BibTeX records: Gurpreet Dhillon

download as .bib file

@article{DBLP:journals/ajis/AlhelalyDO24,
  author       = {Yasser Alhelaly and
                  Gurpreet Dhillon and
                  Tiago Oliveira},
  title        = {Mobile Identity Protection: The Moderation Role of Self-Efficacy},
  journal      = {Australas. J. Inf. Syst.},
  volume       = {28},
  year         = {2024},
  url          = {https://doi.org/10.3127/ajis.v28.4397},
  doi          = {10.3127/AJIS.V28.4397},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ajis/AlhelalyDO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AebissaDM23,
  author       = {Berhanu Aebissa and
                  Gurpreet Dhillon and
                  Million Meshesha},
  title        = {The direct and indirect effect of organizational justice on employee
                  intention to comply with information security policy: The case of
                  Ethiopian banks},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103248},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103248},
  doi          = {10.1016/J.COSE.2023.103248},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AebissaDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlhelalyDO23,
  author       = {Yasser Alhelaly and
                  Gurpreet Dhillon and
                  Tiago Oliveira},
  title        = {When expectation fails and motivation prevails: the mediating role
                  of awareness in bridging the expectancy-capability gap in mobile identity
                  protection},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103470},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103470},
  doi          = {10.1016/J.COSE.2023.103470},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlhelalyDO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/SultanaDO23,
  author       = {Tahmina Sultana and
                  Gurpreet Dhillon and
                  Tiago Oliveira},
  title        = {The effect of fear and situational motivation on online information
                  avoidance: The case of {COVID-19}},
  journal      = {Int. J. Inf. Manag.},
  volume       = {69},
  pages        = {102596},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2022.102596},
  doi          = {10.1016/J.IJINFOMGT.2022.102596},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/SultanaDO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/SmithD23,
  author       = {Kane Smith and
                  Gurpreet Dhillon},
  title        = {Re-framing the policy conversation for preventing cyberstalking},
  journal      = {Internet Res.},
  volume       = {33},
  number       = {1},
  pages        = {84--123},
  year         = {2023},
  url          = {https://doi.org/10.1108/INTR-03-2021-0169},
  doi          = {10.1108/INTR-03-2021-0169},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/SmithD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SrivastavaD23,
  author       = {Smriti Srivastava and
                  Gurpreet Dhillon},
  editor       = {Paul A. Pavlou and
                  Vishal Midha and
                  Animesh Animesh and
                  Traci A. Carte and
                  Alexandre R. Graeml and
                  Alanah Mitchell},
  title        = {Online Sex Trafficking Policy Research: {A} Systematic Review},
  booktitle    = {29th Americas Conference on Information Systems, {AMCIS} 2023, Panama
                  City, Panama, August 10-12, 2023},
  publisher    = {Association for Information Systems},
  year         = {2023},
  url          = {https://aisel.aisnet.org/amcis2023/social\_comput/social\_comput/15},
  timestamp    = {Wed, 19 Jul 2023 08:55:10 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SrivastavaD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/HelalyDO23,
  author       = {Yasser Al Helaly and
                  Gurpreet Dhillon and
                  Tiago Oliviera},
  editor       = {Margunn Aanestad and
                  Stefan Klein and
                  Monideepa Tarafdar and
                  Shengnan Han and
                  Sven Laumer and
                  Isabel Ramos},
  title        = {The Impact of Online Advertisment Personalization and Transparency
                  on Individual Defensive responses and Engagment},
  booktitle    = {31st European Conference on Information Systems - Co-creating Sustainable
                  Digital Futures, {ECIS} 2023, Kristiansan, Norway, June 11-16, 2023},
  year         = {2023},
  url          = {https://aisel.aisnet.org/ecis2023\_rip/44},
  timestamp    = {Wed, 19 Jul 2023 10:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/HelalyDO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajis/SohSD22,
  author       = {Franck Soh and
                  Kane Smith and
                  Gurpreet Dhillon},
  title        = {The Relationship between Social Capital and Social Media Addiction:
                  The Role of Privacy Self-Efficacy},
  journal      = {Australas. J. Inf. Syst.},
  volume       = {26},
  year         = {2022},
  url          = {https://doi.org/10.3127/ajis.v26i0.3367},
  doi          = {10.3127/AJIS.V26I0.3367},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ajis/SohSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/SmithDO22,
  author       = {Kane J. Smith and
                  Gurpreet Dhillon and
                  Brigid A. Otoo},
  title        = {iGen User (over) Attachment to Social Media: Reframing the Policy
                  Intervention Conversation},
  journal      = {Inf. Syst. Frontiers},
  volume       = {24},
  number       = {6},
  pages        = {1989--2006},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10796-021-10224-7},
  doi          = {10.1007/S10796-021-10224-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/SmithDO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/XiaoDS22,
  author       = {Ming Xiao and
                  Gurpreet Dhillon and
                  Kane J. Smith},
  editor       = {Gordan Davis and
                  Sue Brown and
                  Mani R. Subramani and
                  Gove N. Allen and
                  K. D. Joshi and
                  Kevin P. Scheibe},
  title        = {A Review of Cyberattack Research using Latent Dirichlet Allocation},
  booktitle    = {28th Americas Conference on Information Systems, {AMCIS} 2022, Minneapolis,
                  MN, USA, August 10-14, 2022},
  publisher    = {Association for Information Systems},
  year         = {2022},
  url          = {https://aisel.aisnet.org/amcis2022/sig\_sec/sig\_sec/24},
  timestamp    = {Tue, 14 Feb 2023 11:57:54 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/XiaoDS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/SmithDC21,
  author       = {Kane J. Smith and
                  Gurpreet Dhillon and
                  Lemuria D. Carter},
  title        = {User values and the development of a cybersecurity public policy for
                  the IoT},
  journal      = {Int. J. Inf. Manag.},
  volume       = {56},
  pages        = {102123},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2020.102123},
  doi          = {10.1016/J.IJINFOMGT.2020.102123},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/SmithDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/DhillonSD21,
  author       = {Gurpreet Dhillon and
                  Kane Smith and
                  Indika Dissanayaka},
  title        = {Information systems security research agenda: Exploring the gap between
                  research and practice},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {30},
  number       = {4},
  pages        = {101693},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jsis.2021.101693},
  doi          = {10.1016/J.JSIS.2021.101693},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsis/DhillonSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/AlamD021,
  author       = {Nabid Alam and
                  Gurpreet Dhillon and
                  Tiago Oliveira},
  editor       = {Yolande E. Chan and
                  Maric Boudreau and
                  Benoit Aubert and
                  Guy Par{\'{e}} and
                  Wynne Chin},
  title        = {Psychological Antecedents and Consequences of Online Romance Scam
                  Victimization Fear},
  booktitle    = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual
                  Conference, August 9-13, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/amcis2021/social\_computing/social\_computing/11},
  timestamp    = {Mon, 30 Aug 2021 12:04:20 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/AlamD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/AlhelalyD021,
  author       = {Yasser Alhelaly and
                  Gurpreet Dhillon and
                  Tiago Oliveira},
  editor       = {Joe S. Valacich and
                  Anitesh Barua and
                  Ryan T. Wright and
                  Atreyi Kankanhalli and
                  Xitong Li and
                  Shaila Miranda},
  title        = {Using the Expectancy-Value Theory of Motivation to Understand the
                  Gaps in Mobile Identity Protection},
  booktitle    = {Proceedings of the 42nd International Conference on Information Systems,
                  {ICIS} 2021, Building Sustainability and Resilience with {IS:} {A}
                  Call for Action, Austin, TX, USA, December 12-15, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/icis2021/cyber\_security/cyber\_security/3},
  timestamp    = {Sun, 16 Apr 2023 13:39:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/AlhelalyD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/SamonasDA20,
  author       = {Spyridon Samonas and
                  Gurpreet Dhillon and
                  Ahlam Almusharraf},
  title        = {Stakeholder perceptions of information security policy: Analyzing
                  personal constructs},
  journal      = {Int. J. Inf. Manag.},
  volume       = {50},
  pages        = {144--154},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2019.04.011},
  doi          = {10.1016/J.IJINFOMGT.2019.04.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/SamonasDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/DhillonTP20,
  author       = {Gurpreet Dhillon and
                  Yurita Yakimini Abdul Talib and
                  Winnie Ng Picoto},
