Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gurpreet Dhillon
@article{DBLP:journals/ajis/AlhelalyDO24, author = {Yasser Alhelaly and Gurpreet Dhillon and Tiago Oliveira}, title = {Mobile Identity Protection: The Moderation Role of Self-Efficacy}, journal = {Australas. J. Inf. Syst.}, volume = {28}, year = {2024}, url = {https://doi.org/10.3127/ajis.v28.4397}, doi = {10.3127/AJIS.V28.4397}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ajis/AlhelalyDO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AebissaDM23, author = {Berhanu Aebissa and Gurpreet Dhillon and Million Meshesha}, title = {The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks}, journal = {Comput. Secur.}, volume = {130}, pages = {103248}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103248}, doi = {10.1016/J.COSE.2023.103248}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AebissaDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlhelalyDO23, author = {Yasser Alhelaly and Gurpreet Dhillon and Tiago Oliveira}, title = {When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection}, journal = {Comput. Secur.}, volume = {134}, pages = {103470}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103470}, doi = {10.1016/J.COSE.2023.103470}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AlhelalyDO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/SultanaDO23, author = {Tahmina Sultana and Gurpreet Dhillon and Tiago Oliveira}, title = {The effect of fear and situational motivation on online information avoidance: The case of {COVID-19}}, journal = {Int. J. Inf. Manag.}, volume = {69}, pages = {102596}, year = {2023}, url = {https://doi.org/10.1016/j.ijinfomgt.2022.102596}, doi = {10.1016/J.IJINFOMGT.2022.102596}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfoman/SultanaDO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/SmithD23, author = {Kane Smith and Gurpreet Dhillon}, title = {Re-framing the policy conversation for preventing cyberstalking}, journal = {Internet Res.}, volume = {33}, number = {1}, pages = {84--123}, year = {2023}, url = {https://doi.org/10.1108/INTR-03-2021-0169}, doi = {10.1108/INTR-03-2021-0169}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/SmithD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SrivastavaD23, author = {Smriti Srivastava and Gurpreet Dhillon}, editor = {Paul A. Pavlou and Vishal Midha and Animesh Animesh and Traci A. Carte and Alexandre R. Graeml and Alanah Mitchell}, title = {Online Sex Trafficking Policy Research: {A} Systematic Review}, booktitle = {29th Americas Conference on Information Systems, {AMCIS} 2023, Panama City, Panama, August 10-12, 2023}, publisher = {Association for Information Systems}, year = {2023}, url = {https://aisel.aisnet.org/amcis2023/social\_comput/social\_comput/15}, timestamp = {Wed, 19 Jul 2023 08:55:10 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SrivastavaD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/HelalyDO23, author = {Yasser Al Helaly and Gurpreet Dhillon and Tiago Oliviera}, editor = {Margunn Aanestad and Stefan Klein and Monideepa Tarafdar and Shengnan Han and Sven Laumer and Isabel Ramos}, title = {The Impact of Online Advertisment Personalization and Transparency on Individual Defensive responses and Engagment}, booktitle = {31st European Conference on Information Systems - Co-creating Sustainable Digital Futures, {ECIS} 2023, Kristiansan, Norway, June 11-16, 2023}, year = {2023}, url = {https://aisel.aisnet.org/ecis2023\_rip/44}, timestamp = {Wed, 19 Jul 2023 10:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ecis/HelalyDO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajis/SohSD22, author = {Franck Soh and Kane Smith and Gurpreet Dhillon}, title = {The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy}, journal = {Australas. J. Inf. Syst.}, volume = {26}, year = {2022}, url = {https://doi.org/10.3127/ajis.v26i0.3367}, doi = {10.3127/AJIS.V26I0.3367}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ajis/SohSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SmithDO22, author = {Kane J. Smith and Gurpreet Dhillon and Brigid A. Otoo}, title = {iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation}, journal = {Inf. Syst. Frontiers}, volume = {24}, number = {6}, pages = {1989--2006}, year = {2022}, url = {https://doi.org/10.1007/s10796-021-10224-7}, doi = {10.1007/S10796-021-10224-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/SmithDO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/XiaoDS22, author = {Ming Xiao and Gurpreet Dhillon and Kane J. Smith}, editor = {Gordan Davis and Sue Brown and Mani R. Subramani and Gove N. Allen and K. D. Joshi and Kevin P. Scheibe}, title = {A Review of Cyberattack Research using Latent Dirichlet Allocation}, booktitle = {28th Americas Conference on Information Systems, {AMCIS} 2022, Minneapolis, MN, USA, August 10-14, 2022}, publisher = {Association for Information Systems}, year = {2022}, url = {https://aisel.aisnet.org/amcis2022/sig\_sec/sig\_sec/24}, timestamp = {Tue, 14 Feb 2023 11:57:54 +0100}, biburl = {https://dblp.org/rec/conf/amcis/XiaoDS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/SmithDC21, author = {Kane J. Smith and Gurpreet Dhillon and Lemuria D. Carter}, title = {User values and the development of a cybersecurity public policy for the IoT}, journal = {Int. J. Inf. Manag.}, volume = {56}, pages = {102123}, year = {2021}, url = {https://doi.org/10.1016/j.ijinfomgt.2020.102123}, doi = {10.1016/J.IJINFOMGT.2020.102123}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfoman/SmithDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/DhillonSD21, author = {Gurpreet Dhillon and Kane Smith and Indika Dissanayaka}, title = {Information systems security research agenda: Exploring the gap between research and practice}, journal = {J. Strateg. Inf. Syst.}, volume = {30}, number = {4}, pages = {101693}, year = {2021}, url = {https://doi.org/10.1016/j.jsis.2021.101693}, doi = {10.1016/J.JSIS.2021.101693}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsis/DhillonSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/AlamD021, author = {Nabid Alam and Gurpreet Dhillon and Tiago Oliveira}, editor = {Yolande E. Chan and Maric Boudreau and Benoit Aubert and Guy Par{\'{e}} and Wynne Chin}, title = {Psychological Antecedents and Consequences of Online Romance Scam Victimization Fear}, booktitle = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual Conference, August 9-13, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/amcis2021/social\_computing/social\_computing/11}, timestamp = {Mon, 30 Aug 2021 12:04:20 +0200}, biburl = {https://dblp.org/rec/conf/amcis/AlamD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/AlhelalyD021, author = {Yasser Alhelaly and Gurpreet Dhillon and Tiago Oliveira}, editor = {Joe S. Valacich and Anitesh Barua and Ryan T. Wright and Atreyi Kankanhalli and Xitong Li and Shaila Miranda}, title = {Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection}, booktitle = {Proceedings of the 42nd International Conference on Information Systems, {ICIS} 2021, Building Sustainability and Resilience with {IS:} {A} Call for Action, Austin, TX, USA, December 12-15, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/icis2021/cyber\_security/cyber\_security/3}, timestamp = {Sun, 16 Apr 2023 13:39:53 +0200}, biburl = {https://dblp.org/rec/conf/icis/AlhelalyD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/SamonasDA20, author = {Spyridon Samonas and Gurpreet Dhillon and Ahlam Almusharraf}, title = {Stakeholder perceptions of information security policy: Analyzing personal constructs}, journal = {Int. J. Inf. Manag.}, volume = {50}, pages = {144--154}, year = {2020}, url = {https://doi.org/10.1016/j.ijinfomgt.2019.04.011}, doi = {10.1016/J.IJINFOMGT.2019.04.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfoman/SamonasDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/DhillonTP20, author = {Gurpreet Dhillon and Yurita Yakimini Abdul Talib and Winnie Ng Picoto}, title = {The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions}, journal = {J. Assoc. Inf. Syst.}, volume = {21}, number = {1}, pages = {5}, year = {2020}, url = {https://aisel.aisnet.org/jais/vol21/iss1/5}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/DhillonTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CossD20, author = {David Lewis Coss and Gurpreet Dhillon}, title = {A Framework for Auditing and Strategizing to Ensure Cloud Privacy}, journal = {J. Inf. Syst.