Gurpreet Dhillon

Orcid: 0000-0002-0487-4050

According to our database1, Gurpreet Dhillon authored at least 134 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mobile Identity Protection: The Moderation Role of Self-Efficacy.
Australas. J. Inf. Syst., 2024

What Makes You Trust Digital Data Wallets? The Role of Platform Mechanisms on Trust Formation.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection.
Comput. Secur., November, 2023

The effect of fear and situational motivation on online information avoidance: The case of COVID-19.
Int. J. Inf. Manag., April, 2023

Re-framing the policy conversation for preventing cyberstalking.
Internet Res., 2023

The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks.
Comput. Secur., 2023

The Impact of Online Advertisment Personalization and Transparency on Individual Defensive responses and Engagment.
Proceedings of the 31st European Conference on Information Systems, 2023

Online Sex Trafficking Policy Research: A Systematic Review.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation.
Inf. Syst. Frontiers, 2022

The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy.
Australas. J. Inf. Syst., 2022

A Review of Cyberattack Research using Latent Dirichlet Allocation.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Information systems security research agenda: Exploring the gap between research and practice.
J. Strateg. Inf. Syst., 2021

User values and the development of a cybersecurity public policy for the IoT.
Int. J. Inf. Manag., 2021

Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection.
Proceedings of the 42nd International Conference on Information Systems, 2021

Psychological Antecedents and Consequences of Online Romance Scam Victimization Fear.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
A Framework for Auditing and Strategizing to Ensure Cloud Privacy.
J. Inf. Syst., 2020

The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions.
J. Assoc. Inf. Syst., 2020

Stakeholder perceptions of information security policy: Analyzing personal constructs.
Int. J. Inf. Manag., 2020

2019
Cloud privacy objectives a value based approach.
Inf. Comput. Secur., 2019

The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media.
Decis. Sci., 2019

Atrial Fibrillation Stratification Via Super-Resolution Analysis of Fibrillatory Waves.
Proceedings of the 46th Computing in Cardiology, 2019

Important Issues for Preventing Cyberstalking in India.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Reconciling value-based objectives for security and identity management.
Inf. Comput. Secur., 2018

Value-based information privacy objectives for Internet Commerce.
Comput. Hum. Behav., 2018

Eliciting Societal Values for Health Information Policy Decisions.
Proceedings of the International Conference on Information Systems, 2018

Strategic Planning for IS Security: Designing Objectives.
Proceedings of the Designing for a Digital and Globalized World, 2018

2017
Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors.
Inf. Manag., 2017

Modelling and testing consumer trust dimensions in e-commerce.
Comput. Hum. Behav., 2017

Blockchain for Privacy and Security: The Case of Health Informatics.
Proceedings of the AMIA 2017, 2017

Understanding Digital Crime, Trust, and Control in Blockchain Technologies.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Blockchain for Digital Crime Prevention: The Case of Health Informatics.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Value-focused objectives for CRM system adoption.
Ind. Manag. Data Syst., 2016

Interpreting information security culture: An organizational transformation case study.
Comput. Secur., 2016

Deciding between information security and usability: Developing value based objectives.
Comput. Hum. Behav., 2016

Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Defining Objectives for Preventing Cyberstalking.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Eliciting Societal Values About Cyberstalking Policy Decisions.
Proceedings of the International Conference on Information Systems, 2016

Competence-based Model for Securing the in-Ternet of Things in Organizations.
Proceedings of the 24th European Conference on Information Systems, 2016

What Interrupts Intention to Comply with IS-Security Policy?
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Misunderstandings and Misjudgments about Security: A Dialogical Narrative Analysis of Global IT Offshoring.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Money Laundering and Technology Enabled Crime: a cultural analysis.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
From Adoption to Routinization of B2B e-Commerce: Understanding Patterns Across Europe.
J. Glob. Inf. Manag., 2015

Disassociations in Security Policy Lifecycles.
Int. J. Inf. Secur. Priv., 2015

Multi-Objective Decision Model for Information Systems Risk.
Proceedings of the UKAIS 2015, 2015

Employee ISP Compliance Intentions: An Empirical Test of Empowerment.
Proceedings of the International Conference on Information Systems, 2015

Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation.
Proceedings of the International Conference on Information Systems, 2015

Capturing Experiences to Inform Organizational Intelligence: The Case of IT Service Competence.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Mismatched Understanding of IS Security Policy: A RepGrid Analysis.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research.
Inf. Syst. Res., 2014

Organizational Transformation and Information Security Culture: A Telecom Case Study.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Defining value-based objectives for ERP systems planning.
Decis. Support Syst., 2013

Organizational power and information security rule compliance.
Comput. Secur., 2013

Variations in Information Security Cultures across Professions: A Qualitative Study.
Commun. Assoc. Inf. Syst., 2013

Secure Outsourcing: An Investigation of the Fit between Clients and Providers.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Individual values for protecting identity in social networks.
Proceedings of the International Conference on Information Systems, 2013

2012
Interpreting Deep Structures of Information Systems Security.
Comput. J., 2012

When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems.
Proceedings of the Information Security and Privacy Research, 2012

Shaping of Security Policy in an Indonesian Bank: Interpreting Institutionalization and Structuration.
Proceedings of the 20th European Conference on Information Systems, 2012

2011
Intentionality and power interplay in IS implementation: The case of an asset management firm.
J. Strateg. Inf. Syst., 2011

User Acceptance of Agile Information Systems: A Model and Empirical Test.
J. Manag. Inf. Syst., 2011

Information Security and Privacy - Rethinking Governance Models.
Commun. Assoc. Inf. Syst., 2011

Can a Cloud Be Really Secure? A Socratic Dialogue.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
The implementation of the Spa Select System: Coming to grips with the cog in the machine.
Int. J. Inf. Manag., 2010

Are we really competent?: Assessing organizational ability in delivering IT benefits.
Bus. Process. Manag. J., 2010

Using Actor Network Theory to Understand Information Security Management.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Information Security and Privacy: Rethinking Governance Models.
Proceedings of the International Conference on Information Systems, 2010

A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation.
Proceedings of the 18th European Conference on Information Systems, 2010

2009
Interpreting Beyond Syntactics: A Semiotic Learning Model of Computer Programming Languages.
J. Inf. Syst. Educ., 2009

Creativity and Intelligence in Small and Medium Sized Enterprises: The Role of Information Systems.
Proceedings of the Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises, 2009

2008
A bumpy road to success (or not): The case of Project Genesis at Nevada DMV.
Int. J. Inf. Manag., 2008

Organizational competence for harnessing IT: A case study.
Inf. Manag., 2008

Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment.
Proceedings of the 16th European Conference on Information Systems, 2008

Power Relationships in Information Systems Security Policy Formulation and Implementation.
Proceedings of the 16th European Conference on Information Systems, 2008

2007
Editorial: JSIS Security and Privacy Special Issue.
J. Strateg. Inf. Syst., 2007

Introducing IT to Partners Financial Services: The case of a vision without direction.
Int. J. Inf. Manag., 2007

Management of Information Security: Challenges and Research Directions.
Commun. Assoc. Inf. Syst., 2007

Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A Theoretical Basis for Defining Internal Control Objectives for Information Systems Security.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Investigating the Development of a Multi-objective Decision Model that Seeks to Generate Informed Alternatives for Maximizing IS Security within an Organization.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Value-focused assessment of information system security in organizations.
Inf. Syst. J., 2006

Minitrack Introduction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Deep Structures of Information Systems Security.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Principles of information systems security - text and cases.
Wiley, ISBN: 978-0-471-45056-6, 2006

2005
A fractal perspective on competencies necessary for managing information systems.
Int. J. Technol. Manag., 2005

Gaining benefits from IS/IT implementation: Interpretations from case studies.
Int. J. Inf. Manag., 2005

Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Mini Track: 'Information Systems Security Management'.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Panel: Information systems security standards: The solution or the problem?
Proceedings of the 13th European Conference on Information Systems, 2005

ERP Implementation in Portugal: Interpreting Dimensions of Power.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Computer crime at CEFORMA: a case study.
Int. J. Inf. Manag., 2004

Guest Editorial: the challenge of managing information security.
Int. J. Inf. Manag., 2004

Dimensions of power and IS implementation.
Inf. Manag., 2004

Re-examining the measurement models of success for Internet commerce.
Inf. Manag., 2004

Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Information Systems Security Management: Minitrack Introduction.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications.
J. Database Manag., 2003

Strategic Planning for E-Commerce Systems (SPECS): Value Returns and Customer Alliance.
Inf. Technol. Manag., 2003

Interpreting Dimensions of Consumer Trust in E-Commerce.
Inf. Technol. Manag., 2003

Positioning IS/IT in networked firms.
Int. J. Inf. Manag., 2003

Do privacy seals in e-commerce really work?
Commun. ACM, 2003

Applying double loop learning to interpret implications for information systems security design.
Proceedings of the IEEE International Conference on Systems, 2003

2002
Measuring Factors that Influence the Success of Internet Commerce.
Inf. Syst. Res., 2002

Chaos Theory as a Framework for Studying Information Systems.
Inf. Resour. Manag. J., 2002

Ethical and Intellectual Property Concerns in a Multicultural Global Economy.
Electron. J. Inf. Syst. Dev. Ctries., 2002

Value Focused Assessment of Individual Privacy Concerns for Internet Commerce.
Proceedings of the International Conference on Information Systems, 2002

2001
The Emergence of Networked Organizations in India: A Misalignment of Interests?
J. Glob. Inf. Manag., 2001

Current directions in IS security research: towards socio-organizational perspectives.
Inf. Syst. J., 2001

Internet Privacy: Interpreting Key Issues.
Inf. Resour. Manag. J., 2001

Computer crimes: theorizing about the enemy within.
Comput. Secur., 2001

Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns.
Comput. Secur., 2001

Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

2000
Ethics and information technology use: a survey of US based SMEs.
Inf. Manag. Comput. Secur., 2000

Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry.
Inf. Manag. Comput. Secur., 2000

Challenging Assumptions for Strategic Information Systems Planning: Theoretical Perspectives.
Commun. Assoc. Inf. Syst., 2000

Software piracy: a view from Hong Kong.
Commun. ACM, 2000

Information system security management in the new millennium.
Commun. ACM, 2000

Interpreting the Evolving Nature of Transactions in Cyberteaching.
Proceedings of the Fourth Pacific Asia Conference on Information Systems, 2000

What is information? A review of different perspectives.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

Value assessment of IS/IT service provision within organizations.
Proceedings of the Twenty-First International Conference on Information Systems, 2000

IS/IT and Dynamic Business Change.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

Interpreting Key Issues in IS/IT Benefits Management.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

1999
Managing and controlling computer misuse.
Inf. Manag. Comput. Secur., 1999

Interpreting IS/IT Decision Support in the UK Primary Health Care System: Issues of Consumer Orientation and Structures.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1997
Developing A Networked Authority: Nature and Significance of Power Relationships.
Proceedings of the Fifth European Conference on Information Systems, 1997

Panel: Developing An Ethical Agenda for A Networked Workplace.
Proceedings of the Fifth European Conference on Information Systems, 1997

Factors Affecting the Use and Adoption of EDI in Manufacturing SMEs: Experiences From Portugal.
Proceedings of the Fifth European Conference on Information Systems, 1997

1996
Information management competencies in global enterprises.
Proceedings of the Fourth European Conference on Information Systems, 1996

Developing Integrated Solutions in the Health Care Environment: A Case Study.
Proceedings of the Fourth European Conference on Information Systems, 1996

1995
Managing computer crime: a research outlook.
Comput. Secur., 1995

Electronic thesaurus for clinical terms: A methodological approach.
Proceedings of the Third European Conference on Information Systems, 1995


  Loading...