


Остановите войну!
for scientists:
Gurpreet Dhillon
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j60]Franck Soh, Kane Smith, Gurpreet Dhillon:
The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Australas. J. Inf. Syst. 26 (2022) - 2021
- [j59]Kane J. Smith, Gurpreet Dhillon
, Lemuria D. Carter:
User values and the development of a cybersecurity public policy for the IoT. Int. J. Inf. Manag. 56: 102123 (2021) - [j58]Gurpreet Dhillon, Kane Smith, Indika Dissanayaka:
Information systems security research agenda: Exploring the gap between research and practice. J. Strateg. Inf. Syst. 30(4): 101693 (2021) - [c64]Nabid Alam, Gurpreet Dhillon, Tiago Oliveira:
Psychological Antecedents and Consequences of Online Romance Scam Victimization Fear. AMCIS 2021 - [c63]Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliveira:
Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection. ICIS 2021 - 2020
- [j57]Spyridon Samonas, Gurpreet Dhillon
, Ahlam Almusharraf
:
Stakeholder perceptions of information security policy: Analyzing personal constructs. Int. J. Inf. Manag. 50: 144-154 (2020) - [j56]Gurpreet Dhillon, Yurita Yakimini Abdul Talib, Winnie Ng Picoto:
The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions. J. Assoc. Inf. Syst. 21(1): 5 (2020) - [j55]David Lewis Coss
, Gurpreet Dhillon
:
A Framework for Auditing and Strategizing to Ensure Cloud Privacy. J. Inf. Syst. 34(2): 47-63 (2020)
2010 – 2019
- 2019
- [j54]Romilla Syed
, Gurpreet Dhillon
, Jason R. W. Merrick:
The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media. Decis. Sci. 50(3): 498-536 (2019) - [j53]David Lewis Coss, Gurpreet Dhillon
:
Cloud privacy objectives a value based approach. Inf. Comput. Secur. 27(2): 189-220 (2019) - [c62]Kane Smith, Gurpreet Dhillon:
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential. AMCIS 2019 - [c61]Kane J. Smith, Gurpreet Dhillon, Ella Kolkowska:
Important Issues for Preventing Cyberstalking in India. AMCIS 2019 - [c60]Saumitra Mishra, Sreehari Rammohan, Khalid Z. Rajab, Gurpreet Dhillon, Pier Lambiase
, Ross Hunter, Elaine Chew
:
Atrial Fibrillation Stratification Via Super-Resolution Analysis of Fibrillatory Waves. CinC 2019: 1-4 - [e3]Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 562, Springer 2019, ISBN 978-3-030-22311-3 [contents] - 2018
- [j52]Gurpreet Dhillon
, Tiago Oliveira
, Romilla Syed
:
Value-based information privacy objectives for Internet Commerce. Comput. Hum. Behav. 87: 292-307 (2018) - [j51]Kane Smith, Gurpreet Dhillon
, Karin Hedström:
Reconciling value-based objectives for security and identity management. Inf. Comput. Secur. 26(2): 194-212 (2018) - [c59]Gurpreet Dhillon
, Gholamreza Torkzadeh, Jerry C. Chang:
Strategic Planning for IS Security: Designing Objectives. DESRIST 2018: 285-299 - [c58]Kane Smith, Gurpreet Dhillon:
Eliciting Societal Values for Health Information Policy Decisions. ICIS 2018 - 2017
- [j50]Tiago Oliveira
, Matilde Alhinho, Paulo Rita
, Gurpreet Dhillon
:
Modelling and testing consumer trust dimensions in e-commerce. Comput. Hum. Behav. 71: 153-164 (2017) - [j49]Gurpreet Dhillon
, Romilla Syed, Filipe de Sá-Soares
:
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors. Inf. Manag. 54(4): 452-464 (2017) - [c57]Kane Smith, Gurpreet Dhillon:
Blockchain for Digital Crime Prevention: The Case of Health Informatics. AMCIS 2017 - [c56]Joseph B. Walton, Gurpreet Dhillon:
Understanding Digital Crime, Trust, and Control in Blockchain Technologies. AMCIS 2017 - [c55]Gurpreet Dhillon, Kane Smith, Monica C. Tremblay:
Blockchain for Privacy and Security: The Case of Health Informatics. AMIA 2017 - 2016
- [j48]Gurpreet Dhillon
, Tiago Oliveira