}, volume = {34}, number = {2}, pages = {47--63}, year = {2020}, url = {https://doi.org/10.2308/isys-17-046}, doi = {10.2308/ISYS-17-046}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CossD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsj/SyedDM19, author = {Romilla Syed and Gurpreet Dhillon and Jason R. W. Merrick}, title = {The Identity Management Value Model: {A} Design Science Approach to Assess Value Gaps on Social Media}, journal = {Decis. Sci.}, volume = {50}, number = {3}, pages = {498--536}, year = {2019}, url = {https://doi.org/10.1111/deci.12335}, doi = {10.1111/DECI.12335}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsj/SyedDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CossD19, author = {David Lewis Coss and Gurpreet Dhillon}, title = {Cloud privacy objectives a value based approach}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {189--220}, year = {2019}, url = {https://doi.org/10.1108/ICS-05-2017-0034}, doi = {10.1108/ICS-05-2017-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CossD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SmithD19, author = {Kane Smith and Gurpreet Dhillon}, title = {Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential}, booktitle = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n, Mexico, August 15-17, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/amcis2019/treo/treos/1}, timestamp = {Wed, 21 Aug 2019 10:43:25 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SmithD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SmithDK19, author = {Kane J. Smith and Gurpreet Dhillon and Ella Kolkowska}, title = {Important Issues for Preventing Cyberstalking in India}, booktitle = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n, Mexico, August 15-17, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/amcis2019/info\_security\_privacy/info\_security\_privacy/10}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SmithDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cinc/MishraRRDLHC19, author = {Saumitra Mishra and Sreehari Rammohan and Khalid Z. Rajab and Gurpreet Dhillon and Pier Lambiase and Ross Hunter and Elaine Chew}, title = {Atrial Fibrillation Stratification Via Super-Resolution Analysis of Fibrillatory Waves}, booktitle = {46th Computing in Cardiology, CinC 2019, Singapore, September 8-11, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.22489/CinC.2019.353}, doi = {10.22489/CINC.2019.353}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cinc/MishraRRDLHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2019, editor = {Gurpreet Dhillon and Fredrik Karlsson and Karin Hedstr{\"{o}}m and Andr{\'{e}} Z{\'{u}}quete}, title = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11 International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {562}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22312-0}, doi = {10.1007/978-3-030-22312-0}, isbn = {978-3-030-22311-3}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/DhillonOS18, author = {Gurpreet Dhillon and Tiago Oliveira and Romilla Syed}, title = {Value-based information privacy objectives for Internet Commerce}, journal = {Comput. Hum. Behav.}, volume = {87}, pages = {292--307}, year = {2018}, url = {https://doi.org/10.1016/j.chb.2018.05.043}, doi = {10.1016/J.CHB.2018.05.043}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/DhillonOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithDH18, author = {Kane Smith and Gurpreet Dhillon and Karin Hedstr{\"{o}}m}, title = {Reconciling value-based objectives for security and identity management}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {194--212}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0059}, doi = {10.1108/ICS-08-2017-0059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desrist/DhillonTC18, author = {Gurpreet Dhillon and Gholamreza Torkzadeh and Jerry C. Chang}, editor = {Samir Chatterjee and Kaushik Dutta and Rangaraja P. Sundarraj}, title = {Strategic Planning for {IS} Security: Designing Objectives}, booktitle = {Designing for a Digital and Globalized World - 13th International Conference, {DESRIST} 2018, Chennai, India, June 3-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10844}, pages = {285--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91800-6\_19}, doi = {10.1007/978-3-319-91800-6\_19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desrist/DhillonTC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SmithD18, author = {Kane Smith and Gurpreet Dhillon}, editor = {Jan Pries{-}Heje and Sudha Ram and Michael Rosemann}, title = {Eliciting Societal Values for Health Information Policy Decisions}, booktitle = {Proceedings of the International Conference on Information Systems - Bridging the Internet of People, Data, and Things, {ICIS} 2018, San Francisco, CA, USA, December 13-16, 2018}, publisher = {Association for Information Systems}, year = {2018}, url = {https://aisel.aisnet.org/icis2018/healthcare/Presentations/5}, timestamp = {Tue, 22 Jan 2019 10:41:07 +0100}, biburl = {https://dblp.org/rec/conf/icis/SmithD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/OliveiraARD17, author = {Tiago Oliveira and Matilde Alhinho and Paulo Rita and Gurpreet Dhillon}, title = {Modelling and testing consumer trust dimensions in e-commerce}, journal = {Comput. Hum. Behav.}, volume = {71}, pages = {153--164}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2017.01.050}, doi = {10.1016/J.CHB.2017.01.050}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/OliveiraARD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/DhillonSS17, author = {Gurpreet Dhillon and Romilla Syed and Filipe de S{\'{a}}{-}Soares}, title = {Information security concerns in {IT} outsourcing: Identifying (in) congruence between clients and vendors}, journal = {Inf. Manag.}, volume = {54}, number = {4}, pages = {452--464}, year = {2017}, url = {https://doi.org/10.1016/j.im.2016.10.002}, doi = {10.1016/J.IM.2016.10.002}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/DhillonSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SmithD17, author = {Kane Smith and Gurpreet Dhillon}, title = {Blockchain for Digital Crime Prevention: The Case of Health Informatics}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/1}, timestamp = {Tue, 23 May 2017 14:16:12 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SmithD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/WaltonD17, author = {Joseph B. Walton and Gurpreet Dhillon}, title = {Understanding Digital Crime, Trust, and Control in Blockchain Technologies}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/36}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/WaltonD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/DhillonST17, author = {Gurpreet Dhillon and Kane Smith and Monica C. Tremblay}, title = {Blockchain for Privacy and Security: The Case of Health Informatics}, booktitle = {{AMIA} 2017, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 4-8, 2017}, publisher = {{AMIA}}, year = {2017}, url = {https://knowledge.amia.org/65881-amiab-1.4254737/t004-1.4257399/f004-1.4257400/2732242-1.4258186/2729569-1.4258183}, timestamp = {Wed, 17 Apr 2024 11:47:24 +0200}, biburl = {https://dblp.org/rec/conf/amia/DhillonST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/DhillonOSC16, author = {Gurpreet Dhillon and Tiago Oliveira and Santa R. Susarapu and M{\'{a}}rio M. Caldeira}, title = {Deciding between information security and usability: Developing value based objectives}, journal = {Comput. Hum. Behav.}, volume = {61}, pages = {656--666}, year = {2016}, url = {https://doi.org/10.1016/j.chb.2016.03.068}, doi = {10.1016/J.CHB.2016.03.068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/DhillonOSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DhillonSP16, author = {Gurpreet Dhillon and Romilla Syed and Cristiane Pedron}, title = {Interpreting information security culture: An organizational transformation case study}, journal = {Comput. Secur.}, volume = {56}, pages = {63--69}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.10.001}, doi = {10.1016/J.COSE.2015.