Richard L. Baskerville

Selected Publications

 

 

Publications:  Books

                       

Baskerville, R., De Marco, M., & Spagnoletti, P. (Eds.). (2013). Designing Organisational Systems - An Interdisciplinary Discourse. Heidelberg: Springer-Verlag.                

Dhillon, G., Stahl, B. C., & Baskerville, R. (Eds.). (2009). Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises. Berlin: Springer.

Straub, D. W., Goodman, S., & Baskerville, R.  (Eds ). (2008 ). Information Security Policy, Processes, and Practices. Armonk, New York: M.E. Sharpe.

Avison, D., & Baskerville, R. (Eds.). (2008). Major Currents in Information Systems: Information Systems Development (Vol. 2). Los Angeles: Sage.

Abrahamsson, P., Baskerville, R., Conboy, K., Fitzgerald, B., Morgan, L., & Wang, X. (Eds.). (2008). Agile Processes in Software Engineering and Extreme Programming (Lecture Notes in Business Information Processing Vol. 9). New York: Springer.

Vaishnavi, V., & Baskerville, R. (Eds.). (2008). Proceedings of the Third International Conference on Design Science Research in Information Systems and Technology (DESRIST 2008). Atlanta: Georgia State University.

Baskerville, R., Mathiassen, L., Pries-Heje, J., & DeGross, J. (Eds)  (2005). Business Agility and Information Technology Diffusion. New York: Springer.

Baskerville, R., Stage, J. and DeGross, J. (Eds). (2000) Organizational and Social Perspectives on Information Technology, Boston, Kluwer.

Baskerville, R., Smithson, S., Ngwenyama, O., and DeGross, J.  (Eds). (1994) Transforming Organizations with Information Technology, Elsevier, Amsterdam.

Baskerville, R. (1988) Designing Information Systems Security, J. Wiley, Chichester.

 

Journal Articles

 

Baskerville, R. & Myers, M.  (Forthcoming). Design Ethnography in Information Systems.  Information Systems Journal.

Lee, A. S., Thomas, M. A., & Baskerville, R. L. (Forthcoming). Going Back to Basics in Design: From the IT Artifact to the IS Artifact.  Information Systems Journal.

Venable, J., Pries-Heje, J., & Baskerville, R. (Forthcoming). FEDS: A Framework for Evaluation in Design Science Research. European Journal Information Systems.

Lee, J. S., Baskerville, R., & Pries-Heje, J. (Forthcoming). The Creativity Passdown Effect: Applying Design Theory in Creating Instance Design. Information Technology & People.

Dulipovici, A., & Baskerville, R. (Forthcoming). An Eduction Model of Disciplinary Emergence: The Ripples of Knowledge Management. Knowledge Management Research & Practice.

Raymond, B., & Baskerville, R. (Forthcoming). Generative Control Theory for Information Security. Journal of Information System Security.

Baskerville, R., Park, E., & Kim, J. (2014). An Emote Opportunity Model of Computer Abuse. Information Technology & People, 27(2), 155-181.

Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-Centered Information Security: Managing a Strategic Balance between Prevention and Response. Information &  Management, 51(1), 138-151.

Pries-Heje, J., Venable, J., & Baskerville, R. (2014). RMF4DSR: A Risk Management Framework for Design Science Research. Scandinavian Journal of Information Systems, 26(1), 57-82.

Mellis, W., Loebbecke, C., & Baskerville, R. (2013). Requirements Uncertainty in Contract Software Development Projects. Journal of Computer Information Systems, 53(3), pp. 97-108.

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future Directions for Behavioral Information Security Research. Computers & Security, 32(1), 90-101.

Lee, A. S., & Baskerville, R. L. (2012). Conceptualizing Generalizability: New Contributions and a Reply. MIS Quarterly, 36(3), 749-761.

Venable, J., & Baskerville, R. (2012). Eating our own Cooking: Toward a More Rigorous Design Science of Research Methods. Electronic Journal of Business Research Methods, 10(2), 144-153.

Baskerville, R., Pries-Heje, J., & Madsen, S. (2011). Post-agility: What follows a decade of agility? Information and Software Technology, 53 (5) 543-555.

Myers, M.D., Baskerville, R.L., Gill, G., and Ramiller, N. (2011) "Setting Our Research Agendas: Institutional Ecology, Informing Sciences, or Management Fashion Theory?," Communications of the AIS (28) Article 23, p. 1-18

Walsh, I., & Baskerville, R. (2010). Managing Culture Creep: Toward a Strategic Model of User IT Culture. Journal of Strategic Information Systems, 19 (4), 257-280.

Baskerville, R., & Pries-Heje, J. (2010). Explanatory Design Theory. Business & Information Systems Engineering, 2(5), 271-282. A German language translation appears as Baskerville, R., & Pries-Heje, J. (2010). Erklärende Designtheorie Wirtschaftsinformatik, 52(5), 259-271.

Baskerville, R. L. (2010). Knowledge lost and found: a commentary on Allen Lee's ‘retrospect and prospect’. Journal of Information Technology 25(4), 350-351.

Ramesh, B., Cao, L., & Baskerville, R. (2010). Agile Requirements Engineering Practices and Challenges: An Empirical Study. Information Systems Journal 20 (5) pp. 449-480.

Baskerville, R., Cavallari, M., Hjort-Madsen, K., Pries-Heje, J., Sorrentino, M., & Virili, F. (2010). The strategic value of SOA: A comparative case study in the banking sector. International Journal of Information Technology and Management, 9(1), 30-53.

Baskerville, R.L., and Myers, M.D. (2009) Fashion Waves in Information Systems Research and Practice, MIS Quarterly 33(4), p. 647-662.

Baskerville, R. L., & Myers, M. D. (2009). Commentary on Gill and Bhattacherjee: Is There an Informing Crisis? MIS Quarterly, 33(4), 663-665.

Pries-Heje, J., & Baskerville, R. (2008). The design theory nexus. MIS Quarterly, 32(4), 731-755.

Lyytinen, K., Baskerville, R., Iivari, J., & Te'eni, D. (2007). Why the old world cannot publish? Overcoming challenges in publishing high-impact IS research. European Journal of Information Systems, 16(4), 317-326.