, Santa R. Susarapu, Mário M. Caldeira
:
Deciding between information security and usability: Developing value based objectives. Comput. Hum. Behav. 61: 656-666 (2016) - [j47]Gurpreet Dhillon
, Romilla Syed, Cristiane Pedron
:
Interpreting information security culture: An organizational transformation case study. Comput. Secur. 56: 63-69 (2016) - [j46]Cristiane Drebes-Pedron, Winnie Ng Picoto
, Gurpreet Dhillon
, Mário M. Caldeira
:
Value-focused objectives for CRM system adoption. Ind. Manag. Data Syst. 116(3): 526-545 (2016) - [c54]Javad Abed, Gurpreet Dhillon, Sevgi Ozkan:
Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model. AMCIS 2016 - [c53]Gurpreet Dhillon:
Money Laundering and Technology Enabled Crime: a cultural analysis. AMCIS 2016 - [c52]Gurpreet Dhillon, Dan Harnesk:
Misunderstandings and Misjudgments about Security: A Dialogical Narrative Analysis of Global IT Offshoring. AMCIS 2016 - [c51]Chris Merritt, Gurpreet Dhillon:
What Interrupts Intention to Comply with IS-Security Policy? AMCIS 2016 - [c50]Rui Silva, Gurpreet Dhillon, Winnie Picoto:
Competence-based Model for Securing the in-Ternet of Things in Organizations. ECIS 2016: Research-in-Progress Paper 58 - [c49]Kane Smith, Gurpreet Dhillon:
Eliciting Societal Values About Cyberstalking Policy Decisions. ICIS 2016 - [c48]Gurpreet Dhillon
, Spyridon Samonas, Ugo Etudo:
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research. SEC 2016: 49-61 - [c47]Gurpreet Dhillon
, Chandrashekar Challa, Kane Smith:
Defining Objectives for Preventing Cyberstalking. SEC 2016: 76-87 - 2015
- [j45]Michael Lapke, Gurpreet Dhillon
:
Disassociations in Security Policy Lifecycles. Int. J. Inf. Secur. Priv. 9(1): 62-77 (2015) - [j44]Tiago Oliveira
, Gurpreet Dhillon
:
From Adoption to Routinization of B2B e-Commerce: Understanding Patterns Across Europe. J. Glob. Inf. Manag. 23(1): 24-43 (2015) - [c46]Ahlam Almusharraf, Gurpreet Dhillon, Spyridon Samonas:
Mismatched Understanding of IS Security Policy: A RepGrid Analysis. AMCIS 2015 - [c45]Mário M. Caldeira, Gurpreet Dhillon, Simran Dhillon:
Capturing Experiences to Inform Organizational Intelligence: The Case of IT Service Competence. AMCIS 2015 - [c44]Romilla Syed, Gurpreet Dhillon:
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation. ICIS 2015 - [c43]Yurita Abdul Talib, Gurpreet Dhillon:
Employee ISP Compliance Intentions: An Empirical Test of Empowerment. ICIS 2015 - [c42]Sérgio Nunes, Gurpreet Dhillon, Mário M. Caldeira:
Multi-Objective Decision Model for Information Systems Risk. UKAIS 2015: 7 - 2014
- [j43]Weiyin Hong, Frank K. Y. Chan
, James Y. L. Thong
, Lewis C. Chasalow, Gurpreet Dhillon
:
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research. Inf. Syst. Res. 25(1): 111-136 (2014) - [c41]Gurpreet Dhillon
, Romilla Chowdhuri, Cristiane Pedron
:
Organizational Transformation and Information Security Culture: A Telecom Case Study. SEC 2014: 431-437 - 2013
- [j42]Sriraman Ramachandran, Chino Rao, Tim Goles, Gurpreet Dhillon:
Variations in Information Security Cultures across Professions: A Qualitative Study. Commun. Assoc. Inf. Syst. 33: 11 (2013) - [j41]Ella Kolkowska, Gurpreet Dhillon
:
Organizational power and information security rule compliance. Comput. Secur. 33: 3-11 (2013) - [j40]Jeffrey May, Gurpreet Dhillon
, Mário M. Caldeira
:
Defining value-based objectives for ERP systems planning. Decis. Support Syst. 55(1): 98-109 (2013) - [c40]Gurpreet Dhillon, Romilla Chowdhuri:
Individual values for protecting identity in social networks. ICIS 2013 - [c39]Gurpreet Dhillon
, Romilla Chowdhuri, Filipe de Sá-Soares:
Secure Outsourcing: An Investigation of the Fit between Clients and Providers. SEC 2013: 405-418 - 2012
