Gurpreet Sing Dhillon
AuthID: R-000-RRS
21
TITLE: Cloud privacy objectives a value based approach
AUTHORS: David Lewis Coss; Gurpreet Dhillon;
PUBLISHED: 2019, SOURCE: Information and Computer Security, VOLUME: 27, ISSUE: 2
AUTHORS: David Lewis Coss; Gurpreet Dhillon;
PUBLISHED: 2019, SOURCE: Information and Computer Security, VOLUME: 27, ISSUE: 2
22
TITLE: Value-based information privacy objectives for Internet Commerce
AUTHORS: Dhillon, G; Oliveira, T; Syed, R;
PUBLISHED: 2018, SOURCE: COMPUTERS IN HUMAN BEHAVIOR, VOLUME: 87
AUTHORS: Dhillon, G; Oliveira, T; Syed, R;
PUBLISHED: 2018, SOURCE: COMPUTERS IN HUMAN BEHAVIOR, VOLUME: 87
23
TITLE: Eliciting societal values for healthcare policy decisions
AUTHORS: Kane J Smith; Gurpreet Dhillon;
PUBLISHED: 2018, SOURCE: International Conference on Information Systems 2018, ICIS 2018
AUTHORS: Kane J Smith; Gurpreet Dhillon;
PUBLISHED: 2018, SOURCE: International Conference on Information Systems 2018, ICIS 2018
INDEXED IN:
Scopus

IN MY:
ORCID

24
TITLE: Reconciling value-based objectives for security and identity management
AUTHORS: Kane J Smith; Gurpreet Dhillon; Karin Hedström;
PUBLISHED: 2018, SOURCE: Information and Computer Security, VOLUME: 26, ISSUE: 2
AUTHORS: Kane J Smith; Gurpreet Dhillon; Karin Hedström;
PUBLISHED: 2018, SOURCE: Information and Computer Security, VOLUME: 26, ISSUE: 2
25
TITLE: Strategic planning for IS security: Designing objectives
AUTHORS: Gurpreet Dhillon; Gholamreza Torkzadeh; Jerry Chang;
PUBLISHED: 2018, SOURCE: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 10844 LNCS
AUTHORS: Gurpreet Dhillon; Gholamreza Torkzadeh; Jerry Chang;
PUBLISHED: 2018, SOURCE: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 10844 LNCS
26
TITLE: Modelling and testing consumer trust dimensions in e-commerce
AUTHORS: Oliveira, T; Alhinho, M; Rita, P; Dhillon, G;
PUBLISHED: 2017, SOURCE: COMPUTERS IN HUMAN BEHAVIOR, VOLUME: 71
AUTHORS: Oliveira, T; Alhinho, M; Rita, P; Dhillon, G;
PUBLISHED: 2017, SOURCE: COMPUTERS IN HUMAN BEHAVIOR, VOLUME: 71
27
TITLE: Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors
AUTHORS: Gurpreet Dhillon; Romilla Syed; Filipe de Sá Soares;
PUBLISHED: 2017, SOURCE: Information and Management, VOLUME: 54, ISSUE: 4
AUTHORS: Gurpreet Dhillon; Romilla Syed; Filipe de Sá Soares;
PUBLISHED: 2017, SOURCE: Information and Management, VOLUME: 54, ISSUE: 4
28
TITLE: Blockchain for digital crime prevention: The case of health informatics
AUTHORS: Kane J Smith; Gurpreet Dhillon;
PUBLISHED: 2017, SOURCE: AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation, VOLUME: 2017-August
AUTHORS: Kane J Smith; Gurpreet Dhillon;
PUBLISHED: 2017, SOURCE: AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation, VOLUME: 2017-August
INDEXED IN:
Scopus

IN MY:
ORCID

29
TITLE: Understanding digital crime, trust, and control in blockchain technologies
AUTHORS: Joseph B Walton; Gurpreet Dhillon;
PUBLISHED: 2017, SOURCE: AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation, VOLUME: 2017-August
AUTHORS: Joseph B Walton; Gurpreet Dhillon;
PUBLISHED: 2017, SOURCE: AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation, VOLUME: 2017-August
INDEXED IN:
Scopus

IN MY:
ORCID

30
TITLE: Interpreting information security culture: An organizational transformation case study Full Text
AUTHORS: Gurpreet Dhillon; Romilla Syed; Cristiane Pedron;
PUBLISHED: 2016, SOURCE: COMPUTERS & SECURITY, VOLUME: 56
AUTHORS: Gurpreet Dhillon; Romilla Syed; Cristiane Pedron;
PUBLISHED: 2016, SOURCE: COMPUTERS & SECURITY, VOLUME: 56