Dulipovici, A., & Baskerville, R. (2007). Conflicts between privacy and property: The discourse in personal and organizational knowledge. Journal of Strategic Information Systems, 16 (2) 187-213.

Baskerville, R., & Nandhakumar, J. (2007). Activating and Perpetuating Virtual Teams:  Now That We’re Mobile, Where Do We Go? IEEE Transactions on Professional Communication, 50 (1), 17-34.

Baskerville, R., Pawlowski, S., & McLean, E. (2006). Enterprise Resource Planning and Organizational Knowledge:  Patterns of Convergence and Divergence (Les systèmes ERP et la connaissance organisationnelle: schémas de convergence et de divergence) Systèmes d'Information et Management, 11(4).

Siponen, M., Baskerville, R., & Heikka, J. (2006). A Design Theory for Secure Information Systems Design Methods. Journal of the Association for Information Systems, 7 (11) 725-770.

Baskerville, R., Ramesh, B., Levine, L., & Pries-Heje, J. (2006). Pros and Cons of Six Key Practices in High-Speed Software Development IT Professional, 8(4), 29-36.

Baskerville, R., & Dulipovici, A. (2006). The Theoretical Foundations of Knowledge Management. Knowledge Management Research & Practice 4 (2), pp. 83-105.     

Nandhakumar, J., & Baskerville, R. (2006). Durability of Online Teamworking:  Patterns of Trust. Information Technology & People 19 (4), pp. 371-389.  (Winner of 2007 Emerald Literati Outstanding Paper Award.)

Slaughter, S., Levine, L., Ramesh, B., Pries-Heje, J., & Baskerville, R. (2006). Aligning Software Processes with Strategy. MIS Quarterly, 30(4), 891-918.

Baskerville, R. (2006). Hacker Wars: E-Collaboration By Vandals and Warriors. International Journal of e-Collaboration, 2(1), 1-16 (Winner of the 2006 IJeC Best Article Award).

Pries-Heje, J., Baskerville, R., Levine, L., & Ramesh, B. (2005). The High Speed Balancing Game: How Software Companies Cope with Internet Speed. Scandinavian Journal of Information Systems, 16, 11-54.

Im, G., & Baskerville, R. (2005). A Longitudinal Study Of Information System Threat Categories: The Enduring Problem Of Human Error. The Database for Advances in Information Systems, 36 (4), pp. 68-79.

Pries-Heje, J., Baskerville, R., & Hansen, G. I. (2005). Strategy Models for Enabling Offshore Outsourcing: Russian Short-Cycle-Time Software Development. Journal of IT for Development, 11(1), 5-30.

Baskerville, R. (2005). Warfare: A Comparative Framework for Business Information Security. Journal of Information Systems Security, 1(1), 23-50.

Baskerville, R., & Pries-Heje, J. (2004). Short Cycle Time Systems Development. Information Systems Journal, 14(2), 237-264.

Baskerville, R. (2003). The LEO principle: perspectives on 50 years of business computing. The Journal of Strategic Information Systems, 12(4), 255-263.

Lee, A. S., & Baskerville, R. L. (2003). Generalizing Generalizability In Information Systems Research. Information Systems Research, 14(3), pp. 221-243.

Baskerville, R., Levine, L., Pries-Heje, J., Ramesh, B., & Slaughter, S. (2003). Is Internet-speed software development different? IEEE Software, 20(6), pp. 70-77.

Baskerville, R., & Pries-Heje, J. (2003). Diversity In Modeling Diffusion Of Information Technology. The Journal of Technology Transfer, 28(3-4), pp. 251-264.

Baskerville, R., & Portougal, V. (2003). A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection. Journal of Database Management, 14(2), 1-13.

Baskerville, R., & Siponen, M. (2002). An Information Security Meta-policy for Emergent Organizations. Journal of Logistics Information Management, 15(5/6), 337-346.  (Winner of the 2003 Literati Club Highly Commended Award.)

Ramesh, B., Pries-Heje, J., & Baskerville, R. (2002). Internet Software Engineering: A Different Class of Processes. In Y. Wang & A. Bryant (Eds.), Annals of Software Engineering: Process-Based Software Engineering (Vol. 14, pp. 169-195). New York: Kluwer Academic Publishers.

Baskerville, R., & Myers, M. (2002). Information Systems as a Reference Discipline. MIS Quarterly, 26(1), pp. 1-14.

Ives, B., Valacich, J. S., Watson, R. T., Zmud, R. W., Alavi, M., Baskerville, R., et al. (2002 ). What Every Business Student Needs to Know About Information Systems. Communications of the Association for Information Systems, 9(Article 30).

Baskerville, R., Levine, L., Pries-Heje, J., Ramesh, B., & Slaughter, S. (2001). How Internet Software Companies Negotiate Quality. IEEE Computer, 34(5), 51-57.

Avison, D., Baskerville, R., & Myers, M. (2001). Controlling Action Research Projects. Information Technology and People, 14(1), 28-45.

Baskerville, R., & Pries-Heje, J. (2001). A Multiple-Theory Analysis of a Diffusion of Information Technology Case. Information Systems Journal, 11(3), 181-212.

Stewart, K. A., Baskerville, R., Storey, V. C., Senn, J. A., Raven, A., & Long, C. (2000). Confronting the Assumptions Underlying the Management of Knowledge: An Agenda for Understanding and Investigating Knowledge Management. The Data Base for Advances in Information Systems, 31(4), 41-53.

Truex, D., Baskerville, R., and Travis, J. (2000) “Amethodical Systems Development: The Deferred Meaning of Systems Development Methods.” Accounting, Management and Information Technology, 10, 53-79.

Baskerville, R., and Pries-Heje, J. (1999) “Knowledge Capability and Maturity in Software Management,” The Data Base for Advances in Information Systems, 30 (2), 26-43.

Baskerville, R. (1999) “Investigating Information Systems with Action Research,” Communications of The Association for Information Systems, (19) Article 2.

Baskerville, R., and Pries-Heje, J. (1999) “Grounded Action Research:  A Method For Understanding IT in Practice,” Accounting, Management and Information Technology, 9 , 1-23.

Truex, D. P., R. Baskerville and H. K. Klein. (1999) “Growing Systems in an Emergent Organization,” Communications of The ACM, (42) 8, pp. 117-123.

