default search action
Gurpreet Dhillon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliveira:
Mobile Identity Protection: The Moderation Role of Self-Efficacy. Australas. J. Inf. Syst. 28 (2024) - [c68]Varvara Keba, Gurpreet Dhillon, Tiago Oliveira, Ronnie Das, Melanie Trabandt:
What Makes You Trust Digital Data Wallets? The Role of Platform Mechanisms on Trust Formation. AMCIS 2024 - 2023
- [j65]Berhanu Aebissa, Gurpreet Dhillon, Million Meshesha:
The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks. Comput. Secur. 130: 103248 (2023) - [j64]Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliveira:
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection. Comput. Secur. 134: 103470 (2023) - [j63]Tahmina Sultana, Gurpreet Dhillon, Tiago Oliveira:
The effect of fear and situational motivation on online information avoidance: The case of COVID-19. Int. J. Inf. Manag. 69: 102596 (2023) - [j62]Kane Smith, Gurpreet Dhillon:
Re-framing the policy conversation for preventing cyberstalking. Internet Res. 33(1): 84-123 (2023) - [c67]Smriti Srivastava, Gurpreet Dhillon:
Online Sex Trafficking Policy Research: A Systematic Review. AMCIS 2023 - [c66]Yasser Al Helaly, Gurpreet Dhillon, Tiago Oliveira:
The Impact of Online Advertisment Personalization and Transparency on Individual Defensive responses and Engagment. ECIS 2023 - 2022
- [j61]Franck Soh, Kane Smith, Gurpreet Dhillon:
The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Australas. J. Inf. Syst. 26 (2022) - [j60]Kane J. Smith, Gurpreet Dhillon, Brigid A. Otoo:
iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Inf. Syst. Frontiers 24(6): 1989-2006 (2022) - [c65]Ming Xiao, Gurpreet Dhillon, Kane J. Smith:
A Review of Cyberattack Research using Latent Dirichlet Allocation. AMCIS 2022 - 2021
- [j59]Kane J. Smith, Gurpreet Dhillon, Lemuria D. Carter:
User values and the development of a cybersecurity public policy for the IoT. Int. J. Inf. Manag. 56: 102123 (2021) - [j58]Gurpreet Dhillon, Kane Smith, Indika Dissanayaka:
Information systems security research agenda: Exploring the gap between research and practice. J. Strateg. Inf. Syst. 30(4): 101693 (2021) - [c64]Nabid Alam, Gurpreet Dhillon, Tiago Oliveira:
Psychological Antecedents and Consequences of Online Romance Scam Victimization Fear. AMCIS 2021 - [c63]Yasser Alhelaly, Gurpreet Dhillon, Tiago Oliveira:
Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection. ICIS 2021 - 2020
- [j57]Spyridon Samonas, Gurpreet Dhillon, Ahlam Almusharraf:
Stakeholder perceptions of information security policy: Analyzing personal constructs. Int. J. Inf. Manag. 50: 144-154 (2020) - [j56]Gurpreet Dhillon, Yurita Yakimini Abdul Talib, Winnie Ng Picoto:
The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions. J. Assoc. Inf. Syst. 21(1): 5 (2020) - [j55]David Lewis Coss, Gurpreet Dhillon:
A Framework for Auditing and Strategizing to Ensure Cloud Privacy. J. Inf. Syst. 34(2): 47-63 (2020)
2010 – 2019
- 2019
- [j54]Romilla Syed, Gurpreet Dhillon, Jason R. W. Merrick:
The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media. Decis. Sci. 50(3): 498-536 (2019) - [j53]David Lewis Coss, Gurpreet Dhillon:
Cloud privacy objectives a value based approach. Inf. Comput. Secur. 27(2): 189-220 (2019) - [c62]Kane Smith, Gurpreet Dhillon:
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential. AMCIS 2019 - [c61]Kane J. Smith, Gurpreet Dhillon, Ella Kolkowska:
Important Issues for Preventing Cyberstalking in India. AMCIS 2019 - [c60]Saumitra Mishra, Sreehari Rammohan, Khalid Z. Rajab, Gurpreet Dhillon, Pier Lambiase, Ross Hunter, Elaine Chew:
