Seguir
Kane J. Smith
Kane J. Smith
Dirección de correo verificada de unt.edu
Título
Citado por
Citado por
Año
Information Systems Security Research Agenda: Exploring the Gap Between Research and Practice
G Dhillon, KJ Smith, I Dissanayaka
The Journal of Strategic Information Systems 30 (4), 101693, 2021
782021
Defining Objectives for Preventing Cyberstalking
G Dhillon, KJ Smith
Journal of Business Ethics 157 (1), 137-158, 2019
722019
Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions
KJ Smith, G Dhillon
Managerial Finance, 2019
522019
User values and the development of a cybersecurity public policy for the IoT
KJ Smith, G Dhillon, L Carter
International Journal of Information Management 56, 102123, 2021
382021
Blockchain for Digital Crime Prevention: The Case of Health Informatics
K Smith, G Dhillon
AIS Electronic Library, AMCIS 2017, 2017
232017
Supply chain virtualization: Facilitating agent trust utilizing blockchain technology
KJ Smith, G Dhillon
Revisiting Supply Chain Risk, 299-311, 2019
192019
The relationship between social capital and social media addiction: The role of privacy self-efficacy
F Soh, KJ Smith, G Dhillon
Australasian Journal of Information Systems 26, 2022
102022
Revisiting supply chain risk
G Baryannis, S Dani, S Validi, G Antoniou, KJ Smith, G Dhillon
Supply Chain Virtualization: Facilitating Agent Trust Utilizing Blockchain …, 2019
102019
iGen user (over) attachment to social media: reframing the policy intervention conversation
KJ Smith, G Dhillon, BA Otoo
Information Systems Frontiers 24 (6), 1989-2006, 2022
62022
Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management.
DL Coss, KJ Smith, J Foster, S Dhillon
Journal of Information System Security 15 (2), 2019
62019
Reconciling Value-based Objectives for Security & Identity Management
KJ Smith, G Dhillon, K Hedström
Information & Computer Security 26 (2), 194-212, 2018
62018
Defining objectives for preventing cyberstalking
G Dhillon, C Challa, K Smith
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
62016
System Theory: Should Information Systems Researchers Even Care?
KJ Smith, HR Weistroffer
SAIS 2016 Proceedings, 14, 2016
6*2016
Bad employees: examining deviant security behaviors
KJ Smith
Journal of Computer Information Systems 64 (1), 17-30, 2024
52024
Re-framing the policy conversation for preventing cyberstalking
KJ Smith, G Dhillon
Internet Research 33 (1), 84-123, 2023
52023
Revisiting Supply Chain Risk
KJ Smith, G Dhillon
Springer International Publishing, 2019
52019
Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain
KJ Smith, M Gupta, P Prakash, NK Rangan
Internet Research, 2023
22023
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential
K Smith, G Dhillon
AIS Electronic Library, AMCIS 2019, 2019
22019
Ensuring core competencies for cybersecurity specialists
G Dhillon, K Smith, K Hedström
Cybersecurity Education for Awareness and Compliance, 1-13, 2019
22019
Work Tactics in Hybrid Work Environment: A Gender Perspective
G Dhillon, K Smith, J Kaur, S Dhillon
12023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20