Baskerville, R., and Pries-Heje, J. (1998) “Information Technology Diffusion:  Building Positive Barriers,” European Journal of Information Systems, 7 , 17-28.

Baskerville, R., and Wood-Harper, A. T. (1998) “Diversity in Information Systems Action Research Methods,” European Journal of Information Systems, 7 (2), 90-107.

Truex, D., and Baskerville, R. (1998) “Deep Structure or Emergence Theory: Contrasting Theoretical Foundations for Information Systems Development,” Information Systems Journal, 8 (2), 99-118.

Baskerville, R. (1997) “Distinguishing Action Research From Participative Case Studies,” Journal of Systems and Information Technology, 1 (1), 25 - 45.

Baskerville, R. (1996) “Deferring generalizability:  Four classes of generalization in social enquiry,” Scandinavian Journal of Information Systems,  8 (2), 5-28.

Baskerville, R., and Stage, J. (1996) “Controlling Prototype Development Through Risk Analysis,” MIS Quarterly, 20 (4), 481-504.

Baskerville, R., and Wood-Harper, A. T. (1996) “A Critical Perspective on Action Research as a Method for Information Systems Research,” Journal of Information Technology, 11 (3), 235-246. (Winner of the Literati Club Best Research Paper Award.)

Kendall, J., Kendall, K., Baskerville, R., and Barns, R. (1996) “An Empirical Comparison of A Hypertext-Based Systems Analysis Case with Conventional Cases and Role Playing,” The Data Base for Advances in Information Systems, 27 (1), 58-77.

Baskerville, R., and Smithson, S. (1995) “Information technology and new organizational forms: Choosing chaos over panaceas,” European Journal of Information Systems, 4 (2), 66-73.

Baskerville, R. (1994) “Research Notes: Research directions in information systems security,” International Journal of Information Management, 14 (5), 385-387.

Baskerville, R. (1993) “Information Systems Security Design Methods: Implications for Information Systems Development,” Computing Surveys, 25 (4), 375-414.

Baskerville, R. (1993) “Semantic database prototypes,” Journal of Information Systems, 3 (2), 119-144.

Baskerville, R. (1992) “The developmental duality of information systems security,” The Journal of Management Systems, 4 (1), 1-12.

Baskerville, R. (1991) “Risk analysis as a source of professional knowledge,” Computers & Security, 10 (8), 749-764.

Baskerville, R. (1991) “Risk analysis: an interpretive feasibility tool in justifying information systems security,” European Journal of Information Systems, 1 (2), 121-130.

         

Refereed Conference Papers

 

Baskerville, R., Davison, R., Kaul, M. & Wong, L (2014). Designing Artifacts for Systems of Information. In B. Doolin, E. Lamprou & N. Mitev (Eds.), Information Systems and Global Assemblages: (Re)Configuring Actors, Artefacts, Organizations: Proceedings of the IFIP Working Group 8.2 Working Conference (Auckland, 2014) (forthcoming). Heidelberg: Springer.

Baskerville, R., & Pries-Heje, J. (2014). Design Theory Projectability. In B. Doolin, E. Lamprou & N. Mitev (Eds.), Information Systems and Global Assemblages: (Re)Configuring Actors, Artefacts, Organizations: Proceedings of the IFIP Working Group 8.2 Working Conference (Auckland, 2014) (forthcoming). Heidelberg: Springer.

Pries-Heje, J., Venable, J., & Baskerville, R. (2014). Soft Design Science Methodology. In J. Simonsen, C. Svabo, S. M. Strandvad, K. Samson, M. Hertzum & O. E. Hansen (Eds.), Situated Design Methods (pp. 77-95). Cambridge, Mass: MIT Press.

Baskerville, R., & Pries-Heje, J. (2014). Diffusing Best Practices: A Design Science Study Using the Theory of Planed Behavior. In B. Bergvall-Kåreborn & P. Nielsen (Eds.), Creating Value for All Through IT (IFIP WG 11.6 Working Conference ) (Vol. 429, pp. 35-48): Springer Berlin Heidelberg.

Kristiansen, E., Pries-Heje, J., & Baskerville, R. (2014). Designing Scientific Creativity. In T. Hald, J. Nørbjerg & J. Pries-Heje (Eds.), Nordic Contributions in IS Research: 5th Scandinavian Conference on Information Systems (SCIS 2014) (pp. 44-57). Heidelberg: Springer.

Baskerville, R., Kim, J., Stucke, C., & Sainsbury, R. (2013). The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment. Paper presented at the IFIP WG8.11/11.13 Dewald Roode Information Security Workshop.

Lee, A. S., Thomas, M. A., & Baskerville, R. L. (2013). Going Back to Basics in Design: From the IT Artifact to the IS Artifact. In K. D. Joshi & Y. Yoo (Eds.), Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. (pp. 1-7). Chicago, Illinois: Association for Information Systems.

Baskerville, R., & Pries-Heje, J. (2013). Discursive Co-Development. In Y. K. Dwivedi, H. Z. Henriksen, D. Wastell & R. De' (Eds.), Grand Successes and Failures in IT: Public and Private Sectors (pp. 279-294). Heidelberg: Springer.

Baskerville, R. & Lee, A. (2013). Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System. Paper presented at the Pacific Asia Conference on Information Systems 2013 (PACIS 2013), Jeju Island, Korea.

Baskerville, R., & Pries-Heje, J. (2013). Discovering the Significance of Scientific Design Practice: New Science wrapped in Old Science? Paper presented at the The 2nd international SIG Prag workshop on IT Artefact Design & Workpractice Improvement, Tilburg, The Netherlands.

Rowe, F., Baskerville, R., & Wolff, F. C. (2012). Functionality vs. Security in IS: Tradeoff or Equilibrium? 2012  International Conference on Information Systems (ICIS). Orlando, Fla.  AIS. Security Paper 11, pp. 1-20.

Kim, J., Park, E., & Baskerville, R. (2012). Vengeance is Mine: A Model of Emotional Appraisal and Computer Abuse. In J. D'Arcy & G. Moody (Eds.), Proceedings of the IFIP WG 8.11/11.13 2012 Dewald Roode Information Security Workshop (pp. Paper 6, 1-16). Provo, Utah: IFIP.

Venable, J., & Baskerville, R. (2012). Eating our own cooking: Towards a design science of research methods. In R. McClean (Ed.), Proceedings of the 11th European Conference on Research Methods in Business and Management (pp. 399-407). Bolton UK: University of Bolton.

Venable, J., Pries-Heje, J., & Baskerville, R. (2012). A Comprehensive Framework for Evaluation in Design Science Research. In K. Peffers, M. Rothenberger & B. Kuechler (Eds.), Design Science Research in Information Systems. Advances in Theory and Practice (Vol. 7286, pp. 423-438). Berlin / Heidelberg: Springer.                     

Lee, J. S., Baskerville, R., & Pries-Heje, J. (2012). The Creativity Passdown Effect: Sharing Design Thinking Processes with Design Theory. In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS-44) (pp. 1-10). Maui, Hawaii: CD-ROM, IEEE Computer Society.

Baskerville, R., Kaul, M., & Storey, V. (2011). Unpacking the Duality of Design Science. In Proceedings of the International Conference On Information Systems (ICIS 2011), AIS, Shanghai, China.

Baskerville, R. (2011). Transferring Information Security Risk to an Opponent:  New Principles for Non-Financial Risk Transfer Treatments In A. Vance (Ed.), Proceedings of the IFIP WG 8.11/11.13 2011 Dewald Roode Information Security Workshop (pp. Paper 6, 1-16). Blacksburg, Virgina: IFIP.

Baskerville, R. (2011). Design Theorizing Individual Information Systems. In Proceedings of the Fifteenth Pacific-Asia Conference on Information Systems (PACIS 2011), Article 25, p. 1-14, Brisbane, Australia.

Lee, J. S., Pries-Heje, J., & Baskerville, R. (2011). Theorizing in Design Science Research. In H. Jain, A. P. Sinha & P. Vitharana (Eds.), 6th International Conference, DESRIST 2011, Service-Oriented Perspectives in Design Science Research , Lecture Notes in Computer Science, 2011, Volume 6629 (pp. 1-16). Berlin: Springer.

Pries-Heje, J., Baskerville, R., & Venable, J. (2011). A Risk Management Framework for Design Science Research. In Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS-44) (pp. 1-10). Koloa, Kauai, Hawaii: IEEE Computer Society.

Mellis, W., Loebbecke, C.,  Baskerville, R. (2010) Moderating Effects of Requirements Uncertainty on Flexible Software Development Techniques.  Proceedings of the 5th International Research Workshop on IT Project Management. December 11, St. Louis, Mo.  91-102

Baskerville, R., & Pries-Heje, J. (2010). Design logic and the ambiguity operator. In R. Winter, J. L. Zhao & S. Aier (Eds.), Global Perspectives on Design Science Research (pp. 180-193). Lecture Notes in Computer Science 6105  Berlin: Springer Verlag.

Baskerville, R., Pries-Heje, J., & Madsen, S. (2010). From exotic to mainstream: A 10-year odyssey from Internet speed to boundary spanning with Scrum. In T. Dingsøyr, T. Dybå & N. B. Moe (Eds.), Agile Software Development: Current Research and Future Directions (pp. 87-110). Heidelberg: Springer

Pries-Heje, J., & Baskerville, R. (2010). Management Design Theories. In J. Pries-Heje, J. Venable, D. Bunker, N. L. Russo & J. DeGross (Eds.), IS Design Science Research (pp. 263-281). Norwell, Mass: Kluwer.

Pries-Heje, J., & Baskerville, R. (2009). A design theory for managing software process improvement In V. Vaishanvi & S. Purao (Eds.), Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology (pp. 1-2). New York: ACM.

Dhillon, G., Stahl, B. C., & Baskerville, R. (2009). Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems. In G. Dhillon, B. C. Stahl & R. Baskerville (Eds.), Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises (pp. 1-9). Berlin: Springer.

Baskerville, R. (2009). Information Security Control Decision Theory. In A. Vance (Ed.), Proceedings of the IFIP TC8 International Workshop on Information Systems Security Research (pp. 179-193). Cape Town, South Africa.

Baskerville, R., Pries-Heje, J., & Venable, J. (2009). Soft Design Science Methodology Paper presented at the Design Science Research in Information Systems and Technology DESRIST 2009, Philadelphia, Pa.

Baskerville, R. (2009). Hacker Wars: E-Collaboration by Vandals and Warriors In N. Kock (Ed.), E-Collaboration: Concepts, Methodologies, Tools, and Applications (Vol. 3, pp. 1575-1587). Hershey: IGI.  (Reprint)

Granlien, M. S., Pries-Heje, J., & Baskerville, R. (2009). Project management strategies for prototyping breakdowns. In R. H. Sprague (Ed.), Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS-42) (pp. 1-10). Los Alamitos, Calif: IEEE Computer Society.

Siponen, M., Willison, R., & Baskerville, R. (2008). Power and Practice in Information Systems Security Research. In R. Boland, M. Limayem & B. Pentland (Eds.), Proceedings of the International Conference On Information Systems (ICIS) (pp. 26.21-26.13). Paris: Association for Information Systems.

Pries-Heje, J., Venable, J., & Baskerville, R. (2008). Strategies for Design Science Research Evaluation. In W. Golden, T. Acton, K. Conboy, H. van der Heijden & V. K. Tuunainen (Eds.), Proceedings of the 16th European Conference on Information Systems (ECIS 2008) (pp. 1-12). Galway, Ireland: National University of Ireland.

Pries-Heje, J., Levine, L., Baskerville, R., & Ramesh, B. (2008). Advances in Information Systems Development: From Discipline and Predictability to Agility and Improvisation. In D. Avison, G. M. Kasper, B. Pernici, I. Ramos & D. Roode (Eds.), Advances in Information Systems Research, Education and Practice (pp. 53-75). New York: Kluwer Academic Publishers.

Pries-Heje, J., Baskerville, R., & Venable, J. (2008). A Risk Management Framework for Design Science Research. In A. Asproth, K. Axelsson, S. Holmberg, C. Ihlström & B. Sundgren (Eds.), Proceedings of the 31st Information Systems Research Seminar in Scandinavia,  Public systems in the future - possibilities, challenges and pitfalls (IRIS 31) (pp. 1-18). Å?re, Sweden: Mid Sweden University.