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DhillonSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imds/Drebes-PedronPD16, author = {Cristiane Drebes{-}Pedron and Winnie Ng Picoto and Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {Value-focused objectives for {CRM} system adoption}, journal = {Ind. Manag. Data Syst.}, volume = {116}, number = {3}, pages = {526--545}, year = {2016}, url = {https://doi.org/10.1108/IMDS-01-2015-0018}, doi = {10.1108/IMDS-01-2015-0018}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imds/Drebes-PedronPD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/AbedDO16, author = {Javad Abed and Gurpreet Dhillon and Sevgi Ozkan}, title = {Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model}, booktitle = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San Diego, CA, USA, August 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/amcis2016/ISSec/Presentations/21}, timestamp = {Tue, 23 May 2017 14:11:43 +0200}, biburl = {https://dblp.org/rec/conf/amcis/AbedDO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/Dhillon16, author = {Gurpreet Dhillon}, title = {Money Laundering and Technology Enabled Crime: a cultural analysis}, booktitle = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San Diego, CA, USA, August 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/amcis2016/ICTs/Presentations/17}, timestamp = {Mon, 07 Nov 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/Dhillon16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/DhillonH16, author = {Gurpreet Dhillon and Dan Harnesk}, title = {Misunderstandings and Misjudgments about Security: {A} Dialogical Narrative Analysis of Global {IT} Offshoring}, booktitle = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San Diego, CA, USA, August 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/amcis2016/ICTs/Presentations/2}, timestamp = {Mon, 07 Nov 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/DhillonH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/MerrittD16, author = {Chris Merritt and Gurpreet Dhillon}, title = {What Interrupts Intention to Comply with IS-Security Policy?}, booktitle = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San Diego, CA, USA, August 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/amcis2016/ISSec/Presentations/3}, timestamp = {Mon, 07 Nov 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/MerrittD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/SilvaDP16, author = {Rui Silva and Gurpreet Dhillon and Winnie Picoto}, title = {Competence-based Model for Securing the in-Ternet of Things in Organizations}, booktitle = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul, Turkey, June 12-15, 2016}, pages = {Research--in--Progress Paper 58}, year = {2016}, url = {http://aisel.aisnet.org/ecis2016\_rip/58}, timestamp = {Sat, 12 Nov 2016 17:38:24 +0100}, biburl = {https://dblp.org/rec/conf/ecis/SilvaDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SmithD16, author = {Kane Smith and Gurpreet Dhillon}, editor = {P{\"{a}}r J. {\AA}gerfalk and Natalia Levina and Sia Siew Kien}, title = {Eliciting Societal Values About Cyberstalking Policy Decisions}, booktitle = {Proceedings of the International Conference on Information Systems - Digital Innovation at the Crossroads, {ICIS} 2016, Dublin, Ireland, December 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/icis2016/Sustainability/Presentations/5}, timestamp = {Tue, 23 May 2017 13:25:25 +0200}, biburl = {https://dblp.org/rec/conf/icis/SmithD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DhillonSE16, author = {Gurpreet Dhillon and Spyridon Samonas and Ugo Etudo}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {Developing a Human Activity Model for Insider {IS} Security Breaches Using Action Design Research}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {49--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_4}, doi = {10.1007/978-3-319-33630-5\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DhillonSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DhillonCS16, author = {Gurpreet Dhillon and Chandrashekar Challa and Kane Smith}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {Defining Objectives for Preventing Cyberstalking}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {76--87}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_6}, doi = {10.1007/978-3-319-33630-5\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DhillonCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LapkeD15, author = {Michael Lapke and Gurpreet Dhillon}, title = {Disassociations in Security Policy Lifecycles}, journal = {Int. J. Inf. Secur. Priv.}, volume = {9}, number = {1}, pages = {62--77}, year = {2015}, url = {https://doi.org/10.4018/IJISP.2015010104}, doi = {10.4018/IJISP.2015010104}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LapkeD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/OliveiraD15a, author = {Tiago Oliveira and Gurpreet Dhillon}, title = {From Adoption to Routinization of {B2B} e-Commerce: Understanding Patterns Across Europe}, journal = {J. Glob. Inf. Manag.}, volume = {23}, number = {1}, pages = {24--43}, year = {2015}, url = {https://doi.org/10.4018/jgim.2015010102}, doi = {10.4018/JGIM.2015010102}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/OliveiraD15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/AlmusharrafDS15, author = {Ahlam Almusharraf and Gurpreet Dhillon and Spyridon Samonas}, title = {Mismatched Understanding of {IS} Security Policy: {A} RepGrid Analysis}, booktitle = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto Rico, August 13-15, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/amcis2015/GlobalIssues/GeneralPresentations/6}, timestamp = {Sun, 13 Dec 2015 13:10:52 +0100}, biburl = {https://dblp.org/rec/conf/amcis/AlmusharrafDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/CaldeiraDD15, author = {M{\'{a}}rio M. Caldeira and Gurpreet Dhillon and Simran Dhillon}, title = {Capturing Experiences to Inform Organizational Intelligence: The Case of {IT} Service Competence}, booktitle = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto Rico, August 13-15, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/amcis2015/IntelSys/GeneralPresentations/7}, timestamp = {Sun, 13 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/CaldeiraDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SyedD15, author = {Romilla Syed and Gurpreet Dhillon}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/SocialMedia/14}, timestamp = {Wed, 09 Oct 2019 12:51:34 +0200}, biburl = {https://dblp.org/rec/conf/icis/SyedD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/TalibD15, author = {Yurita Abdul Talib and Gurpreet Dhillon}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {Employee {ISP} Compliance Intentions: An Empirical Test of Empowerment}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/13}, timestamp = {Sun, 13 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/TalibD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ukais/NunesDC15, author = {S{\'{e}}rgio Nunes and Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {Multi-Objective Decision Model for Information Systems Risk}, booktitle = {{UKAIS} 2015, {UK} Academy for Information Systems 20th Annual Conference 2015, Oxford, UK, March 16-18, 2015}, pages = {7}, year = {2015}, url = {http://aisel.aisnet.org/ukais2015/7}, timestamp = {Wed, 30 Nov 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ukais/NunesDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/HongCTCD14, author = {Weiyin Hong and Frank K. Y. Chan and James Y. L. Thong and Lewis C. Chasalow and Gurpreet Dhillon}, title = {A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research}, journal = {Inf. Syst. Res.}, volume = {25}, number = {1}, pages = {111--136}, year = {2014}, url = {https://doi.org/10.1287/isre.2013.0501}, doi = {10.1287/ISRE.2013.0501}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isr/HongCTCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DhillonCP14, author = {Gurpreet Dhillon and Romilla Chowdhuri and Cristiane Pedron}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {Organizational Transformation and Information Security Culture: {A} Telecom Case Study}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {431--437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_36}, doi = {10.1007/978-3-642-55415-5\_36}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DhillonCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/RamachandranRGD13, author = {Sriraman Ramachandran and Chino Rao and Tim Goles and Gurpreet Dhillon}, title = {Variations in Information Security Cultures across Professions: {A} Qualitative Study}, journal = {Commun. Assoc. Inf. Syst.