Skip to main content

Gurpreet S. Dhillon

Title: Professor

Department: Information Technology and Decision Sciences

College: College of Business

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, The London School of Economics and Political Science, 1995
    Major: Information Systems
    Specialization: Information Systems
    Dissertation: Interpreting the management of information systems security
  • MSc, The London School of Economics and Political Science, 1989
    Major: Statistical and Mathematical Sciences
    Specialization: Information Systems
    Dissertation: Semantic Analysis for Secure Systems Development

Current Scheduled Teaching

DBAS 6003.501Qualitative Research Method IISpring 2025
DBAS 6021.501Digital TransformationFall 2024
BCIS 6950.768Doctoral DissertationFall 2024
BCIS 6650.001Seminar in General Systems TheoryFall 2024

Previous Scheduled Teaching

BCIS 6950.753Doctoral DissertationSummer 5W2 2024
BCIS 5150.006Leveraging Information Technology for BusinessSummer 5W1 2024 Syllabus SPOT
BCIS 6950.759Doctoral DissertationSpring 2024
BCIS 5150.001Leveraging Information Technology for BusinessSpring 8W1 2024 SPOT
DBAS 6003.501Qualitative Research Method IISpring 2024
BCIS 6900.712Special ProblemsSpring 2024
BCIS 6950.768Doctoral DissertationFall 2023
BCIS 5150.002Leveraging Information Technology for BusinessFall 8W1 2023 SPOT
BCIS 5150.006Leveraging Information Technology for BusinessSummer 5W1 2023 SPOT
BCIS 6950.759Doctoral DissertationSpring 2023
BCIS 6650.001Seminar in General Systems TheorySpring 2023 SPOT
BCIS 6950.768Doctoral DissertationFall 2022
BCIS 5150.002Leveraging Information Technology for BusinessFall 8W1 2022 SPOT
BCIS 5150.003Leveraging Information Technology for BusinessSummer 5W1 2022 SPOT
BCIS 5150.004Leveraging Information Technology for BusinessSummer 5W2 2022 SPOT
BCIS 5150.005Leveraging Information Technology for BusinessSummer 5W2 2022 SPOT
BCIS 5150.006Leveraging Information Technology for BusinessSummer 5W1 2022 SPOT
BCIS 5120.003Information Systems DevelopmentSpring 2022 SPOT
BCIS 5150.002Leveraging Information Technology for BusinessSpring 8W2 2022 SPOT
BCIS 4610.001Analysis of Business Information SystemsFall 2021 Syllabus SPOT
DSCI 4700.001Analytics for Decision MakingFall 2021 Syllabus SPOT
BCIS 5150.001Leveraging Information Technology for BusinessSummer 5W2 2021 SPOT
BCIS 5150.002Leveraging Information Technology for BusinessSummer 5W2 2021 SPOT
BCIS 5150.026Leveraging Information Technology for BusinessSummer 5W2 2021

Published Intellectual Contributions

    Book Chapter

  • Dhillon, G.S., Smith, K., Hedstr\"om, Karin. (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
  • Smith, K., Dhillon, G.S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
  • Baskerville, R.L., Dhillon, G.S. (2016). Information systems security strategy: A process view. Information Security: Policy, Processes, and Practices. 15-45. https://api.elsevier.com/content/abstract/scopus_id/85106105889
  • Oliveira, T., Dhillon, G.S. (2015). From adoption to routinization of B2B e-Commerce: Understanding patterns across Europe. Web Design and Development: Concepts, Methodologies, Tools, and Applications. 3-3 1477-1497. https://api.elsevier.com/content/abstract/scopus_id/84958869150
  • Dhillon, G.S., Kolkowska, E. (2011). Can a cloud be really secure? A socratic dialogue. Computers, Privacy and Data Protection: an Element of Choice. 345-360. https://api.elsevier.com/content/abstract/scopus_id/84892247197
  • Dhillon, G.S., Mishra, S. (2006). The impact of Sarbanes-Oxley (SOX) act on information security governance. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. 62-79. https://api.elsevier.com/content/abstract/scopus_id/84898273735
  • Conference Proceeding

  • Xie, W., Dhillon, G., Smith, K., Yang, Z. Information Disorder Behavior on social media: A Moral Intensity Perspective. AIS.
  • Kaur, J., Dhillon, G., Picoto, W. The Role of Organizational Competence on Information Security Job Performance.. AIS/WISP.
  • AlHelay, Y., Dhillon, G., Oliveira, T. Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection. AIS.
  • Smith, K.J., Dhillon, G.S., Kolkowska, E. (2019). Important issues for preventing cyberstalking in India. 25th Americas Conference on Information Systems, AMCIS 2019. https://api.elsevier.com/content/abstract/scopus_id/85084023161
  • Smith, K.J., Dhillon, G.S. (2018). Eliciting societal values for healthcare policy decisions. International Conference on Information Systems 2018, ICIS 2018. https://api.elsevier.com/content/abstract/scopus_id/85062554775
  • Dhillon, G.S., Torkzadeh, G., Chang, J. (2018). Strategic planning for IS security: Designing objectives. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10844 LNCS 285-299. https://api.elsevier.com/content/abstract/scopus_id/85047913468
  • Smith, K.J., Dhillon, G.S. (2017). Blockchain for digital crime prevention: The case of health informatics. AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. 2017-August https://api.elsevier.com/content/abstract/scopus_id/85048419661
  • Walton, J.B., Dhillon, G.S. (2017). Understanding digital crime, trust, and control in blockchain technologies. AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. 2017-August https://api.elsevier.com/content/abstract/scopus_id/85048399205
  • Merritt, C.D., Dhillon, G.S. (2016). AMCIS 2016 San Diego paper submission what interrupts intention to comply with IS-security policy?. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987597626
  • Silva, R., Dhillon, G.S., Picoto, W. (2016). Competence-based model for securing the internet of things in organizations. 24th European Conference on Information Systems, ECIS 2016. https://api.elsevier.com/content/abstract/scopus_id/84995793087
  • Dhillon, G.S., Samonas, S., Etudo, U. (2016). Developing a human activity model for insider IS security breaches using action design research. IFIP Advances in Information and Communication Technology. 471 49-61. https://api.elsevier.com/content/abstract/scopus_id/84969980367
  • Smith, K.J., Dhillon, G.S. (2016). Eliciting societal values for cyberstalking policy decisions. 2016 International Conference on Information Systems, ICIS 2016. https://api.elsevier.com/content/abstract/scopus_id/85019399077
  • Abed, J., Dhillon, G.S., Ozkan, S. (2016). Investigating continuous security compliance behavior: Insights from information systems continuance model. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987673658
  • Dhillon, G.S., Harnesk, D. (2016). Misunderstandings and misjudgments about security: A dialogical narrative analysis of global it offshoring. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987662438
  • Dhillon, G.S. (2016). Money laundering and technology enabled crime: A cultural analysis. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987654825
  • Syed, R., Dhillon, G.S. (2015). Dynamics of data breaches in online social networks: Understanding threats to organizational information security reputation. 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. https://api.elsevier.com/content/abstract/scopus_id/85107238148
  • Talib, Y.Y., Dhillon, G.S. (2015). Employee ISP compliance intentions: An empirical test of empowerment. 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. https://api.elsevier.com/content/abstract/scopus_id/85041742235
  • Dhillon, G.S., Almusharraf, A., Samonas, S. (2015). Mismatched understanding of IS security policy: A RepGrid analysis. 2015 Americas Conference on Information Systems, AMCIS 2015. https://api.elsevier.com/content/abstract/scopus_id/84963632172
  • Nunes, S., Dhillon, G.S., Caldeira, M. (2015). Value focused approach to information systems risk management. Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao. 15 103-115. https://api.elsevier.com/content/abstract/scopus_id/85047177201
  • Singh, R., Wall, J.D., Dhillon, G.S. (2014). Archetypes to inform information security: The organization man and the innovator. 20th Americas Conference on Information Systems, AMCIS 2014. https://api.elsevier.com/content/abstract/scopus_id/84905983110
  • Dhillon, G.S., Chowdhuri, R., Pedron, C. (2014). Organizational transformation and information security culture: A telecom case study. IFIP Advances in Information and Communication Technology. 428 431-437. https://api.elsevier.com/content/abstract/scopus_id/84926431396
  • Dhillon, G.S., Chowdhuri, R. (2013). Individual values for protecting identity in social networks. International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. 3 2177-2192. https://api.elsevier.com/content/abstract/scopus_id/84897765355
  • Dhillon, G.S., Chowdhuri, R., De Sá-Soares, F. (2013). Secure outsourcing: An investigation of the fit between clients and providers. IFIP Advances in Information and Communication Technology. 405 405-418. https://api.elsevier.com/content/abstract/scopus_id/84920911433
  • Dhillon, G.S., Oliveira, T., Susarapu, S., Caldeira, M. (2012). When convenience trumps security: Defining objectives for security and usability of systems. IFIP Advances in Information and Communication Technology. 376 AICT 352-363. https://api.elsevier.com/content/abstract/scopus_id/84863932698
  • Nasution, F.M., Dhillon, G.S. (2012). Shaping of security policy in an Indonesian bank: Interpreting institutionalization and structuration. ECIS 2012 - Proceedings of the 20th European Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84905748847
  • Kolkowska, E., Dhillon, G.S. (2011). Organizational power and information security rule compliance. IFIP Advances in Information and Communication Technology. 354 AICT 185-196. https://api.elsevier.com/content/abstract/scopus_id/79960854139
  • May, J., Dhillon, G.S. (2010). A holistic approach for enriching information security analysis and security policy formation. 18th European Conference on Information Systems, ECIS 2010. https://api.elsevier.com/content/abstract/scopus_id/84870636420
  • Hodgkinson, R., Branz, L., Culnan, M., Dhillon, G.S., Macwillson, A., Ponemon, L. (2010). Information security and privacy: Rethinking governance models. ICIS 2010 Proceedings - Thirty First International Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84870974185
  • Hedström, K., Dhillon, G.S., Karlsson, F. (2010). Using Actor Network Theory to understand information security management. IFIP Advances in Information and Communication Technology. 330 43-54. https://api.elsevier.com/content/abstract/scopus_id/84885075680
  • Dhillon, G.S., Stahl, B.C., Baskerville, R. (2009). Creativity and intelligence in small and medium sized enterprises: The role of information systems. IFIP Advances in Information and Communication Technology. 301 1-9. https://api.elsevier.com/content/abstract/scopus_id/84943564957
  • Dhillon, G.S., Stahl, B.C., Baskerville, R. (2009). Information systems – creativity and innovation in small and medium-sized enterprises IFIP WG 8.2 international conference, creativeSME 2009 guimarães, Portugal, june 21-24, 2009 proceedings. IFIP Advances in Information and Communication Technology. 301 https://api.elsevier.com/content/abstract/scopus_id/84943528087
  • Caldeira, M., Pedron, C., Dhillon, G.S., Lee, J. (2008). Applying EA perspective to CRM: Developing a competency framework. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. 2 1029-1034. https://api.elsevier.com/content/abstract/scopus_id/57849120096
  • Mishra, S., Dhillon, G.S. (2008). Defining internal control objectives for information systems security: A value focused assessment. 16th European Conference on Information Systems, ECIS 2008. https://api.elsevier.com/content/abstract/scopus_id/84870631493
  • Lapke, M., Dhillon, G.S. (2008). Power relationships in information systems security policy formulation and implementation. 16th European Conference on Information Systems, ECIS 2008. https://api.elsevier.com/content/abstract/scopus_id/84870627490
  • Mishra, S., Dhillon, G.S. (2007). A theoretical basis for defining internal control objectives for information systems security. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 1 427-436. https://api.elsevier.com/content/abstract/scopus_id/84870200118
  • Dhillon, G.S., Tejay, G., Weiyin, H. (2007). Identifying governance dimensions to evaluate information systems security in organizations. Proceedings of the Annual Hawaii International Conference on System Sciences. https://api.elsevier.com/content/abstract/scopus_id/39749131907
  • May, J., Dhillon, G.S. (2007). Investigating the development of a multi-objective decision model that seeks to generate informed alternatives for maximizing is security within an organization. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 1 407-417. https://api.elsevier.com/content/abstract/scopus_id/84870203735
  • Lapke, M., Dhillon, G.S. (2006). A semantic analysis of security policy formulation and implementation: A case study. Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. 2 1232-1241. https://api.elsevier.com/content/abstract/scopus_id/84870003095
  • Thomas, M.A., Dhillon, G.S. (2006). Deep structures of information systems security. Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. 6 3461-3468. https://api.elsevier.com/content/abstract/scopus_id/84870346821
  • Wenger, M.R., Dhillon, G.S., Caldeira, M. (2005). ERP implementation in Portugal: Interpreting dimensions of power. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. 5 2487-2494. https://api.elsevier.com/content/abstract/scopus_id/84870039346
  • Susarapu, S.R., Dhillon, G.S. (2005). Semiotic analysis of knowledge intensive business processes: Developing interpretations for sustainable competitive advantage. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. 6 3088-3094. https://api.elsevier.com/content/abstract/scopus_id/84870002655
  • White, E.F., Dhillon, G.S. (2005). Synthesizing information system design ideals to overcome developmental duality in securing information systems. Proceedings of the Annual Hawaii International Conference on System Sciences. 186. https://api.elsevier.com/content/abstract/scopus_id/27544442846
  • Dhillon, G.S., Fabian, F. (2005). A fractal perspective on competencies necessary for managing information systems. International Journal of Technology Management. 31 (1-2) 129-139. https://api.elsevier.com/content/abstract/scopus_id/19344368665
  • Dhillon, G.S., Silva, L., Backhouse, J. (2004). Computer crime at CEFORMA: A case study. International Journal of Information Management. 24 (6) 551-561. https://api.elsevier.com/content/abstract/scopus_id/7744227587
  • Mattia, A., Dhillon, G.S. (2003). Applying double loop learning to interpret implications for information systems security design. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. 3 2521-2526. https://api.elsevier.com/content/abstract/scopus_id/0242552856
  • Eloff, J.H., Labuschagne, L., von Solms, R., Dhillon, G.S. (2002). Advances in Information Security Management & Small Systems Security. IFIP Advances in Information and Communication Technology. 72 https://api.elsevier.com/content/abstract/scopus_id/84904250094
  • Dhillon, G.S., Silva, L. (2002). Interpreting computer-related crime at the Malaria Research Center: A case study. IFIP Advances in Information and Communication Technology. 72 167-182. https://api.elsevier.com/content/abstract/scopus_id/84904253615
  • Dhillon, G.S. (2000). Interpreting key issues in IS/IT benefits management. Proceedings of the Annual Hawaii International Conference on System Sciences. 2000-January https://api.elsevier.com/content/abstract/scopus_id/85094173476
  • Dhillon, G.S. (2000). Interpreting key issues in IS/IT benefits management. Proceedings of the Hawaii International Conference on System Sciences. 190. https://api.elsevier.com/content/abstract/scopus_id/0033900580
  • Dhillon, G.S., Hackney, R. (2000). IS/IT and dynamic business change. Proceedings of the Annual Hawaii International Conference on System Sciences. 2000-January https://api.elsevier.com/content/abstract/scopus_id/84898395722
  • Dhillon, G.S., Hackney, R. (2000). IS/IT and dynamic business change. Proceedings of the Hawaii International Conference on System Sciences. 207. https://api.elsevier.com/content/abstract/scopus_id/0033891063
  • Dhillon, G.S., Hackney, R., McBride, N., Kesar, S. (1999). Interpreting IS/IT decision support in the UK primary health care system: Issues of consumer orientation and structures. Proceedings of the Hawaii International Conference on System Sciences. 141. https://api.elsevier.com/content/abstract/scopus_id/0032760893
  • Editorial, Book Series

  • Dhillon, G.S., Karlsson, F., Hedström, K., Zúquete, A. (2019). Preface. IFIP Advances in Information and Communication Technology. 562 vi. https://api.elsevier.com/content/abstract/scopus_id/85068220555
  • Dhillon, G.S., Stahl, B.C., Baskerville, R. (2009). Preface. IFIP Advances in Information and Communication Technology. 301 5. https://api.elsevier.com/content/abstract/scopus_id/84943521212
  • Editorial, Journal

  • Dhillon, G.S. (2023). EDITORIAL. Other. 19 (2) 89. https://api.elsevier.com/content/abstract/scopus_id/85176577534
  • Dhillon, G.S. (2023). EDITORIAL. Other. 19 (1) 1. https://api.elsevier.com/content/abstract/scopus_id/85163593294
  • Dhillon, G.S. (2022). EDITORIAL. Other. 18 (1) I. https://api.elsevier.com/content/abstract/scopus_id/85141538154
  • Dhillon, G.S., Backhouse, J., Ray, A. (2007). Editorial: JSIS Security and Privacy Special Issue. Journal of Strategic Information Systems. 16 (2) 127-129. https://api.elsevier.com/content/abstract/scopus_id/34547866769
  • Dhillon, G.S. (2004). Guest Editorial: The challenge of managing information security. International Journal of Information Management. 24 (1) 3-4. https://api.elsevier.com/content/abstract/scopus_id/1242287852
  • Editorial, Trade Journal

  • Dhillon, G.S. (2003). Data and information security. Journal of Database Management. 14 (1) https://api.elsevier.com/content/abstract/scopus_id/0041379364
  • Journal Article

  • Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
  • Alhelaly, Y., Dhillon, G.S., Oliveira, T. (2023). When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection. Other. 134 103470. Elsevier BV. http://dx.doi.org/10.1016/j.cose.2023.103470
  • Sultana, T., Dhillon, G.S., Oliveira, T. (2023). The effect of fear and situational motivation on online information avoidance: The case of COVID-19. International Journal of Information Management. 69 https://api.elsevier.com/content/abstract/scopus_id/85142869560
  • Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33 (1) 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
  • Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
  • Soh, F., Smith, K., Dhillon, G.S., others. (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26 Australian Computer Society.
  • Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24 (6) 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
  • Sultana, T., Dhillon, G., Oliveira, T. (2022). The Effect of Fear and Situational Motivation on Online Information Avoidance: The Case of COVID-19. International Journal of Information Management. 69 Elsevier B.V.
  • Dhillon, G.S. (2022). A BAD REVIEW IS AS MUCH OF A LABOR TO WRITE AS A GOOD ONE: THE FOUR PRINCIPLES FOR REVIEWING RESEARCH MANUSCRIPTS. Other. 18 (3) 167-176. https://api.elsevier.com/content/abstract/scopus_id/85162865775
  • Dhillon, G.S., Smith, K., Dissanayake, I. Information Systems Security Research Agenda: Exploring the Gap Between Theory.. Journal of Strategic Information Systems. 30 (4) London, Elsevier.
  • Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30 (4) 101693. North-Holland.
  • Smith, K., Dhillon, G.S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56 102123. Pergamon.
  • Kolotylo-Kulkarni, M., Xia, W., Dhillon, G.S. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research. 126 221-238. https://api.elsevier.com/content/abstract/scopus_id/85099246792
  • Smith, K.J., Dhillon, G.S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56 https://api.elsevier.com/content/abstract/scopus_id/85091938398
  • Smith, K.J., Dhillon, G.S. (2020). Assessing blockchain potential for improving the cybersecurity of financial transactions. Managerial Finance. 46 (6) 833-848. https://api.elsevier.com/content/abstract/scopus_id/85074016223
  • Coss, D.L., Dhillon, G.S. (2020). A framework for auditing and strategizing to ensure cloud privacy. Journal of Information Systems. 34 (2) 47-63. https://api.elsevier.com/content/abstract/scopus_id/85090961172
  • Samonas, S., Dhillon, G.S., Almusharraf, A. (2020). Stakeholder perceptions of information security policy: Analyzing personal constructs. International Journal of Information Management. 50 144-154. https://api.elsevier.com/content/abstract/scopus_id/85066049578
  • Dhillon, G.S., Talib, Y.Y., Picoto, W.N. (2020). The mediating role of psychological empowerment in information security compliance intentions. Journal of the Association for Information Systems. 21 (1) 152-174. https://api.elsevier.com/content/abstract/scopus_id/85079496434
  • Smith, K., Dhillon, G.S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
  • Dhillon, G.S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157 (1) 137--158. Springer Netherlands.
  • Dhillon, G.S., Smith, K.J. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157 (1) 137-158. https://api.elsevier.com/content/abstract/scopus_id/85029580831
  • Syed, R., Dhillon, G.S., Merrick, J. (2019). The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media. Decision Sciences. 50 (3) 498-536. https://api.elsevier.com/content/abstract/scopus_id/85052919985
  • Coss, D.L., Dhillon, G.S. (2019). Cloud privacy objectives a value based approach. Other. 27 (2) 189-220. https://api.elsevier.com/content/abstract/scopus_id/85061724860
  • Smith, K., Dhillon, G.S., Hedstr\"om, Karin. (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26 (2) 194--212. Emerald Publishing Limited.
  • Dhillon, G.S., Oliveira, T., Syed, R. (2018). Value-based information privacy objectives for Internet Commerce. Computers in Human Behavior. 87 292-307. https://api.elsevier.com/content/abstract/scopus_id/85049307208
  • Smith, K.J., Dhillon, G.S., Hedström, K. (2018). Reconciling value-based objectives for security and identity management. Other. 26 (2) 194-212. https://api.elsevier.com/content/abstract/scopus_id/85049889857
  • Dhillon, G.S., Syed, R., Sá-Soares, F.d. (2017). Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors. Other. 54 (4) 452-464. https://api.elsevier.com/content/abstract/scopus_id/85008613613
  • Oliveira, T., Alhinho, M., Rita, P., Dhillon, G.S. (2017). Modelling and testing consumer trust dimensions in e-commerce. Computers in Human Behavior. 71 153-164. https://api.elsevier.com/content/abstract/scopus_id/85011599434
  • Dhillon, G.S., Oliveira, T., Susarapu, S., Caldeira, M. (2016). Deciding between information security and usability: Developing value based objectives. Computers in Human Behavior. 61 656-666. https://api.elsevier.com/content/abstract/scopus_id/84961933307
  • Pedron, C.D., Picoto, W.N., Dhillon, G.S., Caldeira, M. (2016). Value-focused objectives for CRM system adoption. Other. 116 (3) 526-545. https://api.elsevier.com/content/abstract/scopus_id/84962339896
  • Dhillon, G.S., Syed, R., Pedron, C. (2016). Interpreting information security culture: An organizational transformation case study. Other. 56 63-69. https://api.elsevier.com/content/abstract/scopus_id/84946820899
  • Lapke, M., Dhillon, G.S. (2015). Disassociations in security policy lifecycles. Other. 9 (1) 62-77. https://api.elsevier.com/content/abstract/scopus_id/84958061019
  • Oliveira, T., Dhillon, G.S. (2015). From adoption to routinization of B2B e-Commerce: Understanding patterns across Europe. Journal of Global Information Management. 23 (1) 24-43. https://api.elsevier.com/content/abstract/scopus_id/84934268135
  • Hong, W., Chan, F.K., Thong, J.Y., Chasalow, L.C., Dhillon, G.S. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research. 25 (1) 111-136. https://api.elsevier.com/content/abstract/scopus_id/84897933983
  • May, J., Dhillon, G.S., Caldeira, M. (2013). Defining value-based objectives for ERP systems planning. Decision Support Systems. 55 (1) 98-109. https://api.elsevier.com/content/abstract/scopus_id/84877779058
  • Kolkowska, E., Dhillon, G.S. (2013). Organizational power and information security rule compliance. Other. 33 3-11. https://api.elsevier.com/content/abstract/scopus_id/85027950618
  • Ramachandran, S., Rao, C., Goles, T., Dhillon, G.S. (2013). Variations in information security cultures across professions: A qualitative study. Communications of the Association for Information Systems. 33 (1) 163-204. https://api.elsevier.com/content/abstract/scopus_id/84890538511
  • Thomas, M., Dhillon, G.S. (2012). Interpreting deep structures of information systems security. Other. 55 (10) 1148-1156. https://api.elsevier.com/content/abstract/scopus_id/84867311818
  • Dhillon, G.S., Caldeira, M., Wenger, M.R. (2011). Intentionality and power interplay in IS implementation: The case of an asset management firm. Journal of Strategic Information Systems. 20 (4) 438-448. https://api.elsevier.com/content/abstract/scopus_id/82955162956
  • Hong, W., Thong, J.Y., Chasalow, L., Dhillon, G.S. (2011). User acceptance of agile information systems: A model and empirical test. Journal of Management Information Systems. 28 (1) 235-272. https://api.elsevier.com/content/abstract/scopus_id/80051718916
  • Gillon, K., Branz, L., Culnan, M., Dhillon, G.S., Hodgkinson, R., MacWillson, A. (2011). Information security and privacy-rethinking governance models. Communications of the Association for Information Systems. 28 (1) 561-570. https://api.elsevier.com/content/abstract/scopus_id/81055124841
  • Caldeira, M., Dhillon, G.S. (2010). Are we really competent?: Assessing organizational ability in delivering IT benefits. Business Process Management Journal. 16 (1) 5-28. https://api.elsevier.com/content/abstract/scopus_id/76449095249
  • Dhillon, G.S., Caldeira, M. (2010). The implementation of the Spa Select System: Coming to grips with the cog in the machine. International Journal of Information Management. 30 (1) 38-46. https://api.elsevier.com/content/abstract/scopus_id/73449141770
  • Dhillon, G.S. (2008). Organizational competence for harnessing IT: A case study. Other. 45 (5) 297-303. https://api.elsevier.com/content/abstract/scopus_id/44649103943
  • Dhillon, G.S., Caldeira, M. (2008). A bumpy road to success (or not): The case of Project Genesis at Nevada DMV. International Journal of Information Management. 28 (3) 222-228. https://api.elsevier.com/content/abstract/scopus_id/44249121443
  • Dhillon, G.S., Hall, C. (2007). Introducing IT to Partners Financial Services: The case of a vision without direction. International Journal of Information Management. 27 (2) 139-148. https://api.elsevier.com/content/abstract/scopus_id/33847418272
  • Dhillon, G.S., Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal. 16 (3) 293-314. https://api.elsevier.com/content/abstract/scopus_id/33744830087
  • Dhillon, G.S. (2005). Gaining benefits from IS/IT implementation: Interpretations from case studies. International Journal of Information Management. 25 (6) 502-515. https://api.elsevier.com/content/abstract/scopus_id/27644437270
  • Dhillon, G.S. (2004). Realizing benefits of an information security program. Business Process Management Journal. 10 (3) https://api.elsevier.com/content/abstract/scopus_id/70449576952
  • Dhillon, G.S. (2004). Dimensions of power and IS implementation. Other. 41 (5) 635-644. https://api.elsevier.com/content/abstract/scopus_id/1242308514
  • Chang, J.C., Torkzadeh, G., Dhillon, G.S. (2004). Re-examining the measurement models of success for Internet commerce. Other. 41 (5) 577-584. https://api.elsevier.com/content/abstract/scopus_id/1242331021
  • Moores, T.T., Dhillon, G.S. (2003). Do privacy seals in E-commerce really work?. Communications of the ACM. 46 (12) 265-271. https://api.elsevier.com/content/abstract/scopus_id/29844455709
  • Reid, R., Dhillon, G.S. (2003). Integrating digital signatures with relational databases: Issues and organizational implications. Journal of Database Management. 14 (1) 42-51. https://api.elsevier.com/content/abstract/scopus_id/0041379360
  • Dhillon, G.S., Hackney, R. (2003). Positioning IS/IT in networked firms. International Journal of Information Management. 23 (2) 163-169. https://api.elsevier.com/content/abstract/scopus_id/0037399993
  • Dhillon, G.S., Ward, J. (2002). Chaos Theory as a Framework for Studying Information Systems. Other. 15 (2) 1-13. https://api.elsevier.com/content/abstract/scopus_id/85001759469
  • Torkzadeh, G., Dhillon, G.S. (2002). Measuring factors that influence the success of Internet commerce. Information Systems Research. 13 (2) 187-204. https://api.elsevier.com/content/abstract/scopus_id/0036015964
  • Dhillon, G.S., Moores, S. (2001). Computer crimes: Theorizing about the enemy within. Other. 20 (8) 715-723. https://api.elsevier.com/content/abstract/scopus_id/0035658603
  • Dhillon, G.S., Moores, T.T. (2001). Internet Privacy: Interpreting Key Issues. Other. 14 (4) 33-37. https://api.elsevier.com/content/abstract/scopus_id/85001759514
  • Dhillon, G.S. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Other. 20 (2) 165-172. https://api.elsevier.com/content/abstract/scopus_id/0035063716
  • Phukan, S., Dhillon, G.S. (2000). Ethics and information technology use: A survey of US based SMEs. Other. 8 (5) 239-243. https://api.elsevier.com/content/abstract/scopus_id/8744280051
  • Dhillon, G.S., Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM. 43 (7) 125-128. https://api.elsevier.com/content/abstract/scopus_id/0002698747
  • Dhillon, G.S., Caldeira, M. (2000). Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. Other. 8 (4) 184-188. https://api.elsevier.com/content/abstract/scopus_id/1842867241
  • Moores, T., Dhillon, G.S. (2000). Software piracy: A view from Hong Kong. Communications of the ACM. 43 (12) 88-93. https://api.elsevier.com/content/abstract/scopus_id/0042223455
  • Hackney, R., Kawalek, J., Dhillon, G.S. (1999). Strategic information systems planning: Perspectives on the role of the 'end-user' revisited. Journal of End User Computing. 11 (2) 3-12. https://api.elsevier.com/content/abstract/scopus_id/0041707328
  • Dhillon, G.S., Hackney, R. (1999). IS/IT market support systems: augmenting UK primary health care groups.. Topics in Health Information Management. 20 (2) 83-90. https://api.elsevier.com/content/abstract/scopus_id/0033220610
  • Dhillon, G.S. (1999). Managing and controlling computer misuse. Other. 7 (3-4) 171-175. https://api.elsevier.com/content/abstract/scopus_id/0007551808
  • Dhillon, G.S., Hackney, R. (1997). Drug use management and IT-based medical thesauri: issues of semantics and linguistics.. Other. 23 (2-3) 58-64. https://api.elsevier.com/content/abstract/scopus_id/0030629336
  • Hackney, R., Dhillon, G.S., McBride, N. (1997). Primary care information technology within the NHS: The concept of markets and hierarchies on systems exploitation. Other. 10 (4-5) 388-395. https://api.elsevier.com/content/abstract/scopus_id/7744225469
  • Dhillon, G.S., Backhouse, J. (1996). Risks in the use of information technology within organizations. International Journal of Information Management. 16 (1) 65-74. https://api.elsevier.com/content/abstract/scopus_id/0040645933
  • Bytheway, A.J., Dhillon, G.S. (1996). Significance of partnerships in the management of interorganisational systems. International Journal of Information Management. 16 (5) 369-380. https://api.elsevier.com/content/abstract/scopus_id/0030269097
  • Backhouse, J., Dhillon, G.S. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems. 5 (1) 2-9. https://api.elsevier.com/content/abstract/scopus_id/21344459955
  • Backhouse, J., Dhillon, G.S. (1995). Managing computer crime: a research outlook. Other. 14 (7) 645-651. https://api.elsevier.com/content/abstract/scopus_id/0001156375
  • Note, Journal

  • Dhillon, G.S. (2023). THE INTELLECTUAL CORE OF INFORMATION SYSTEMS SECURITY. Other. 19 (2) 91-95. https://api.elsevier.com/content/abstract/scopus_id/85176615369
  • Review, Journal

  • Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30 (4) https://api.elsevier.com/content/abstract/scopus_id/85116553374
  • Dhillon, G.S., Orton, J.D. (2001). Schizoid incoherence, microstrategic options, and the strategic management of new organizational forms. Other. 4 (4) 229-240. https://api.elsevier.com/content/abstract/scopus_id/0013324007
  • Hackney, R., Dhillon, G.S. (1998). Developing a clinical information system: An interpretive case analysis within a UK hospital. Health Services Management Research. 11 (4) 238-245. https://api.elsevier.com/content/abstract/scopus_id/0031732472
  • posted-content

  • Srivastava, S., Dhillon, G.S., Kaur, R., Dhillon, S. Impact of Positive and Negative User Affect on Information Security: Insights from Rural India. Elsevier BV. http://dx.doi.org/10.2139/ssrn.4644568
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE