Gurpreet Sing Dhillon
AuthID: R-000-RRS
101
TITLE: Semiotic analysis of knowledge intensive business processes: Developing interpretations for sustainable competitive advantage
AUTHORS: Susarapu, SR; Dhillon, GS;
PUBLISHED: 2005, SOURCE: 11th Americas Conference on Information Systems, AMCIS 2005 in Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale, VOLUME: 6
AUTHORS: Susarapu, SR; Dhillon, GS;
PUBLISHED: 2005, SOURCE: 11th Americas Conference on Information Systems, AMCIS 2005 in Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale, VOLUME: 6
INDEXED IN:
Scopus

IN MY:
ORCID

102
TITLE: Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)
AUTHORS: Tejay, G; Dhillon, G; Chin, AG;
PUBLISHED: 2005, SOURCE: IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems in IFIP Advances in Information and Communication Technology, VOLUME: 193
AUTHORS: Tejay, G; Dhillon, G; Chin, AG;
PUBLISHED: 2005, SOURCE: IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems in IFIP Advances in Information and Communication Technology, VOLUME: 193
INDEXED IN:
Scopus

IN MY:
ORCID

103
TITLE: Guest Editorial: The challenge of managing information security Full Text
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 1
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 1
104
TITLE: Dimensions of power and IS implementation Full Text
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
AUTHORS: Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
105
TITLE: Re-examining the measurement models of success for Internet commerce Full Text
AUTHORS: Chang, JCJ; Torkzadeh, G; Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
AUTHORS: Chang, JCJ; Torkzadeh, G; Dhillon, G;
PUBLISHED: 2004, SOURCE: Information and Management, VOLUME: 41, ISSUE: 5
106
TITLE: Computer crime at CEFORMA: A case study Full Text
AUTHORS: Dhillon, G; Silva, L; Backhouse, J;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 6
AUTHORS: Dhillon, G; Silva, L; Backhouse, J;
PUBLISHED: 2004, SOURCE: International Journal of Information Management, VOLUME: 24, ISSUE: 6
107
TITLE: Realizing benefits of an information security program
AUTHORS: Gurpreet Dhillon;
PUBLISHED: 2004, SOURCE: Business Process Management Journal, VOLUME: 10, ISSUE: 3
AUTHORS: Gurpreet Dhillon;
PUBLISHED: 2004, SOURCE: Business Process Management Journal, VOLUME: 10, ISSUE: 3
108
TITLE: Positioning IS/IT in networked firms Full Text
AUTHORS: Dhillon, G; Hackney, R;
PUBLISHED: 2003, SOURCE: International Journal of Information Management, VOLUME: 23, ISSUE: 2
AUTHORS: Dhillon, G; Hackney, R;
PUBLISHED: 2003, SOURCE: International Journal of Information Management, VOLUME: 23, ISSUE: 2
109
TITLE: Integrating digital signatures with relational databases: Issues and organizational implications
AUTHORS: Reid, R; Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
AUTHORS: Reid, R; Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
INDEXED IN:
Scopus

IN MY:
ORCID

110
TITLE: Data and information security
AUTHORS: Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
AUTHORS: Dhillon, G;
PUBLISHED: 2003, SOURCE: Journal of Database Management, VOLUME: 14, ISSUE: 1
INDEXED IN:
Scopus

IN MY:
ORCID
