Gurpreet Dhillon
Orcid: 0000-0002-0487-4050
According to our database1,
Gurpreet Dhillon
authored at least 134 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isy.vcu.edu
On csauthors.net:
Bibliography
2024
Australas. J. Inf. Syst., 2024
What Makes You Trust Digital Data Wallets? The Role of Platform Mechanisms on Trust Formation.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection.
Comput. Secur., November, 2023
The effect of fear and situational motivation on online information avoidance: The case of COVID-19.
Int. J. Inf. Manag., April, 2023
The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks.
Comput. Secur., 2023
The Impact of Online Advertisment Personalization and Transparency on Individual Defensive responses and Engagment.
Proceedings of the 31st European Conference on Information Systems, 2023
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation.
Inf. Syst. Frontiers, 2022
The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy.
Australas. J. Inf. Syst., 2022
Proceedings of the 28th Americas Conference on Information Systems, 2022
2021
Information systems security research agenda: Exploring the gap between research and practice.
J. Strateg. Inf. Syst., 2021
Int. J. Inf. Manag., 2021
Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection.
Proceedings of the 42nd International Conference on Information Systems, 2021
Psychological Antecedents and Consequences of Online Romance Scam Victimization Fear.
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
J. Inf. Syst., 2020
The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions.
J. Assoc. Inf. Syst., 2020
Stakeholder perceptions of information security policy: Analyzing personal constructs.
Int. J. Inf. Manag., 2020
2019
The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media.
Decis. Sci., 2019
Atrial Fibrillation Stratification Via Super-Resolution Analysis of Fibrillatory Waves.
Proceedings of the 46th Computing in Cardiology, 2019
Proceedings of the 25th Americas Conference on Information Systems, 2019
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential.
Proceedings of the 25th Americas Conference on Information Systems, 2019
2018
Inf. Comput. Secur., 2018
Comput. Hum. Behav., 2018
Proceedings of the International Conference on Information Systems, 2018
Proceedings of the Designing for a Digital and Globalized World, 2018
2017
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors.
Inf. Manag., 2017
Comput. Hum. Behav., 2017
Proceedings of the AMIA 2017, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Interpreting information security culture: An organizational transformation case study.
Comput. Secur., 2016
Deciding between information security and usability: Developing value based objectives.
Comput. Hum. Behav., 2016
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the International Conference on Information Systems, 2016
Proceedings of the 24th European Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Misunderstandings and Misjudgments about Security: A Dialogical Narrative Analysis of Global IT Offshoring.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
From Adoption to Routinization of B2B e-Commerce: Understanding Patterns Across Europe.
J. Glob. Inf. Manag., 2015
Proceedings of the UKAIS 2015, 2015
Proceedings of the International Conference on Information Systems, 2015
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation.
Proceedings of the International Conference on Information Systems, 2015
Capturing Experiences to Inform Organizational Intelligence: The Case of IT Service Competence.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research.
Inf. Syst. Res., 2014
Organizational Transformation and Information Security Culture: A Telecom Case Study.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
2013
Commun. Assoc. Inf. Syst., 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the International Conference on Information Systems, 2013
2012
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems.
Proceedings of the Information Security and Privacy Research, 2012
Shaping of Security Policy in an Indonesian Bank: Interpreting Institutionalization and Structuration.
Proceedings of the 20th European Conference on Information Systems, 2012
2011
Intentionality and power interplay in IS implementation: The case of an asset management firm.
J. Strateg. Inf. Syst., 2011
J. Manag. Inf. Syst., 2011
Commun. Assoc. Inf. Syst., 2011
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011
2010
The implementation of the Spa Select System: Coming to grips with the cog in the machine.
Int. J. Inf. Manag., 2010
Are we really competent?: Assessing organizational ability in delivering IT benefits.
Bus. Process. Manag. J., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the International Conference on Information Systems, 2010
A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation.
Proceedings of the 18th European Conference on Information Systems, 2010
2009
Interpreting Beyond Syntactics: A Semiotic Learning Model of Computer Programming Languages.
J. Inf. Syst. Educ., 2009
Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems.
Proceedings of the Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises, 2009
2008
Int. J. Inf. Manag., 2008
Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment.
Proceedings of the 16th European Conference on Information Systems, 2008
Power Relationships in Information Systems Security Policy Formulation and Implementation.
Proceedings of the 16th European Conference on Information Systems, 2008
2007
Introducing IT to Partners Financial Services: The case of a vision without direction.
Int. J. Inf. Manag., 2007
Commun. Assoc. Inf. Syst., 2007
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
A Theoretical Basis for Defining Internal Control Objectives for Information Systems Security.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Investigating the Development of a Multi-objective Decision Model that Seeks to Generate Informed Alternatives for Maximizing IS Security within an Organization.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Inf. Syst. J., 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
Principles of information systems security - text and cases.
Wiley, ISBN: 978-0-471-45056-6, 2006
2005
Int. J. Technol. Manag., 2005
Int. J. Inf. Manag., 2005
Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 13th European Conference on Information Systems, 2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
Int. J. Inf. Manag., 2004
Inf. Manag., 2004
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications.
J. Database Manag., 2003
Strategic Planning for E-Commerce Systems (SPECS): Value Returns and Customer Alliance.
Inf. Technol. Manag., 2003
Applying double loop learning to interpret implications for information systems security design.
Proceedings of the IEEE International Conference on Systems, 2003
2002
Inf. Syst. Res., 2002
Inf. Resour. Manag. J., 2002
Electron. J. Inf. Syst. Dev. Ctries., 2002
Proceedings of the International Conference on Information Systems, 2002
2001
J. Glob. Inf. Manag., 2001
Current directions in IS security research: towards socio-organizational perspectives.
Inf. Syst. J., 2001
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns.
Comput. Secur., 2001
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
2000
Inf. Manag. Comput. Secur., 2000
Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry.
Inf. Manag. Comput. Secur., 2000
Challenging Assumptions for Strategic Information Systems Planning: Theoretical Perspectives.
Commun. Assoc. Inf. Syst., 2000
Proceedings of the Fourth Pacific Asia Conference on Information Systems, 2000
What is information? A review of different perspectives.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000
Proceedings of the Twenty-First International Conference on Information Systems, 2000
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000
1999
Interpreting IS/IT Decision Support in the UK Primary Health Care System: Issues of Consumer Orientation and Structures.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999
1997
Developing A Networked Authority: Nature and Significance of Power Relationships.
Proceedings of the Fifth European Conference on Information Systems, 1997
Panel: Developing An Ethical Agenda for A Networked Workplace.
Proceedings of the Fifth European Conference on Information Systems, 1997
Factors Affecting the Use and Adoption of EDI in Manufacturing SMEs: Experiences From Portugal.
Proceedings of the Fifth European Conference on Information Systems, 1997
1996
Information management competencies in global enterprises.
Proceedings of the Fourth European Conference on Information Systems, 1996
Developing Integrated Solutions in the Health Care Environment: A Case Study.
Proceedings of the Fourth European Conference on Information Systems, 1996
1995
Electronic thesaurus for clinical terms: A methodological approach.
Proceedings of the Third European Conference on Information Systems, 1995