Skip to main content

Dr. Gurpreet S. Dhillon

Professor

University of North Texas

Department of Information Technology and Decision Sciences

(940) 369-7076

Email: Gurpreet.Dhillon@unt.edu

Education

  • PhD, The London School of Economics and Political Science, 1995
    Major: Information Systems
    Specialization: Information Systems
    Dissertation: Interpreting the management of information systems security
  • MSc, The London School of Economics and Political Science, 1989
    Major: Statistical and Mathematical Sciences
    Specialization: Information Systems
    Dissertation: Semantic Analysis for Secure Systems Development

Professional Memberships

  • Association of Computing Machinery. (June 1, 2017 - Present).
  • Association of Information Systems. (August 1, 1997 - Present).
  • International Federation of Information Processing. (May 1, 1995 - Present).

Teaching

Teaching Experience

    University of North Texas

  • BCIS 4610 - Analysis of Business Information Systems, 1 course.
  • BCIS 5120 - Information Systems Development, 1 course.
  • BCIS 5150 - Leveraging Information Technology for Business, 13 courses.
  • BCIS 6650 - Seminar in General Systems Theory, 2 courses.
  • BCIS 6900 - Special Problems, 1 course.
  • BCIS 6950 - Doctoral Dissertation, 6 courses.
  • DBAS 6003 - Qualitative Research Method II, 2 courses.
  • DBAS 6021 - Digital Transformation, 1 course.
  • DSCI 4700 - Analytics for Decision Making, 1 course.

Awards and Honors

  • Faculty Excellence in Research and Creative Activity Award, UNCG. (June 1, 2019).
  • Honorary Doctorate, Örebro University, Sweden. (February 1, 2019).
  • Dean's Award, UNCG. (May 1, 2018).
  • Faculty Award of excellence, Virginia Commonwealth University. (August 1, 2010).
  • Siver Core Award, International Federation for Information Processing. (June 1, 2010).
  • Faculty Award of excellence, Virginia Commonwealth University. (August 1, 2005).

Research

Published Intellectual Contributions

    Book Chapter

  • Dhillon, G.S., Smith, K., Hedstr\"om, Karin. (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
  • Smith, K., Dhillon, G.S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
  • Baskerville, R.L., Dhillon, G.S. (2016). Information systems security strategy: A process view. Information Security: Policy, Processes, and Practices. 15-45. https://api.elsevier.com/content/abstract/scopus_id/85106105889
  • Oliveira, T., Dhillon, G.S. (2015). From adoption to routinization of B2B e-Commerce: Understanding patterns across Europe. Web Design and Development: Concepts, Methodologies, Tools, and Applications. 3-3 1477-1497. https://api.elsevier.com/content/abstract/scopus_id/84958869150
  • Dhillon, G.S., Kolkowska, E. (2011). Can a cloud be really secure? A socratic dialogue. Computers, Privacy and Data Protection: an Element of Choice. 345-360. https://api.elsevier.com/content/abstract/scopus_id/84892247197
  • Dhillon, G.S., Mishra, S. (2006). The impact of Sarbanes-Oxley (SOX) act on information security governance. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. 62-79. https://api.elsevier.com/content/abstract/scopus_id/84898273735
  • Conference Proceeding