Baskerville, R., Pries-Heje, J., & Venable, J. (2008). Evaluation Risks in Design Science Research: A Framework In V. Vaishnavi & R. Baskerville (Eds.), Proceedings of the Third International Conference on Design Science Research in Information Systems and Technology (DESRIST 2008) (pp. 329-334). Atlanta: Georgia State University.

Sainsbury, R., & Baskerville, R. (2007). Possible Risks Analysis Engine: A Prototype Tool for Managing IT Security Safeguards Acquisition.  In L. Armistead (Ed.), Proceedings of ICIW 2007: International Conference on Information Warfare and Security. Reading: Academic Conferences International, pp. 13-22.

Siponen, M., Baskerville, R., & Kuivalainen, T. (2007). Extending Security In Agile Software Development Methods. In H. Mouratidis & P. Giorgini (Eds.), Integrating Security and Software Engineering: Advances and Future Vision (pp. 168-190). Hershey, Penn.: Idea Group.

Baskerville, R. (2006, 6-8 December 2006). The Information Security Standards Marketplace. Paper presented at the 17th Australasian Conference on Information Systems Adelaide.

Elisberg, T., & Baskerville, R. (2006). To vanquish the social monster: The struggle for social inclusion among peers in the field of systems development. In D. Howcroft, E. Trauth & J. I. DeGross (Eds.), Social Inclusion: Societal and Organizational Implications for Information Systems (367-380). New York: Springer.

Baskerville, R., & Sainsbury, R. (2006). Analyzing Risk of Improbable Events: Managing Business Continuity and Information Warfare. In L. Armistead (Ed.), Proceedings of ICIW 2006: International Conference on Information Warfare and Security (pp. 13-22). Reading: Academic Conferences International.

Snow, A. P., Straub, D., Stucke, C., & Baskerville, R. (2006). The survivability principle: IT-enable dispersal of organizational capital. In M. Warkentin & R. B. Vaughn (Eds.), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 150-166). Hershey: Idea Group.

Pries-Heje, J., & Baskerville, R. (2006, February 24-25). Designing Organizational Change in IT: A Theory Nexus. First International Conference on Design Science Research in Information Systems & Technology, Claremont, California.

Baskerville, R., & Sainsbury, R. (2006). Distrusting Online: Social Deviance in Virtual Teamwork. In R. H. Sprague (Ed.), Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS-39) (pp. 121, CD-ROM 121-129). Los Alamitos, Calif: IEEE Computer Society.

Baskerville, R., & Dulipovici, A. (2006). The ethics of knowledge transfers and conversions: property or privacy rights? In R. H. Sprague (Ed.), Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS-39) (p. 144, CD-ROM 1-9). Los Alamitos, Calif: IEEE Computer Society.

Baskerville, R. (2006). Educing Theory from Practice. In N. Kock (Ed.), Information Systems Action Research: Bridging the Industry-University Technology Gap (pp. 313-326). Norwell, Mass: Springer

Avison, D., Baskerville, R., & Myers, M. D. (2006). The Structure of Power in Action Research Projects. In N. Kock (Ed.), Information Systems Action Research: Bridging the Industry-University Technology Gap (19-42). Norwell, Mass: Springer

Baskerville, R., & Sainsbury, R. (2006). Analyzing Risk of Improbable Events: Managing Business Continuity and Information Warfare. In L. Armistead (Ed.), Proceedings of ICIW 2006: International Conference on Information Warfare and Security (pp. 13-22). Reading: Academic Conferences International.

Baskerville, R., & Sainsbury, R. (2005, 11-12 July). Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. Paper presented at the European Conference on Information Warfare and Security, Glamorgan University, UK, 29-38.

Baskerville, R., Cavallari, M., Hjort-Madsen, K., Pries-Heje, J., Sorrentino, M., & Virili, F. (2005, May 26-28). Extensible Architectures: The Strategic Value Of Service-Oriented Architecture In Banking. Paper presented at the European Conference on Information Systems, Regensburg, Germany.

Siponen, M., Baskerville, R., & Kuivalainen, T. (2005). Integrating Security into Agile Development Methods. In R. H. Sprague (Ed.), Proceedings of the 38 th Annual Hawaii International Conference on System Sciences (pp. 1-7). Los Alamitos, California: IEEE Computer Society.

Baskerville, R., & Portougal, V. (2005). Possibility Theory in Protecting National Information Infrastructure. In K. Siau (Ed.), Advanced Topics in Database Research (Vol. 4, pp. 325-340). Hershey, Penn.: Idea Group.

Baskerville, R., Mathiassen, L., & Pries-Heje, J. (2005). Agility in Fours: IT Diffusion, IT Infrastructures, IT Development, and Business. In R. Baskerville & L. Mathiassen & J. Pries-Heje & J. DeGross (Eds.), Business Agility and Information Technology Diffusion (pp. 3-10). New York: Springer (Not a refereed article).

Baskerville, R. (2004). Information Warfare Action Plans for e-Business. In A. Jones (Ed.), The 3rd European Conference on Information Warfare and Security (pp. 15-20). Royal Holloway, University of London, UK,: Academic Conferences International.

Baskerville, R. (2004). Agile security for information warfare: A call for research. In T. Leino & T. Saarinen & S. Klein (Eds.), Proceedings of the 12 th European Conference on Information Systems (pp. 1-10). Turku, Finland: Turku School of Economics and Business Administration.

Pries-Heje, J., Baskerville, R., & Hansen, G. I. (2003). Russian high-speed software development: Overcoming the challenges of globalization. In M. Korpela & R. Montealegre & A. Poulymenakou (Eds.), IS Perspectives and Challenges in the Context of Globalization (pp. 253-259). New York: Kluwer Academic Publishers.

Baskerville, R. (2003). Four complexions of information security risk analysis. In B. Hutchinson (Ed.), Second European Conference on Information Warfare and Security (pp. 19-29). Reading, UK: University of Reading.

Baskerville, R., Levine, L., Pries-Heje, J., Ramesh, B., & Slaughter, S. (2002, December). Balancing Quality and Agility in Internet Speed Software Development. Paper presented at the 2002 International Conference On Information Systems (ICIS), Barcelona.

