Gurpreet Sing Dhillon
AuthID: R-000-RRS
101
TITLE: Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)
AUTHORS: Tejay, G; Dhillon, G; Chin, AG;
PUBLISHED: 2005, SOURCE: IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems in IFIP Advances in Information and Communication Technology, VOLUME: 193
AUTHORS: Tejay, G; Dhillon, G; Chin, AG;
PUBLISHED: 2005, SOURCE: IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems in IFIP Advances in Information and Communication Technology, VOLUME: 193
INDEXED IN: Scopus
IN MY: ORCID
102
TITLE: Guest Editorial: The challenge of managing information security Full Text
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 1
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 1
103
TITLE: Dimensions of power and IS implementation Full Text
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
104
TITLE: Re-examining the measurement models of success for Internet commerce Full Text
AUTHORS: Chang, JCJ; Torkzadeh, G; Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
AUTHORS: Chang, JCJ; Torkzadeh, G; Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
105
TITLE: Computer crime at CEFORMA: A case study Full Text
AUTHORS: Dhillon, G; Silva, L; Backhouse, J;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 6
AUTHORS: Dhillon, G; Silva, L; Backhouse, J;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 6
106
TITLE: Realizing benefits of an information security program
AUTHORS: Gurpreet Dhillon;
PUBLISHED: 2004, SOURCE: Business Process Management Journal, VOLUME: 10, ISSUE: 3
AUTHORS: Gurpreet Dhillon;
PUBLISHED: 2004, SOURCE: Business Process Management Journal, VOLUME: 10, ISSUE: 3
107
TITLE: Positioning IS/IT in networked firms Full Text
AUTHORS: Dhillon, G; Hackney, R;
PUBLISHED: 2003, SOURCE: International Journal of Information Management, VOLUME: 23, ISSUE: 2
AUTHORS: Dhillon, G; Hackney, R;
PUBLISHED: 2003, SOURCE: International Journal of Information Management, VOLUME: 23, ISSUE: 2
108
TITLE: Integrating digital signatures with relational databases: Issues and organizational implications
AUTHORS: Reid, R; Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
AUTHORS: Reid, R; Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
INDEXED IN: Scopus
IN MY: ORCID
109
TITLE: Data and information security
AUTHORS: Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
AUTHORS: Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
INDEXED IN: Scopus
IN MY: ORCID
110
TITLE: Applying double loop learning to interpret implications for information systems security design
AUTHORS: Mattia, A; Dhillon, G;
PUBLISHED: 2003, SOURCE: System Security and Assurance in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, VOLUME: 3
AUTHORS: Mattia, A; Dhillon, G;
PUBLISHED: 2003, SOURCE: System Security and Assurance in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, VOLUME: 3
INDEXED IN: Scopus
IN MY: ORCID