The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gurpreet Dhillon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares
    Panel: Information systems security standards: The solution or the problem? [Citation Graph (0, 0)][DBLP]
    ECIS, 2005, pp:- [Conf]
  2. Gurpreet Dhillon
    Interpreting Key Issues in IS/IT Benefits Management. [Citation Graph (0, 0)][DBLP]
    HICSS, 2000, pp:- [Conf]
  3. Gurpreet Dhillon, Ray Hackney
    IS/IT and Dynamic Business Change. [Citation Graph (0, 0)][DBLP]
    HICSS, 2000, pp:- [Conf]
  4. Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman
    Mini Track: 'Information Systems Security Management'. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  5. Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman
    Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  6. Ray Hackney, Gurpreet Dhillon, Neil McBride, Shalini Kesar
    Interpreting IS/IT Decision Support in the UK Primary Health Care System: Issues of Consumer Orientation and Structures. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  7. Mikko T. Siponen, Gurpreet Dhillon
    Information Systems Security Management: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  8. Elizabeth F. R. White, Gurpreet Dhillon
    Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  9. Gurpreet Dhillon, Gurvirender Tejay, Weiyin Hong
    Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:157- [Conf]
  10. Gurpreet Dhillon, Jungwoo Lee
    Value assessment of IS/IT service provision within organizations. [Citation Graph (0, 0)][DBLP]
    ICIS, 2000, pp:647-651 [Conf]
  11. Gurpreet Dhillon, Gholamreza Torkzadeh
    Value-Focused Assessment of Information System Security in Organizations. [Citation Graph (0, 0)][DBLP]
    ICIS, 2001, pp:561-566 [Conf]
  12. Gurpreet Dhillon, Leiser Silva
    Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:167-182 [Conf]
  13. Andrew S. Targowski, Gurpreet Dhillon
    What is information? A review of different perspectives. [Citation Graph (0, 0)][DBLP]
    IRMA Conference, 2000, pp:1142-1143 [Conf]
  14. Gurpreet Dhillon, James Backhouse
    Information system security management in the new millennium. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:7, pp:125-128 [Journal]
  15. Trevor T. Moores, Gurpreet Dhillon
    Software piracy: a view from Hong Kong. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:88-93 [Journal]
  16. Trevor T. Moores, Gurpreet Dhillon
    Do privacy seals in e-commerce really work? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:12, pp:265-271 [Journal]
  17. James Backhouse, Gurpreet Dhillon
    Managing computer crime: a research outlook. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:7, pp:645-651 [Journal]
  18. Gurpreet Dhillon
    Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:2, pp:165-172 [Journal]
  19. Gurpreet Dhillon, Steve Moore
    Computer crimes: theorizing about the enemy within. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:8, pp:715-723 [Journal]
  20. Gurpreet Dhillon
    Managing and controlling computer misuse. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:4, pp:171-175 [Journal]
  21. Gurpreet Dhillon, Mário M. Caldeira
    Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:4, pp:184-188 [Journal]
  22. Sanjeev Phukan, Gurpreet Dhillon
    Ethics and information technology use: a survey of US based SMEs. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:239-243 [Journal]
  23. Gurpreet Dhillon, James Backhouse
    Current directions in IS security research: towards socio-organizational perspectives. [Citation Graph (0, 0)][DBLP]
    Inf. Syst. J., 2001, v:11, n:2, pp:127-154 [Journal]
  24. Randal Reid, Gurpreet Dhillon
    Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2003, v:14, n:2, pp:42-51 [Journal]

Search in 0.030secs, Finished in 0.031secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002