  title        = {The Mediating Role of Psychological Empowerment in Information Security
                  Compliance Intentions},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {5},
  year         = {2020},
  url          = {https://aisel.aisnet.org/jais/vol21/iss1/5},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/DhillonTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CossD20,
  author       = {David Lewis Coss and
                  Gurpreet Dhillon},
  title        = {A Framework for Auditing and Strategizing to Ensure Cloud Privacy},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {47--63},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-17-046},
  doi          = {10.2308/ISYS-17-046},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CossD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsj/SyedDM19,
  author       = {Romilla Syed and
                  Gurpreet Dhillon and
                  Jason R. W. Merrick},
  title        = {The Identity Management Value Model: {A} Design Science Approach to
                  Assess Value Gaps on Social Media},
  journal      = {Decis. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {498--536},
  year         = {2019},
  url          = {https://doi.org/10.1111/deci.12335},
  doi          = {10.1111/DECI.12335},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsj/SyedDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CossD19,
  author       = {David Lewis Coss and
                  Gurpreet Dhillon},
  title        = {Cloud privacy objectives a value based approach},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {189--220},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-05-2017-0034},
  doi          = {10.1108/ICS-05-2017-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CossD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SmithD19,
  author       = {Kane Smith and
                  Gurpreet Dhillon},
  title        = {Improving the Cybersecurity of Financial Transactions: Assessing Blockchain
                  Potential},
  booktitle    = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n,
                  Mexico, August 15-17, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/amcis2019/treo/treos/1},
  timestamp    = {Wed, 21 Aug 2019 10:43:25 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SmithD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SmithDK19,
  author       = {Kane J. Smith and
                  Gurpreet Dhillon and
                  Ella Kolkowska},
  title        = {Important Issues for Preventing Cyberstalking in India},
  booktitle    = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n,
                  Mexico, August 15-17, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/amcis2019/info\_security\_privacy/info\_security\_privacy/10},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SmithDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cinc/MishraRRDLHC19,
  author       = {Saumitra Mishra and
                  Sreehari Rammohan and
                  Khalid Z. Rajab and
                  Gurpreet Dhillon and
                  Pier Lambiase and
                  Ross Hunter and
                  Elaine Chew},
  title        = {Atrial Fibrillation Stratification Via Super-Resolution Analysis of
                  Fibrillatory Waves},
  booktitle    = {46th Computing in Cardiology, CinC 2019, Singapore, September 8-11,
                  2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.22489/CinC.2019.353},
  doi          = {10.22489/CINC.2019.353},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cinc/MishraRRDLHC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2019,
  editor       = {Gurpreet Dhillon and
                  Fredrik Karlsson and
                  Karin Hedstr{\"{o}}m and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11
                  International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27,
                  2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {562},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22312-0},
  doi          = {10.1007/978-3-030-22312-0},
  isbn         = {978-3-030-22311-3},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/DhillonOS18,
  author       = {Gurpreet Dhillon and
                  Tiago Oliveira and
                  Romilla Syed},
  title        = {Value-based information privacy objectives for Internet Commerce},
  journal      = {Comput. Hum. Behav.},
  volume       = {87},
  pages        = {292--307},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.chb.2018.05.043},
  doi          = {10.1016/J.CHB.2018.05.043},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/DhillonOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithDH18,
  author       = {Kane Smith and
                  Gurpreet Dhillon and
                  Karin Hedstr{\"{o}}m},
  title        = {Reconciling value-based objectives for security and identity management},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {194--212},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0059},
  doi          = {10.1108/ICS-08-2017-0059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desrist/DhillonTC18,
  author       = {Gurpreet Dhillon and
                  Gholamreza Torkzadeh and
                  Jerry C. Chang},
  editor       = {Samir Chatterjee and
                  Kaushik Dutta and
                  Rangaraja P. Sundarraj},
  title        = {Strategic Planning for {IS} Security: Designing Objectives},
  booktitle    = {Designing for a Digital and Globalized World - 13th International
                  Conference, {DESRIST} 2018, Chennai, India, June 3-6, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10844},
  pages        = {285--299},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91800-6\_19},
  doi          = {10.1007/978-3-319-91800-6\_19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desrist/DhillonTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SmithD18,
  author       = {Kane Smith and
                  Gurpreet Dhillon},
  editor       = {Jan Pries{-}Heje and
                  Sudha Ram and
                  Michael Rosemann},
  title        = {Eliciting Societal Values for Health Information Policy Decisions},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Bridging the Internet of People, Data, and Things, {ICIS} 2018,
                  San Francisco, CA, USA, December 13-16, 2018},
  publisher    = {Association for Information Systems},
  year         = {2018},
  url          = {https://aisel.aisnet.org/icis2018/healthcare/Presentations/5},
  timestamp    = {Tue, 22 Jan 2019 10:41:07 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/SmithD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/OliveiraARD17,
  author       = {Tiago Oliveira and
                  Matilde Alhinho and
                  Paulo Rita and
                  Gurpreet Dhillon},
  title        = {Modelling and testing consumer trust dimensions in e-commerce},
  journal      = {Comput. Hum. Behav.},
  volume       = {71},
  pages        = {153--164},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2017.01.050},
  doi          = {10.1016/J.CHB.2017.01.050},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/OliveiraARD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/DhillonSS17,
  author       = {Gurpreet Dhillon and
                  Romilla Syed and
                  Filipe de S{\'{a}}{-}Soares},
  title        = {Information security concerns in {IT} outsourcing: Identifying (in)
                  congruence between clients and vendors},
  journal      = {Inf. Manag.},
  volume       = {54},
  number       = {4},
  pages        = {452--464},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.im.2016.10.002},
  doi          = {10.1016/J.IM.2016.10.002},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/DhillonSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SmithD17,
  author       = {Kane Smith and
                  Gurpreet Dhillon},
  title        = {Blockchain for Digital Crime Prevention: The Case of Health Informatics},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/1},
  timestamp    = {Tue, 23 May 2017 14:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SmithD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WaltonD17,
  author       = {Joseph B. Walton and
                  Gurpreet Dhillon},
  title        = {Understanding Digital Crime, Trust, and Control in Blockchain Technologies},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/36},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/WaltonD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/DhillonST17,
  author       = {Gurpreet Dhillon and
                  Kane Smith and
                  Monica C. Tremblay},
  title        = {Blockchain for Privacy and Security: The Case of Health Informatics},
  booktitle    = {{AMIA} 2017, American Medical Informatics Association Annual Symposium,
                  Washington, DC, USA, November 4-8, 2017},
  publisher    = {{AMIA}},
  year         = {2017},
  url          = {https://knowledge.amia.org/65881-amiab-1.4254737/t004-1.4257399/f004-1.4257400/2732242-1.4258186/2729569-1.4258183},
  timestamp    = {Wed, 17 Apr 2024 11:47:24 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/DhillonST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/DhillonOSC16,
  author       = {Gurpreet Dhillon and
                  Tiago Oliveira and
                  Santa R. Susarapu and
                  M{\'{a}}rio M. Caldeira},
  title        = {Deciding between information security and usability: Developing value
                  based objectives},
  journal      = {Comput. Hum. Behav.},
  volume       = {61},
  pages        = {656--666},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.chb.2016.03.068},
  doi          = {10.1016/J.CHB.2016.03.068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/DhillonOSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DhillonSP16,
  author       = {Gurpreet Dhillon and
                  Romilla Syed and
                  Cristiane Pedron},
  title        = {Interpreting information security culture: An organizational transformation
                  case study},
  journal      = {Comput. Secur.},
  volume       = {56},
  pages        = {63--69},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.10.001},
  doi          = {10.1016/J.COSE.2015.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DhillonSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imds/Drebes-PedronPD16,
  author       = {Cristiane Drebes{-}Pedron and
                  Winnie Ng Picoto and
                  Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {Value-focused objectives for {CRM} system adoption},
  journal      = {Ind. Manag. Data Syst.},
  volume       = {116},
  number       = {3},
  pages        = {526--545},
  year         = {2016},
  url          = {https://doi.org/10.1108/IMDS-01-2015-0018},
  doi          = {10.1108/IMDS-01-2015-0018},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imds/Drebes-PedronPD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/AbedDO16,
  author       = {Javad Abed and
                  Gurpreet Dhillon and
                  Sevgi Ozkan},
  title        = {Investigating Continuous Security Compliance Behavior: Insights from
                  Information Systems Continuance Model},
  booktitle    = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San
                  Diego, CA, USA, August 11-14, 2016},
  publisher    = {Association for Information Systems},
  year         = {2016},
  url          = {http://aisel.aisnet.org/amcis2016/ISSec/Presentations/21},
  timestamp    = {Tue, 23 May 2017 14:11:43 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/AbedDO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/Dhillon16,
  author       = {Gurpreet Dhillon},
  title        = {Money Laundering and Technology Enabled Crime: a cultural analysis},
  booktitle    = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San
                  Diego, CA, USA, August 11-14, 2016},
  publisher    = {Association for Information Systems},
  year         = {2016},
  url          = {http://aisel.aisnet.org/amcis2016/ICTs/Presentations/17},
  timestamp    = {Mon, 07 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/Dhillon16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/DhillonH16,
  author       = {Gurpreet Dhillon and
                  Dan Harnesk},
  title        = {Misunderstandings and Misjudgments about Security: {A} Dialogical
                  Narrative Analysis of Global {IT} Offshoring},
  booktitle    = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San
                  Diego, CA, USA, August 11-14, 2016},
  publisher    = {Association for Information Systems},
  year         = {2016},
  url          = {http://aisel.aisnet.org/amcis2016/ICTs/Presentations/2},
  timestamp    = {Mon, 07 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/DhillonH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/MerrittD16,
  author       = {Chris Merritt and
                  Gurpreet Dhillon},
  title        = {What Interrupts Intention to Comply with IS-Security Policy?},
  booktitle    = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San
                  Diego, CA, USA, August 11-14, 2016},
  publisher    = {Association for Information Systems},
  year         = {2016},
  url          = {http://aisel.aisnet.org/amcis2016/ISSec/Presentations/3},
  timestamp    = {Mon, 07 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/MerrittD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/SilvaDP16,
  author       = {Rui Silva and
                  Gurpreet Dhillon and
                  Winnie Picoto},
  title        = {Competence-based Model for Securing the in-Ternet of Things in Organizations},
  booktitle    = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul,
                  Turkey, June 12-15, 2016},
  pages        = {Research--in--Progress Paper 58},
  year         = {2016},
  url          = {http://aisel.aisnet.org/ecis2016\_rip/58},
  timestamp    = {Sat, 12 Nov 2016 17:38:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/SilvaDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SmithD16,
  author       = {Kane Smith and
                  Gurpreet Dhillon},
  editor       = {P{\"{a}}r J. {\AA}gerfalk and
                  Natalia Levina and
                  Sia Siew Kien},
  title        = {Eliciting Societal Values About Cyberstalking Policy Decisions},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Digital Innovation at the Crossroads, {ICIS} 2016, Dublin, Ireland,
                  December 11-14, 2016},
  publisher    = {Association for Information Systems},
  year         = {2016},
  url          = {http://aisel.aisnet.org/icis2016/Sustainability/Presentations/5},
  timestamp    = {Tue, 23 May 2017 13:25:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/SmithD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DhillonSE16,
  author       = {Gurpreet Dhillon and
                  Spyridon Samonas and
                  Ugo Etudo},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {Developing a Human Activity Model for Insider {IS} Security Breaches
                  Using Action Design Research},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {49--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_4},
  doi          = {10.1007/978-3-319-33630-5\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DhillonSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DhillonCS16,
  author       = {Gurpreet Dhillon and
                  Chandrashekar Challa and
                  Kane Smith},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {Defining Objectives for Preventing Cyberstalking},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_6},
  doi          = {10.1007/978-3-319-33630-5\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DhillonCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LapkeD15,
  author       = {Michael Lapke and
                  Gurpreet Dhillon},
  title        = {Disassociations in Security Policy Lifecycles},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {9},
  number       = {1},
  pages        = {62--77},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJISP.2015010104},
  doi          = {10.4018/IJISP.2015010104},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LapkeD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/OliveiraD15a,
  author       = {Tiago Oliveira and
                  Gurpreet Dhillon},
  title        = {From Adoption to Routinization of {B2B} e-Commerce: Understanding
                  Patterns Across Europe},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {23},
  number       = {1},
  pages        = {24--43},
  year         = {2015},
  url          = {https://doi.org/10.4018/jgim.2015010102},
  doi          = {10.4018/JGIM.2015010102},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/OliveiraD15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/AlmusharrafDS15,
  author       = {Ahlam Almusharraf and
                  Gurpreet Dhillon and
                  Spyridon Samonas},
  title        = {Mismatched Understanding of {IS} Security Policy: {A} RepGrid Analysis},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/GlobalIssues/GeneralPresentations/6},
  timestamp    = {Sun, 13 Dec 2015 13:10:52 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/AlmusharrafDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/CaldeiraDD15,
  author       = {M{\'{a}}rio M. Caldeira and
                  Gurpreet Dhillon and
                  Simran Dhillon},
  title        = {Capturing Experiences to Inform Organizational Intelligence: The Case
                  of {IT} Service Competence},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/IntelSys/GeneralPresentations/7},
  timestamp    = {Sun, 13 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/CaldeiraDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SyedD15,
  author       = {Romilla Syed and
                  Gurpreet Dhillon},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {Dynamics of Data Breaches in Online Social Networks: Understanding
                  Threats to Organizational Information Security Reputation},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/SocialMedia/14},
  timestamp    = {Wed, 09 Oct 2019 12:51:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/SyedD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/TalibD15,
  author       = {Yurita Abdul Talib and
                  Gurpreet Dhillon},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {Employee {ISP} Compliance Intentions: An Empirical Test of Empowerment},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/13},
  timestamp    = {Sun, 13 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/TalibD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ukais/NunesDC15,
  author       = {S{\'{e}}rgio Nunes and
                  Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {Multi-Objective Decision Model for Information Systems Risk},
  booktitle    = {{UKAIS} 2015, {UK} Academy for Information Systems 20th Annual Conference
                  2015, Oxford, UK, March 16-18, 2015},
  pages        = {7},
  year         = {2015},
  url          = {http://aisel.aisnet.org/ukais2015/7},
  timestamp    = {Wed, 30 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ukais/NunesDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/HongCTCD14,
  author       = {Weiyin Hong and
                  Frank K. Y. Chan and
                  James Y. L. Thong and
                  Lewis C. Chasalow and
                  Gurpreet Dhillon},
  title        = {A Framework and Guidelines for Context-Specific Theorizing in Information
                  Systems Research},
  journal      = {Inf. Syst. Res.},
  volume       = {25},
  number       = {1},
  pages        = {111--136},
  year         = {2014},
  url          = {https://doi.org/10.1287/isre.2013.0501},
  doi          = {10.1287/ISRE.2013.0501},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isr/HongCTCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DhillonCP14,
  author       = {Gurpreet Dhillon and
                  Romilla Chowdhuri and
                  Cristiane Pedron},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Organizational Transformation and Information Security Culture: {A}
                  Telecom Case Study},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {431--437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_36},
  doi          = {10.1007/978-3-642-55415-5\_36},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DhillonCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/RamachandranRGD13,
  author       = {Sriraman Ramachandran and
                  Chino Rao and