  • Xie, W., Dhillon, G., Smith, K., Yang, Z. Information Disorder Behavior on social media: A Moral Intensity Perspective. AIS.
  • Kaur, J., Dhillon, G., Picoto, W. The Role of Organizational Competence on Information Security Job Performance.. AIS/WISP.
  • AlHelay, Y., Dhillon, G., Oliveira, T. Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection. AIS.
  • Smith, K.J., Dhillon, G.S., Kolkowska, E. (2019). Important issues for preventing cyberstalking in India. 25th Americas Conference on Information Systems, AMCIS 2019. https://api.elsevier.com/content/abstract/scopus_id/85084023161
  • Smith, K.J., Dhillon, G.S. (2018). Eliciting societal values for healthcare policy decisions. International Conference on Information Systems 2018, ICIS 2018. https://api.elsevier.com/content/abstract/scopus_id/85062554775
  • Dhillon, G.S., Torkzadeh, G., Chang, J. (2018). Strategic planning for IS security: Designing objectives. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10844 LNCS 285-299. https://api.elsevier.com/content/abstract/scopus_id/85047913468
  • Smith, K.J., Dhillon, G.S. (2017). Blockchain for digital crime prevention: The case of health informatics. AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. 2017-August https://api.elsevier.com/content/abstract/scopus_id/85048419661
  • Walton, J.B., Dhillon, G.S. (2017). Understanding digital crime, trust, and control in blockchain technologies. AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. 2017-August https://api.elsevier.com/content/abstract/scopus_id/85048399205
  • Merritt, C.D., Dhillon, G.S. (2016). AMCIS 2016 San Diego paper submission what interrupts intention to comply with IS-security policy?. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987597626
  • Silva, R., Dhillon, G.S., Picoto, W. (2016). Competence-based model for securing the internet of things in organizations. 24th European Conference on Information Systems, ECIS 2016. https://api.elsevier.com/content/abstract/scopus_id/84995793087
  • Dhillon, G.S., Samonas, S., Etudo, U. (2016). Developing a human activity model for insider IS security breaches using action design research. IFIP Advances in Information and Communication Technology. 471 49-61. https://api.elsevier.com/content/abstract/scopus_id/84969980367
  • Smith, K.J., Dhillon, G.S. (2016). Eliciting societal values for cyberstalking policy decisions. 2016 International Conference on Information Systems, ICIS 2016. https://api.elsevier.com/content/abstract/scopus_id/85019399077
  • Abed, J., Dhillon, G.S., Ozkan, S. (2016). Investigating continuous security compliance behavior: Insights from information systems continuance model. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987673658
  • Dhillon, G.S., Harnesk, D. (2016). Misunderstandings and misjudgments about security: A dialogical narrative analysis of global it offshoring. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987662438
  • Dhillon, G.S. (2016). Money laundering and technology enabled crime: A cultural analysis. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987654825
  • Syed, R., Dhillon, G.S. (2015). Dynamics of data breaches in online social networks: Understanding threats to organizational information security reputation. 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. https://api.elsevier.com/content/abstract/scopus_id/85107238148
  • Talib, Y.Y., Dhillon, G.S. (2015). Employee ISP compliance intentions: An empirical test of empowerment. 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. https://api.elsevier.com/content/abstract/scopus_id/85041742235
  • Dhillon, G.S., Almusharraf, A., Samonas, S. (2015). Mismatched understanding of IS security policy: A RepGrid analysis. 2015 Americas Conference on Information Systems, AMCIS 2015. https://api.elsevier.com/content/abstract/scopus_id/84963632172
  • Nunes, S., Dhillon, G.S., Caldeira, M. (2015). Value focused approach to information systems risk management. Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao. 15 103-115. https://api.elsevier.com/content/abstract/scopus_id/85047177201
  • Singh, R., Wall, J.D., Dhillon, G.S. (2014). Archetypes to inform information security: The organization man and the innovator. 20th Americas Conference on Information Systems, AMCIS 2014. https://api.elsevier.com/content/abstract/scopus_id/84905983110
  • Dhillon, G.S., Chowdhuri, R., Pedron, C. (2014). Organizational transformation and information security culture: A telecom case study. IFIP Advances in Information and Communication Technology. 428 431-437. https://api.elsevier.com/content/abstract/scopus_id/84926431396
  • Dhillon, G.S., Chowdhuri, R. (2013). Individual values for protecting identity in social networks. International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. 3 2177-2192. https://api.elsevier.com/content/abstract/scopus_id/84897765355
  • Dhillon, G.S., Chowdhuri, R., De Sá-Soares, F. (2013). Secure outsourcing: An investigation of the fit between clients and providers. IFIP Advances in Information and Communication Technology. 405 405-418. https://api.elsevier.com/content/abstract/scopus_id/84920911433
  • Dhillon, G.S., Oliveira, T., Susarapu, S., Caldeira, M. (2012). When convenience trumps security: Defining objectives for security and usability of systems. IFIP Advances in Information and Communication Technology. 376 AICT 352-363. https://api.elsevier.com/content/abstract/scopus_id/84863932698
  • Nasution, F.M., Dhillon, G.S. (2012). Shaping of security policy in an Indonesian bank: Interpreting institutionalization and structuration. ECIS 2012 - Proceedings of the 20th European Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84905748847
  • Kolkowska, E., Dhillon, G.S. (2011). Organizational power and information security rule compliance. IFIP Advances in Information and Communication Technology. 354 AICT 185-196. https://api.elsevier.com/content/abstract/scopus_id/79960854139
  • May, J., Dhillon, G.S. (2010). A holistic approach for enriching information security analysis and security policy formation. 18th European Conference on Information Systems, ECIS 2010. https://api.elsevier.com/content/abstract/scopus_id/84870636420
  • Hodgkinson, R., Branz, L., Culnan, M., Dhillon, G.S., Macwillson, A., Ponemon, L. (2010). Information security and privacy: Rethinking governance models. ICIS 2010 Proceedings - Thirty First International Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84870974185
  • Hedström, K., Dhillon, G.S., Karlsson, F. (2010). Using Actor Network Theory to understand information security management. IFIP Advances in Information and Communication Technology. 330 43-54. https://api.elsevier.com/content/abstract/scopus_id/84885075680
  • Dhillon, G.S., Stahl, B.C., Baskerville, R. (2009). Creativity and intelligence in small and medium sized enterprises: The role of information systems. IFIP Advances in Information and Communication Technology. 301 1-9. https://api.elsevier.com/content/abstract/scopus_id/84943564957
  • Dhillon, G.S., Stahl, B.C., Baskerville, R. (2009). Information systems – creativity and innovation in small and medium-sized enterprises IFIP WG 8.2 international conference, creativeSME 2009 guimarães, Portugal, june 21-24, 2009 proceedings. IFIP Advances in Information and Communication Technology. 301 https://api.elsevier.com/content/abstract/scopus_id/84943528087
  • Caldeira, M., Pedron, C., Dhillon, G.S., Lee, J. (2008). Applying EA perspective to CRM: Developing a competency framework. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. 2 1029-1034. https://api.elsevier.com/content/abstract/scopus_id/57849120096
  • Mishra, S., Dhillon, G.S. (2008). Defining internal control objectives for information systems security: A value focused assessment. 16th European Conference on Information Systems, ECIS 2008. https://api.elsevier.com/content/abstract/scopus_id/84870631493
  • Lapke, M., Dhillon, G.S. (2008). Power relationships in information systems security policy formulation and implementation. 16th European Conference on Information Systems, ECIS 2008. https://api.elsevier.com/content/abstract/scopus_id/84870627490
  • Mishra, S., Dhillon, G.S. (2007). A theoretical basis for defining internal control objectives for information systems security. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 1 427-436. https://api.elsevier.com/content/abstract/scopus_id/84870200118
  • Dhillon, G.S., Tejay, G., Weiyin, H. (2007). Identifying governance dimensions to evaluate information systems security in organizations. Proceedings of the Annual Hawaii International Conference on System Sciences. https://api.elsevier.com/content/abstract/scopus_id/39749131907
  • May, J., Dhillon, G.S. (2007). Investigating the development of a multi-objective decision model that seeks to generate informed alternatives for maximizing is security within an organization. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 1 407-417. https://api.elsevier.com/content/abstract/scopus_id/84870203735
  • Lapke, M., Dhillon, G.S. (2006). A semantic analysis of security policy formulation and implementation: A case study. Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. 2 1232-1241. https://api.elsevier.com/content/abstract/scopus_id/84870003095
  • Thomas, M.A., Dhillon, G.S. (2006). Deep structures of information systems security. Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. 6 3461-3468. https://api.elsevier.com/content/abstract/scopus_id/84870346821
  • Wenger, M.R., Dhillon, G.S., Caldeira, M. (2005). ERP implementation in Portugal: Interpreting dimensions of power. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. 5 2487-2494. https://api.elsevier.com/content/abstract/scopus_id/84870039346
  • Susarapu, S.R., Dhillon, G.S. (2005). Semiotic analysis of knowledge intensive business processes: Developing interpretations for sustainable competitive advantage. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. 6 3088-3094. https://api.elsevier.com/content/abstract/scopus_id/84870002655
  • White, E.F., Dhillon, G.S. (2005). Synthesizing information system design ideals to overcome developmental duality in securing information systems. Proceedings of the Annual Hawaii International Conference on System Sciences. 186. https://api.elsevier.com/content/abstract/scopus_id/27544442846
  • Dhillon, G.S., Fabian, F. (2005). A fractal perspective on competencies necessary for managing information systems. International Journal of Technology Management. 31 (1-2) 129-139. https://api.elsevier.com/content/abstract/scopus_id/19344368665
  • Dhillon, G.S., Silva, L., Backhouse, J. (2004). Computer crime at CEFORMA: A case study. International Journal of Information Management. 24 (6) 551-561. https://api.elsevier.com/content/abstract/scopus_id/7744227587
  • Mattia, A., Dhillon, G.S. (2003). Applying double loop learning to interpret implications for information systems security design. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. 3 2521-2526. https://api.elsevier.com/content/abstract/scopus_id/0242552856
  • Eloff, J.H., Labuschagne, L., von Solms, R., Dhillon, G.S. (2002). Advances in Information Security Management & Small Systems Security. IFIP Advances in Information and Communication Technology. 72 https://api.elsevier.com/content/abstract/scopus_id/84904250094
  • Dhillon, G.S., Silva, L. (2002). Interpreting computer-related crime at the Malaria Research Center: A case study. IFIP Advances in Information and Communication Technology. 72 167-182. https://api.elsevier.com/content/abstract/scopus_id/84904253615
  • Dhillon, G.S. (2000). Interpreting key issues in IS/IT benefits management. Proceedings of the Annual Hawaii International Conference on System Sciences. 2000-January https://api.elsevier.com/content/abstract/scopus_id/85094173476
  • Dhillon, G.S. (2000). Interpreting key issues in IS/IT benefits management. Proceedings of the Hawaii International Conference on System Sciences. 190. https://api.elsevier.com/content/abstract/scopus_id/0033900580
  • Dhillon, G.S., Hackney, R. (2000). IS/IT and dynamic business change. Proceedings of the Annual Hawaii International Conference on System Sciences. 2000-January https://api.elsevier.com/content/abstract/scopus_id/84898395722
  • Dhillon, G.S., Hackney, R. (2000). IS/IT and dynamic business change. Proceedings of the Hawaii International Conference on System Sciences. 207. https://api.elsevier.com/content/abstract/scopus_id/0033891063
  • Dhillon, G.S., Hackney, R., McBride, N., Kesar, S. (1999). Interpreting IS/IT decision support in the UK primary health care system: Issues of consumer orientation and structures. Proceedings of the Hawaii International Conference on System Sciences. 141. https://api.elsevier.com/content/abstract/scopus_id/0032760893
  • Editorial, Book Series

  • Dhillon, G.S., Karlsson, F., Hedström, K., Zúquete, A. (2019). Preface. IFIP Advances in Information and Communication Technology. 562 vi. https://api.elsevier.com/content/abstract/scopus_id/85068220555
  • Dhillon, G.S., Stahl, B.C., Baskerville, R. (2009). Preface. IFIP Advances in Information and Communication Technology. 301 5. https://api.elsevier.com/content/abstract/scopus_id/84943521212
  • Editorial, Journal

  • Dhillon, G.S. (2023). EDITORIAL. Other. 19 (2) 89. https://api.elsevier.com/content/abstract/scopus_id/85176577534
  • Dhillon, G.S. (2023). EDITORIAL. Other. 19 (1) 1. https://api.elsevier.com/content/abstract/scopus_id/85163593294
  • Dhillon, G.S. (2022). EDITORIAL. Other. 18 (1) I. https://api.elsevier.com/content/abstract/scopus_id/85141538154
  • Dhillon, G.S., Backhouse, J., Ray, A. (2007). Editorial: JSIS Security and Privacy Special Issue. Journal of Strategic Information Systems. 16 (2) 127-129. https://api.elsevier.com/content/abstract/scopus_id/34547866769
  • Dhillon, G.S. (2004). Guest Editorial: The challenge of managing information security. International Journal of Information Management. 24 (1) 3-4. https://api.elsevier.com/content/abstract/scopus_id/1242287852
  • Editorial, Trade Journal

  • Dhillon, G.S. (2003). Data and information security. Journal of Database Management. 14 (1) https://api.elsevier.com/content/abstract/scopus_id/0041379364
  • Journal Article

  • Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
  • Alhelaly, Y., Dhillon, G.S., Oliveira, T. (2023). When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection. Other. 134 103470. Elsevier BV. http://dx.doi.org/10.1016/j.cose.2023.103470
  • Sultana, T., Dhillon, G.S., Oliveira, T. (2023). The effect of fear and situational motivation on online information avoidance: The case of COVID-19. International Journal of Information Management. 69 https://api.elsevier.com/content/abstract/scopus_id/85142869560
  • Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33 (1) 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
  • Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
  • Soh, F., Smith, K., Dhillon, G.S., others. (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26 Australian Computer Society.
  • Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24 (6) 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
  • Sultana, T., Dhillon, G., Oliveira, T. (2022). The Effect of Fear and Situational Motivation on Online Information Avoidance: The Case of COVID-19. International Journal of Information Management. 69 Elsevier B.V.
  • Dhillon, G.S. (2022). A BAD REVIEW IS AS MUCH OF A LABOR TO WRITE AS A GOOD ONE: THE FOUR PRINCIPLES FOR REVIEWING RESEARCH MANUSCRIPTS. Other. 18 (3) 167-176. https://api.elsevier.com/content/abstract/scopus_id/85162865775
  • Dhillon, G.S., Smith, K., Dissanayake, I. Information Systems Security Research Agenda: Exploring the Gap Between Theory.. Journal of Strategic Information Systems. 30 (4) London, Elsevier.
  • Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30 (4) 101693. North-Holland.
  • Smith, K., Dhillon, G.S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56 102123. Pergamon.
  • Kolotylo-Kulkarni, M., Xia, W., Dhillon, G.S. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research. 126 221-238. https://api.elsevier.com/content/abstract/scopus_id/85099246792
  • Smith, K.J., Dhillon, G.S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56 https://api.elsevier.com/content/abstract/scopus_id/85091938398
  • Smith, K.J., Dhillon, G.S. (2020). Assessing blockchain potential for improving the cybersecurity of financial transactions. Managerial Finance. 46 (6) 833-848. https://api.elsevier.com/content/abstract/scopus_id/85074016223
  • Coss, D.L., Dhillon, G.S. (2020). A framework for auditing and strategizing to ensure cloud privacy. Journal of Information Systems. 34 (2) 47-63. https://api.elsevier.com/content/abstract/scopus_id/85090961172
  • Samonas, S., Dhillon, G.S., Almusharraf, A. (2020). Stakeholder perceptions of information security policy: Analyzing personal constructs. International Journal of Information Management. 50 144-154. https://api.elsevier.com/content/abstract/scopus_id/85066049578
  • Dhillon, G.S., Talib, Y.Y., Picoto, W.N. (2020). The mediating role of psychological empowerment in information security compliance intentions. Journal of the Association for Information Systems. 21 (1) 152-174. https://api.elsevier.com/content/abstract/scopus_id/85079496434
  • Smith, K., Dhillon, G.S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
  • Dhillon, G.S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157 (1) 137--158. Springer Netherlands.
  • Dhillon, G.S., Smith, K.J. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157 (1) 137-158. https://api.elsevier.com/content/abstract/scopus_id/85029580831
  • Syed, R., Dhillon, G.S., Merrick, J. (2019). The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media. Decision Sciences. 50 (3) 498-536. https://api.elsevier.com/content/abstract/scopus_id/85052919985
  • Coss, D.L., Dhillon, G.S. (2019). Cloud privacy objectives a value based approach. Other. 27 (2) 189-220. https://api.elsevier.com/content/abstract/scopus_id/85061724860
  • Smith, K., Dhillon, G.S., Hedstr\"om, Karin. (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26 (2) 194--212. Emerald Publishing Limited.
  • Dhillon, G.S., Oliveira, T., Syed, R. (2018). Value-based information privacy objectives for Internet Commerce. Computers in Human Behavior. 87 292-307. https://api.elsevier.com/content/abstract/scopus_id/85049307208
  • Smith, K.J., Dhillon, G.S., Hedström, K. (2018). Reconciling value-based objectives for security and identity management. Other. 26 (2) 194-212. https://api.elsevier.com/content/abstract/scopus_id/85049889857
  • Dhillon, G.S., Syed, R., Sá-Soares, F.d. (2017). Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors. Other. 54 (4) 452-464. https://api.elsevier.com/content/abstract/scopus_id/85008613613