- [j39]Manoj A. Thomas
, Gurpreet Dhillon
:
Interpreting Deep Structures of Information Systems Security. Comput. J. 55(10): 1148-1156 (2012) - [c38]Faisal M. Nasution, Gurpreet Dhillon:
Shaping of Security Policy in an Indonesian Bank: Interpreting Institutionalization and Structuration. ECIS 2012: 125 - [c37]Gurpreet Dhillon
, Tiago Oliveira
, Santa R. Susarapu, Mário M. Caldeira
:
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. SEC 2012: 352-363 - 2011
- [j38]Kirstin Gillon, Louis Branz, Mary J. Culnan, Gurpreet Dhillon, Robert Hodgkinson, Alastair MacWillson:
Information Security and Privacy - Rethinking Governance Models. Commun. Assoc. Inf. Syst. 28: 33 (2011) - [j37]Weiyin Hong, James Y. L. Thong
, Lewis C. Chasalow, Gurpreet Dhillon
:
User Acceptance of Agile Information Systems: A Model and Empirical Test. J. Manag. Inf. Syst. 28(1): 235-272 (2011) - [j36]Gurpreet Dhillon
, Mário M. Caldeira
, Mitchell R. Wenger:
Intentionality and power interplay in IS implementation: The case of an asset management firm. J. Strateg. Inf. Syst. 20(4): 438-448 (2011) - [c36]Ella Kolkowska, Gurpreet Dhillon
:
Organizational Power and Information Security Rule Compliance. SEC 2011: 185-196 - [p1]Gurpreet Dhillon
, Ella Kolkowska:
Can a Cloud Be Really Secure? A Socratic Dialogue. Computers, Privacy and Data Protection 2011: 345-360 - 2010
- [j35]Mário M. Caldeira
, Gurpreet Dhillon
:
Are we really competent?: Assessing organizational ability in delivering IT benefits. Bus. Process. Manag. J. 16(1): 5-28 (2010) - [j34]Gurpreet Dhillon
, Mário M. Caldeira
:
The implementation of the Spa Select System: Coming to grips with the cog in the machine. Int. J. Inf. Manag. 30(1): 38-46 (2010) - [c35]Jeffrey May, Gurpreet Dhillon:
A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation. ECIS 2010: 146 - [c34]Robert Hodgkinson, Louis Branz, Mary J. Culnan, Gurpreet Dhillon, Alastair MacWillson, Larry Ponemon:
Information Security and Privacy: Rethinking Governance Models. ICIS 2010: 38 - [c33]Karin Hedström
, Gurpreet Dhillon
, Fredrik Karlsson:
Using Actor Network Theory to Understand Information Security Management. SEC 2010: 43-54
2000 – 2009
- 2009
- [j33]Jeffrey May, Gurpreet Dhillon:
Interpreting Beyond Syntactics: A Semiotic Learning Model of Computer Programming Languages. J. Inf. Syst. Educ. 20(4): 431-438 (2009) - [c32]Gurpreet Dhillon
, Bernd Carsten Stahl, Richard L. Baskerville
:
Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems. CreativeSME 2009: 1-9 - [e2]Gurpreet Dhillon, Bernd Carsten Stahl, Richard L. Baskerville:
Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises - IFIP WG 8.2 International Conference, CreativeSME 2009, Guimarães, Portugal, June 21-24, 2009. Proceedings. IFIP Advances in Information and Communication Technology 301, Springer 2009, ISBN 978-3-642-02387-3 [contents] - 2008
- [j32]Gurpreet Dhillon
:
Organizational competence for harnessing IT: A case study. Inf. Manag. 45(5): 297-303 (2008) - [j31]Gurpreet Dhillon
, Mário M. Caldeira
:
A bumpy road to success (or not): The case of Project Genesis at Nevada DMV. Int. J. Inf. Manag. 28(3): 222-228 (2008) - [c31]Sushma Mishra, Gurpreet Dhillon:
Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment. ECIS 2008: 1334-1345 - [c30]Michael Lapke, Gurpreet Dhillon:
Power Relationships in Information Systems Security Policy Formulation and Implementation. ECIS 2008: 1358-1369 - 2007
- [j30]Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, Jackie Rees:
Management of Information Security: Challenges and Research Directions. Commun. Assoc. Inf. Syst. 20: 57 (2007) - [j29]Gurpreet Dhillon
, Christopher Hall:
Introducing IT to Partners Financial Services: The case of a vision without direction. Int. J. Inf. Manag. 27(2): 139-148 (2007) - [j28]Gurpreet Dhillon
, James Backhouse, Amy W. Ray:
Editorial: JSIS Security and Privacy Special Issue. J. Strateg. Inf. Syst. 16(2): 127-129 (2007) - [c29]Jeffrey May, Gurpreet Dhillon:
Investigating the Development of a Multi-objective Decision Model that Seeks to Generate Informed Alternatives for Maximizing IS Security within an Organization. AMCIS 2007: 3 - [c28]Sushma Mishra, Gurpreet Dhillon:
A Theoretical Basis for Defining Internal Control Objectives for Information Systems Security. AMCIS 2007: 347 - [c27]Gurpreet Dhillon
, Gurvirender Tejay, Weiyin Hong:
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations. HICSS 2007: 157 - 2006
- [b1]Gurpreet Dhillon:
Principles of information systems security - text and cases. Wiley 2006, ISBN 978-0-471-45056-6, pp. I-XII, 1-451 - [j27]Gurpreet Dhillon
, Gholamreza Torkzadeh:
Value-focused assessment of information system security in organizations. Inf. Syst. J. 16(3): 293-314 (2006) - [c26]Michael Lapke, Gurpreet Dhillon:
A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study. AMCIS 2006: 166 - [c25]Manoj A. Thomas, Gurpreet Dhillon:
Deep Structures of Information Systems Security. AMCIS 2006: 419 - [c24]Gurpreet Dhillon
, Mikko T. Siponen, Raj Sharman:
Minitrack Introduction. HICSS 2006 - 2005
- [j26]Gurpreet Dhillon
:
Gaining benefits from IS/IT implementation: Interpretations from case studies. Int. J. Inf. Manag. 25(6): 502-515 (2005) - [j25]Gurpreet Dhillon, Frances Hauge Fabian:
A fractal perspective on competencies necessary for managing information systems. Int. J. Technol. Manag. 31(1/2): 129-139 (2005) - [c23]Mitchell R. Wenger, Gurpreet Dhillon, Mário M. Caldeira:
ERP Implementation in Portugal: Interpreting Dimensions of Power. AMCIS 2005: 348 - [c22]Santa R. Susarapu, Gurpreet Dhillon:
Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage. AMCIS 2005: 389 - [c21]Richard L. Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares:
Panel: Information systems security standards: The solution or the problem? ECIS 2005: 1780-1782 - [c20]Gurpreet Dhillon
, Mikko T. Siponen, Raj Sharman:
Mini Track: 'Information Systems Security Management'. HICSS 2005 - [c19]Elizabeth F. R. White, Gurpreet Dhillon:
Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems. HICSS 2005 - 2004
- [j24]Jerry Cha-Jan Chang, Gholamreza Torkzadeh, Gurpreet Dhillon
:
Re-examining the measurement models of success for Internet commerce. Inf. Manag. 41(5): 577-584 (2004) - [j23]Gurpreet Dhillon
:
Dimensions of power and IS implementation. Inf. Manag. 41(5): 635-644 (2004) - [j22]Gurpreet Dhillon
:
Guest Editorial: the challenge of managing information security. Int. J. Inf. Manag. 24(1): 3-4 (2004) - [j21]Gurpreet Dhillon
, Leiser Silva, James Backhouse:
Computer crime at CEFORMA: a case study. Int. J. Inf. Manag. 24(6): 551-561 (2004) - [c18]Mikko T. Siponen, Gurpreet Dhillon:
Information Systems Security Management: Minitrack Introduction. HICSS 2004 - [c17]Gurvirender Tejay, Gurpreet Dhillon
, Amita Goyal Chin:
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper). IICIS 2004: 21-39 - 2003
- [j20]Trevor T. Moores, Gurpreet Dhillon
:
Do privacy seals in e-commerce really work? Commun. ACM 46(12): 265-271 (2003) - [j19]Gurpreet Dhillon
, Ray Hackney:
Positioning IS/IT in networked firms. Int. J. Inf. Manag. 23(2): 163-169 (2003) - [j18]Ray Hackney, Janice M. Burn, Gurpreet Dhillon:
Strategic Planning for E-Commerce Systems (SPECS): Value Returns and Customer Alliance. Inf. Technol. Manag. 4(2-3): 135-138 (2003) - [j17]Sandy C. Chen, Gurpreet Dhillon:
Interpreting Dimensions of Consumer Trust in E-Commerce. Inf. Technol. Manag. 4(2-3): 303-318 (2003) - [j16]Randal Reid, Gurpreet Dhillon:
Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications. J. Database Manag. 14(2): 42-51 (2003) - [c16]Angela Mattia, Gurpreet Dhillon:
Applying double loop learning to interpret implications for information systems security design. SMC 2003: 2521-2526 - 2002
- [j15]Sanjeev Phukan, Gurpreet Dhillon:
Ethical and Intellectual Property Concerns in a Multicultural Global Economy. Electron. J. Inf. Syst. Dev. Ctries. 7(1): 1-9 (2002) - [j14]Gurpreet Dhillon
, John Ward:
Chaos Theory as a Framework for Studying Information Systems. Inf. Resour. Manag. J. 15(2): 1-13 (2002) - [j13]Gholamreza Torkzadeh, Gurpreet Dhillon:
Measuring Factors that Influence the Success of Internet Commerce. Inf. Syst. Res. 13(2): 187-204 (2002) - [c15]Gurpreet Dhillon, John Bardacino, Raymond A. Hackney:
Value Focused Assessment of Individual Privacy Concerns for Internet Commerce. ICIS 2002: 67 - 2001
- [j12]Gurpreet Dhillon
:
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. Comput. Secur. 20(2): 165-172 (2001) - [j11]Gurpreet Dhillon
, Steve Moore:
Computer crimes: theorizing about the enemy within. Comput. Secur. 20(8): 715-723 (2001) - [j10]Gurpreet Dhillon
, Trevor T. Moores:
Internet Privacy: Interpreting Key Issues. Inf. Resour. Manag. J. 14(4): 33-37 (2001) - [j9]Gurpreet Dhillon, James Backhouse:
Current directions in IS security research: towards socio-organizational perspectives. Inf. Syst. J. 11(2): 127-154 (2001) - [j8]Gurpreet Dhillon, Trevor T. Moores, Ray Hackney:
The Emergence of Networked Organizations in India: A Misalignment of Interests? J. Glob. Inf. Manag. 9(1): 25-30 (2001) - [c14]Gurpreet Dhillon, Gholamreza Torkzadeh:
Value-Focused Assessment of Information System Security in Organizations. ICIS 2001: 561-566 - [c13]Gurpreet Dhillon, Leiser Silva:
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study. Conference on Information Security Management & Small Systems Security 2001: 167-182 - [e1]Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. IFIP Conference Proceedings 200, Kluwer 2001, ISBN 0-7923-7506-8 [contents] - 2000
- [j7]Gurpreet Dhillon, James Backhouse:
Information system security management in the new millennium. Commun. ACM 43(7): 125-128 (2000) - [j6]Trevor T. Moores, Gurpreet Dhillon:
Software piracy: a view from Hong Kong. Commun. ACM 43(12): 88-93 (2000) - [j5]Ray Hackney, Janice M. Burn, Gurpreet Dhillon:
Challenging Assumptions for Strategic Information Systems Planning: Theoretical Perspectives. Commun. Assoc. Inf. Syst. 3: 9 (2000) - [j4]Gurpreet Dhillon, Mário M. Caldeira
:
Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. Inf. Manag. Comput. Secur. 8(4): 184-188 (2000) - [j3]Sanjeev Phukan, Gurpreet Dhillon
:
Ethics and information technology use: a survey of US based SMEs. Inf. Manag. Comput. Secur. 8(5): 239-243 (2000) - [c12]Gurpreet Dhillon:
Interpreting Key Issues in IS/IT Benefits Management. HICSS 2000 - [c11]Gurpreet Dhillon, Ray Hackney:
IS/IT and Dynamic Business Change. HICSS 2000 - [c10]Gurpreet Dhillon, Jungwoo Lee:
Value assessment of IS/IT service provision within organizations. ICIS 2000: 647-651 - [c9]Andrew S. Targowski, Gurpreet Dhillon:
What is information? A review of different perspectives. IRMA Conference 2000: 1142-1143 - [c8]Gurpreet Dhillon, Robert M. Davison:
Interpreting the Evolving Nature of Transactions in Cyberteaching. PACIS 2000: 42
1990 – 1999
- 1999
- [j2]Gurpreet Dhillon:
Managing and controlling computer misuse. Inf. Manag. Comput. Secur. 7(4): 171-175 (1999) - [c7]