}, volume = {33}, pages = {11}, year = {2013}, url = {https://doi.org/10.17705/1cais.03311}, doi = {10.17705/1CAIS.03311}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/RamachandranRGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KolkowskaD13, author = {Ella Kolkowska and Gurpreet Dhillon}, title = {Organizational power and information security rule compliance}, journal = {Comput. Secur.}, volume = {33}, pages = {3--11}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.07.001}, doi = {10.1016/J.COSE.2012.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KolkowskaD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/MayDC13, author = {Jeffrey May and Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {Defining value-based objectives for {ERP} systems planning}, journal = {Decis. Support Syst.}, volume = {55}, number = {1}, pages = {98--109}, year = {2013}, url = {https://doi.org/10.1016/j.dss.2012.12.036}, doi = {10.1016/J.DSS.2012.12.036}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/MayDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/DhillonC13, author = {Gurpreet Dhillon and Romilla Chowdhuri}, editor = {Richard L. Baskerville and Michael Chau}, title = {Individual values for protecting identity in social networks}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2013, Milano, Italy, December 15-18, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/icis2013/proceedings/ConferenceTheme/3}, timestamp = {Wed, 30 Oct 2019 17:01:36 +0100}, biburl = {https://dblp.org/rec/conf/icis/DhillonC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DhillonCS13, author = {Gurpreet Dhillon and Romilla Chowdhuri and Filipe de S{\'{a}}{-}Soares}, editor = {Lech J. Janczewski and Henry B. Wolfe and Sujeet Shenoi}, title = {Secure Outsourcing: An Investigation of the Fit between Clients and Providers}, booktitle = {Security and Privacy Protection in Information Processing Systems - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {405}, pages = {405--418}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39218-4\_30}, doi = {10.1007/978-3-642-39218-4\_30}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/DhillonCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ThomasD12, author = {Manoj A. Thomas and Gurpreet Dhillon}, title = {Interpreting Deep Structures of Information Systems Security}, journal = {Comput. J.}, volume = {55}, number = {10}, pages = {1148--1156}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr118}, doi = {10.1093/COMJNL/BXR118}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ThomasD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/NasutionD12, author = {Faisal M. Nasution and Gurpreet Dhillon}, title = {Shaping of Security Policy in an Indonesian Bank: Interpreting Institutionalization and Structuration}, booktitle = {20th European Conference on Information Systems, {ECIS} 2012, Barcelona, Spain, June 10-13, 2012}, pages = {125}, year = {2012}, url = {http://aisel.aisnet.org/ecis2012/125}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/NasutionD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DhillonOSC12, author = {Gurpreet Dhillon and Tiago Oliveira and Santa R. Susarapu and M{\'{a}}rio M. Caldeira}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {352--363}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_29}, doi = {10.1007/978-3-642-30436-1\_29}, timestamp = {Sun, 02 Jun 2019 21:15:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/DhillonOSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/GillonBCDHM11, author = {Kirstin Gillon and Louis Branz and Mary J. Culnan and Gurpreet Dhillon and Robert Hodgkinson and Alastair MacWillson}, title = {Information Security and Privacy - Rethinking Governance Models}, journal = {Commun. Assoc. Inf. Syst.}, volume = {28}, pages = {33}, year = {2011}, url = {https://doi.org/10.17705/1cais.02833}, doi = {10.17705/1CAIS.02833}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/GillonBCDHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/HongTCD11, author = {Weiyin Hong and James Y. L. Thong and Lewis C. Chasalow and Gurpreet Dhillon}, title = {User Acceptance of Agile Information Systems: {A} Model and Empirical Test}, journal = {J. Manag. Inf. Syst.}, volume = {28}, number = {1}, pages = {235--272}, year = {2011}, url = {https://doi.org/10.2753/mis0742-1222280108}, doi = {10.2753/MIS0742-1222280108}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/HongTCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/DhillonCW11, author = {Gurpreet Dhillon and M{\'{a}}rio M. Caldeira and Mitchell R. Wenger}, title = {Intentionality and power interplay in {IS} implementation: The case of an asset management firm}, journal = {J. Strateg. Inf. Syst.}, volume = {20}, number = {4}, pages = {438--448}, year = {2011}, url = {https://doi.org/10.1016/j.jsis.2011.09.003}, doi = {10.1016/J.JSIS.2011.09.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsis/DhillonCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KolkowskaD11, author = {Ella Kolkowska and Gurpreet Dhillon}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Organizational Power and Information Security Rule Compliance}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {185--196}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_15}, doi = {10.1007/978-3-642-21424-0\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KolkowskaD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/cpdp11/DhillonK11, author = {Gurpreet Dhillon and Ella Kolkowska}, editor = {Serge Gutwirth and Yves Poullet and Paul de Hert and Ronald Leenes}, title = {Can a Cloud Be Really Secure? {A} Socratic Dialogue}, booktitle = {Computers, Privacy and Data Protection: an Element of Choice}, pages = {345--360}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-0641-5\_16}, doi = {10.1007/978-94-007-0641-5\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/cpdp11/DhillonK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bpmj/CaldeiraD10, author = {M{\'{a}}rio M. Caldeira and Gurpreet Dhillon}, title = {Are we really competent?: Assessing organizational ability in delivering {IT} benefits}, journal = {Bus. Process. Manag. J.}, volume = {16}, number = {1}, pages = {5--28}, year = {2010}, url = {https://doi.org/10.1108/14637151011017921}, doi = {10.1108/14637151011017921}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bpmj/CaldeiraD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/DhillonC10, author = {Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {The implementation of the Spa Select System: Coming to grips with the cog in the machine}, journal = {Int. J. Inf. Manag.}, volume = {30}, number = {1}, pages = {38--46}, year = {2010}, url = {https://doi.org/10.1016/j.ijinfomgt.2009.03.003}, doi = {10.1016/J.IJINFOMGT.2009.03.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/DhillonC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/MayD10, author = {Jeffrey May and Gurpreet Dhillon}, editor = {Patricia M. Alexander and Marita Turpin and Jacobus Philippus van Deventer}, title = {A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation}, booktitle = {18th European Conference on Information Systems, {ECIS} 2010, Pretoria, South Africa, June 7-9, 2010}, pages = {146}, year = {2010}, url = {http://aisel.aisnet.org/ecis2010/146}, timestamp = {Fri, 30 Dec 2022 11:13:31 +0100}, biburl = {https://dblp.org/rec/conf/ecis/MayD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/HodgkinsonBCDMP10, author = {Robert Hodgkinson and Louis Branz and Mary J. Culnan and Gurpreet Dhillon and Alastair MacWillson and Larry Ponemon}, editor = {Rajiv Sabherwal and Mary Sumner}, title = {Information Security and Privacy: Rethinking Governance Models}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2010, Saint Louis, Missouri, USA, December 12-15, 2010}, pages = {38}, publisher = {Association for Information Systems}, year = {2010}, url = {http://aisel.aisnet.org/icis2010\_submissions/38}, timestamp = {Tue, 27 Dec 2011 13:06:10 +0100}, biburl = {https://dblp.org/rec/conf/icis/HodgkinsonBCDMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HedstromDK10, author = {Karin Hedstr{\"{o}}m and Gurpreet Dhillon and Fredrik Karlsson}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Using Actor Network Theory to Understand Information Security Management}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {43--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_5}, doi = {10.1007/978-3-642-15257-3\_5}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/HedstromDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/MayD09, author = {Jeffrey May and Gurpreet Dhillon}, title = {Interpreting Beyond Syntactics: {A} Semiotic Learning Model of Computer Programming Languages}, journal = {J. Inf. Syst. Educ.}, volume = {20}, number = {4}, pages = {431--438}, year = {2009}, url = {https://jise.org/Volume20/n4/JISEv20n4p431.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/MayD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-2/DhillonSB09, author = {Gurpreet Dhillon and Bernd Carsten Stahl and Richard L. Baskerville}, editor = {Gurpreet Dhillon and Bernd Carsten Stahl and Richard L. Baskerville}, title = {Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems}, booktitle = {Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises - {IFIP} {WG} 8.2 International Conference, CreativeSME 2009, Guimar{\~{a}}es, Portugal, June 21-24, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {301}, pages = {1--9}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02388-0\_1}, doi = {10.1007/978-3-642-02388-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip8-2/DhillonSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip8-2/2009, editor = {Gurpreet Dhillon and Bernd Carsten Stahl and Richard L. Baskerville}, title = {Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises - {IFIP} {WG} 8.2 International Conference, CreativeSME 2009, Guimar{\~{a}}es, Portugal, June 21-24, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {301}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02388-0}, doi = {10.1007/978-3-642-02388-0}, isbn = {978-3-642-02387-3}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip8-2/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/Dhillon08, author = {Gurpreet Dhillon}, title = {Organizational competence for harnessing {IT:} {A} case study}, journal = {Inf. Manag.}, volume = {45}, number = {5}, pages = {297--303}, year = {2008}, url = {https://doi.org/10.1016/j.im.2008.01.008}, doi = {10.1016/J.IM.2008.01.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/Dhillon08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/DhillonC08, author = {Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {A bumpy road to success (or not): The case of Project Genesis at Nevada {DMV}}, journal = {Int. J. Inf. Manag.}, volume = {28}, number = {3}, pages = {222--228}, year = {2008}, url = {https://doi.org/10.1016/j.ijinfomgt.2008.02.001}, doi = {10.1016/J.IJINFOMGT.2008.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/DhillonC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/MishraD08, author = {Sushma Mishra and Gurpreet Dhillon}, editor = {Willie Golden and Thomas Acton and Kieran Conboy and Hans van der Heijden and Virpi Kristiina Tuunainen}, title = {Defining Internal Control Objectives for Information Systems Security: {A} Value Focused Assessment}, booktitle = {16th European Conference on Information Systems, {ECIS} 2008, Galway, Ireland, 2008}, pages = {1334--1345}, year = {2008}, url = {http://aisel.aisnet.org/ecis2008/210}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/MishraD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/LapkeD08, author = {Michael Lapke and Gurpreet Dhillon}, editor = {Willie Golden and Thomas Acton and Kieran Conboy and Hans van der Heijden and Virpi Kristiina Tuunainen}, title = {Power Relationships in Information Systems Security Policy Formulation and Implementation}, booktitle = {16th European Conference on Information Systems, {ECIS} 2008, Galway, Ireland, 2008}, pages = {1358--1369}, year = {2008}, url = {http://aisel.aisnet.org/ecis2008/119}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/LapkeD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/ChoobinehDGR07, author = {Joobin Choobineh and Gurpreet Dhillon and Michael R. Grimaila and Jackie Rees}, title = {Management of Information Security: Challenges and Research Directions}, journal = {Commun. Assoc. Inf. Syst.}, volume = {20}, pages = {57}, year = {2007}, url = {https://doi.org/10.17705/1cais.02057}, doi = {10.17705/1CAIS.02057}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/ChoobinehDGR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/DhillonH07, author = {Gurpreet Dhillon and Christopher Hall}, title = {Introducing {IT} to Partners Financial Services: The case of a vision without direction}, journal = {Int. J. Inf. Manag.}, volume = {27}, number = {2}, pages = {139--148}, year = {2007}, url = {https://doi.org/10.1016/j.ijinfomgt.2006.11.004}, doi = {10.1016/J.IJINFOMGT.2006.11.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/DhillonH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/DhillonBR07, author = {Gurpreet Dhillon and James Backhouse and Amy W. Ray}, title = {Editorial: {JSIS} Security and Privacy Special Issue}, journal = {J. Strateg. Inf. Syst.}, volume = {16}, number = {2}, pages = {127--129}, year = {2007}, url = {https://doi.org/10.1016/j.jsis.2007.05.002}, doi = {10.1016/J.JSIS.2007.05.002}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsis/DhillonBR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/MayD07, author = {Jeffrey May and Gurpreet Dhillon}, editor = {John A. Hoxmeier and Stephen C. Hayne}, title = {Investigating the Development of a Multi-objective Decision Model that Seeks to Generate Informed Alternatives for Maximizing {IS} Security within an Organization}, booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems, {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007}, pages = {3}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/amcis2007/3}, timestamp = {Thu, 26 Nov 2020 16:35:40 +0100}, biburl = {https://dblp.org/rec/conf/amcis/MayD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/MishraD07, author = {Sushma Mishra and Gurpreet Dhillon}, editor = {John A. Hoxmeier and Stephen C. Hayne}, title = {A Theoretical Basis for Defining Internal Control Objectives for Information Systems Security}, booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems, {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007}, pages = {347}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/amcis2007/347}, timestamp = {Wed, 04 Jan 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/MishraD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DhillonTH07, author = {Gurpreet Dhillon and Gurvirender Tejay and Weiyin Hong}, title = {Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {157}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.257}, doi = {10.1109/HICSS.2007.257}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/DhillonTH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0015655, author = {Gurpreet Dhillon}, title = {Principles of information systems security - text and cases}, publisher = {Wiley}, year = {2006}, isbn = {978-0-471-45056-6}, timestamp = {Wed, 23 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0015655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/DhillonT06, author = {Gurpreet Dhillon and Gholamreza Torkzadeh}, title = {Value-focused assessment of information system security in organizations}, journal = {Inf. Syst. J.}, volume = {16}, number = {3}, pages = {293--314}, year = {2006}, url = {https://doi.org/10.1111/j.1365-2575.2006.00219.x}, doi = {10.1111/J.1365-2575.2006.00219.X}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/DhillonT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LapkeD06, author = {Michael Lapke and Gurpreet Dhillon}, editor = {Guillermo Rodr{\'{\i}}guez{-}Abitia and Ignacio Ania B.}, title = {A Semantic Analysis of Security Policy Formulation and Implementation: {A} Case Study}, booktitle = {Connecting the Americas. 12th Americas Conference on Information Systems, {AMCIS} 2006, Acapulco, Mexico, August 4-6, 2006}, pages = {166}, publisher = {Association for Information Systems}, year = {2006}, url = {http://aisel.aisnet.org/amcis2006/166}, timestamp = {Thu, 21 Jun 2018 07:21:45 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LapkeD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/ThomasD06, author = {Manoj A. Thomas and Gurpreet Dhillon}, editor = {Guillermo Rodr{\'{\i}}guez{-}Abitia and Ignacio Ania B.}, title = {Deep Structures of Information Systems Security}, booktitle = {Connecting the Americas. 12th Americas Conference on Information Systems, {AMCIS} 2006, Acapulco, Mexico, August 4-6, 2006}, pages = {419}, publisher = {Association for Information Systems}, year = {2006}, url = {http://aisel.aisnet.org/amcis2006/419}, timestamp = {Sat, 24 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/ThomasD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DhillonSS06, author = {Gurpreet Dhillon and Mikko T. Siponen and Raj Sharman}, title = {Minitrack Introduction}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.302}, doi = {10.1109/HICSS.2006.302}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DhillonSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/Dhillon05, author = {Gurpreet Dhillon}, title = {Gaining benefits from {IS/IT} implementation: Interpretations from case studies}, journal = {Int. J. Inf. Manag.}, volume = {25}, number = {6}, pages = {502--515}, year = {2005}, url = {https://doi.org/10.1016/j.ijinfomgt.2005.08.004}, doi = {10.1016/J.IJINFOMGT.2005.08.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/Dhillon05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtm/DhillonF05, author = {Gurpreet Dhillon and Frances Hauge Fabian}, title = {A fractal perspective on competencies necessary for managing information systems}, journal = {Int. J. Technol. Manag.}, volume = {31}, number = {1/2}, pages = {129--139}, year = {2005}, url = {https://doi.org/10.1504/IJTM.2005.006627}, doi = {10.1504/IJTM.2005.006627}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtm/DhillonF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/WengerDC05, author = {Mitchell R. Wenger and Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, editor = {Deepak Khazanchi and Ilze Zigurs}, title = {{ERP} Implementation in Portugal: Interpreting Dimensions of Power}, booktitle = {A Conference on a Human Scale. 11th Americas Conference on Information Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005}, pages = {348}, publisher = {Association for Information Systems}, year = {2005}, url = {http://aisel.aisnet.org/amcis2005/348}, timestamp = {Wed, 06 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/WengerDC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SusarapuD05, author = {Santa R. Susarapu and Gurpreet Dhillon}, editor = {Deepak Khazanchi and Ilze Zigurs}, title = {Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage}, booktitle = {A Conference on a Human Scale. 11th Americas Conference on Information Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005}, pages = {389}, publisher = {Association for Information Systems}, year = {2005}, url = {http://aisel.aisnet.org/amcis2005/389}, timestamp = {Wed, 06 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SusarapuD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/BaskervilleDPS05, author = {Richard L. Baskerville and Gurpreet Dhillon and G{\"{u}}nther Pernul and Filipe de S{\'{a}}{-}Soares}, editor = {Dieter Bartmann and Federico Rajola and Jannis Kallinikos and David E. Avison and Robert Winter and Phillip Ein{-}Dor and J{\"{o}}rg Becker and Freimut Bodendorf and Christof Weinhardt}, title = {Panel: Information systems security standards: The solution or the problem?}, booktitle = {Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg, Germany, May 26-28, 2005}, pages = {1780--1782}, year = {2005}, url = {http://aisel.aisnet.org/ecis2005/159}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/BaskervilleDPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DhillonSS05, author = {Gurpreet Dhillon and Mikko T. Siponen and Raj Sharman}, title = {Mini Track: 'Information Systems Security Management'}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.414}, doi = {10.1109/HICSS.2005.414}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DhillonSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WhiteD05a, author = {Elizabeth F. R. White and Gurpreet Dhillon}, title = {Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.572}, doi = {10.1109/HICSS.2005.572}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WhiteD05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/ChangTD04, author = {Jerry Cha{-}Jan Chang and Gholamreza Torkzadeh and Gurpreet Dhillon}, title = {Re-examining the measurement models of success for Internet commerce}, journal = {Inf. Manag.}, volume = {41}, number = {5}, pages = {577--584}, year = {2004}, url = {https://doi.org/10.1016/S0378-7206(03)00091-0}, doi = {10.1016/S0378-7206(03)00091-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/ChangTD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/Dhillon04, author = {Gurpreet Dhillon}, title = {Dimensions of power and {IS} implementation}, journal = {Inf. Manag.}, volume = {41}, number = {5}, pages = {635--644}, year = {2004}, url = {https://doi.org/10.1016/j.im.2003.02.001}, doi = {10.1016/J.IM.2003.02.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/Dhillon04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/Dhillon04, author = {Gurpreet Dhillon}, title = {Guest Editorial: the challenge of managing information security}, journal = {Int. J. Inf. Manag.}, volume = {24}, number = {1}, pages = {3--4}, year = {2004}, url = {https://doi.org/10.1016/j.ijinfomgt.2003.12.002}, doi = {10.1016/J.IJINFOMGT.2003.12.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/Dhillon04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/DhillonSB04, author = {Gurpreet Dhillon and Leiser Silva and James Backhouse}, title = {Computer crime at {CEFORMA:} a case study}, journal = {Int. J. Inf. Manag.}, volume = {24}, number = {6}, pages = {551--561}, year = {2004}, url = {https://doi.org/10.1016/j.ijinfomgt.2004.08.009}, doi = {10.1016/J.IJINFOMGT.2004.08.009}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/DhillonSB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenD04, author = {Mikko T. Siponen and Gurpreet Dhillon}, title = {Information Systems Security Management: Minitrack Introduction}, booktitle = {37th Hawaii International Conference on System Sciences {(HICSS-37} 2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/HICSS.2004.1265442}, doi = {10.1109/HICSS.2004.1265442}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SiponenD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/TejayDC04, author = {Gurvirender Tejay and Gurpreet Dhillon and Amita Goyal Chin}, editor = {Paul Dowland and Steven Furnell and Bhavani Thuraisingham and Xiaoyang Sean Wang}, title = {Data Quality Dimensions for Information Systems Security: {A} Theoretical Exposition (Invited Paper)}, booktitle = {Security Management, Integrity, and Internal Control in Information Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}}, series = {{IFIP}}, volume = {193}, pages = {21--39}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-31167-X\_2}, doi = {10.1007/0-387-31167-X\_2}, timestamp = {Tue, 16 May 2023 22:42:09 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/TejayDC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MooresD03, author = {Trevor T. Moores and Gurpreet Dhillon}, title = {Do privacy seals in e-commerce really work?}, journal = {Commun. {ACM}}, volume = {46}, number = {12}, pages = {265--271}, year = {2003}, url = {https://doi.org/10.1145/953460.953510}, doi = {10.1145/953460.953510}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MooresD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/DhillonH03, author = {Gurpreet Dhillon and Ray Hackney}, title = {Positioning {IS/IT} in networked firms}, journal = {Int. J. Inf. Manag.}, volume = {23}, number = {2}, pages = {163--169}, year = {2003}, url = {https://doi.org/10.1016/S0268-4012(02)00069-5}, doi = {10.1016/S0268-4012(02)00069-5}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/DhillonH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itm/HackneyBD03, author = {Ray Hackney and Janice M. Burn and Gurpreet Dhillon}, title = {Strategic Planning for E-Commerce Systems {(SPECS):} Value Returns and Customer Alliance}, journal = {Inf. Technol. Manag.}, volume = {4}, number = {2-3}, pages = {135--138}, year = {2003}, url = {https://doi.org/10.1023/A:1022937925798}, doi = {10.1023/A:1022937925798}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itm/HackneyBD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itm/ChenD03, author = {Sandy C. Chen and Gurpreet Dhillon}, title = {Interpreting Dimensions of Consumer Trust in E-Commerce}, journal = {Inf. Technol. Manag.}, volume = {4}, number = {2-3}, pages = {303--318}, year = {2003}, url = {https://doi.org/10.1023/A:1022962631249}, doi = {10.1023/A:1022962631249}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itm/ChenD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/ReidD03, author = {Randal Reid and Gurpreet Dhillon}, title = {Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications}, journal = {J. Database Manag.}, volume = {14}, number = {2}, pages = {42--51}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003040104}, doi = {10.4018/JDM.2003040104}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/ReidD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/MattiaD03, author = {Angela Mattia and Gurpreet Dhillon}, title = {Applying double loop learning to interpret implications for information systems security design}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003}, pages = {2521--2526}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICSMC.2003.1244262}, doi = {10.1109/ICSMC.2003.1244262}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/MattiaD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/PhukanD02, author = {Sanjeev Phukan and Gurpreet Dhillon}, title = {Ethical and Intellectual Property Concerns in a Multicultural Global Economy}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {7}, number = {1}, pages = {1--9}, year = {2002}, url = {https://doi.org/10.1002/j.1681-4835.2002.tb00039.x}, doi = {10.1002/J.1681-4835.2002.TB00039.X}, timestamp = {Mon, 28 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisdc/PhukanD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irmj/DhillonW02, author = {Gurpreet Dhillon and John Ward}, title = {Chaos Theory as a Framework for Studying Information Systems}, journal = {Inf. Resour. Manag. J.}, volume = {15}, number = {2}, pages = {1--13}, year = {2002}, url = {https://doi.org/10.4018/irmj.2002040101}, doi = {10.4018/IRMJ.2002040101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irmj/DhillonW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/TorkzadehD02, author = {Gholamreza Torkzadeh and Gurpreet Dhillon}, title = {Measuring Factors that Influence the Success of Internet Commerce}, journal = {Inf. Syst. Res.}, volume = {13}, number = {2}, pages = {187--204}, year = {2002}, url = {https://doi.org/10.1287/isre.13.2.187.87}, doi = {10.1287/ISRE.13.2.187.87}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/TorkzadehD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/DhillonBH02, author = {Gurpreet Dhillon and John Bardacino and Raymond A. Hackney}, editor = {Francesc Miralles and Josep Valor}, title = {Value Focused Assessment of Individual Privacy Concerns for Internet Commerce}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2002, Barcelona, Spain, December 15-18, 2002}, pages = {67}, publisher = {Association for Information Systems}, year = {2002}, url = {http://aisel.aisnet.org/icis2002/67}, timestamp = {Mon, 21 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/DhillonBH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Dhillon01, author = {Gurpreet Dhillon}, title = {Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns}, journal = {Comput. Secur.}, volume = {20}, number = {2}, pages = {165--172}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00209-7}, doi = {10.1016/S0167-4048(01)00209-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Dhillon01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DhillonM01, author = {Gurpreet Dhillon and Steve Moore}, title = {Computer crimes: theorizing about the enemy within}, journal = {Comput. Secur.}, volume = {20}, number = {8}, pages = {715--723}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00813-6}, doi = {10.1016/S0167-4048(01)00813-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DhillonM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irmj/DhillonM01, author = {Gurpreet Dhillon and Trevor T. Moores}, title = {Internet Privacy: Interpreting Key Issues}, journal = {Inf. Resour. Manag. J.}, volume = {14}, number = {4}, pages = {33--37}, year = {2001}, url = {https://doi.org/10.4018/irmj.2001100104}, doi = {10.4018/IRMJ.2001100104}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irmj/DhillonM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/DhillonB01, author = {Gurpreet Dhillon and James Backhouse}, title = {Current directions in {IS} security research: towards socio-organizational perspectives}, journal = {Inf. Syst. J.}, volume = {11}, number = {2}, pages = {127--154}, year = {2001}, url = {https://doi.org/10.1046/j.1365-2575.2001.00099.x}, doi = {10.1046/J.1365-2575.2001.00099.X}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/DhillonB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/DhillonMH01, author = {Gurpreet Dhillon and Trevor T. Moores and Ray Hackney}, title = {The Emergence of Networked Organizations in India: {A} Misalignment of Interests?}, journal = {J. Glob. Inf. Manag.}, volume = {9}, number = {1}, pages = {25--30}, year = {2001}, url = {https://doi.org/10.4018/jgim.2001010104}, doi = {10.4018/JGIM.2001010104}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/DhillonMH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/DhillonT01, author = {Gurpreet Dhillon and Gholamreza Torkzadeh}, editor = {Veda C. Storey and Sumit Sarkar and Janice I. DeGross}, title = {Value-Focused Assessment of Information System Security in Organizations}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2001, December 16-19, 2001, New Orleans, Louisiana, {USA}}, pages = {561--566}, publisher = {Association for Information Systems}, year = {2001}, url = {http://aisel.aisnet.org/icis2001/72}, timestamp = {Sun, 29 Mar 2015 13:07:34 +0200}, biburl = {https://dblp.org/rec/conf/icis/DhillonT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-1/DhillonS01, author = {Gurpreet Dhillon and Leiser Silva}, editor = {Jan H. P. Eloff and Les Labuschagne and Rossouw von Solms and Gurpreet Dhillon}, title = {Interpreting Computer-Related Crime at the Malaria Research Center: {A} Case Study}, booktitle = {Advances in Information Security Management {\&} Small Systems Security, {IFIP} {TC11} {WG11.1/WG11.2} Eigth Annual Working Conference on Information Security Management {\&} Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {200}, pages = {167--182}, publisher = {Kluwer}, year = {2001}, timestamp = {Thu, 01 Aug 2002 12:51:43 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-1/DhillonS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11-1/2001, editor = {Jan H. P. Eloff and Les Labuschagne and Rossouw von Solms and Gurpreet Dhillon}, title = {Advances in Information Security Management {\&} Small Systems Security, {IFIP} {TC11} {WG11.1/WG11.2} Eigth Annual Working Conference on Information Security Management {\&} Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {200}, publisher = {Kluwer}, year = {2001}, isbn = {0-7923-7506-8}, timestamp = {Thu, 01 Aug 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-1/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DhillonB00, author = {Gurpreet Dhillon and James Backhouse}, title = {Information system security management in the new millennium}, journal = {Commun. {ACM}}, volume = {43}, number = {7}, pages = {125--128}, year = {2000}, url = {https://doi.org/10.1145/341852.341877}, doi = {10.1145/341852.341877}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DhillonB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MooresD00, author = {Trevor T. Moores and Gurpreet Dhillon}, title = {Software piracy: a view from Hong Kong}, journal = {Commun. {ACM}}, volume = {43}, number = {12}, pages = {88--93}, year = {2000}, url = {https://doi.org/10.1145/355112.355129}, doi = {10.1145/355112.355129}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MooresD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/HackneyBD00, author = {Ray Hackney and Janice M. Burn and Gurpreet Dhillon}, title = {Challenging Assumptions for Strategic Information Systems Planning: Theoretical Perspectives}, journal = {Commun. Assoc. Inf. Syst.}, volume = {3}, pages = {9}, year = {2000}, url = {https://doi.org/10.17705/1cais.00309}, doi = {10.17705/1CAIS.00309}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/HackneyBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DhillonC00, author = {Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {Interpreting the adoption and use of {EDI} in the Portuguese clothing and textile industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {184--188}, year = {2000}, url = {https://doi.org/10.1108/09685220010344934}, doi = {10.1108/09685220010344934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DhillonC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PhukanD00, author = {Sanjeev Phukan and Gurpreet Dhillon}, title = {Ethics and information technology use: a survey of {US} based SMEs}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {239--243}, year = {2000}, url = {https://doi.org/10.1108/09685220010353907}, doi = {10.1108/09685220010353907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PhukanD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Dhillon00, author = {Gurpreet Dhillon}, title = {Interpreting Key Issues in {IS/IT} Benefits Management}, booktitle = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/HICSS.2000.926926}, doi = {10.1109/HICSS.2000.926926}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Dhillon00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DhillonH00, author = {Gurpreet Dhillon and Ray Hackney}, title = {{IS/IT} and Dynamic Business Change}, booktitle = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/HICSS.2000.926955}, doi = {10.1109/HICSS.2000.926955}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DhillonH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/DhillonL00, author = {Gurpreet Dhillon and Jungwoo Lee}, editor = {Soon Ang and Helmut Krcmar and Wanda J. Orlikowski and Peter Weill and Janice I. DeGross}, title = {Value assessment of {IS/IT} service provision within organizations}, booktitle = {Proceedings of the Twenty-First International Conference on Information Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000}, pages = {647--651}, publisher = {Association for Information Systems}, year = {2000}, url = {http://aisel.aisnet.org/icis2000/70}, timestamp = {Wed, 28 Nov 2018 12:57:14 +0100}, biburl = {https://dblp.org/rec/conf/icis/DhillonL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irma/TargowskiD00, author = {Andrew S. Targowski and Gurpreet Dhillon}, editor = {Mehdi Khosrowpour}, title = {What is information? {A} review of different perspectives}, booktitle = {Challenges of Information Technology Management in the 21st Century, 2000 Information Resources Management Association International Conference, Anchorage, Alaska, USA, May 21-24, 2000}, pages = {1142--1143}, publisher = {{IDEA} Group Publishing}, year = {2000}, timestamp = {Wed, 30 Aug 2006 11:04:01 +0200}, biburl = {https://dblp.org/rec/conf/irma/TargowskiD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/DhillonD00, author = {Gurpreet Dhillon and Robert M. Davison}, title = {Interpreting the Evolving Nature of Transactions in Cyberteaching}, booktitle = {The Fourth Pacific Asia Conference on Information Systems, {PACIS} 2000, Hong Kong, China, June 1-3, 2000}, pages = {42}, publisher = {AISeL}, year = {2000}, url = {http://aisel.aisnet.org/pacis2000/42}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/DhillonD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Dhillon99, author = {Gurpreet Dhillon}, title = {Managing and controlling computer misuse}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {4}, pages = {171--175}, year = {1999}, url = {https://doi.org/10.1108/09685229910292664}, doi = {10.1108/09685229910292664}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Dhillon99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/HackneyDMK99, author = {Ray Hackney and Gurpreet Dhillon and Neil McBride and Shalini Kesar}, title = {Interpreting {IS/IT} Decision Support in the {UK} Primary Health Care System: Issues of Consumer Orientation and Structures}, booktitle = {32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/HICSS.1999.773012}, doi = {10.1109/HICSS.1999.773012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/HackneyDMK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/SilvaDB97, author = {Leiser Silva and Gurpreet Dhillon and James Backhouse}, editor = {Robert D. Galliers and Ciaran Murphy and Sven A. Carlsson and Claudia Loebbecke and Hans Robert Hansen and Ramon O'Callaghan}, title = {Developing {A} Networked Authority: Nature and Significance of Power Relationships}, booktitle = {Proceedings of the Fifth European Conference on Information Systems, {ECIS} 1997, Cork, UK, 1997}, pages = {511--525}, publisher = {Cork Publishing Ltd}, year = {1997}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/SilvaDB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/CaldeiraD97, author = {M{\'{a}}rio M. Caldeira and Gurpreet Dhillon}, editor = {Robert D. Galliers and Ciaran Murphy and Sven A. Carlsson and Claudia Loebbecke and Hans Robert Hansen and Ramon O'Callaghan}, title = {Factors Affecting the Use and Adoption of {EDI} in Manufacturing SMEs: Experiences From Portugal}, booktitle = {Proceedings of the Fifth European Conference on Information Systems, {ECIS} 1997, Cork, UK, 1997}, pages = {1184--1190}, publisher = {Cork Publishing Ltd}, year = {1997}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/CaldeiraD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/DhillonCHMS97, author = {Gurpreet Dhillon and Tony Cornford and Ray Hackney and Neil McBride and Leiser Silva}, editor = {Robert D. Galliers and Ciaran Murphy and Sven A. Carlsson and Claudia Loebbecke and Hans Robert Hansen and Ramon O'Callaghan}, title = {Panel: Developing An Ethical Agenda for {A} Networked Workplace}, booktitle = {Proceedings of the Fifth European Conference on Information Systems, {ECIS} 1997, Cork, UK, 1997}, pages = {1535--1536}, publisher = {Cork Publishing Ltd}, year = {1997}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/DhillonCHMS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/DhillonH96, author = {Gurpreet Dhillon and Ray Hackney}, editor = {J. Dias Coelho and Tawfik Jelassi and Wolfgang K{\"{o}}nig and Helmut Krcmar and Ramon O'Callaghan and Markku S{\"{a}}{\"{a}}ksj{\"{a}}rvi}, title = {Developing Integrated Solutions in the Health Care Environment: {A} Case Study}, booktitle = {Proceedings of the Fourth European Conference on Information Systems, {ECIS} 1996, Lisbon, Portugal, 1996}, pages = {1163--1172}, year = {1996}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/DhillonH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/DhillonPCDPR96, author = {Gurpreet Dhillon and Joe Peppard and Tony Cornford and Soumitra Dutta and Dror Pockard and Norbert Reekers}, editor = {J. Dias Coelho and Tawfik Jelassi and Wolfgang K{\"{o}}nig and Helmut Krcmar and Ramon O'Callaghan and Markku S{\"{a}}{\"{a}}ksj{\"{a}}rvi}, title = {Information management competencies in global enterprises}, booktitle = {Proceedings of the Fourth European Conference on Information Systems, {ECIS} 1996, Lisbon, Portugal, 1996}, pages = {1347--1349}, year = {1996}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/DhillonPCDPR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BackhouseD95, author = {James Backhouse and Gurpreet Dhillon}, title = {Managing computer crime: a research outlook}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {645--651}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00024-0}, doi = {10.1016/0167-4048(95)00024-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BackhouseD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/BackhouseD95, author = {James Backhouse and Gurpreet Dhillon}, editor = {Georgios I. Doukidis and Robert D. Galliers and Tawfik Jelassi and Helmut Krcmar and Frank Land}, title = {Electronic thesaurus for clinical terms: {A} methodological approach}, booktitle = {Proceedings of the Third European Conference on Information Systems, {ECIS} 1995, Athens, Greece, 1995}, pages = {591--600}, year = {1995}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/BackhouseD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.