61
TITLE: Shaping of security policy in an Indonesian bank: Interpreting institutionalization and structuration
AUTHORS: Faisal M Nasution; Gurpreet Dhillon;
PUBLISHED: 2012, SOURCE: ECIS 2012 - Proceedings of the 20th European Conference on Information Systems
INDEXED IN: Scopus
IN MY: ORCID
62
TITLE: Intentionality and power interplay in IS implementation: The case of an asset management firm  Full Text
AUTHORS: Gurpreet S Dhillon; Mario Caldeira ; Mitchell R Wenger;
PUBLISHED: 2011, SOURCE: JOURNAL OF STRATEGIC INFORMATION SYSTEMS, VOLUME: 20, ISSUE: 4
INDEXED IN: Scopus WOS CrossRef
IN MY: ORCID
63
TITLE: User acceptance of agile information systems: A model and empirical test  Full Text
AUTHORS: Hong, W; Thong, JYL; Chasalow, L; Dhillon, G;
PUBLISHED: 2011, SOURCE: Journal of Management Information Systems, VOLUME: 28, ISSUE: 1
INDEXED IN: Scopus CrossRef
IN MY: ORCID
64
TITLE: Information security and privacy-rethinking governance models
AUTHORS: Gillon, K; Branz, L; Culnan, M; Dhillon, G; Hodgkinson, R; MacWillson, A;
PUBLISHED: 2011, SOURCE: Communications of the Association for Information Systems, VOLUME: 28, ISSUE: 1
INDEXED IN: Scopus
IN MY: ORCID
65
TITLE: Organizational power and information security rule compliance
AUTHORS: Ella Kolkowska; Gurpreet Dhillon;
PUBLISHED: 2011, SOURCE: IFIP Advances in Information and Communication Technology, VOLUME: 354 AICT
INDEXED IN: Scopus
IN MY: ORCID
66
TITLE: Can a cloud be really secure? A socratic dialogue
AUTHORS: Gurpreet Dhillon; Ella Kolkowska;
PUBLISHED: 2011, SOURCE: Computers, Privacy and Data Protection: an Element of Choice
INDEXED IN: Scopus CrossRef: 1
IN MY: ORCID
67
TITLE: The implementation of the Spa Select System: Coming to grips with the cog in the machine  Full Text
AUTHORS: Gurpreet Dhillon; Mario Caldeira ;
PUBLISHED: 2010, SOURCE: INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, VOLUME: 30, ISSUE: 1
INDEXED IN: Scopus WOS CrossRef
IN MY: ORCID
68
TITLE: Are we really competent?: Assessing organizational ability in delivering IT benefits
AUTHORS: Caldeira, M ; Dhillon, G;
PUBLISHED: 2010, SOURCE: Business Process Management Journal, VOLUME: 16, ISSUE: 1
INDEXED IN: Scopus
69
TITLE: A holistic approach for enriching information security analysis and security policy formation
AUTHORS: May, J; Dhillon, G;
PUBLISHED: 2010, SOURCE: 18th European Conference on Information Systems, ECIS 2010 in 18th European Conference on Information Systems, ECIS 2010
INDEXED IN: Scopus
IN MY: ORCID
70
TITLE: Information security and privacy: Rethinking governance models
AUTHORS: Hodgkinson, R; Branz, L; Culnan, M; Dhillon, G; Macwillson, A; Ponemon, L;
PUBLISHED: 2010, SOURCE: 31st International Conference on Information Systems, ICIS 2010 in ICIS 2010 Proceedings - Thirty First International Conference on Information Systems
INDEXED IN: Scopus
IN MY: ORCID
Page 7 of 14. Total results: 139.