  • Oliveira, T., Alhinho, M., Rita, P., Dhillon, G.S. (2017). Modelling and testing consumer trust dimensions in e-commerce. Computers in Human Behavior. 71 153-164. https://api.elsevier.com/content/abstract/scopus_id/85011599434
  • Dhillon, G.S., Oliveira, T., Susarapu, S., Caldeira, M. (2016). Deciding between information security and usability: Developing value based objectives. Computers in Human Behavior. 61 656-666. https://api.elsevier.com/content/abstract/scopus_id/84961933307
  • Pedron, C.D., Picoto, W.N., Dhillon, G.S., Caldeira, M. (2016). Value-focused objectives for CRM system adoption. Other. 116 (3) 526-545. https://api.elsevier.com/content/abstract/scopus_id/84962339896
  • Dhillon, G.S., Syed, R., Pedron, C. (2016). Interpreting information security culture: An organizational transformation case study. Other. 56 63-69. https://api.elsevier.com/content/abstract/scopus_id/84946820899
  • Lapke, M., Dhillon, G.S. (2015). Disassociations in security policy lifecycles. Other. 9 (1) 62-77. https://api.elsevier.com/content/abstract/scopus_id/84958061019
  • Oliveira, T., Dhillon, G.S. (2015). From adoption to routinization of B2B e-Commerce: Understanding patterns across Europe. Journal of Global Information Management. 23 (1) 24-43. https://api.elsevier.com/content/abstract/scopus_id/84934268135
  • Hong, W., Chan, F.K., Thong, J.Y., Chasalow, L.C., Dhillon, G.S. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research. 25 (1) 111-136. https://api.elsevier.com/content/abstract/scopus_id/84897933983
  • May, J., Dhillon, G.S., Caldeira, M. (2013). Defining value-based objectives for ERP systems planning. Decision Support Systems. 55 (1) 98-109. https://api.elsevier.com/content/abstract/scopus_id/84877779058
  • Kolkowska, E., Dhillon, G.S. (2013). Organizational power and information security rule compliance. Other. 33 3-11. https://api.elsevier.com/content/abstract/scopus_id/85027950618
  • Ramachandran, S., Rao, C., Goles, T., Dhillon, G.S. (2013). Variations in information security cultures across professions: A qualitative study. Communications of the Association for Information Systems. 33 (1) 163-204. https://api.elsevier.com/content/abstract/scopus_id/84890538511
  • Thomas, M., Dhillon, G.S. (2012). Interpreting deep structures of information systems security. Other. 55 (10) 1148-1156. https://api.elsevier.com/content/abstract/scopus_id/84867311818
  • Dhillon, G.S., Caldeira, M., Wenger, M.R. (2011). Intentionality and power interplay in IS implementation: The case of an asset management firm. Journal of Strategic Information Systems. 20 (4) 438-448. https://api.elsevier.com/content/abstract/scopus_id/82955162956
  • Hong, W., Thong, J.Y., Chasalow, L., Dhillon, G.S. (2011). User acceptance of agile information systems: A model and empirical test. Journal of Management Information Systems. 28 (1) 235-272. https://api.elsevier.com/content/abstract/scopus_id/80051718916
  • Gillon, K., Branz, L., Culnan, M., Dhillon, G.S., Hodgkinson, R., MacWillson, A. (2011). Information security and privacy-rethinking governance models. Communications of the Association for Information Systems. 28 (1) 561-570. https://api.elsevier.com/content/abstract/scopus_id/81055124841
  • Caldeira, M., Dhillon, G.S. (2010). Are we really competent?: Assessing organizational ability in delivering IT benefits. Business Process Management Journal. 16 (1) 5-28. https://api.elsevier.com/content/abstract/scopus_id/76449095249
  • Dhillon, G.S., Caldeira, M. (2010). The implementation of the Spa Select System: Coming to grips with the cog in the machine. International Journal of Information Management. 30 (1) 38-46. https://api.elsevier.com/content/abstract/scopus_id/73449141770
  • Dhillon, G.S. (2008). Organizational competence for harnessing IT: A case study. Other. 45 (5) 297-303. https://api.elsevier.com/content/abstract/scopus_id/44649103943
  • Dhillon, G.S., Caldeira, M. (2008). A bumpy road to success (or not): The case of Project Genesis at Nevada DMV. International Journal of Information Management. 28 (3) 222-228. https://api.elsevier.com/content/abstract/scopus_id/44249121443
  • Dhillon, G.S., Hall, C. (2007). Introducing IT to Partners Financial Services: The case of a vision without direction. International Journal of Information Management. 27 (2) 139-148. https://api.elsevier.com/content/abstract/scopus_id/33847418272
  • Dhillon, G.S., Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal. 16 (3) 293-314. https://api.elsevier.com/content/abstract/scopus_id/33744830087
  • Dhillon, G.S. (2005). Gaining benefits from IS/IT implementation: Interpretations from case studies. International Journal of Information Management. 25 (6) 502-515. https://api.elsevier.com/content/abstract/scopus_id/27644437270
  • Dhillon, G.S. (2004). Realizing benefits of an information security program. Business Process Management Journal. 10 (3) https://api.elsevier.com/content/abstract/scopus_id/70449576952
  • Dhillon, G.S. (2004). Dimensions of power and IS implementation. Other. 41 (5) 635-644. https://api.elsevier.com/content/abstract/scopus_id/1242308514
  • Chang, J.C., Torkzadeh, G., Dhillon, G.S. (2004). Re-examining the measurement models of success for Internet commerce. Other. 41 (5) 577-584. https://api.elsevier.com/content/abstract/scopus_id/1242331021
  • Moores, T.T., Dhillon, G.S. (2003). Do privacy seals in E-commerce really work?. Communications of the ACM. 46 (12) 265-271. https://api.elsevier.com/content/abstract/scopus_id/29844455709
  • Reid, R., Dhillon, G.S. (2003). Integrating digital signatures with relational databases: Issues and organizational implications. Journal of Database Management. 14 (1) 42-51. https://api.elsevier.com/content/abstract/scopus_id/0041379360
  • Dhillon, G.S., Hackney, R. (2003). Positioning IS/IT in networked firms. International Journal of Information Management. 23 (2) 163-169. https://api.elsevier.com/content/abstract/scopus_id/0037399993
  • Dhillon, G.S., Ward, J. (2002). Chaos Theory as a Framework for Studying Information Systems. Other. 15 (2) 1-13. https://api.elsevier.com/content/abstract/scopus_id/85001759469
  • Torkzadeh, G., Dhillon, G.S. (2002). Measuring factors that influence the success of Internet commerce. Information Systems Research. 13 (2) 187-204. https://api.elsevier.com/content/abstract/scopus_id/0036015964
  • Dhillon, G.S., Moores, S. (2001). Computer crimes: Theorizing about the enemy within. Other. 20 (8) 715-723. https://api.elsevier.com/content/abstract/scopus_id/0035658603
  • Dhillon, G.S., Moores, T.T. (2001). Internet Privacy: Interpreting Key Issues. Other. 14 (4) 33-37. https://api.elsevier.com/content/abstract/scopus_id/85001759514
  • Dhillon, G.S. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Other. 20 (2) 165-172. https://api.elsevier.com/content/abstract/scopus_id/0035063716
  • Phukan, S., Dhillon, G.S. (2000). Ethics and information technology use: A survey of US based SMEs. Other. 8 (5) 239-243. https://api.elsevier.com/content/abstract/scopus_id/8744280051
  • Dhillon, G.S., Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM. 43 (7) 125-128. https://api.elsevier.com/content/abstract/scopus_id/0002698747
  • Dhillon, G.S., Caldeira, M. (2000). Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. Other. 8 (4) 184-188. https://api.elsevier.com/content/abstract/scopus_id/1842867241
  • Moores, T., Dhillon, G.S. (2000). Software piracy: A view from Hong Kong. Communications of the ACM. 43 (12) 88-93. https://api.elsevier.com/content/abstract/scopus_id/0042223455
  • Hackney, R., Kawalek, J., Dhillon, G.S. (1999). Strategic information systems planning: Perspectives on the role of the 'end-user' revisited. Journal of End User Computing. 11 (2) 3-12. https://api.elsevier.com/content/abstract/scopus_id/0041707328
  • Dhillon, G.S., Hackney, R. (1999). IS/IT market support systems: augmenting UK primary health care groups.. Topics in Health Information Management. 20 (2) 83-90. https://api.elsevier.com/content/abstract/scopus_id/0033220610
  • Dhillon, G.S. (1999). Managing and controlling computer misuse. Other. 7 (3-4) 171-175. https://api.elsevier.com/content/abstract/scopus_id/0007551808
  • Dhillon, G.S., Hackney, R. (1997). Drug use management and IT-based medical thesauri: issues of semantics and linguistics.. Other. 23 (2-3) 58-64. https://api.elsevier.com/content/abstract/scopus_id/0030629336
  • Hackney, R., Dhillon, G.S., McBride, N. (1997). Primary care information technology within the NHS: The concept of markets and hierarchies on systems exploitation. Other. 10 (4-5) 388-395. https://api.elsevier.com/content/abstract/scopus_id/7744225469
  • Dhillon, G.S., Backhouse, J. (1996). Risks in the use of information technology within organizations. International Journal of Information Management. 16 (1) 65-74. https://api.elsevier.com/content/abstract/scopus_id/0040645933
  • Bytheway, A.J., Dhillon, G.S. (1996). Significance of partnerships in the management of interorganisational systems. International Journal of Information Management. 16 (5) 369-380. https://api.elsevier.com/content/abstract/scopus_id/0030269097
  • Backhouse, J., Dhillon, G.S. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems. 5 (1) 2-9. https://api.elsevier.com/content/abstract/scopus_id/21344459955
  • Backhouse, J., Dhillon, G.S. (1995). Managing computer crime: a research outlook. Other. 14 (7) 645-651. https://api.elsevier.com/content/abstract/scopus_id/0001156375
  • Note, Journal

  • Dhillon, G.S. (2023). THE INTELLECTUAL CORE OF INFORMATION SYSTEMS SECURITY. Other. 19 (2) 91-95. https://api.elsevier.com/content/abstract/scopus_id/85176615369
  • Review, Journal

  • Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30 (4) https://api.elsevier.com/content/abstract/scopus_id/85116553374
  • Dhillon, G.S., Orton, J.D. (2001). Schizoid incoherence, microstrategic options, and the strategic management of new organizational forms. Other. 4 (4) 229-240. https://api.elsevier.com/content/abstract/scopus_id/0013324007
  • Hackney, R., Dhillon, G.S. (1998). Developing a clinical information system: An interpretive case analysis within a UK hospital. Health Services Management Research. 11 (4) 238-245. https://api.elsevier.com/content/abstract/scopus_id/0031732472
  • posted-content

  • Srivastava, S., Dhillon, G.S., Kaur, R., Dhillon, S. Impact of Positive and Negative User Affect on Information Security: Insights from Rural India. Elsevier BV. http://dx.doi.org/10.2139/ssrn.4644568

Service

University Service

  • Chairperson, Course Coordinator. (January 2022 - Present).
  • Chairperson, ITDS Course Scheduler. (January 2022 - Present).
  • Member, Academic Curriculum. (August 2021 - Present).
  • Committee Member, PhD Exam Pool. (August 2021 - Present).
  • Committee Member, Reappointment, Promotion, Tenure. (August 2021 - Present).
  • Committee Member, Reappointment, Promotion, Tenure. (August 2021 - Present).
  • Committee Member, Search Committee (Clinical). (August 2021 - Present).
  • Committee Member, Search Committee (Tenure Track). (August 2021 - Present).

Professional Service

  • Guest Speaker, TEDx. (March 2021 - Present).
  • Board of Advisors, Journal of Strategic Information Systems. (January 2021 - Present).
  • Editor, Senior Editor, AIS Transactions on HCI. (January 2018 - Present).
  • Editor, Journal Editor, European Journal of Management Studies. (January 2013 - Present).
  • Editor, Journal Editor, Journal of Information System Security. (January 2005 - Present).
  • Program Coordinator, Annual Security Conference. (April 2002 - Present).