51
TITLE: A framework and guidelines for context-specific theorizing in information systems research
AUTHORS: Weiyin Hong; Frank K Y Chan; James Y L Thong; Lewis C Chasalow; Gurpreet Dhillon;
PUBLISHED: 2014, SOURCE: Information Systems Research, VOLUME: 25, ISSUE: 1
INDEXED IN: Scopus CrossRef: 345
IN MY: ORCID
52
TITLE: Defining value-based objectives for ERP systems planning  Full Text
AUTHORS: Jeffrey May; Gurpreet Dhillon; Mario Caldeira ;
PUBLISHED: 2013, SOURCE: DECISION SUPPORT SYSTEMS, VOLUME: 55, ISSUE: 1
INDEXED IN: Scopus WOS CrossRef
IN MY: ORCID
53
TITLE: Secure outsourcing: An investigation of the fit between clients and providers
AUTHORS: Dhillon, G; Chowdhuri, R; De Sa Soares, F;
PUBLISHED: 2013, SOURCE: 28th IFIP TC 11 International Conference on Information Security and privacy conference, SEC 2013 in IFIP Advances in Information and Communication Technology, VOLUME: 405
INDEXED IN: Scopus CrossRef
IN MY: ORCID
54
TITLE: Variations in information security cultures across professions: A qualitative study
AUTHORS: Ramachandran, S; Rao, C; Goles, T; Dhillon, G;
PUBLISHED: 2013, SOURCE: Communications of the Association for Information Systems, VOLUME: 33, ISSUE: 1
INDEXED IN: Scopus
IN MY: ORCID
55
TITLE: Organizational power and information security rule compliance
AUTHORS: Ella Kolkowska; Gurpreet Dhillon;
PUBLISHED: 2013, SOURCE: Computers and Security, VOLUME: 33
INDEXED IN: Scopus CrossRef
IN MY: ORCID
56
TITLE: Individual values for protecting identity in social networks
AUTHORS: Gurpreet Dhillon; Romilla Chowdhuri;
PUBLISHED: 2013, SOURCE: International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design, VOLUME: 3
INDEXED IN: Scopus
IN MY: ORCID
57
TITLE: When convenience trumps security: Defining objectives for security and usability of systems
AUTHORS: Dhillon, G; Oliveira, T ; Susarapu, S; Caldeira, M ;
PUBLISHED: 2012, SOURCE: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 in IFIP Advances in Information and Communication Technology, VOLUME: 376 AICT
INDEXED IN: Scopus CrossRef
IN MY: ORCID
58
TITLE: Organizational power and information security rule compliance  Full Text
AUTHORS: Kolkowska, E; Dhillon, G;
PUBLISHED: 2012, SOURCE: Computers and Security, VOLUME: 33
INDEXED IN: Scopus CrossRef
IN MY: ORCID
59
TITLE: Interpreting deep structures of information systems security
AUTHORS: Thomas, M; Dhillon, G;
PUBLISHED: 2012, SOURCE: Computer Journal, VOLUME: 55, ISSUE: 10
INDEXED IN: Scopus CrossRef
IN MY: ORCID
60
TITLE: When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems
AUTHORS: Gurpreet Dhillon; Tiago Oliveira; Santa Susarapu; Mario Caldeira;
PUBLISHED: 2012, SOURCE: 27th IFIP TC11 International Information Security and Privacy Conference (IFIP SEC) in INFORMATION SECURITY AND PRIVACY RESEARCH, VOLUME: 376
INDEXED IN: WOS
Page 6 of 14. Total results: 139.