Atrial Fibrillation Stratification Via Super-Resolution Analysis of Fibrillatory Waves. CinC 2019: 1-4 - [e3]Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 562, Springer 2019, ISBN 978-3-030-22311-3 [contents] - 2018
- [j52]Gurpreet Dhillon, Tiago Oliveira, Romilla Syed:
Value-based information privacy objectives for Internet Commerce. Comput. Hum. Behav. 87: 292-307 (2018) - [j51]Kane Smith, Gurpreet Dhillon, Karin Hedström:
Reconciling value-based objectives for security and identity management. Inf. Comput. Secur. 26(2): 194-212 (2018) - [c59]Gurpreet Dhillon, Gholamreza Torkzadeh, Jerry C. Chang:
Strategic Planning for IS Security: Designing Objectives. DESRIST 2018: 285-299 - [c58]Kane Smith, Gurpreet Dhillon:
Eliciting Societal Values for Health Information Policy Decisions. ICIS 2018 - 2017
- [j50]Tiago Oliveira, Matilde Alhinho, Paulo Rita, Gurpreet Dhillon:
Modelling and testing consumer trust dimensions in e-commerce. Comput. Hum. Behav. 71: 153-164 (2017) - [j49]Gurpreet Dhillon, Romilla Syed, Filipe de Sá-Soares:
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors. Inf. Manag. 54(4): 452-464 (2017) - [c57]Kane Smith, Gurpreet Dhillon:
Blockchain for Digital Crime Prevention: The Case of Health Informatics. AMCIS 2017 - [c56]Joseph B. Walton, Gurpreet Dhillon:
Understanding Digital Crime, Trust, and Control in Blockchain Technologies. AMCIS 2017 - [c55]Gurpreet Dhillon, Kane Smith, Monica C. Tremblay:
Blockchain for Privacy and Security: The Case of Health Informatics. AMIA 2017 - 2016
- [j48]Gurpreet Dhillon, Tiago Oliveira, Santa R. Susarapu, Mário M. Caldeira:
Deciding between information security and usability: Developing value based objectives. Comput. Hum. Behav. 61: 656-666 (2016) - [j47]Gurpreet Dhillon, Romilla Syed, Cristiane Pedron:
Interpreting information security culture: An organizational transformation case study. Comput. Secur. 56: 63-69 (2016) - [j46]Cristiane Drebes-Pedron, Winnie Ng Picoto, Gurpreet Dhillon, Mário M. Caldeira:
Value-focused objectives for CRM system adoption. Ind. Manag. Data Syst. 116(3): 526-545 (2016) - [c54]Javad Abed, Gurpreet Dhillon, Sevgi Ozkan:
Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model. AMCIS 2016 - [c53]Gurpreet Dhillon:
Money Laundering and Technology Enabled Crime: a cultural analysis. AMCIS 2016 - [c52]Gurpreet Dhillon, Dan Harnesk:
Misunderstandings and Misjudgments about Security: A Dialogical Narrative Analysis of Global IT Offshoring. AMCIS 2016 - [c51]Chris Merritt, Gurpreet Dhillon:
What Interrupts Intention to Comply with IS-Security Policy? AMCIS 2016 - [c50]Rui Silva, Gurpreet Dhillon, Winnie Picoto:
Competence-based Model for Securing the in-Ternet of Things in Organizations. ECIS 2016: Research-in-Progress Paper 58 - [c49]Kane Smith, Gurpreet Dhillon:
Eliciting Societal Values About Cyberstalking Policy Decisions. ICIS 2016 - [c48]Gurpreet Dhillon, Spyridon Samonas, Ugo Etudo:
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research. SEC 2016: 49-61 - [c47]Gurpreet Dhillon, Chandrashekar Challa, Kane Smith:
Defining Objectives for Preventing Cyberstalking. SEC 2016: 76-87 - 2015
- [j45]Michael Lapke, Gurpreet Dhillon:
Disassociations in Security Policy Lifecycles. Int. J. Inf. Secur. Priv. 9(1): 62-77 (2015) - [j44]Tiago Oliveira, Gurpreet Dhillon:
From Adoption to Routinization of B2B e-Commerce: Understanding Patterns Across Europe. J. Glob. Inf. Manag. 23(1): 24-43 (2015) - [c46]Ahlam Almusharraf, Gurpreet Dhillon, Spyridon Samonas:
Mismatched Understanding of IS Security Policy: A RepGrid Analysis. AMCIS 2015 - [c45]Mário M. Caldeira, Gurpreet Dhillon, Simran Dhillon:
Capturing Experiences to Inform Organizational Intelligence: The Case of IT Service Competence. AMCIS 2015 - [c44]Romilla Syed, Gurpreet Dhillon:
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation. ICIS 2015 - [c43]Yurita Abdul Talib, Gurpreet Dhillon:
Employee ISP Compliance Intentions: An Empirical Test of Empowerment. ICIS 2015 - [c42]Sérgio Nunes, Gurpreet Dhillon, Mário M. Caldeira:
Multi-Objective Decision Model for Information Systems Risk. UKAIS 2015: 7 - 2014
- [j43]Weiyin Hong, Frank K. Y. Chan, James Y. L. Thong, Lewis C. Chasalow, Gurpreet Dhillon:
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research. Inf. Syst. Res. 25(1): 111-136 (2014) - [c41]Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron:
Organizational Transformation and Information Security Culture: A Telecom Case Study. SEC 2014: 431-437 - 2013
- [j42]Sriraman Ramachandran, Chino Rao, Tim Goles, Gurpreet Dhillon:
Variations in Information Security Cultures across Professions: A Qualitative Study. Commun. Assoc. Inf. Syst. 33: 11 (2013) - [j41]Ella Kolkowska, Gurpreet Dhillon:
Organizational power and information security rule compliance. Comput. Secur. 33: 3-11 (2013) - [j40]Jeffrey May, Gurpreet Dhillon, Mário M. Caldeira:
Defining value-based objectives for ERP systems planning. Decis. Support Syst. 55(1): 98-109 (2013) - [c40]Gurpreet Dhillon, Romilla Chowdhuri:
Individual values for protecting identity in social networks. ICIS 2013 - [c39]Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares:
Secure Outsourcing: An Investigation of the Fit between Clients and Providers. SEC 2013: 405-418 - 2012
- [j39]Manoj A. Thomas, Gurpreet Dhillon:
Interpreting Deep Structures of Information Systems Security. Comput. J. 55(10): 1148-1156 (2012) - [c38]Faisal M. Nasution, Gurpreet Dhillon:
Shaping of Security Policy in an Indonesian Bank: Interpreting Institutionalization and Structuration. ECIS 2012: 125 - [c37]Gurpreet Dhillon, Tiago Oliveira, Santa R. Susarapu, Mário M. Caldeira:
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. SEC 2012: 352-363 - 2011
- [j38]Kirstin Gillon, Louis Branz, Mary J. Culnan, Gurpreet Dhillon, Robert Hodgkinson, Alastair MacWillson:
Information Security and Privacy - Rethinking Governance Models. Commun. Assoc. Inf. Syst. 28: 33 (2011) - [j37]Weiyin Hong, James Y. L. Thong, Lewis C. Chasalow, Gurpreet Dhillon:
User Acceptance of Agile Information Systems: A Model and Empirical Test. J. Manag. Inf. Syst. 28(1): 235-272 (2011) - [j36]Gurpreet Dhillon, Mário M. Caldeira, Mitchell R. Wenger:
Intentionality and power interplay in IS implementation: The case of an asset management firm. J. Strateg. Inf. Syst. 20(4): 438-448 (2011) - [c36]Ella Kolkowska, Gurpreet Dhillon:
Organizational Power and Information Security Rule Compliance. SEC 2011: 185-196 - [p1]Gurpreet Dhillon, Ella Kolkowska:
Can a Cloud Be Really Secure? A Socratic Dialogue. Computers, Privacy and Data Protection 2011: 345-360 - 2010
- [j35]Mário M. Caldeira, Gurpreet Dhillon:
Are we really competent?: Assessing organizational ability in delivering IT benefits. Bus. Process. Manag. J. 16(1): 5-28 (2010) - [j34]Gurpreet Dhillon, Mário M. Caldeira:
The implementation of the Spa Select System: Coming to grips with the cog in the machine. Int. J. Inf. Manag. 30(1): 38-46 (2010) - [c35]Jeffrey May, Gurpreet Dhillon:
A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation. ECIS 2010: 146 - [c34]Robert Hodgkinson, Louis Branz, Mary J. Culnan, Gurpreet Dhillon, Alastair MacWillson, Larry Ponemon:
Information Security and Privacy: Rethinking Governance Models. ICIS 2010: 38 - [c33]Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson:
Using Actor Network Theory to Understand Information Security Management. SEC 2010: 43-54
2000 – 2009
- 2009
- [j33]Jeffrey May, Gurpreet Dhillon:
Interpreting Beyond Syntactics: A Semiotic Learning Model of Computer Programming Languages. J. Inf. Syst. Educ. 20(4): 431-438 (2009) - [c32]Gurpreet Dhillon, Bernd Carsten Stahl, Richard L. Baskerville:
Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems. CreativeSME 2009: 1-9 - [e2]Gurpreet Dhillon, Bernd Carsten Stahl, Richard L. Baskerville:
Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises - IFIP WG 8.2 International Conference, CreativeSME 2009, Guimarães, Portugal, June 21-24, 2009. Proceedings. IFIP Advances in Information and Communication Technology 301, Springer 2009, ISBN 978-3-642-02387-3 [contents] - 2008
- [j32]Gurpreet Dhillon:
Organizational competence for harnessing IT: A case study. Inf. Manag. 45(5): 297-303 (2008) - [j31]Gurpreet Dhillon, Mário M. Caldeira:
A bumpy road to success (or not): The case of Project Genesis at Nevada DMV. Int. J. Inf. Manag. 28(3): 222-228 (2008) - [c31]Sushma Mishra, Gurpreet Dhillon:
Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment. ECIS 2008: 1334-1345 - [c30]Michael Lapke, Gurpreet Dhillon:
Power Relationships in Information Systems Security Policy Formulation and Implementation. ECIS 2008: 1358-1369 - 2007
- [j30]Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, Jackie Rees:
Management of Information Security: Challenges and Research Directions. Commun. Assoc. Inf. Syst. 20: 57 (2007) - [j29]Gurpreet Dhillon, Christopher Hall:
Introducing IT to Partners Financial Services: The case of a vision without direction. Int. J. Inf. Manag. 27(2): 139-148 (2007) - [j28]Gurpreet Dhillon, James Backhouse, Amy W. Ray:
Editorial: JSIS Security and Privacy Special Issue. J. Strateg. Inf. Syst. 16(2): 127-129 (2007) - [c29]Jeffrey May, Gurpreet Dhillon:
Investigating the Development of a Multi-objective Decision Model that Seeks to Generate Informed Alternatives for Maximizing IS Security within an Organization. AMCIS 2007: 3 - [c28]Sushma Mishra, Gurpreet Dhillon:
A Theoretical Basis for Defining Internal Control Objectives for Information Systems Security. AMCIS 2007: 347 - [c27]Gurpreet Dhillon, Gurvirender Tejay, Weiyin Hong:
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations. HICSS 2007: 157 - 2006
- [b1]Gurpreet Dhillon:
Principles of information systems security - text and cases. Wiley 2006, ISBN 978-0-471-45056-6, pp. I-XII, 1-451 - [j27]Gurpreet Dhillon, Gholamreza Torkzadeh:
Value-focused assessment of information system security in organizations. Inf. Syst. J. 16(3): 293-314 (2006) - [c26]Michael Lapke, Gurpreet Dhillon:
A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study. AMCIS 2006: 166 - [c25]Manoj A. Thomas, Gurpreet Dhillon:
Deep Structures of Information Systems Security. AMCIS 2006: 419 - [c24]Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman:
Minitrack Introduction. HICSS 2006 - 2005
- [j26]Gurpreet Dhillon:
Gaining benefits from IS/IT implementation: Interpretations from case studies. Int. J. Inf. Manag. 25(6): 502-515 (2005) - [j25]Gurpreet Dhillon, Frances Hauge Fabian:
