The CIA strikes back: Redefining confidentiality, integrity and availability in security. S Samonas, D Coss Journal of Information System Security 10 (3), 2014 | 426 | 2014 |
Interpreting the role of disruptive technologies in e‐businesses G Dhillon, D Coss, R Hackney Logistics Information Management 14 (1/2), 163-171, 2001 | 39 | 2001 |
Cloud privacy objectives a value based approach DL Coss, G Dhillon Information & Computer Security 27 (2), 189-220, 2019 | 19 | 2019 |
A framework for auditing and strategizing to ensure cloud privacy DL Coss, G Dhillon Journal of Information Systems 34 (2), 47-63, 2020 | 8 | 2020 |
BIG DATA IN AUDITING: A VALUE-FOCUSED APPROACH TO CYBERSECURITY MANAGEMENT. DL Coss, K Smith, J Foster, S Dhillon Journal of Information Systems Security 15 (2), 2019 | 6 | 2019 |
Individual’s Intentions to use Self Diagnostic Medical Support Systems DL Coss | 5 | 2009 |
INFORMATION PRIVACY LITERATURE: ISSUES AND CHALLENGES. S Dhillon, DL Coss Journal of Information System Security 15 (3), 2019 | 4 | 2019 |
Strategic planning objectives for venture capitalist investments in emerging information technologies: a value-focused perspective DL Coss, G Dhillon, I Udeh The Journal of Entrepreneurial Finance (JEF) 17 (1), 27-64, 2015 | 3 | 2015 |
Cloud privacy audit framework: A value-based design DL Coss Virginia Commonwealth University, 2013 | 1 | 2013 |
The disconnect between tax laws, public opinion and taxpayer compliance: a study of the taxation of gambling winnings KB Menk, B Nagle, DL Coss International Journal of Critical Accounting 9 (3), 206-227, 2017 | | 2017 |
INTERNAL CONTROLS AND THE POWER OF NEGOTIATION: THE ROLE OF IDENTITY MANAGEMENT IN THE PROTECTION OF INFORMATION ASSETS. DL Coss Portuguese Journal of Management Studies 19 (1), 2014 | | 2014 |
Ethics of Information Security I Udeh, G Dhillon, D Coss Proceedings of the 11th IFIP TC 11.1 Working Conference on Information …, 2008 | | 2008 |