Monod, E., Truex, D., & Baskerville, R. (2002). The discourse of a large scale organizational transformation: The reengineering of IBM, 1989 -1994. In E. Wynn & M. Myers & E. Whitley & J. DeGross (Eds.), Global and Organizational Discourse About Information Technology (pp. 249-272). New York: Kluwer Academic Publishers.

Baskerville, R., & Pries-Heje, J. (2002). Information Systems Development @ Internet Speed: A New Paradigm in the Making. In S. Wrycza (Ed.), Proceedings of The Tenth European Conference on Information Systems (pp. 282-291). Gdansk: University of Gdansk.

Siponen, M., & Baskerville, R. (2001). A New Paradigm for Adding Security into Is Development Methods. In J. H. P. Eloff & L. Labuschagne & R. v. Solms & G. Dhillon (Eds.), Advances in Information Security Management & Small Systems Security (pp. 99-111). Boston: Kluwer.

Baskerville, R., & Pries-Heje, J. (2001). Emethodology: Towards a Systems Development Methodology for E-Business and E-Commerce Applications. In S. Elliot & K. V. Andersen & P. Swatman & S. Reich (Eds.), Developing a Dynamic, Integrative, Multi-Disciplinary Research Agenda in E-Commerce/E-Business. (pp. 164-178). Ourimbah: BICE Press.

Baskerville, R., & Pries-Heje, J. (2001). Racing the E-Bomb: How the Internet Is Redefining Information Systems Development Methodology. In B. FitzGerald & N. Russo & J. DeGross (Eds.), Realigning Research and Practice in Is Development: The Social and Organisational Perspective (pp. 49-68). New York: Kluwer.

Baskerville, R., & Stage, J. (2001). Accommodating Emergent Work Practices: Ethnographic Choice of Method Fragments. In B. FitzGerald & N. Russo & J. DeGross (Eds.), Realigning Research and Practice in Is Development: The Social and Organisational Perspective (pp. 12-28). New York: Kluwer.

Nanhakumar, J., & Baskerville, R. (2001). Trusting Online: Nurturing Trust in Virtual Teams. In S. Smithson & J. Gricar & M. Podlogar & S. Avgerinou (Eds.), Global Co-Operation in the New Millennium: Proceedings of the 9th European Conference on Information Systems (pp. 188-194). Bled: University of Maribor.

Baskerville, R., Pawlowski, S., and McLean, E. (2000) “Enterprise Resource Planning and Organizational Knowledge:  Patterns of Convergence and Divergence.” in Proceedings of The 21st International Conference on Information Systems (ICIS), (S. Ang, H. Krcmar, W. Orlikowski, and J. DeGross, eds.), Brisbane 396-406.

Baskerville, R., and Stage, J. (2000) “Discourses on The Interaction of Information Systems, Organizations and Society:  Reformation and Transformation.” in R. Baskerville, J. Stage, and J. DeGross, eds., Organizational and Social Perspectives on Information Technology, Kluwer, Boston, 1-12 (Not a refereed article).

Baskerville, R. and A. Lee. (1999) “Distinctions Among Different Types of Generalizing in Information Systems Research.” in  O. Ngwenyama et al., (eds.) New Information Technologies in Organizational Processes: Field Studies and Theoretical Reflections on the Future of Work, New York: Kluwer Academic Publishers, pp. 49-65.

Baskerville, R. and D. Straub. (1999) “Internet Groupware Use in A Policy-Oriented Computer Security Course.” in  L. Yngström and S. Fischer-Hübner, (eds.) WISE 1 Proceedings of the IFIP TC11 WG 11.8 First World Conference on Information Security Education, Kista, Sweden: Department of Computer and Systems Sciences, Stockholm University and Royal Institute of Technology, pp. 171-196.

Pawlowski, S., M.-C. Boudreau and R. Baskerville. (1999) “Constraints and Flexibility in Enterprise Systems:  A Dialectic of System and Job.” in  W. Haseman and D. Nazareth, (eds.) Proceedings of The Fifth Americas Conference on Information Systems, Milwaukee, Wisconsin: Association for Information Systems, pp. 791-793.

Baskerville, R., and Pries-Heje, J. (1999) “Managing Knowledge Capability and Maturity.” in Information Systems:  Current Issues and Future Changes, (T. Larsen, L. Levine, and J. DeGross, eds.), IFIP, Laxenburg, Austria, 175-196.

Baskerville, R., and Pries-Heje, J. (1998) “Packaging Information Security Safeguards,” Global IT Security, G. Papp and R. Posch, eds., Austrian Computer Society, Vienna, 549-553.

Baskerville, R. (1997) “New Forms for Information Security Organizations,” Information Security in Research and Business, L. Yngström and J. Carlsen, eds., Chapman and Hall, London, 296-307.

Baskerville, R., and Pries-Heje, J. (1997) “IT diffusion and innovation models:  The conceptual domains,” Facilitating Technology Transfer Through Partnership: Learning From Practice and Research, T. McMaster, E. Mumford, E. B. Swanson, B. Warboys, and D. Wastell, eds., Chapman & Hall, London, 23-38.

Baskerville, R. (1996) “Socially self-destructing systems,” Proceedings of the 19th Information Systems Research Seminar in Scandinavia, B. Dahlbom, F. Ljungberg, U. Nulden, K. Simon, C. Soerensen, and J. Stage, eds., Gothenburg Studies in Informatics, Gothenburg, Sweden, 187-904.

Baskerville, R. (1996) “Structural Artifacts in Method Engineering:  The Security Imperative,” Method Engineering, S. Brinkkemper, K. Lyttinen, and R. Welke, eds., Chapman & Hall, London, 8-28.

Baskerville, R. (1996) “A Taxonomy for Analyzing Hazards to Information Systems,” Information Systems Security:  Facing The Information Society of The 21st Century, S. Katsikas and D. Gritzalis, eds., Chapman-Hall, London, 167-176.

Baskerville, R., and Pries-Heje, J. (1996) “Information Technology Diffusion:  Building Positive Barriers,” Proceedings of the 4th European Conference on Information Systems, J. Coelho, T. Jelassi, W. König, H. Krcmar, R. O'Callaghan, and M. Saaksjarvi, eds., AIS, Lisbon, 401-416.

Baskerville, R. (1995) “Deferring Generalizability:  Four Classes of Generalization in Social Enquiry,” Proceedings of IRIS 18 Design in Context Vol. I, Gothenburg Studies in Informatics, Report 7, June 1995, pp. 79-95., B. Dahlbom, F. Kämmerer, F. Ljungberg, J. Stage, and C. Sørensen, eds., Gothenburg University Studies in Informatics, Gothenburg, Sweden, 79-95.

Baskerville, R. (1995) “The Second Order Security Dilemma,” Information Technology and Changes in Organizational Work, W. Orlikowski, G. Walsham, M. Jones, and J. DeGross, eds., Chapman & Hall, London, 239-249.

Baskerville, R. (1995) “A Structural Entropy Model of Technology Transfer,” Diffusion and Adoption of Information Technology:  Conference Notebook of the First IFIP WG 8.6 Working Conference.  Oslo:  Norwegian Computing Center, K. Kautz, J. Pries-Heje, T. Larsen, and P. Sørgaard, eds., Norwegian Computing Center, Oslo, 105-118.

Baskerville, R., and Pries-Heje, J. (1995) “Grounding the Theory in Action Research,” Proceedings of the 3rd European Conference on Information Systems, G. Goukidis, B. Galliers, T. Jelassi, H. Krcmar, and F. Land, eds., Athens University of Economics and Business, Athens Greece, 837-349.

Smithson, S., Baskerville, R., and Ngwenyama, O. (1994) “Perspectives on Information Technology and New Emergent Forms of Organizations,,” Transforming Organizations with Information Technology, R. Baskerville, S. Smithson, O. Ngwenyama, and J. DeGross, eds., North-Holland, Amsterdam, 3-13 (Not a refereed article).

Baskerville, R., Travis, J., and Truex, D. (1992) “Systems without method,” The Impact of Computer Supported Technologies on Information Systems Development, K. Kendall, K. Lyytinen, and J. DeGross, eds., North-Holland, Amsterdam, 241-270.

Baskerville, R. (1991) “Practitioner Autonomy and the Bias of Methods and Tools,” Information Systems research: Contemporary  Approaches & Emergent Traditions, H.-E. Nissen, H. K. Klein, and R. A. Hirschheim, eds., North-Holland, Amsterdam, 673-698.

Baskerville, R. (1990) “Desktop systems: more power, less safety,” Desktop Information Technology: Organizational Worklife in the 1990's, K. Kaiser and H. Oppelland, eds., North-Holland, Amsterdam, 311-329.

Baskerville, R. (1989) “Logical controls specification: An approach to information systems security.,” Systems development for human progress, H. Klein and K. Kumar, eds., North-Holland., Amsterdam, 241-255.

Editorially Reviewed Articles

 

Baskerville, R. (2014). Rigour. In D. Coghlan & M. Brydon-Miller (Eds.), The SAGE Encyclopedia of Action Research (pp. 691-692). Los Angeles: Sage.

Baskerville, R. (2012) Reviving the IT in the IS, (Editorial) European Journal of Information Systems 21, (6), 587-591.

Baskerville, R. (2012). Making Better Choices: A Response to Walsham. Journal of Information Technology 27 (2) , 94-95

Baskerville, R. (2011). Information design (Editorial). European Journal Information Systems, 20(4), 375-377.

Baskerville, R. (2011). Individual information systems as a research arena (Editorial). European Journal Information Systems, 20(3), 251-254.

Baskerville, R., Lyytinen, K., Sambamurthy, V., & Straub, D. (2011). A response to the design-oriented information systems research memorandum. European Journal of Information Systems, 20(1), 11-15.

Junglas, I., Niehaves, B., Spiekermann, S., Stahl, B. C., Weitzel, T., Winter, R., & Baskerville, R. (2011). The inflation of academic intellectual capital: the case for design science research in Europe (Editorial). European Journal of Information Systems, 20(1), 1-6.

Baskerville, R. L., & Pries-Heje, J. (2010). Design and management. In J. Simonsen, J. O. Bærenholdt, M. Büscher & J. D. Scheuer (Eds.), Design Research: Synergies from Interdisciplinary Perspectives (pp. 63-78). London: Routledge.

Baskerville, R. (2010). Third-degree conflicts: information warfare (Editorial). European Journal of Information Systems, 19(1), 1-4.

Baskerville, R., Ding, Y., & Kim, J. W. (2009). The Ethics of Online Social Network Forensics. Paper presented at the IFIP 8.2 Organizations and Society in Information Systems (OASIS) 2009 Workshop, Phoenix, Ariz 15 December

Baskerville, R. (2009). Preparing for evidence based management (Editorial). European Journal of Information Systems, 18(6), 523-525.

Baskerville, R., and McPherson, E. (2009) "Security and Privacy Convergence: A Global Governance Perspective" Cutter IT Journal 22 (8), pp 19-23.

Dulipovici, A., & Baskerville, R. (2009). Privacy, Property and Ethics -- Conflicts between privacy and property: The discourse in personal and organizational knowledge. In R. D. Galliers & D. E. Leidner (Eds.), Strategic Information Management: Challenges and Strategies in Managing Information Systems (4th ed., pp. 393-421). New York: Routledge.

Baskerville, R. (2009). The EJIS editorial organisation and submissions (Editorial). European Journal of Information Systems, 18(1), 1-3.

Baskerville, R. (2008). Changing the challenge: measure what makes you better and be better at what you measure (Editorial). European Journal of Information Systems, 17(1), 1-3.

Baskerville, R. (2008). For better or worse: how we apply journal ranking lists (Editorial). European Journal of Information Systems, 17(2), 156-157.

Baskerville, R. (2008). Introduction to the Opinion Paper: Bryant's 'The future of information systems'. European Journal of Information Systems, 17(6), 694.

Baskerville, R. (2008). Research quality, project failure, and privacy threats: spitting, yelling, and cussing (Editorial). European Journal of Information Systems, 17(4), 321-323.

Baskerville, R. (2008). Strategies, systems, and technologies. European Journal of Information Systems, 17(3), 179-181.

Baskerville, R. (2008). Hacker wars: Cyber warfare previews. E-Collaboration in Modern Organizations: Initiating and Managing Distributed Projects. N. Kock. Hershey, Pennsylvania, Idea Group Publishing: 162-175.

Avison, D., & Baskerville, R. (2008). Editors' Introduction: Information Systems Development. In D. Avison & R. Baskerville (Eds.), Major Currents in Information Systems: Information Systems Development (Vol. 2, pp. vii-xiv). Los Angeles: Sage.

Baskerville, R. (2008). Strategic Information Security Risk Management In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 112-122). Armonk, New York: M.E. Sharpe.

Baskerville, R., & Dhillon, G. (2008). Information Systems Security Strategy: A Process View. In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 15-45). Armonk, New York: M.E. Sharpe.

Straub, D. W., Goodman, S., & Baskerville, R. (2008). Framing the Information Security Process in Modern Society. In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 5-12). Armonk, New York: M.E. Sharpe.

Straub, D. W., Goodman, S., & Baskerville, R. (2008). Directions for Future Work in Information Security Policies and Practices. In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 253-270). Armonk, New York: M.E. Sharpe.

Baskerville, R., Pries-Heje, J., & Ramesh, B. (2007). The enduring contradictions of new software development approaches: a response to ‘Persistent Problems and Practices in ISD’ Information Systems Journal, 17(3), 241–245.

Baskerville, R. (2005). Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk? Cutter Benchmark Review, 5(12), 5-12.

Baskerville, R., & Russo, N. (2005). Metaphors for PHD study. In D. Avison & J. Pries-Heje (Eds.), Research in IS: A Handbook for Research Supervisors and Their Students (pp. 55-72). New York: McGraw Hill.

Baskerville, R. (2005). "If IT Projects Fail, What's To Blame?" Optimize 4(3): 23-24.

Baskerville, R., & Myers, M. (2004). Special issue on action research in information systems: Making IS research relevant to practice--foreword. MIS  Quarterly, 28(3), 329-335.

Baskerville, R. L., & Land, F. (2004). Socially self-destructing systems. In C. Avgerou & C. Ciborra & F. Land (Eds.), The Social Study of Information and Communication Technology (pp. 263-285). Oxford: Oxford University Press.

Baskerville, R. (2004). Editorial: An editor's values. European Journal of Information Systems, 13(1), 1-2.

Baskerville, R., & Stage, J. (2004). Iterative Design. In W. S. Bainbridge (Ed.), Encyclopedia of Human-Computer Interaction (Vol. 1, pp. 397-400). Great Barrington, MA: Berkshire Publishing Group.

Baskerville, R., & Stage, J. (2004). Prototyping. In W. S. Bainbridge (Ed.), Encyclopedia of Human-Computer Interaction (Vol. 2, pp. 582-586). Great Barrington, MA: Berkshire Publishing Group.

Baskerville, R. (2002). Events and Sightings: The 2001 LEO Jubilee. IEEE Annals of the History of Computing, 24(2), 100.

Baskerville, R. (2002). Leo: Looking back, looking forward. The Software Practitioner, 12(2), 9-10.

Baskerville, R. (2002). Security and Information Systems. In M. Warner (Ed.), International Encyclopedia of Business and Management (2nd ed., pp. 5777-5782). London: Thompson Learning.

Baskerville, R., & Wood-Harper, T. (2002). A Critical Perspective on Action Research as a Method for Information Systems Research (reprint). In M. Myers & D. Avison (Eds.), Qualitative Research in Information Systems (pp. 129-145). London: Sage Publications.

Baskerville, R. (2001). Conducting Action Research: High Risk and High Reward in Theory and Practice. In E. Trauth (Ed.), Qualitative Research in Information Systems, pp. 192-218. Hershey, Penn.: Idea Group Publishing.

Truex, D. P., Baskerville, R., & Klein, H. K. (2001). Growing Systems in an Emergent Organization (Reprint from CACM). In Y. Malhotra (Ed.), Knowledge Management and Business Model Innovation (pp. 374-383). Hershey, Penn.: Idea Group.

Baskerville, R. (2001). Diffusion and Adoption of Information Technology (Reprint). In A. Kent (Ed.), Encyclopedia of Library and Information Science (Vol. 69, Supplement 32, pp. 89-105). New York: Marcel Dekker, Inc.

Baskerville, R. (2000) “Diffusion and Adoption of Information Technology.” in Encyclopedia of Computer Science and Technology, (A. Kent and J. Williams, eds.), Marcel Dekker, New York, Vol. 42, Supplement 28, 67-82.

Baskerville, R. (1999) “Security and IT/S (Reprinted from Security and Information Systems),” The IEBM Handbook of IT in Business, M. Zeleny, ed., International Thompson Business Press, London.

Baskerville, R., Kendall, J., and Kendall, K. (1999) “Object-Oriented Systems Analysis (Reprint),” Systems Analysis and Design, Prentice-Hall, Englewood Cliffs, N.J.

Baskerville, R. (1998) “Accelerating Organizational Emergence,” Telecooperation, Proceedings of the XV. IFIP World Computer Congress, R. Traunmüller and E. Csuháj-Varjú, eds., Austrian Computer Society, Vienna/Austria and Budapest/Hungary, 403-408.

Baskerville, R. (1996) “Security and Information Systems,” International Encyclopedia of Business and Management, M. Warner and J. Kotter, eds., International Thompson Business Press, London, 4419-4424.

Baskerville, R., Kendall, J., and Kendall, K. (1996) “Object-Oriented Systems Analysis,” Systems Analysis and Design, Prentice-Hall, Englewood Cliffs, N.J.

Baskerville, R. (1995) “Session reviews of the IFIP WG 8.2 Working Conference on Information Technology and New Emergent Forms of Organization (Compiler),” ACM SIGOIS Bulletin, 15 (3), 49-68.

Baskerville, R. (1994) “New Approaches to Information Systems Security,” Handbook of IS Management 1994-95 Yearbook, R. Umbaugh, ed., Auerbach, New York, S257-S265.

Baskerville, R. (1993) “Information Systems Security:  Adapting To Survive,,” Information Systems Security, 2 (1), 40-47.

Baskerville, R. (1989) “Security of Decision Support Systems,” Knowledge Based Management Support Systems, G. Doukidis, F. Land, and G. Miller, eds., Ellis Horwood, Chichester, 225-235.

Baskerville, R. (1984) “Local area networks: papermill or computermill,,” Pace, 12 (1), 72,117-118.

Baskerville, R. (1984) “Micro protection involves physical security,,” Computerworld, 17 (28 November).