A fractal perspective on competencies necessary for managing information systems. Int. J. Technol. Manag. 31(1/2): 129-139 (2005) - [c23]Mitchell R. Wenger, Gurpreet Dhillon, Mário M. Caldeira:
ERP Implementation in Portugal: Interpreting Dimensions of Power. AMCIS 2005: 348 - [c22]Santa R. Susarapu, Gurpreet Dhillon:
Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage. AMCIS 2005: 389 - [c21]Richard L. Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares:
Panel: Information systems security standards: The solution or the problem? ECIS 2005: 1780-1782 - [c20]Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman:
Mini Track: 'Information Systems Security Management'. HICSS 2005 - [c19]Elizabeth F. R. White, Gurpreet Dhillon:
Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems. HICSS 2005 - 2004
- [j24]Jerry Cha-Jan Chang, Gholamreza Torkzadeh, Gurpreet Dhillon:
Re-examining the measurement models of success for Internet commerce. Inf. Manag. 41(5): 577-584 (2004) - [j23]Gurpreet Dhillon:
Dimensions of power and IS implementation. Inf. Manag. 41(5): 635-644 (2004) - [j22]Gurpreet Dhillon:
Guest Editorial: the challenge of managing information security. Int. J. Inf. Manag. 24(1): 3-4 (2004) - [j21]Gurpreet Dhillon, Leiser Silva, James Backhouse:
Computer crime at CEFORMA: a case study. Int. J. Inf. Manag. 24(6): 551-561 (2004) - [c18]Mikko T. Siponen, Gurpreet Dhillon:
Information Systems Security Management: Minitrack Introduction. HICSS 2004 - [c17]Gurvirender Tejay, Gurpreet Dhillon, Amita Goyal Chin:
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper). IICIS 2004: 21-39 - 2003
- [j20]Trevor T. Moores, Gurpreet Dhillon:
Do privacy seals in e-commerce really work? Commun. ACM 46(12): 265-271 (2003) - [j19]Gurpreet Dhillon, Ray Hackney:
Positioning IS/IT in networked firms. Int. J. Inf. Manag. 23(2): 163-169 (2003) - [j18]Ray Hackney, Janice M. Burn, Gurpreet Dhillon:
Strategic Planning for E-Commerce Systems (SPECS): Value Returns and Customer Alliance. Inf. Technol. Manag. 4(2-3): 135-138 (2003) - [j17]Sandy C. Chen, Gurpreet Dhillon:
Interpreting Dimensions of Consumer Trust in E-Commerce. Inf. Technol. Manag. 4(2-3): 303-318 (2003) - [j16]Randal Reid, Gurpreet Dhillon:
Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications. J. Database Manag. 14(2): 42-51 (2003) - [c16]Angela Mattia, Gurpreet Dhillon:
Applying double loop learning to interpret implications for information systems security design. SMC 2003: 2521-2526 - 2002
- [j15]Sanjeev Phukan, Gurpreet Dhillon:
Ethical and Intellectual Property Concerns in a Multicultural Global Economy. Electron. J. Inf. Syst. Dev. Ctries. 7(1): 1-9 (2002) - [j14]Gurpreet Dhillon, John Ward:
Chaos Theory as a Framework for Studying Information Systems. Inf. Resour. Manag. J. 15(2): 1-13 (2002) - [j13]Gholamreza Torkzadeh, Gurpreet Dhillon:
Measuring Factors that Influence the Success of Internet Commerce. Inf. Syst. Res. 13(2): 187-204 (2002) - [c15]Gurpreet Dhillon, John Bardacino, Raymond A. Hackney:
Value Focused Assessment of Individual Privacy Concerns for Internet Commerce. ICIS 2002: 67 - 2001
- [j12]Gurpreet Dhillon:
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. Comput. Secur. 20(2): 165-172 (2001) - [j11]Gurpreet Dhillon, Steve Moore:
Computer crimes: theorizing about the enemy within. Comput. Secur. 20(8): 715-723 (2001) - [j10]Gurpreet Dhillon, Trevor T. Moores:
Internet Privacy: Interpreting Key Issues. Inf. Resour. Manag. J. 14(4): 33-37 (2001) - [j9]Gurpreet Dhillon, James Backhouse:
Current directions in IS security research: towards socio-organizational perspectives. Inf. Syst. J. 11(2): 127-154 (2001) - [j8]Gurpreet Dhillon, Trevor T. Moores, Ray Hackney:
The Emergence of Networked Organizations in India: A Misalignment of Interests? J. Glob. Inf. Manag. 9(1): 25-30 (2001) - [c14]Gurpreet Dhillon, Gholamreza Torkzadeh:
Value-Focused Assessment of Information System Security in Organizations. ICIS 2001: 561-566 - [c13]Gurpreet Dhillon, Leiser Silva:
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study. Conference on Information Security Management & Small Systems Security 2001: 167-182 - [e1]Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. IFIP Conference Proceedings 200, Kluwer 2001, ISBN 0-7923-7506-8 [contents] - 2000
- [j7]Gurpreet Dhillon, James Backhouse:
Information system security management in the new millennium. Commun. ACM 43(7): 125-128 (2000) - [j6]Trevor T. Moores, Gurpreet Dhillon:
Software piracy: a view from Hong Kong. Commun. ACM 43(12): 88-93 (2000) - [j5]Ray Hackney, Janice M. Burn, Gurpreet Dhillon:
Challenging Assumptions for Strategic Information Systems Planning: Theoretical Perspectives. Commun. Assoc. Inf. Syst. 3: 9 (2000) - [j4]Gurpreet Dhillon, Mário M. Caldeira:
Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. Inf. Manag. Comput. Secur. 8(4): 184-188 (2000) - [j3]Sanjeev Phukan, Gurpreet Dhillon:
Ethics and information technology use: a survey of US based SMEs. Inf. Manag. Comput. Secur. 8(5): 239-243 (2000) - [c12]Gurpreet Dhillon:
Interpreting Key Issues in IS/IT Benefits Management. HICSS 2000 - [c11]Gurpreet Dhillon, Ray Hackney:
IS/IT and Dynamic Business Change. HICSS 2000 - [c10]Gurpreet Dhillon, Jungwoo Lee:
Value assessment of IS/IT service provision within organizations. ICIS 2000: 647-651 - [c9]Andrew S. Targowski, Gurpreet Dhillon:
What is information? A review of different perspectives. IRMA Conference 2000: 1142-1143 - [c8]Gurpreet Dhillon, Robert M. Davison:
Interpreting the Evolving Nature of Transactions in Cyberteaching. PACIS 2000: 42
1990 – 1999
- 1999
- [j2]Gurpreet Dhillon:
Managing and controlling computer misuse. Inf. Manag. Comput. Secur. 7(4): 171-175 (1999) - [c7]Ray Hackney, Gurpreet Dhillon, Neil McBride, Shalini Kesar:
Interpreting IS/IT Decision Support in the UK Primary Health Care System: Issues of Consumer Orientation and Structures. HICSS 1999 - 1997
- [c6]Leiser Silva, Gurpreet Dhillon, James Backhouse:
Developing A Networked Authority: Nature and Significance of Power Relationships. ECIS 1997: 511-525 - [c5]Mário M. Caldeira, Gurpreet Dhillon:
Factors Affecting the Use and Adoption of EDI in Manufacturing SMEs: Experiences From Portugal. ECIS 1997: 1184-1190 - [c4]Gurpreet Dhillon, Tony Cornford, Ray Hackney, Neil McBride, Leiser Silva:
Panel: Developing An Ethical Agenda for A Networked Workplace. ECIS 1997: 1535-1536 - 1996
- [c3]Gurpreet Dhillon, Ray Hackney:
Developing Integrated Solutions in the Health Care Environment: A Case Study. ECIS 1996: 1163-1172 - [c2]Gurpreet Dhillon, Joe Peppard, Tony Cornford, Soumitra Dutta, Dror Pockard, Norbert Reekers:
Information management competencies in global enterprises. ECIS 1996: 1347-1349 - 1995
- [j1]James Backhouse, Gurpreet Dhillon:
Managing computer crime: a research outlook. Comput. Secur. 14(7): 645-651 (1995) - [c1]James Backhouse, Gurpreet Dhillon:
Electronic thesaurus for clinical terms: A methodological approach. ECIS 1995: 591-600
Coauthor Index
aka: Kane J. Smith
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint