default search action
Roger Clarke
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Roger Clarke, Katina Michael, Roba Abbas:
Robodebt: A Socio-Technical Case Study of Public Sector Information Systems Failure. Australas. J. Inf. Syst. 28 (2024) - 2023
- [c46]Roger Clarke:
A Generic Theory of Authentication to Support IS Practice and Research. ACIS 2023 - [c45]Roger Clarke:
A Generic Theory of Authorization to Support IS Practice and Research. ACIS 2023 - 2022
- [j80]Roger Clarke:
Research opportunities in the regulatory aspects of electronic markets. Electron. Mark. 32(1): 179-200 (2022) - [j79]Roger Clarke:
Responsible application of artificial intelligence to surveillance: What prospects? Inf. Polity 27(2): 175-191 (2022) - [c44]Roger Clarke:
A Reconsideration of the Foundations of Identity Management. Bled eConference 2022: 39 - 2021
- [c43]Roger Clarke:
A Platform for a Pragmatic Metatheoretic Model for Information Systems Practice and Research. ACIS 2021: 53 - [c42]Roger Clarke:
A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation. Bled eConference 2021: 18 - 2020
- [j78]Roger Clarke:
The Challenges Involved in Establishing a Research Technique. Australas. J. Inf. Syst. 24 (2020) - [j77]Weng Marc Lim, Tareq Rasul, Roger Clarke:
A Post Publication review of "The challenges involved in establishing a research technique". Australas. J. Inf. Syst. 24 (2020) - [j76]Roger Clarke:
Researcher perspectives in Electronic Markets. Electron. Mark. 30(1): 15-27 (2020) - [j75]Roger Clarke, Robert M. Davison, Wanying Jia:
Researcher perspective in the IS discipline: an empirical study of articles in the basket of 8 journals. Inf. Technol. People 33(6): 1515-1541 (2020) - [j74]Roger Clarke, Robert M. Davison:
Research Perspectives: Through Whose Eyes? The Critical Concept of Researcher Perspective. J. Assoc. Inf. Syst. 21(2): 1 (2020) - [c41]Roger Clarke:
RegTech Opportunities in the Platform-Based Business Sector. Bled eConference 2020: 37
2010 – 2019
- 2019
- [j73]Roger Clarke:
Regulatory alternatives for AI. Comput. Law Secur. Rev. 35(4): 398-409 (2019) - [j72]Roger Clarke:
Principles and business processes for responsible AI. Comput. Law Secur. Rev. 35(4): 410-422 (2019) - [j71]Roger Clarke:
Why the world wants controls over Artificial Intelligence. Comput. Law Secur. Rev. 35(4): 423-433 (2019) - [c40]Roger Clarke:
Beyond De-Identification Record Falsification to Disarm Expropriated Data-Sets. Bled eConference 2019: 53 - 2018
- [j70]Roger Clarke:
Guidelines for the responsible application of data analytics. Comput. Law Secur. Rev. 34(3): 467-476 (2018) - [j69]Roger Clarke, Marcus R. Wigan:
The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security. Comput. Law Secur. Rev. 34(4): 677-700 (2018) - [j68]Roger Clarke:
Assertion, belief, and context. Synth. 195(11): 4951-4977 (2018) - [c39]Roger Clarke, Kerry Taylor:
Towards Responsible Data Analytics: A Process Approach. Bled eConference 2018: 36 - 2017
- [j67]Fred Niederman, Roger Clarke, Lynda M. Applegate, John Leslie King, Roman Beck, Ann Majchrzak:
IS Research and Policy: Notes From the 2015 ICIS Senior Scholar's Forum. Commun. Assoc. Inf. Syst. 40: 5 (2017) - [j66]Roger Clarke:
Can small users recover from the cloud? Comput. Law Secur. Rev. 33(6): 754-767 (2017) - [c38]Roger Clarke:
Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot. Bled eConference 2017: 43 - [e2]Andreja Pucihar, Mirjana Kljajic Borstnar, Christian Kittl, Pascal Ravesteijn, Roger Clarke, Roger W. H. Bons:
30th Bled eConference: Digital Transformation - From Connecting Things to Transforming our Lives, Bled, Slovenia, June 18-21, 2017. 2017 [contents] - 2016
- [j65]Roger Clarke:
Practicable Backup Arrangements for Small Organisations and Individuals. Australas. J. Inf. Syst. 20 (2016) - [j64]Roger Clarke:
Appropriate regulatory responses to the drone epidemic. Comput. Law Secur. Rev. 32(1): 152-155 (2016) - [j63]Roger Clarke:
Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives. Comput. Law Secur. Rev. 32(3): 403-418 (2016) - [j62]Roger Clarke:
A framework for analysing technology's negative and positive impacts on freedom and privacy. Datenschutz und Datensicherheit 40(2): 79-83 (2016) - [j61]Roger Clarke:
Big data, big risks. Inf. Syst. J. 26(1): 77-90 (2016) - [j60]Roger Clarke, Andrew Burton-Jones, Ron Weber:
On the Ontological Quality and Logical Quality of Conceptual-Modeling Grammars: The Need for a Dual Perspective. Inf. Syst. Res. 27(2): 365-382 (2016) - [c37]Roger Clarke:
An Empirical Assessment of Researcher Perspectives. Bled eConference 2016: 42 - [c36]Roger Clarke:
Quality Assurance for Security Applications of Big Data. EISIC 2016: 1-8 - [c35]Roger Clarke:
Big Data Prophylactics. Privacy and Identity Management 2016: 3-14 - [i1]Roger Clarke:
Not Only Horses Wear Blinkers: The Missing Perspectives in IS Research. CoRR abs/1611.04059 (2016) - 2015
- [j59]Roger Clarke:
Does SaaS Backup Pass the Fitness-for-Purpose Test? IEEE Cloud Comput. 2(6): 58-63 (2015) - [j58]Roger Clarke:
The prospects of easier security for small organisations and consumers. Comput. Law Secur. Rev. 31(4): 538-552 (2015) - [j57]Kayleen Manwaring, Roger Clarke:
Surfing the third wave of computing: A framework for research into eObjects. Comput. Law Secur. Rev. 31(5): 586-603 (2015) - [c34]Roger Clarke:
Quasi-Empirical Scenario Analysis and Its Application to Big Data Quality. Bled eConference 2015: 30 - [c33]Rani Yesudas, Roger Clarke:
Consumer Concerns About Smart Meters. HCI (21) 2015: 625-635 - [c32]Rani Yesudas, Roger Clarke:
Measures to Improve Public Acceptance of Smart Metering System. RE4SuSy@RE 2015: 1-10 - 2014
- [j56]Roger Clarke:
Understanding the drone epidemic. Comput. Law Secur. Rev. 30(3): 230-246 (2014) - [j55]Roger Clarke:
What drones inherit from their ancestors. Comput. Law Secur. Rev. 30(3): 247-262 (2014) - [j54]Roger Clarke, Lyria Bennett Moses:
The regulation of civilian drones' impacts on public safety. Comput. Law Secur. Rev. 30(3): 263-285 (2014) - [j53]Roger Clarke:
The regulation of civilian drones' impacts on behavioural privacy. Comput. Law Secur. Rev. 30(3): 286-305 (2014) - [j52]Roger Clarke:
Persona missing, feared drowned: the digital persona concept, two decades later. Inf. Technol. People 27(2): 182-207 (2014) - [j51]Roger Clarke:
The Regulation of Point of View Surveillance: A Review of Australian Law. IEEE Technol. Soc. Mag. 33(2): 40-46 (2014) - [c31]Roger Clarke:
The Prospects for Consumer-Oriented Social Media. Bled eConference 2014: 45 - [c30]Rani Yesudas, Roger Clarke:
Architecture and Data Flow Model for Consumer-Oriented Smart Meter Design. ISD 2014 - 2013
- [j50]Katina Michael, Roger Clarke:
Location and tracking of mobile devices: Überveillance stalks the streets. Comput. Law Secur. Rev. 29(3): 216-228 (2013) - [j49]Marcus R. Wigan, Roger Clarke:
Big Data's Big Unintended Consequences. Computer 46(6): 46-53 (2013) - [j48]Roger Clarke, Andreja Pucihar:
Electronic interaction research 1988 - 2012 through the lens of the Bled eConference. Electron. Mark. 23(4): 271-283 (2013) - [j47]Roger Clarke:
Morning dew on the Web in Australia: 1992-1995. J. Inf. Technol. 28(2): 93-110 (2013) - [j46]Roger Clarke:
Data Risks in the Cloud. J. Theor. Appl. Electron. Commer. Res. 8(3): 59-73 (2013) - [c29]Roger Clarke:
The Supervisor's Dilemma: Is Reconciliation Possible between the Candidate's Needs and the Supervisor's Integrity? Bled eConference 2013: 4 - [c28]Rani Yesudas, Roger Clarke:
A Framework for Risk Analysis in Smart Grid - Perspective Based Approach. CRITIS 2013: 84-95 - [c27]Roger Clarke, Andrew Burton-Jones, Ron Weber:
Improving the Semantics of Conceptual-Modeling Grammars: A New Perspective on an Old Problem. ICIS 2013 - 2012
- [j45]Roger Clarke:
How reliable is cloudsourcing? A review of articles in the technical media 2005-11. Comput. Law Secur. Rev. 28(1): 90-95 (2012) - [j44]Roger Clarke:
The Challenging World of Privacy Advocacy. IEEE Technol. Soc. Mag. 31(4): 29-31 (2012) - [c26]Roger Clarke:
A Framework for the Evaluation o f CloudSourcing Proposals. Bled eConference 2012: 4 - [c25]Andrew Burton-Jones, Roger Clarke, Kate Lazarenko, Ron Weber:
Is Use of Optional Attributes and Associations in Conceptual Modeling Always Problematic? Theory and Empirical Tests. ICIS 2012 - 2011
- [j43]Roger Clarke, Marcus R. Wigan:
You are where you've been: the privacy implications of location and tracking technologies. J. Locat. Based Serv. 5(3-4): 138-155 (2011) - [j42]Roger Clarke:
Cyborg Rights. IEEE Technol. Soc. Mag. 30(3): 49-57 (2011) - [c24]Roger Clarke:
The Cloudy Future of Consumer Computing. Bled eConference 2011: 47 - 2010
- [j41]Dan Svantesson, Roger Clarke:
A best practice model for e-consumer protection. Comput. Law Secur. Rev. 26(1): 31-37 (2010) - [j40]Dan Svantesson, Roger Clarke:
Privacy and consumer risks in cloud computing. Comput. Law Secur. Rev. 26(4): 391-397 (2010) - [j39]Roger Clarke:
"The Ravens Paradox" is a misnomer. Synth. 175(3): 427-440 (2010) - [j38]Roger Clarke:
What is Überveillance? (And What Should Be Done About It?). IEEE Technol. Soc. Mag. 29(2): 17-25 (2010) - [c23]Roger Clarke:
Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective. Bled eConference 2010: 2 - [c22]Roger Clarke:
User Requirements for Cloud Computing Architecture. CCGRID 2010: 625-630 - [c21]Roger Clarke:
Civil Society Must Publish Standards Documents. HCC 2010: 180-184 - [c20]Roger Clarke:
Cyborg rights. ISTAS 2010: 9-22
2000 – 2009
- 2009
- [j37]Roger Clarke:
A Citation Analysis of Australian Information Systems Researchers: Towards a New ERA? Australas. J. Inf. Syst. 15(2) (2009) - [j36]Roger Clarke, Robert M. Davison, Cynthia Beath:
Journal Self-Citation XI: Regulation of "Journal Self-Referencing" - The Substantive Role of the AIS Code of Research Conduct. Commun. Assoc. Inf. Syst. 25: 11 (2009) - [j35]Roger Clarke:
Journal Self-Citation XIX: Self-Plagiarism and Self-Citation - A Practical Guide Based on Underlying Principles. Commun. Assoc. Inf. Syst. 25: 19 (2009) - [j34]Roger Clarke:
Privacy impact assessment: Its origins and development. Comput. Law Secur. Rev. 25(2): 123-135 (2009) - [c19]Roger Clarke:
An eCommerce Perspective on Carbon Trading. Bled eConference 2009: 23 - 2008
- [j33]Roger Clarke:
An Exploratory Study of Information Systems Researcher Impact. Commun. Assoc. Inf. Syst. 22: 1 (2008) - [j32]Adam Warren, Robin Bayley, Colin Bennett, Andrew Charlesworth, Roger Clarke, Charles Oppenheim:
