Seguir
Gurpreet Dhillon
Gurpreet Dhillon
University of North Texas and University of Lisbon
Dirección de correo verificada de unt.edu - Página principal
Título
Citado por
Citado por
Año
Interpreting dimensions of consumer trust in e-commerce
SC Chen, GS Dhillon
Information Technology and Management 4 (2), 303-318, 2003
10882003
Information system security management in the new millennium
G Dhillon, J Backhouse
Communications of the ACM 43 (7), 125-128, 2000
977*2000
Measuring factors that influence the success of Internet commerce
G Torkzadeh, G Dhillon
Information Systems Research 13 (2), 187-204, 2002
9402002
Current directions in IS security research: towards socio‐organizational perspectives
G Dhillon, J Backhouse
Information Systems Journal 11 (2), 127-153, 2001
9222001
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research
W Hong, FKY Chan, JYL Thong, LC Chasalow, G Dhillon
Information Systems Research 25 (1), 111-136, 2014
7172014
Modelling and testing consumer trust dimensions in e-commerce
T Oliveira, M Alhinho, P Rita, G Dhillon
Computers in Human Behavior 71, 153-164, 2017
7142017
Value‐focused assessment of information system security in organizations
G Dhillon, G Torkzadeh
Information Systems Journal 16 (3), 293-314, 2006
5432006
Principles of Information Systems Security: text and cases
G Dhillon
(No Title), 2007
3632007
User acceptance of agile information systems: A model and empirical test
W Hong, JYL Thong, LC Chasalow, G Dhillon
Journal of Management Information Systems 28 (1), 235-272, 2011
3302011
Software piracy: A view from Hong Kong
T Moores, G Dhillon
Communications of the ACM 43 (12), 88-93, 2000
2232000
Structures of responsibility and security of information systems
J Backhouse, G Dhillon
European Journal of Information Systems 5 (1), 2-9, 1996
2161996
Violation of safeguards by trusted personnel and understanding related information security concerns
G Dhillon
Computers & Security 20 (2), 165-172, 2001
2102001
Managing information system security
G Dhillon
Bloomsbury Publishing, 1997
209*1997
Computer crimes: theorizing about the enemy within
G Dhillon, S Moores
Computers & Security 20 (8), 715-723, 2001
2032001
Managing and controlling computer misuse
G Dhillon
Information Management & Computer Security 7 (4), 171-175, 1999
1941999
Risks in the use of information technology within organizations
G Dhillon, J Backhouse
International Journal of Information Management 16 (1), 65-74, 1996
1471996
Defining value-based objectives for ERP systems planning
J May, G Dhillon, M Caldeira
Decision Support Systems 55 (1), 98-109, 2013
1452013
Organizational power and information security rule compliance
E Kolkowska, G Dhillon
Computers & Security 33, 3-11, 2013
1332013
Information systems security governance research: a behavioral perspective
S Mishra, G Dhillon
1st annual symposium on information assurance, academic track of 9th annual …, 2006
1202006
Gaining benefits from IS/IT implementation: Interpretations from case studies
G Dhillon
International Journal of Information Management 25 (6), 502-515, 2005
1202005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20