                  Tim Goles and
                  Gurpreet Dhillon},
  title        = {Variations in Information Security Cultures across Professions: {A}
                  Qualitative Study},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {33},
  pages        = {11},
  year         = {2013},
  url          = {https://doi.org/10.17705/1cais.03311},
  doi          = {10.17705/1CAIS.03311},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/RamachandranRGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KolkowskaD13,
  author       = {Ella Kolkowska and
                  Gurpreet Dhillon},
  title        = {Organizational power and information security rule compliance},
  journal      = {Comput. Secur.},
  volume       = {33},
  pages        = {3--11},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.07.001},
  doi          = {10.1016/J.COSE.2012.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KolkowskaD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/MayDC13,
  author       = {Jeffrey May and
                  Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {Defining value-based objectives for {ERP} systems planning},
  journal      = {Decis. Support Syst.},
  volume       = {55},
  number       = {1},
  pages        = {98--109},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.dss.2012.12.036},
  doi          = {10.1016/J.DSS.2012.12.036},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/MayDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/DhillonC13,
  author       = {Gurpreet Dhillon and
                  Romilla Chowdhuri},
  editor       = {Richard L. Baskerville and
                  Michael Chau},
  title        = {Individual values for protecting identity in social networks},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/icis2013/proceedings/ConferenceTheme/3},
  timestamp    = {Wed, 30 Oct 2019 17:01:36 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/DhillonC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DhillonCS13,
  author       = {Gurpreet Dhillon and
                  Romilla Chowdhuri and
                  Filipe de S{\'{a}}{-}Soares},
  editor       = {Lech J. Janczewski and
                  Henry B. Wolfe and
                  Sujeet Shenoi},
  title        = {Secure Outsourcing: An Investigation of the Fit between Clients and
                  Providers},
  booktitle    = {Security and Privacy Protection in Information Processing Systems
                  - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland,
                  New Zealand, July 8-10, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {405},
  pages        = {405--418},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39218-4\_30},
  doi          = {10.1007/978-3-642-39218-4\_30},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DhillonCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ThomasD12,
  author       = {Manoj A. Thomas and
                  Gurpreet Dhillon},
  title        = {Interpreting Deep Structures of Information Systems Security},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {10},
  pages        = {1148--1156},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr118},
  doi          = {10.1093/COMJNL/BXR118},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ThomasD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/NasutionD12,
  author       = {Faisal M. Nasution and
                  Gurpreet Dhillon},
  title        = {Shaping of Security Policy in an Indonesian Bank: Interpreting Institutionalization
                  and Structuration},
  booktitle    = {20th European Conference on Information Systems, {ECIS} 2012, Barcelona,
                  Spain, June 10-13, 2012},
  pages        = {125},
  year         = {2012},
  url          = {http://aisel.aisnet.org/ecis2012/125},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/NasutionD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DhillonOSC12,
  author       = {Gurpreet Dhillon and
                  Tiago Oliveira and
                  Santa R. Susarapu and
                  M{\'{a}}rio M. Caldeira},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {When Convenience Trumps Security: Defining Objectives for Security
                  and Usability of Systems},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {352--363},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_29},
  doi          = {10.1007/978-3-642-30436-1\_29},
  timestamp    = {Sun, 02 Jun 2019 21:15:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DhillonOSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/GillonBCDHM11,
  author       = {Kirstin Gillon and
                  Louis Branz and
                  Mary J. Culnan and
                  Gurpreet Dhillon and
                  Robert Hodgkinson and
                  Alastair MacWillson},
  title        = {Information Security and Privacy - Rethinking Governance Models},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {28},
  pages        = {33},
  year         = {2011},
  url          = {https://doi.org/10.17705/1cais.02833},
  doi          = {10.17705/1CAIS.02833},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/GillonBCDHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/HongTCD11,
  author       = {Weiyin Hong and
                  James Y. L. Thong and
                  Lewis C. Chasalow and
                  Gurpreet Dhillon},
  title        = {User Acceptance of Agile Information Systems: {A} Model and Empirical
                  Test},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {235--272},
  year         = {2011},
  url          = {https://doi.org/10.2753/mis0742-1222280108},
  doi          = {10.2753/MIS0742-1222280108},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/HongTCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/DhillonCW11,
  author       = {Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira and
                  Mitchell R. Wenger},
  title        = {Intentionality and power interplay in {IS} implementation: The case
                  of an asset management firm},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {20},
  number       = {4},
  pages        = {438--448},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jsis.2011.09.003},
  doi          = {10.1016/J.JSIS.2011.09.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsis/DhillonCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KolkowskaD11,
  author       = {Ella Kolkowska and
                  Gurpreet Dhillon},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {Organizational Power and Information Security Rule Compliance},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {185--196},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_15},
  doi          = {10.1007/978-3-642-21424-0\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KolkowskaD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/cpdp11/DhillonK11,
  author       = {Gurpreet Dhillon and
                  Ella Kolkowska},
  editor       = {Serge Gutwirth and
                  Yves Poullet and
                  Paul de Hert and
                  Ronald Leenes},
  title        = {Can a Cloud Be Really Secure? {A} Socratic Dialogue},
  booktitle    = {Computers, Privacy and Data Protection: an Element of Choice},
  pages        = {345--360},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-0641-5\_16},
  doi          = {10.1007/978-94-007-0641-5\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/cpdp11/DhillonK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bpmj/CaldeiraD10,
  author       = {M{\'{a}}rio M. Caldeira and
                  Gurpreet Dhillon},
  title        = {Are we really competent?: Assessing organizational ability in delivering
                  {IT} benefits},
  journal      = {Bus. Process. Manag. J.},
  volume       = {16},
  number       = {1},
  pages        = {5--28},
  year         = {2010},
  url          = {https://doi.org/10.1108/14637151011017921},
  doi          = {10.1108/14637151011017921},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bpmj/CaldeiraD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/DhillonC10,
  author       = {Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {The implementation of the Spa Select System: Coming to grips with
                  the cog in the machine},
  journal      = {Int. J. Inf. Manag.},
  volume       = {30},
  number       = {1},
  pages        = {38--46},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2009.03.003},
  doi          = {10.1016/J.IJINFOMGT.2009.03.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/DhillonC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/MayD10,
  author       = {Jeffrey May and
                  Gurpreet Dhillon},
  editor       = {Patricia M. Alexander and
                  Marita Turpin and
                  Jacobus Philippus van Deventer},
  title        = {A Holistic Approach for Enriching Information Security Analysis and
                  Security Policy Formation},
  booktitle    = {18th European Conference on Information Systems, {ECIS} 2010, Pretoria,
                  South Africa, June 7-9, 2010},
  pages        = {146},
  year         = {2010},
  url          = {http://aisel.aisnet.org/ecis2010/146},
  timestamp    = {Fri, 30 Dec 2022 11:13:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/MayD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/HodgkinsonBCDMP10,
  author       = {Robert Hodgkinson and
                  Louis Branz and
                  Mary J. Culnan and
                  Gurpreet Dhillon and
                  Alastair MacWillson and
                  Larry Ponemon},
  editor       = {Rajiv Sabherwal and
                  Mary Sumner},
  title        = {Information Security and Privacy: Rethinking Governance Models},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2010, Saint Louis, Missouri, USA, December 12-15, 2010},
  pages        = {38},
  publisher    = {Association for Information Systems},
  year         = {2010},
  url          = {http://aisel.aisnet.org/icis2010\_submissions/38},
  timestamp    = {Tue, 27 Dec 2011 13:06:10 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/HodgkinsonBCDMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HedstromDK10,
  author       = {Karin Hedstr{\"{o}}m and
                  Gurpreet Dhillon and