Privacy Impact Assessments: International experience as a basis for UK Guidance. Comput. Law Secur. Rev. 24(3): 233-242 (2008) - [j31]Roger Clarke:
Web 2.0 as Syndication. J. Theor. Appl. Electron. Commer. Res. 3(2): 30-43 (2008) - [c18]Roger Clarke:
A Risk Assessment Framework for Mobile Payments. Bled eConference 2008: 40 - 2007
- [j30]Roger Clarke:
The cost profiles of alternative approaches to journal publishing. First Monday 12(12) (2007) - 2006
- [j29]Roger Clarke:
Key Aspects of the History of the Information Systems Discipline in Australia. Australas. J. Inf. Syst. 14(1) (2006) - [j28]Roger Clarke:
Google's gauntlets - Challenges to 'old world corps', consumers and the law. Comput. Law Secur. Rev. 22(4): 288-298 (2006) - [j27]Roger Clarke:
Plagiarism by Academics: More Complex Than It Seems. J. Assoc. Inf. Syst. 7(1): 5 (2006) - [j26]Roger Clarke:
P2P's Significance for eBusiness: Towards a Research Agenda. J. Theor. Appl. Electron. Commer. Res. 1(3): 42-57 (2006) - [c17]Roger Clarke:
A major impediment to B2C success is...the concept 'B2C'. ICEC 2006: 441-450 - [c16]Roger Clarke:
A Pilot Study of the Effectiveness of Privacy Policy Statements. Bled eConference 2006: 10 - 2005
- [j25]Roger Clarke:
A proposal for an open content licence for research paper (Pr)ePrints. First Monday 10(8) (2005) - 2004
- [j24]Enrico W. Coiera, Roger Clarke:
Viewpoint Paper: e-Consent: The Design And Implementation of Consumer Consent Mechanisms in an Electronic Environment. J. Am. Medical Informatics Assoc. 11(2): 129-140 (2004) - [c15]Roger Clarke:
Open Source Software And Open Content As Models For eBusiness. Bled eConference 2004: 32 - 2003
- [j23]Robert M. Davison, Roger Clarke, Duncan Langford, Feng-Yuan Kuo, H. Jeff Smith:
Information Privacy in a Globally Networked Society: Implications for IS Research. Commun. Assoc. Inf. Syst. 12: 22 (2003) - [c14]Roger Clarke:
Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper. Bled eConference 2003: 8 - 2002
- [c13]Roger Clarke:
eConsent: A Critical Element of Trust in eBusiness. Bled eConference 2002: 12 - [c12]Roger Clarke:
If e-Business is Different, then so is Research in e-Business. E-Business: Multidisciplinary Research and Practice 2002: 3-19 - 2001
- [j22]Robert M. Davison, Ned Kock, Karen D. Loch, Roger Clarke:
Research Ethics in Information Systems: Would a Code of Practice Help? Commun. Assoc. Inf. Syst. 7: 4 (2001) - [j21]Roger Clarke:
Person location and person tracking - Technologies, risks and policy implications. Inf. Technol. People 14(2): 206-231 (2001) - [c11]Roger Clarke:
Towards a Taxonomy of B2B e-Commerce Schemes. Bled eConference 2001: 44 - [c10]Roger Clarke:
The Fundamental Inadequacies of Conventional Public Key Infrastructure. ECIS 2001: 148-159 - 2000
- [j20]Anita Smith, Roger Clarke:
Privacy in Electronic Media: Identification, Authentication and Anonymity in a Legal Context. Comput. Law Secur. Rev. 16(2): 95-100 (2000) - [c9]Roger Clarke:
Notes for the workshop on freedom and privacy by design. CFP 2000: 43-44 - [c8]Roger Clarke, Sinningia Nees:
Technological Protections for Digital Copyright Objects. ECIS 2000: 745-752 - [c7]Ned Kock, Robert M. Davison, Roger Clarke, Karen D. Loch:
IS research ethics: defining ethical, barely ethical, and unethical behavior (panel). ICIS 2000: 720-723
1990 – 1999
- 1999
- [j19]Roger Clarke:
Internet Privacy Concerns Confirm the Case for Intervention. Commun. ACM 42(2): 60-67 (1999) - [j18]Roger Clarke:
Freedom of Information? The Internet as Harbinger of the New Dark Ages. First Monday 4(11) (1999) - 1997
- [c6]Roger Clarke, Ken Stevens:
Evaluation Or Justification? The Application of Cost/benefit Analysis to Computer Matching Schemes. ECIS 1997: 104-119 - 1996
- [j17]Roger Clarke, Joze Gricar:
Guest Editors' Introduction. Int. J. Electron. Commer. 1(1): 25-26 (1996) - 1995
- [c5]Roger Clarke, Michael Vitale, Ignace Snellen, Charles Wiseman:
Beyond the Jungle: How Can the Various Schools of Thought in Strategic Information Systems Contribute to Organizational Strategy in Low-Competitive Contexts? ICIS 1995: 381-383 - [c4]Roger Clarke, Robert Mason, Michael Shaw:
The Challgenge of Information Infrastructure and Electronic Commerce. PACIS 1995: 28 - 1994
- [j16]Roger Clarke:
Asimov's Laws of Robotics: Implications for Information Technology - Part 2. Computer 27(1): 57-66 (1994) - [j15]Roger Clarke:
Electronic Support for the Practice of Research. Inf. Soc. 10(1): 25-42 (1994) - [j14]Roger Clarke:
The Digital Persona and Its Application to Data Surveillance. Inf. Soc. 10(2): 77-92 (1994) - 1993
- [j13]Roger Clarke:
Asimov's Laws of Implications for Information Technology - Part 1. Computer 26(12): 53-61 (1993) - [j12]Roger Clarke:
Research Programme in Supra-organizational Systems. Electron. Mark. 3(3): 18-19 (1993) - [j11]Roger Clarke, Michael Jenkins:
The strategic intent of on-line trading systems: a case study in national livestock marketing. J. Strateg. Inf. Syst. 2(1): 57-76 (1993) - [c3]Michael Bieber, Roger Clarke, Nanette Ditosto, Rob Kling, Peggy O'Rourke:
Privacy and Accuracy Issues for Information Systems in the 1990s and Beyond. ICIS 1993: 404 - 1992
- [j10]Roger Clarke:
Case Study - Cardomat/Migros - An Open EFT/POS System. Aust. Comput. J. 24(1): 25-36 (1992) - [j9]Roger Clarke:
A contingency model of EDI's impact on industry sectors. J. Strateg. Inf. Syst. 1(3): 143-151 (1992) - [c2]Julie Cameron, Roger Clarke, Simon Davies, Agnes Jackson, Mark Prentice, Brian Regan:
Ethics, Vulnerability and Information Technology (IT). IFIP Congress (2) 1992: 344-350 - [c1]Roger Clarke:
Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm. IFIP Congress (2) 1992: 564-570 - [e1]Roger Clarke, Julie Cameron:
Managing Information Technology's Organisational Impact, II, Proceedings of the IFIP TC9 Conference on Managing Information Technology's Organisational Impact, II, Adelaide, Australia, 7-8 October, 1991. IFIP Transactions A-3, North-Holland 1992, ISBN 0-444-89506-X [contents] - 1990
- [j8]Roger Clarke:
Social Implications of IT - the Professional's Role. Aust. Comput. J. 22(2): 27-29 (1990) - [j7]Roger Clarke:
Consumer EFTS in Australia - Part II - Security issues. Comput. Law Secur. Rev. 5(5): 19-22 (1990) - [j6]Michael Walters, Roger Clarke:
Electronic banking. Comput. Law Secur. Rev. 5(6): 16-18 (1990)
1980 – 1989
- 1989
- [j5]Roger Clarke:
Who is liable for software errors? Proposed new product liability law in Australia. Comput. Law Secur. Rev. 5(1): 28-32 (1989) - [j4]Roger Clarke, Michael Walters:
An introduction to consumer efts with particular reference to Australia. Comput. Law Secur. Rev. 5(4): 9-13 (1989) - 1988
- [j3]Roger Clarke:
Legal Aspects of Knowledge-Based Technology. J. Inf. Technol. 3(1): 9-16 (1988) - 1982
- [j2]Roger Clarke:
Background to Program Generators for Commercial Applications. Aust. Comput. J. 14(2): 48-55 (1982) - [j1]Roger Clarke:
Teleprocessing Monitors and Program Structure. Aust. Comput. J. 14(4): 143-149 (1982)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint