Kane J. Smith
Kane J. Smith
Dirección de correo verificada de
Citado por
Citado por
Information Systems Security Research Agenda: Exploring the Gap Between Research and Practice
G Dhillon, K Smith, I Dissanayaka
The Journal of Strategic Information Systems 30 (4), 101693, 2021
Defining Objectives for Preventing Cyberstalking
G Dhillon, KJ Smith
Journal of Business Ethics 157 (1), 137-158, 2019
Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions
KJ Smith, G Dhillon
Managerial Finance, 2019
User values and the development of a cybersecurity public policy for the IoT
KJ Smith, G Dhillon, L Carter
International Journal of Information Management 56, 102123, 2021
Supply chain virtualization: Facilitating agent trust utilizing blockchain technology
KJ Smith, G Dhillon
Revisiting Supply Chain Risk, 299-311, 2019
Blockchain for Digital Crime Prevention: The Case of Health Informatics
K Smith, G Dhillon
AIS Electronic Library, AMCIS 2017, 2017
The relationship between social capital and social media addiction: The role of privacy self-efficacy
F Soh, K Smith, G Dhillon
Australasian Journal of Information Systems 26, 2022
Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management.
DL Coss, K Smith, J Foster, S Dhillon
Journal of Information System Security 15 (2), 2019
Reconciling Value-based Objectives for Security & Identity Management
KJ Smith, G Dhillon, K Hedström
Information & Computer Security 26 (2), 194-212, 2018
System Theory: Should Information Systems Researchers Even Care?
KJ Smith, HR Weistroffer
SAIS 2016 Proceedings, 14, 2016
Re-framing the policy conversation for preventing cyberstalking
K Smith, G Dhillon
Internet Research 33 (1), 84-123, 2023
iGen user (over) attachment to social media: reframing the policy intervention conversation
KJ Smith, G Dhillon, BA Otoo
Information Systems Frontiers 24 (6), 1989-2006, 2022
Defining objectives for preventing cyberstalking
G Dhillon, C Challa, K Smith
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
Bad employees: examining deviant security behaviors
KJ Smith
Journal of Computer Information Systems 64 (1), 17-30, 2024
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential
K Smith, G Dhillon
AIS Electronic Library, AMCIS 2019, 2019
Ensuring core competencies for cybersecurity specialists
G Dhillon, K Smith, K Hedström
Cybersecurity Education for Awareness and Compliance, 1-13, 2019
Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain
KJ Smith, M Gupta, P Prakash, NK Rangan
Internet Research, 2023
Examining the effects of cognitive load on information systems security policy compliance
D Ganye, K Smith
Internet Research, 2024
Understanding Generation Z’s Information Security Behaviors Regarding Penalties, Pressures and Perceived Effectiveness
A Madhuvarshi, G Dhillon, KJ Smith, J Kaur
Antecedents and Outcomes of Information Privacy Concerns: A Replication Study in Rural India
M Kaur, G Dhillon, KJ Smith, J Kaur
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20