Information Systems Security Research Agenda: Exploring the Gap Between Research and Practice G Dhillon, KJ Smith, I Dissanayaka The Journal of Strategic Information Systems 30 (4), 101693, 2021 | 78 | 2021 |
Defining Objectives for Preventing Cyberstalking G Dhillon, KJ Smith Journal of Business Ethics 157 (1), 137-158, 2019 | 72 | 2019 |
Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions KJ Smith, G Dhillon Managerial Finance, 2019 | 52 | 2019 |
User values and the development of a cybersecurity public policy for the IoT KJ Smith, G Dhillon, L Carter International Journal of Information Management 56, 102123, 2021 | 38 | 2021 |
Blockchain for Digital Crime Prevention: The Case of Health Informatics K Smith, G Dhillon AIS Electronic Library, AMCIS 2017, 2017 | 23 | 2017 |
Supply chain virtualization: Facilitating agent trust utilizing blockchain technology KJ Smith, G Dhillon Revisiting Supply Chain Risk, 299-311, 2019 | 19 | 2019 |
The relationship between social capital and social media addiction: The role of privacy self-efficacy F Soh, KJ Smith, G Dhillon Australasian Journal of Information Systems 26, 2022 | 10 | 2022 |
Revisiting supply chain risk G Baryannis, S Dani, S Validi, G Antoniou, KJ Smith, G Dhillon Supply Chain Virtualization: Facilitating Agent Trust Utilizing Blockchain …, 2019 | 10 | 2019 |
iGen user (over) attachment to social media: reframing the policy intervention conversation KJ Smith, G Dhillon, BA Otoo Information Systems Frontiers 24 (6), 1989-2006, 2022 | 6 | 2022 |
Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management. DL Coss, KJ Smith, J Foster, S Dhillon Journal of Information System Security 15 (2), 2019 | 6 | 2019 |
Reconciling Value-based Objectives for Security & Identity Management KJ Smith, G Dhillon, K Hedström Information & Computer Security 26 (2), 194-212, 2018 | 6 | 2018 |
Defining objectives for preventing cyberstalking G Dhillon, C Challa, K Smith ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 6 | 2016 |
System Theory: Should Information Systems Researchers Even Care? KJ Smith, HR Weistroffer SAIS 2016 Proceedings, 14, 2016 | 6* | 2016 |
Bad employees: examining deviant security behaviors KJ Smith Journal of Computer Information Systems 64 (1), 17-30, 2024 | 5 | 2024 |
Re-framing the policy conversation for preventing cyberstalking KJ Smith, G Dhillon Internet Research 33 (1), 84-123, 2023 | 5 | 2023 |
Revisiting Supply Chain Risk KJ Smith, G Dhillon Springer International Publishing, 2019 | 5 | 2019 |
Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain KJ Smith, M Gupta, P Prakash, NK Rangan Internet Research, 2023 | 2 | 2023 |
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential K Smith, G Dhillon AIS Electronic Library, AMCIS 2019, 2019 | 2 | 2019 |
Ensuring core competencies for cybersecurity specialists G Dhillon, K Smith, K Hedström Cybersecurity Education for Awareness and Compliance, 1-13, 2019 | 2 | 2019 |
Work Tactics in Hybrid Work Environment: A Gender Perspective G Dhillon, K Smith, J Kaur, S Dhillon | 1 | 2023 |