Comput. Law Secur. Rev., 2000
IS research ethics: defining ethical, barely ethical, and unethical behavior (panel).
Proceedings of the Twenty-First International Conference on Information Systems, 2000
Proceedings of the 8th European Conference on Information Systems, 2000
Proceedings of the Tenth Conference on Computers, 2000
1999
First Monday, 1999
1997
Evaluation Or Justification? The Application of Cost/benefit Analysis to Computer Matching Schemes.
Proceedings of the Fifth European Conference on Information Systems, 1997
1996
1995
Proceedings of the Second Pacific Asia Conference on Information Systems, 1995
Beyond the Jungle: How Can the Various Schools of Thought in Strategic Information Systems Contribute to Organizational Strategy in Low-Competitive Contexts?
Proceedings of the Sixteenth International Conference on Information Systems, 1995
1994
Computer, 1994
1993
The strategic intent of on-line trading systems: a case study in national livestock marketing.
J. Strateg. Inf. Syst., 1993
Proceedings of the Fourteenth International Conference on Information Systems, 1993
1992
J. Strateg. Inf. Syst., 1992
Case Study - Cardomat/Migros - An Open EFT/POS System.
Aust. Comput. J., 1992
Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm.
Proceedings of the Education and Society, 1992
Ethics, Vulnerability and Information Technology (IT).
Proceedings of the Education and Society, 1992
1990
Comput. Law Secur. Rev., 1990
Social Implications of IT - the Professional's Role.
Aust. Comput. J., 1990
1989
Comput. Law Secur. Rev., 1989
Comput. Law Secur. Rev., 1989
1988
1982
Teleprocessing Monitors and Program Structure.
Aust. Comput. J., 1982
Background to Program Generators for Commercial Applications.
Aust. Comput. J., 1982