Seguir
Gurpreet Dhillon
Gurpreet Dhillon
University of North Texas and University of Lisbon
Dirección de correo verificada de unt.edu - Página principal
Título
Citado por
Citado por
Año
Interpreting dimensions of consumer trust in e-commerce
SC Chen, GS Dhillon
Information Technology and Management 4 (2), 303-318, 2003
10452003
Information system security management in the new millennium
G Dhillon, J Backhouse
Communications of the ACM 43 (7), 125-128, 2000
958*2000
Measuring factors that influence the success of Internet commerce
G Torkzadeh, G Dhillon
Information Systems Research 13 (2), 187-204, 2002
9272002
Current directions in IS security research: towards socio‐organizational perspectives
G Dhillon, J Backhouse
Information Systems Journal 11 (2), 127-153, 2001
9102001
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research
W Hong, FKY Chan, JYL Thong, LC Chasalow, G Dhillon
Information Systems Research 25 (1), 111-136, 2014
6532014
Modelling and testing consumer trust dimensions in e-commerce
T Oliveira, M Alhinho, P Rita, G Dhillon
Computers in Human Behavior 71, 153-164, 2017
6392017
Value‐focused assessment of information system security in organizations
G Dhillon, G Torkzadeh
Information Systems Journal 16 (3), 293-314, 2006
5292006
Value‐focused assessment of information system security in organizations
G Dhillon, G Torkzadeh
Information Systems Journal 16 (3), 293-314, 2006
5292006
Principles of Information Systems Security: text and cases
G Dhillon
(No Title), 2007
3532007
User acceptance of agile information systems: A model and empirical test
W Hong, JYL Thong, LC Chasalow, G Dhillon
Journal of Management Information Systems 28 (1), 235-272, 2011
3182011
Software piracy: A view from Hong Kong
T Moores, G Dhillon
Communications of the ACM 43 (12), 88-93, 2000
2192000
Structures of responsibility and security of information systems
J Backhouse, G Dhillon
European Journal of Information Systems 5 (1), 2-9, 1996
2151996
Managing information system security
G Dhillon
Bloomsbury Publishing, 1997
211*1997
Violation of safeguards by trusted personnel and understanding related information security concerns
G Dhillon
Computers & Security 20 (2), 165-172, 2001
2102001
Computer crimes: theorizing about the enemy within
G Dhillon, S Moores
Computers & Security 20 (8), 715-723, 2001
1992001
Managing and controlling computer misuse
G Dhillon
Information Management & Computer Security 7 (4), 171-175, 1999
1931999
Risks in the use of information technology within organizations
G Dhillon, J Backhouse
International Journal of Information Management 16 (1), 65-74, 1996
1451996
Defining value-based objectives for ERP systems planning
J May, G Dhillon, M Caldeira
Decision Support Systems 55 (1), 98-109, 2013
1432013
Organizational power and information security rule compliance
E Kolkowska, G Dhillon
Computers & Security 33, 3-11, 2013
1352013
Information systems security governance research: a behavioral perspective
S Mishra, G Dhillon
1st annual symposium on information assurance, academic track of 9th annual …, 2006
1182006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20