                  Fredrik Karlsson},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Using Actor Network Theory to Understand Information Security Management},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {43--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_5},
  doi          = {10.1007/978-3-642-15257-3\_5},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HedstromDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/MayD09,
  author       = {Jeffrey May and
                  Gurpreet Dhillon},
  title        = {Interpreting Beyond Syntactics: {A} Semiotic Learning Model of Computer
                  Programming Languages},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {20},
  number       = {4},
  pages        = {431--438},
  year         = {2009},
  url          = {https://jise.org/Volume20/n4/JISEv20n4p431.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/MayD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-2/DhillonSB09,
  author       = {Gurpreet Dhillon and
                  Bernd Carsten Stahl and
                  Richard L. Baskerville},
  editor       = {Gurpreet Dhillon and
                  Bernd Carsten Stahl and
                  Richard L. Baskerville},
  title        = {Creativity and Intelligence in Small and Medium Sized Enterprises:
                  The Role of Information Systems},
  booktitle    = {Information Systems - Creativity and Innovation in Small and Medium-Sized
                  Enterprises - {IFIP} {WG} 8.2 International Conference, CreativeSME
                  2009, Guimar{\~{a}}es, Portugal, June 21-24, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {301},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02388-0\_1},
  doi          = {10.1007/978-3-642-02388-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip8-2/DhillonSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip8-2/2009,
  editor       = {Gurpreet Dhillon and
                  Bernd Carsten Stahl and
                  Richard L. Baskerville},
  title        = {Information Systems - Creativity and Innovation in Small and Medium-Sized
                  Enterprises - {IFIP} {WG} 8.2 International Conference, CreativeSME
                  2009, Guimar{\~{a}}es, Portugal, June 21-24, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {301},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02388-0},
  doi          = {10.1007/978-3-642-02388-0},
  isbn         = {978-3-642-02387-3},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip8-2/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/Dhillon08,
  author       = {Gurpreet Dhillon},
  title        = {Organizational competence for harnessing {IT:} {A} case study},
  journal      = {Inf. Manag.},
  volume       = {45},
  number       = {5},
  pages        = {297--303},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.im.2008.01.008},
  doi          = {10.1016/J.IM.2008.01.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/Dhillon08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/DhillonC08,
  author       = {Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {A bumpy road to success (or not): The case of Project Genesis at Nevada
                  {DMV}},
  journal      = {Int. J. Inf. Manag.},
  volume       = {28},
  number       = {3},
  pages        = {222--228},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2008.02.001},
  doi          = {10.1016/J.IJINFOMGT.2008.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/DhillonC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/MishraD08,
  author       = {Sushma Mishra and
                  Gurpreet Dhillon},
  editor       = {Willie Golden and
                  Thomas Acton and
                  Kieran Conboy and
                  Hans van der Heijden and
                  Virpi Kristiina Tuunainen},
  title        = {Defining Internal Control Objectives for Information Systems Security:
                  {A} Value Focused Assessment},
  booktitle    = {16th European Conference on Information Systems, {ECIS} 2008, Galway,
                  Ireland, 2008},
  pages        = {1334--1345},
  year         = {2008},
  url          = {http://aisel.aisnet.org/ecis2008/210},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/MishraD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/LapkeD08,
  author       = {Michael Lapke and
                  Gurpreet Dhillon},
  editor       = {Willie Golden and
                  Thomas Acton and
                  Kieran Conboy and
                  Hans van der Heijden and
                  Virpi Kristiina Tuunainen},
  title        = {Power Relationships in Information Systems Security Policy Formulation
                  and Implementation},
  booktitle    = {16th European Conference on Information Systems, {ECIS} 2008, Galway,
                  Ireland, 2008},
  pages        = {1358--1369},
  year         = {2008},
  url          = {http://aisel.aisnet.org/ecis2008/119},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/LapkeD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/ChoobinehDGR07,
  author       = {Joobin Choobineh and
                  Gurpreet Dhillon and
                  Michael R. Grimaila and
                  Jackie Rees},
  title        = {Management of Information Security: Challenges and Research Directions},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {20},
  pages        = {57},
  year         = {2007},
  url          = {https://doi.org/10.17705/1cais.02057},
  doi          = {10.17705/1CAIS.02057},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/ChoobinehDGR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/DhillonH07,
  author       = {Gurpreet Dhillon and
                  Christopher Hall},
  title        = {Introducing {IT} to Partners Financial Services: The case of a vision
                  without direction},
  journal      = {Int. J. Inf. Manag.},
  volume       = {27},
  number       = {2},
  pages        = {139--148},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2006.11.004},
  doi          = {10.1016/J.IJINFOMGT.2006.11.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/DhillonH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/DhillonBR07,
  author       = {Gurpreet Dhillon and
                  James Backhouse and
                  Amy W. Ray},
  title        = {Editorial: {JSIS} Security and Privacy Special Issue},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {127--129},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jsis.2007.05.002},
  doi          = {10.1016/J.JSIS.2007.05.002},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsis/DhillonBR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/MayD07,
  author       = {Jeffrey May and
                  Gurpreet Dhillon},
  editor       = {John A. Hoxmeier and
                  Stephen C. Hayne},
  title        = {Investigating the Development of a Multi-objective Decision Model
                  that Seeks to Generate Informed Alternatives for Maximizing {IS} Security
                  within an Organization},
  booktitle    = {Reaching New Heights. 13th Americas Conference on Information Systems,
                  {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages        = {3},
  publisher    = {Association for Information Systems},
  year         = {2007},
  url          = {http://aisel.aisnet.org/amcis2007/3},
  timestamp    = {Thu, 26 Nov 2020 16:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/MayD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/MishraD07,
  author       = {Sushma Mishra and
                  Gurpreet Dhillon},
  editor       = {John A. Hoxmeier and
                  Stephen C. Hayne},
  title        = {A Theoretical Basis for Defining Internal Control Objectives for Information
                  Systems Security},
  booktitle    = {Reaching New Heights. 13th Americas Conference on Information Systems,
                  {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages        = {347},
  publisher    = {Association for Information Systems},
  year         = {2007},
  url          = {http://aisel.aisnet.org/amcis2007/347},
  timestamp    = {Wed, 04 Jan 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/MishraD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DhillonTH07,
  author       = {Gurpreet Dhillon and
                  Gurvirender Tejay and
                  Weiyin Hong},
  title        = {Identifying Governance Dimensions to Evaluate Information Systems
                  Security in Organizations},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {157},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.257},
  doi          = {10.1109/HICSS.2007.257},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/DhillonTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0015655,
  author       = {Gurpreet Dhillon},
  title        = {Principles of information systems security - text and cases},
  publisher    = {Wiley},
  year         = {2006},
  isbn         = {978-0-471-45056-6},
  timestamp    = {Wed, 23 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0015655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/DhillonT06,
  author       = {Gurpreet Dhillon and
                  Gholamreza Torkzadeh},
  title        = {Value-focused assessment of information system security in organizations},
  journal      = {Inf. Syst. J.},
  volume       = {16},
  number       = {3},
  pages        = {293--314},
  year         = {2006},
  url          = {https://doi.org/10.1111/j.1365-2575.2006.00219.x},
  doi          = {10.1111/J.1365-2575.2006.00219.X},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/DhillonT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LapkeD06,
  author       = {Michael Lapke and
                  Gurpreet Dhillon},
  editor       = {Guillermo Rodr{\'{\i}}guez{-}Abitia and
                  Ignacio Ania B.},
  title        = {A Semantic Analysis of Security Policy Formulation and Implementation:
                  {A} Case Study},
  booktitle    = {Connecting the Americas. 12th Americas Conference on Information Systems,
                  {AMCIS} 2006, Acapulco, Mexico, August 4-6, 2006},
  pages        = {166},
  publisher    = {Association for Information Systems},
  year         = {2006},
  url          = {http://aisel.aisnet.org/amcis2006/166},
  timestamp    = {Thu, 21 Jun 2018 07:21:45 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/LapkeD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/ThomasD06,
  author       = {Manoj A. Thomas and
                  Gurpreet Dhillon},
  editor       = {Guillermo Rodr{\'{\i}}guez{-}Abitia and
                  Ignacio Ania B.},
  title        = {Deep Structures of Information Systems Security},
  booktitle    = {Connecting the Americas. 12th Americas Conference on Information Systems,
                  {AMCIS} 2006, Acapulco, Mexico, August 4-6, 2006},
  pages        = {419},
  publisher    = {Association for Information Systems},
  year         = {2006},
  url          = {http://aisel.aisnet.org/amcis2006/419},
  timestamp    = {Sat, 24 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/ThomasD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DhillonSS06,
  author       = {Gurpreet Dhillon and
                  Mikko T. Siponen and
                  Raj Sharman},
  title        = {Minitrack Introduction},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.302},
  doi          = {10.1109/HICSS.2006.302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DhillonSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/Dhillon05,
  author       = {Gurpreet Dhillon},
  title        = {Gaining benefits from {IS/IT} implementation: Interpretations from
                  case studies},
  journal      = {Int. J. Inf. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {502--515},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2005.08.004},
  doi          = {10.1016/J.IJINFOMGT.2005.08.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/Dhillon05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtm/DhillonF05,
  author       = {Gurpreet Dhillon and
                  Frances Hauge Fabian},
  title        = {A fractal perspective on competencies necessary for managing information
                  systems},
  journal      = {Int. J. Technol. Manag.},
  volume       = {31},
  number       = {1/2},
  pages        = {129--139},
  year         = {2005},
  url          = {https://doi.org/10.1504/IJTM.2005.006627},
  doi          = {10.1504/IJTM.2005.006627},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtm/DhillonF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WengerDC05,
  author       = {Mitchell R. Wenger and
                  Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  editor       = {Deepak Khazanchi and
                  Ilze Zigurs},
  title        = {{ERP} Implementation in Portugal: Interpreting Dimensions of Power},
  booktitle    = {A Conference on a Human Scale. 11th Americas Conference on Information
                  Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005},
  pages        = {348},
  publisher    = {Association for Information Systems},
  year         = {2005},
  url          = {http://aisel.aisnet.org/amcis2005/348},
  timestamp    = {Wed, 06 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/WengerDC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SusarapuD05,
  author       = {Santa R. Susarapu and
                  Gurpreet Dhillon},
  editor       = {Deepak Khazanchi and
                  Ilze Zigurs},
  title        = {Semiotic Analysis of Knowledge Intensive Business Processes: Developing
                  Interpretations for Sustainable Competitive Advantage},
  booktitle    = {A Conference on a Human Scale. 11th Americas Conference on Information
                  Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005},
  pages        = {389},
  publisher    = {Association for Information Systems},
  year         = {2005},
  url          = {http://aisel.aisnet.org/amcis2005/389},
  timestamp    = {Wed, 06 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SusarapuD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/BaskervilleDPS05,
  author       = {Richard L. Baskerville and
                  Gurpreet Dhillon and
                  G{\"{u}}nther Pernul and
                  Filipe de S{\'{a}}{-}Soares},
  editor       = {Dieter Bartmann and
                  Federico Rajola and
                  Jannis Kallinikos and
                  David E. Avison and
                  Robert Winter and
                  Phillip Ein{-}Dor and
                  J{\"{o}}rg Becker and
                  Freimut Bodendorf and
                  Christof Weinhardt},
  title        = {Panel: Information systems security standards: The solution or the
                  problem?},
  booktitle    = {Proceedings of the 13th European Conference on Information Systems,
                  Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg,
                  Germany, May 26-28, 2005},
  pages        = {1780--1782},
  year         = {2005},
  url          = {http://aisel.aisnet.org/ecis2005/159},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/BaskervilleDPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DhillonSS05,
  author       = {Gurpreet Dhillon and
                  Mikko T. Siponen and
                  Raj Sharman},
  title        = {Mini Track: 'Information Systems Security Management'},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.414},
  doi          = {10.1109/HICSS.2005.414},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DhillonSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WhiteD05a,
  author       = {Elizabeth F. R. White and
                  Gurpreet Dhillon},
  title        = {Synthesizing Information System Design Ideals to Overcome Developmental
                  Duality in Securing Information Systems},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.572},
  doi          = {10.1109/HICSS.2005.572},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WhiteD05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/ChangTD04,
  author       = {Jerry Cha{-}Jan Chang and
                  Gholamreza Torkzadeh and
                  Gurpreet Dhillon},
  title        = {Re-examining the measurement models of success for Internet commerce},
  journal      = {Inf. Manag.},
  volume       = {41},
  number       = {5},
  pages        = {577--584},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0378-7206(03)00091-0},
  doi          = {10.1016/S0378-7206(03)00091-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/ChangTD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/Dhillon04,
  author       = {Gurpreet Dhillon},
  title        = {Dimensions of power and {IS} implementation},
  journal      = {Inf. Manag.},
  volume       = {41},
  number       = {5},
  pages        = {635--644},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.im.2003.02.001},
  doi          = {10.1016/J.IM.2003.02.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/Dhillon04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/Dhillon04,
  author       = {Gurpreet Dhillon},
  title        = {Guest Editorial: the challenge of managing information security},
  journal      = {Int. J. Inf. Manag.},
  volume       = {24},
  number       = {1},
  pages        = {3--4},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2003.12.002},
  doi          = {10.1016/J.IJINFOMGT.2003.12.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/Dhillon04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/DhillonSB04,
  author       = {Gurpreet Dhillon and
                  Leiser Silva and
                  James Backhouse},
  title        = {Computer crime at {CEFORMA:} a case study},
  journal      = {Int. J. Inf. Manag.},
  volume       = {24},
  number       = {6},
  pages        = {551--561},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2004.08.009},
  doi          = {10.1016/J.IJINFOMGT.2004.08.009},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/DhillonSB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenD04,
  author       = {Mikko T. Siponen and
                  Gurpreet Dhillon},
  title        = {Information Systems Security Management: Minitrack Introduction},
  booktitle    = {37th Hawaii International Conference on System Sciences {(HICSS-37}
                  2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/HICSS.2004.1265442},
  doi          = {10.1109/HICSS.2004.1265442},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/TejayDC04,
  author       = {Gurvirender Tejay and
                  Gurpreet Dhillon and
                  Amita Goyal Chin},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bhavani Thuraisingham and
                  Xiaoyang Sean Wang},
  title        = {Data Quality Dimensions for Information Systems Security: {A} Theoretical
                  Exposition (Invited Paper)},
  booktitle    = {Security Management, Integrity, and Internal Control in Information
                  Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working
                  Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}},
  series       = {{IFIP}},
  volume       = {193},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-31167-X\_2},
  doi          = {10.1007/0-387-31167-X\_2},
  timestamp    = {Tue, 16 May 2023 22:42:09 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/TejayDC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MooresD03,
  author       = {Trevor T. Moores and
                  Gurpreet Dhillon},
  title        = {Do privacy seals in e-commerce really work?},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {12},
  pages        = {265--271},
  year         = {2003},
  url          = {https://doi.org/10.1145/953460.953510},
  doi          = {10.1145/953460.953510},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MooresD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/DhillonH03,
  author       = {Gurpreet Dhillon and
                  Ray Hackney},
  title        = {Positioning {IS/IT} in networked firms},
  journal      = {Int. J. Inf. Manag.},
  volume       = {23},
  number       = {2},
  pages        = {163--169},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0268-4012(02)00069-5},
  doi          = {10.1016/S0268-4012(02)00069-5},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/DhillonH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/HackneyBD03,
  author       = {Ray Hackney and
                  Janice M. Burn and
                  Gurpreet Dhillon},
  title        = {Strategic Planning for E-Commerce Systems {(SPECS):} Value Returns
                  and Customer Alliance},
  journal      = {Inf. Technol. Manag.},
  volume       = {4},
  number       = {2-3},
  pages        = {135--138},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1022937925798},
  doi          = {10.1023/A:1022937925798},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itm/HackneyBD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/ChenD03,
  author       = {Sandy C. Chen and
                  Gurpreet Dhillon},
  title        = {Interpreting Dimensions of Consumer Trust in E-Commerce},
  journal      = {Inf. Technol. Manag.},
  volume       = {4},
  number       = {2-3},
  pages        = {303--318},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1022962631249},
  doi          = {10.1023/A:1022962631249},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itm/ChenD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/ReidD03,
  author       = {Randal Reid and
                  Gurpreet Dhillon},
  title        = {Integrating Digital Signatures with Relational Databases: Issues and
                  Organizational Implications},
  journal      = {J. Database Manag.},
  volume       = {14},
  number       = {2},
  pages        = {42--51},
  year         = {2003},
  url          = {https://doi.org/10.4018/jdm.2003040104},
  doi          = {10.4018/JDM.2003040104},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/ReidD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/MattiaD03,
  author       = {Angela Mattia and
                  Gurpreet Dhillon},
  title        = {Applying double loop learning to interpret implications for information
                  systems security design},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages        = {2521--2526},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSMC.2003.1244262},
  doi          = {10.1109/ICSMC.2003.1244262},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/MattiaD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/PhukanD02,
  author       = {Sanjeev Phukan and
                  Gurpreet Dhillon},
  title        = {Ethical and Intellectual Property Concerns in a Multicultural Global
                  Economy},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {7},
  number       = {1},
  pages        = {1--9},
  year         = {2002},
  url          = {https://doi.org/10.1002/j.1681-4835.2002.tb00039.x},
  doi          = {10.1002/J.1681-4835.2002.TB00039.X},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisdc/PhukanD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/DhillonW02,
  author       = {Gurpreet Dhillon and
                  John Ward},
  title        = {Chaos Theory as a Framework for Studying Information Systems},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {15},
  number       = {2},
  pages        = {1--13},
  year         = {2002},
  url          = {https://doi.org/10.4018/irmj.2002040101},
  doi          = {10.4018/IRMJ.2002040101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irmj/DhillonW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/TorkzadehD02,
  author       = {Gholamreza Torkzadeh and
                  Gurpreet Dhillon},
  title        = {Measuring Factors that Influence the Success of Internet Commerce},
  journal      = {Inf. Syst. Res.},
  volume       = {13},
  number       = {2},
  pages        = {187--204},
  year         = {2002},
  url          = {https://doi.org/10.1287/isre.13.2.187.87},
  doi          = {10.1287/ISRE.13.2.187.87},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/TorkzadehD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/DhillonBH02,
  author       = {Gurpreet Dhillon and
                  John Bardacino and
                  Raymond A. Hackney},
  editor       = {Francesc Miralles and
                  Josep Valor},
  title        = {Value Focused Assessment of Individual Privacy Concerns for Internet
                  Commerce},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2002, Barcelona, Spain, December 15-18, 2002},
  pages        = {67},
  publisher    = {Association for Information Systems},
  year         = {2002},
  url          = {http://aisel.aisnet.org/icis2002/67},
  timestamp    = {Mon, 21 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/DhillonBH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Dhillon01,
  author       = {Gurpreet Dhillon},
  title        = {Violation of Safeguards by Trusted Personnel and Understanding Related
                  Information Security Concerns},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {165--172},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00209-7},
  doi          = {10.1016/S0167-4048(01)00209-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Dhillon01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DhillonM01,
  author       = {Gurpreet Dhillon and
                  Steve Moore},
  title        = {Computer crimes: theorizing about the enemy within},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {8},
  pages        = {715--723},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00813-6},
  doi          = {10.1016/S0167-4048(01)00813-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DhillonM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/DhillonM01,
  author       = {Gurpreet Dhillon and
                  Trevor T. Moores},
  title        = {Internet Privacy: Interpreting Key Issues},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {14},
  number       = {4},
  pages        = {33--37},
  year         = {2001},
  url          = {https://doi.org/10.4018/irmj.2001100104},
  doi          = {10.4018/IRMJ.2001100104},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irmj/DhillonM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/DhillonB01,
  author       = {Gurpreet Dhillon and
                  James Backhouse},
  title        = {Current directions in {IS} security research: towards socio-organizational
                  perspectives},
  journal      = {Inf. Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {127--154},
  year         = {2001},
  url          = {https://doi.org/10.1046/j.1365-2575.2001.00099.x},
  doi          = {10.1046/J.1365-2575.2001.00099.X},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/DhillonB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/DhillonMH01,
  author       = {Gurpreet Dhillon and
                  Trevor T. Moores and
                  Ray Hackney},
  title        = {The Emergence of Networked Organizations in India: {A} Misalignment
                  of Interests?},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {25--30},
  year         = {2001},
  url          = {https://doi.org/10.4018/jgim.2001010104},
  doi          = {10.4018/JGIM.2001010104},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/DhillonMH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/DhillonT01,
  author       = {Gurpreet Dhillon and
                  Gholamreza Torkzadeh},
  editor       = {Veda C. Storey and
                  Sumit Sarkar and
                  Janice I. DeGross},
  title        = {Value-Focused Assessment of Information System Security in Organizations},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2001, December 16-19, 2001, New Orleans, Louisiana, {USA}},
  pages        = {561--566},
  publisher    = {Association for Information Systems},
  year         = {2001},
  url          = {http://aisel.aisnet.org/icis2001/72},
  timestamp    = {Sun, 29 Mar 2015 13:07:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/DhillonT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-1/DhillonS01,
  author       = {Gurpreet Dhillon and
                  Leiser Silva},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Rossouw von Solms and
                  Gurpreet Dhillon},
  title        = {Interpreting Computer-Related Crime at the Malaria Research Center:
                  {A} Case Study},
  booktitle    = {Advances in Information Security Management {\&} Small Systems
                  Security, {IFIP} {TC11} {WG11.1/WG11.2} Eigth Annual Working Conference
                  on Information Security Management {\&} Small Systems Security,
                  September 27-28, 2001, Las Vegas, Nevada, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {200},
  pages        = {167--182},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Thu, 01 Aug 2002 12:51:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-1/DhillonS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-1/2001,
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Rossouw von Solms and
                  Gurpreet Dhillon},
  title        = {Advances in Information Security Management {\&} Small Systems
                  Security, {IFIP} {TC11} {WG11.1/WG11.2} Eigth Annual Working Conference
                  on Information Security Management {\&} Small Systems Security,
                  September 27-28, 2001, Las Vegas, Nevada, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {200},
  publisher    = {Kluwer},
  year         = {2001},
  isbn         = {0-7923-7506-8},
  timestamp    = {Thu, 01 Aug 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-1/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DhillonB00,
  author       = {Gurpreet Dhillon and
                  James Backhouse},
  title        = {Information system security management in the new millennium},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {7},
  pages        = {125--128},
  year         = {2000},
  url          = {https://doi.org/10.1145/341852.341877},
  doi          = {10.1145/341852.341877},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/DhillonB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MooresD00,
  author       = {Trevor T. Moores and
                  Gurpreet Dhillon},
  title        = {Software piracy: a view from Hong Kong},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {12},
  pages        = {88--93},
  year         = {2000},
  url          = {https://doi.org/10.1145/355112.355129},
  doi          = {10.1145/355112.355129},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MooresD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/HackneyBD00,
  author       = {Ray Hackney and
                  Janice M. Burn and
                  Gurpreet Dhillon},
  title        = {Challenging Assumptions for Strategic Information Systems Planning:
                  Theoretical Perspectives},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {3},
  pages        = {9},
  year         = {2000},
  url          = {https://doi.org/10.17705/1cais.00309},
  doi          = {10.17705/1CAIS.00309},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/HackneyBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DhillonC00,
  author       = {Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {Interpreting the adoption and use of {EDI} in the Portuguese clothing
                  and textile industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {184--188},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344934},
  doi          = {10.1108/09685220010344934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DhillonC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PhukanD00,
  author       = {Sanjeev Phukan and
                  Gurpreet Dhillon},
  title        = {Ethics and information technology use: a survey of {US} based SMEs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {239--243},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353907},
  doi          = {10.1108/09685220010353907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PhukanD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Dhillon00,
  author       = {Gurpreet Dhillon},
  title        = {Interpreting Key Issues in {IS/IT} Benefits Management},
  booktitle    = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33),
                  4-7 January, 2000, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/HICSS.2000.926926},
  doi          = {10.1109/HICSS.2000.926926},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Dhillon00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DhillonH00,
  author       = {Gurpreet Dhillon and
                  Ray Hackney},
  title        = {{IS/IT} and Dynamic Business Change},
  booktitle    = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33),
                  4-7 January, 2000, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/HICSS.2000.926955},
  doi          = {10.1109/HICSS.2000.926955},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DhillonH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/DhillonL00,
  author       = {Gurpreet Dhillon and
                  Jungwoo Lee},
  editor       = {Soon Ang and
                  Helmut Krcmar and
                  Wanda J. Orlikowski and
                  Peter Weill and
                  Janice I. DeGross},
  title        = {Value assessment of {IS/IT} service provision within organizations},
  booktitle    = {Proceedings of the Twenty-First International Conference on Information
                  Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000},
  pages        = {647--651},
  publisher    = {Association for Information Systems},
  year         = {2000},
  url          = {http://aisel.aisnet.org/icis2000/70},
  timestamp    = {Wed, 28 Nov 2018 12:57:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/DhillonL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/irma/TargowskiD00,
  author       = {Andrew S. Targowski and
                  Gurpreet Dhillon},
  editor       = {Mehdi Khosrowpour},
  title        = {What is information? {A} review of different perspectives},
  booktitle    = {Challenges of Information Technology Management in the 21st Century,
                  2000 Information Resources Management Association International Conference,
                  Anchorage, Alaska, USA, May 21-24, 2000},
  pages        = {1142--1143},
  publisher    = {{IDEA} Group Publishing},
  year         = {2000},
  timestamp    = {Wed, 30 Aug 2006 11:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/irma/TargowskiD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/DhillonD00,
  author       = {Gurpreet Dhillon and
                  Robert M. Davison},
  title        = {Interpreting the Evolving Nature of Transactions in Cyberteaching},
  booktitle    = {The Fourth Pacific Asia Conference on Information Systems, {PACIS}
                  2000, Hong Kong, China, June 1-3, 2000},
  pages        = {42},
  publisher    = {AISeL},
  year         = {2000},
  url          = {http://aisel.aisnet.org/pacis2000/42},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/DhillonD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Dhillon99,
  author       = {Gurpreet Dhillon},
  title        = {Managing and controlling computer misuse},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {171--175},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292664},
  doi          = {10.1108/09685229910292664},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Dhillon99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/HackneyDMK99,
  author       = {Ray Hackney and
                  Gurpreet Dhillon and
                  Neil McBride and
                  Shalini Kesar},
  title        = {Interpreting {IS/IT} Decision Support in the {UK} Primary Health Care
                  System: Issues of Consumer Orientation and Structures},
  booktitle    = {32nd Annual Hawaii International Conference on System Sciences (HICSS-32),
                  January 5-8, 1999, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/HICSS.1999.773012},
  doi          = {10.1109/HICSS.1999.773012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/HackneyDMK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/SilvaDB97,
  author       = {Leiser Silva and
                  Gurpreet Dhillon and
                  James Backhouse},
  editor       = {Robert D. Galliers and
                  Ciaran Murphy and
                  Sven A. Carlsson and
                  Claudia Loebbecke and
                  Hans Robert Hansen and
                  Ramon O'Callaghan},
  title        = {Developing {A} Networked Authority: Nature and Significance of Power
                  Relationships},
  booktitle    = {Proceedings of the Fifth European Conference on Information Systems,
                  {ECIS} 1997, Cork, UK, 1997},
  pages        = {511--525},
  publisher    = {Cork Publishing Ltd},
  year         = {1997},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/SilvaDB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/CaldeiraD97,
  author       = {M{\'{a}}rio M. Caldeira and
                  Gurpreet Dhillon},
  editor       = {Robert D. Galliers and
                  Ciaran Murphy and
                  Sven A. Carlsson and
                  Claudia Loebbecke and
                  Hans Robert Hansen and
                  Ramon O'Callaghan},
  title        = {Factors Affecting the Use and Adoption of {EDI} in Manufacturing SMEs:
                  Experiences From Portugal},
  booktitle    = {Proceedings of the Fifth European Conference on Information Systems,
                  {ECIS} 1997, Cork, UK, 1997},
  pages        = {1184--1190},
  publisher    = {Cork Publishing Ltd},
  year         = {1997},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/CaldeiraD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/DhillonCHMS97,
  author       = {Gurpreet Dhillon and
                  Tony Cornford and
                  Ray Hackney and
                  Neil McBride and
                  Leiser Silva},
  editor       = {Robert D. Galliers and
                  Ciaran Murphy and
                  Sven A. Carlsson and
                  Claudia Loebbecke and
                  Hans Robert Hansen and
                  Ramon O'Callaghan},
  title        = {Panel: Developing An Ethical Agenda for {A} Networked Workplace},
  booktitle    = {Proceedings of the Fifth European Conference on Information Systems,
                  {ECIS} 1997, Cork, UK, 1997},
  pages        = {1535--1536},
  publisher    = {Cork Publishing Ltd},
  year         = {1997},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/DhillonCHMS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/DhillonH96,
  author       = {Gurpreet Dhillon and
                  Ray Hackney},
  editor       = {J. Dias Coelho and
                  Tawfik Jelassi and
                  Wolfgang K{\"{o}}nig and
                  Helmut Krcmar and
                  Ramon O'Callaghan and
                  Markku S{\"{a}}{\"{a}}ksj{\"{a}}rvi},
  title        = {Developing Integrated Solutions in the Health Care Environment: {A}
                  Case Study},
  booktitle    = {Proceedings of the Fourth European Conference on Information Systems,
                  {ECIS} 1996, Lisbon, Portugal, 1996},
  pages        = {1163--1172},
  year         = {1996},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/DhillonH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/DhillonPCDPR96,
  author       = {Gurpreet Dhillon and
                  Joe Peppard and
                  Tony Cornford and
                  Soumitra Dutta and
                  Dror Pockard and
                  Norbert Reekers},
  editor       = {J. Dias Coelho and
                  Tawfik Jelassi and
                  Wolfgang K{\"{o}}nig and
                  Helmut Krcmar and
                  Ramon O'Callaghan and
                  Markku S{\"{a}}{\"{a}}ksj{\"{a}}rvi},
  title        = {Information management competencies in global enterprises},
  booktitle    = {Proceedings of the Fourth European Conference on Information Systems,
                  {ECIS} 1996, Lisbon, Portugal, 1996},
  pages        = {1347--1349},
  year         = {1996},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/DhillonPCDPR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BackhouseD95,
  author       = {James Backhouse and
                  Gurpreet Dhillon},
  title        = {Managing computer crime: a research outlook},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {7},
  pages        = {645--651},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00024-0},
  doi          = {10.1016/0167-4048(95)00024-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BackhouseD95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/BackhouseD95,
  author       = {James Backhouse and
                  Gurpreet Dhillon},
  editor       = {Georgios I. Doukidis and
                  Robert D. Galliers and
                  Tawfik Jelassi and
                  Helmut Krcmar and
                  Frank Land},
  title        = {Electronic thesaurus for clinical terms: {A} methodological approach},
  booktitle    = {Proceedings of the Third European Conference on Information Systems,
                  {ECIS} 1995, Athens, Greece, 1995},
  pages        = {591--600},
  year         = {1995},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/BackhouseD95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics