Faculty Profile

Gurpreet Dhillon

Title
Professor
Department
Information Technology and Decision Sciences
College
College of Business
Professor
Information Technology and Decision Sciences
College of Business

    

Education

PhD, The London School of Economics and Political Science, 1995.
Major: Information Systems
Degree Specialization: Information Systems
Dissertation Title: Interpreting the management of information systems security
MSc, The London School of Economics and Political Science, 1989.
Major: Statistical and Mathematical Sciences
Degree Specialization: Information Systems
Dissertation Title: Semantic Analysis for Secure Systems Development

Current Scheduled Teaching*

BCIS 6950.753, Doctoral Dissertation, Summer 2024
BCIS 5150.006, Leveraging Information Technology for Business, Summer 2024
BCIS 6950.759, Doctoral Dissertation, Spring 2024
BCIS 5150.001, Leveraging Information Technology for Business, Spring 2024 Syllabus
DBAS 6003.501, Qualitative Research Method II, Spring 2024
BCIS 6900.712, Special Problems, Spring 2024

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Previous Scheduled Teaching*

BCIS 6950.768, Doctoral Dissertation, Fall 2023
BCIS 5150.002, Leveraging Information Technology for Business, Fall 8W1 2023 Syllabus SPOT
BCIS 5150.006, Leveraging Information Technology for Business, Summer 5W1 2023 SPOT
BCIS 6950.759, Doctoral Dissertation, Spring 2023
BCIS 6650.001, Seminar in General Systems Theory, Spring 2023 Syllabus SPOT
BCIS 6950.768, Doctoral Dissertation, Fall 2022
BCIS 5150.002, Leveraging Information Technology for Business, Fall 8W1 2022 Syllabus SPOT
BCIS 5150.003, Leveraging Information Technology for Business, Summer 5W1 2022 Syllabus SPOT
BCIS 5150.004, Leveraging Information Technology for Business, Summer 5W2 2022 Syllabus SPOT
BCIS 5150.005, Leveraging Information Technology for Business, Summer 5W2 2022 Syllabus SPOT
BCIS 5150.006, Leveraging Information Technology for Business, Summer 5W1 2022 Syllabus SPOT
BCIS 5120.003, Information Systems Development, Spring 2022 Syllabus SPOT
BCIS 5150.002, Leveraging Information Technology for Business, Spring 8W2 2022 SPOT
BCIS 4610.001, Analysis of Business Information Systems, Fall 2021 Syllabus SPOT
DSCI 4700.001, Analytics for Decision Making, Fall 2021 Syllabus SPOT
BCIS 5150.001, Leveraging Information Technology for Business, Summer 5W2 2021 Syllabus SPOT
BCIS 5150.002, Leveraging Information Technology for Business, Summer 5W2 2021 Syllabus SPOT
BCIS 5150.026, Leveraging Information Technology for Business, Summer 5W2 2021 Syllabus

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Published Publications

Published Intellectual Contributions

Book Chapter
Dhillon, G. S., Smith, K., Hedstr\"om, Karin, (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
Smith, K., Dhillon, G. S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
Baskerville, R. L., Dhillon, G. S. (2016). Information systems security strategy: A process view. Information Security: Policy, Processes, and Practices. 15-45. https://api.elsevier.com/content/abstract/scopus_id/85106105889
Oliveira, T., Dhillon, G. S. (2015). From adoption to routinization of B2B e-Commerce: Understanding patterns across Europe. Web Design and Development: Concepts, Methodologies, Tools, and Applications. 3-3, 1477-1497. https://api.elsevier.com/content/abstract/scopus_id/84958869150
Dhillon, G. S., Kolkowska, E. (2011). Can a cloud be really secure? A socratic dialogue. Computers, Privacy and Data Protection: an Element of Choice. 345-360. https://api.elsevier.com/content/abstract/scopus_id/84892247197
Dhillon, G. S., Mishra, S. (2006). The impact of Sarbanes-Oxley (SOX) act on information security governance. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. 62-79. https://api.elsevier.com/content/abstract/scopus_id/84898273735
Conference Proceeding
Xie, W., Dhillon, G., Smith, K., Yang, Z. Information Disorder Behavior on social media: A Moral Intensity Perspective. AIS.
Kaur, J., Dhillon, G., Picoto, W. The Role of Organizational Competence on Information Security Job Performance.. AIS/WISP.
AlHelay, Y., Dhillon, G., Oliveira, T. Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection. AIS.
Smith, K. J., Dhillon, G. S., Kolkowska, E. (2019). Important issues for preventing cyberstalking in India. 25th Americas Conference on Information Systems, AMCIS 2019. https://api.elsevier.com/content/abstract/scopus_id/85084023161
Smith, K. J., Dhillon, G. S. (2018). Eliciting societal values for healthcare policy decisions. International Conference on Information Systems 2018, ICIS 2018. https://api.elsevier.com/content/abstract/scopus_id/85062554775
Dhillon, G. S., Torkzadeh, G., Chang, J. (2018). Strategic planning for IS security: Designing objectives. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10844 LNCS, 285-299. https://api.elsevier.com/content/abstract/scopus_id/85047913468
Smith, K. J., Dhillon, G. S. (2017). Blockchain for digital crime prevention: The case of health informatics. AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. 2017-August, . https://api.elsevier.com/content/abstract/scopus_id/85048419661
Walton, J. B., Dhillon, G. S. (2017). Understanding digital crime, trust, and control in blockchain technologies. AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. 2017-August, . https://api.elsevier.com/content/abstract/scopus_id/85048399205
Merritt, C. D., Dhillon, G. S. (2016). AMCIS 2016 San Diego paper submission what interrupts intention to comply with IS-security policy?. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987597626
Silva, R., Dhillon, G. S., Picoto, W. (2016). Competence-based model for securing the internet of things in organizations. 24th European Conference on Information Systems, ECIS 2016. https://api.elsevier.com/content/abstract/scopus_id/84995793087
Dhillon, G. S., Samonas, S., Etudo, U. (2016). Developing a human activity model for insider IS security breaches using action design research. IFIP Advances in Information and Communication Technology. 471, 49-61. https://api.elsevier.com/content/abstract/scopus_id/84969980367
Smith, K. J., Dhillon, G. S. (2016). Eliciting societal values for cyberstalking policy decisions. 2016 International Conference on Information Systems, ICIS 2016. https://api.elsevier.com/content/abstract/scopus_id/85019399077
Abed, J., Dhillon, G. S., Ozkan, S. (2016). Investigating continuous security compliance behavior: Insights from information systems continuance model. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987673658
Dhillon, G. S., Harnesk, D. (2016). Misunderstandings and misjudgments about security: A dialogical narrative analysis of global it offshoring. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987662438
Dhillon, G. S. (2016). Money laundering and technology enabled crime: A cultural analysis. AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84987654825
Syed, R., Dhillon, G. S. (2015). Dynamics of data breaches in online social networks: Understanding threats to organizational information security reputation. 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. https://api.elsevier.com/content/abstract/scopus_id/85107238148
Talib, Y. Y., Dhillon, G. S. (2015). Employee ISP compliance intentions: An empirical test of empowerment. 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. https://api.elsevier.com/content/abstract/scopus_id/85041742235
Dhillon, G. S., Almusharraf, A., Samonas, S. (2015). Mismatched understanding of IS security policy: A RepGrid analysis. 2015 Americas Conference on Information Systems, AMCIS 2015. https://api.elsevier.com/content/abstract/scopus_id/84963632172
Nunes, S., Dhillon, G. S., Caldeira, M. (2015). Value focused approach to information systems risk management. Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao. 15, 103-115. https://api.elsevier.com/content/abstract/scopus_id/85047177201
Singh, R., Wall, J. D., Dhillon, G. S. (2014). Archetypes to inform information security: The organization man and the innovator. 20th Americas Conference on Information Systems, AMCIS 2014. https://api.elsevier.com/content/abstract/scopus_id/84905983110
Dhillon, G. S., Chowdhuri, R., Pedron, C. (2014). Organizational transformation and information security culture: A telecom case study. IFIP Advances in Information and Communication Technology. 428, 431-437. https://api.elsevier.com/content/abstract/scopus_id/84926431396
Dhillon, G. S., Chowdhuri, R. (2013). Individual values for protecting identity in social networks. International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. 3, 2177-2192. https://api.elsevier.com/content/abstract/scopus_id/84897765355
Dhillon, G. S., Chowdhuri, R., De Sá-Soares, F. (2013). Secure outsourcing: An investigation of the fit between clients and providers. IFIP Advances in Information and Communication Technology. 405, 405-418. https://api.elsevier.com/content/abstract/scopus_id/84920911433
Dhillon, G. S., Oliveira, T., Susarapu, S., Caldeira, M. (2012). When convenience trumps security: Defining objectives for security and usability of systems. IFIP Advances in Information and Communication Technology. 376 AICT, 352-363. https://api.elsevier.com/content/abstract/scopus_id/84863932698
Nasution, F. M., Dhillon, G. S. (2012). Shaping of security policy in an Indonesian bank: Interpreting institutionalization and structuration. ECIS 2012 - Proceedings of the 20th European Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84905748847
Kolkowska, E., Dhillon, G. S. (2011). Organizational power and information security rule compliance. IFIP Advances in Information and Communication Technology. 354 AICT, 185-196. https://api.elsevier.com/content/abstract/scopus_id/79960854139
May, J., Dhillon, G. S. (2010). A holistic approach for enriching information security analysis and security policy formation. 18th European Conference on Information Systems, ECIS 2010. https://api.elsevier.com/content/abstract/scopus_id/84870636420
Hodgkinson, R., Branz, L., Culnan, M., Dhillon, G. S., Macwillson, A., Ponemon, L. (2010). Information security and privacy: Rethinking governance models. ICIS 2010 Proceedings - Thirty First International Conference on Information Systems. https://api.elsevier.com/content/abstract/scopus_id/84870974185
Hedström, K., Dhillon, G. S., Karlsson, F. (2010). Using Actor Network Theory to understand information security management. IFIP Advances in Information and Communication Technology. 330, 43-54. https://api.elsevier.com/content/abstract/scopus_id/84885075680
Dhillon, G. S., Stahl, B. C., Baskerville, R. (2009). Creativity and intelligence in small and medium sized enterprises: The role of information systems. IFIP Advances in Information and Communication Technology. 301, 1-9. https://api.elsevier.com/content/abstract/scopus_id/84943564957
Dhillon, G. S., Stahl, B. C., Baskerville, R. (2009). Information systems – creativity and innovation in small and medium-sized enterprises IFIP WG 8.2 international conference, creativeSME 2009 guimarães, Portugal, june 21-24, 2009 proceedings. IFIP Advances in Information and Communication Technology. 301, . https://api.elsevier.com/content/abstract/scopus_id/84943528087
Caldeira, M., Pedron, C., Dhillon, G. S., Lee, J. (2008). Applying EA perspective to CRM: Developing a competency framework. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. 2, 1029-1034. https://api.elsevier.com/content/abstract/scopus_id/57849120096
Mishra, S., Dhillon, G. S. (2008). Defining internal control objectives for information systems security: A value focused assessment. 16th European Conference on Information Systems, ECIS 2008. https://api.elsevier.com/content/abstract/scopus_id/84870631493
Lapke, M., Dhillon, G. S. (2008). Power relationships in information systems security policy formulation and implementation. 16th European Conference on Information Systems, ECIS 2008. https://api.elsevier.com/content/abstract/scopus_id/84870627490
Mishra, S., Dhillon, G. S. (2007). A theoretical basis for defining internal control objectives for information systems security. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 1, 427-436. https://api.elsevier.com/content/abstract/scopus_id/84870200118
Dhillon, G. S., Tejay, G., Weiyin, H. (2007). Identifying governance dimensions to evaluate information systems security in organizations. Proceedings of the Annual Hawaii International Conference on System Sciences. https://api.elsevier.com/content/abstract/scopus_id/39749131907
May, J., Dhillon, G. S. (2007). Investigating the development of a multi-objective decision model that seeks to generate informed alternatives for maximizing is security within an organization. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 1, 407-417. https://api.elsevier.com/content/abstract/scopus_id/84870203735
Lapke, M., Dhillon, G. S. (2006). A semantic analysis of security policy formulation and implementation: A case study. Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. 2, 1232-1241. https://api.elsevier.com/content/abstract/scopus_id/84870003095
Thomas, M. A., Dhillon, G. S. (2006). Deep structures of information systems security. Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. 6, 3461-3468. https://api.elsevier.com/content/abstract/scopus_id/84870346821
Wenger, M. R., Dhillon, G. S., Caldeira, M. (2005). ERP implementation in Portugal: Interpreting dimensions of power. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. 5, 2487-2494. https://api.elsevier.com/content/abstract/scopus_id/84870039346
Susarapu, S. R., Dhillon, G. S. (2005). Semiotic analysis of knowledge intensive business processes: Developing interpretations for sustainable competitive advantage. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. 6, 3088-3094. https://api.elsevier.com/content/abstract/scopus_id/84870002655
White, E. F., Dhillon, G. S. (2005). Synthesizing information system design ideals to overcome developmental duality in securing information systems. Proceedings of the Annual Hawaii International Conference on System Sciences. 186. https://api.elsevier.com/content/abstract/scopus_id/27544442846
Dhillon, G. S., Fabian, F. (2005). A fractal perspective on competencies necessary for managing information systems. International Journal of Technology Management. 31(1-2), 129-139. https://api.elsevier.com/content/abstract/scopus_id/19344368665
Dhillon, G. S., Silva, L., Backhouse, J. (2004). Computer crime at CEFORMA: A case study. International Journal of Information Management. 24(6), 551-561. https://api.elsevier.com/content/abstract/scopus_id/7744227587
Mattia, A., Dhillon, G. S. (2003). Applying double loop learning to interpret implications for information systems security design. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. 3, 2521-2526. https://api.elsevier.com/content/abstract/scopus_id/0242552856
Eloff, J. H., Labuschagne, L., von Solms, R., Dhillon, G. S. (2002). Advances in Information Security Management & Small Systems Security. IFIP Advances in Information and Communication Technology. 72, . https://api.elsevier.com/content/abstract/scopus_id/84904250094
Dhillon, G. S., Silva, L. (2002). Interpreting computer-related crime at the Malaria Research Center: A case study. IFIP Advances in Information and Communication Technology. 72, 167-182. https://api.elsevier.com/content/abstract/scopus_id/84904253615
Dhillon, G. S. (2000). Interpreting key issues in IS/IT benefits management. Proceedings of the Annual Hawaii International Conference on System Sciences. 2000-January, . https://api.elsevier.com/content/abstract/scopus_id/85094173476
Dhillon, G. S. (2000). Interpreting key issues in IS/IT benefits management. Proceedings of the Hawaii International Conference on System Sciences. 190. https://api.elsevier.com/content/abstract/scopus_id/0033900580
Dhillon, G. S., Hackney, R. (2000). IS/IT and dynamic business change. Proceedings of the Annual Hawaii International Conference on System Sciences. 2000-January, . https://api.elsevier.com/content/abstract/scopus_id/84898395722
Dhillon, G. S., Hackney, R. (2000). IS/IT and dynamic business change. Proceedings of the Hawaii International Conference on System Sciences. 207. https://api.elsevier.com/content/abstract/scopus_id/0033891063
Dhillon, G. S., Hackney, R., McBride, N., Kesar, S. (1999). Interpreting IS/IT decision support in the UK primary health care system: Issues of consumer orientation and structures. Proceedings of the Hawaii International Conference on System Sciences. 141. https://api.elsevier.com/content/abstract/scopus_id/0032760893
Editorial, Book Series
Dhillon, G. S., Karlsson, F., Hedström, K., Zúquete, A. (2019). Preface. IFIP Advances in Information and Communication Technology. 562, vi. https://api.elsevier.com/content/abstract/scopus_id/85068220555
Dhillon, G. S., Stahl, B. C., Baskerville, R. (2009). Preface. IFIP Advances in Information and Communication Technology. 301, 5. https://api.elsevier.com/content/abstract/scopus_id/84943521212
Editorial, Journal
Dhillon, G. S. (2023). EDITORIAL. Other. 19(2), 89. https://api.elsevier.com/content/abstract/scopus_id/85176577534
Dhillon, G. S. (2023). EDITORIAL. Other. 19(1), 1. https://api.elsevier.com/content/abstract/scopus_id/85163593294
Dhillon, G. S. (2022). EDITORIAL. Other. 18(1), I. https://api.elsevier.com/content/abstract/scopus_id/85141538154
Dhillon, G. S., Backhouse, J., Ray, A. (2007). Editorial: JSIS Security and Privacy Special Issue. Journal of Strategic Information Systems. 16(2), 127-129. https://api.elsevier.com/content/abstract/scopus_id/34547866769
Dhillon, G. S. (2004). Guest Editorial: The challenge of managing information security. International Journal of Information Management. 24(1), 3-4. https://api.elsevier.com/content/abstract/scopus_id/1242287852
Editorial, Trade Journal
Dhillon, G. S. (2003). Data and information security. Journal of Database Management. 14(1), . https://api.elsevier.com/content/abstract/scopus_id/0041379364
Journal Article
Smith, K., Dhillon, G. S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
Alhelaly, Y., Dhillon, G. S., Oliveira, T. (2023). When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection. Other. 134, 103470. Elsevier BV. http://dx.doi.org/10.1016/j.cose.2023.103470
Sultana, T., Dhillon, G. S., Oliveira, T. (2023). The effect of fear and situational motivation on online information avoidance: The case of COVID-19. International Journal of Information Management. 69, . https://api.elsevier.com/content/abstract/scopus_id/85142869560
Smith, K., Dhillon, G. S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33(1), 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
Smith, K., Dhillon, G. S., Otoo, B. A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
Soh, F., Smith, K., Dhillon, G. S., others, (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26, . Australian Computer Society.
Smith, K., Dhillon, G. S., Otoo, B. A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24(6), 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
Sultana, T., Dhillon, G., Oliveira, T. (2022). The Effect of Fear and Situational Motivation on Online Information Avoidance: The Case of COVID-19. International Journal of Information Management. 69, . Elsevier B.V.
Dhillon, G. S. (2022). A BAD REVIEW IS AS MUCH OF A LABOR TO WRITE AS A GOOD ONE: THE FOUR PRINCIPLES FOR REVIEWING RESEARCH MANUSCRIPTS. Other. 18(3), 167-176. https://api.elsevier.com/content/abstract/scopus_id/85162865775
Dhillon, G. S., Smith, K., Dissanayake, I. Information Systems Security Research Agenda: Exploring the Gap Between Theory.. Journal of Strategic Information Systems. 30(4), . London: Elsevier.
Dhillon, G. S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30(4), 101693. North-Holland.
Smith, K., Dhillon, G. S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56, 102123. Pergamon.
Kolotylo-Kulkarni, M., Xia, W., Dhillon, G. S. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research. 126, 221-238. https://api.elsevier.com/content/abstract/scopus_id/85099246792
Smith, K. J., Dhillon, G. S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56, . https://api.elsevier.com/content/abstract/scopus_id/85091938398
Smith, K. J., Dhillon, G. S. (2020). Assessing blockchain potential for improving the cybersecurity of financial transactions. Managerial Finance. 46(6), 833-848. https://api.elsevier.com/content/abstract/scopus_id/85074016223
Coss, D. L., Dhillon, G. S. (2020). A framework for auditing and strategizing to ensure cloud privacy. Journal of Information Systems. 34(2), 47-63. https://api.elsevier.com/content/abstract/scopus_id/85090961172
Samonas, S., Dhillon, G. S., Almusharraf, A. (2020). Stakeholder perceptions of information security policy: Analyzing personal constructs. International Journal of Information Management. 50, 144-154. https://api.elsevier.com/content/abstract/scopus_id/85066049578
Dhillon, G. S., Talib, Y. Y., Picoto, W. N. (2020). The mediating role of psychological empowerment in information security compliance intentions. Journal of the Association for Information Systems. 21(1), 152-174. https://api.elsevier.com/content/abstract/scopus_id/85079496434
Smith, K., Dhillon, G. S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
Dhillon, G. S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157(1), 137--158. Springer Netherlands.
Dhillon, G. S., Smith, K. J. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157(1), 137-158. https://api.elsevier.com/content/abstract/scopus_id/85029580831
Syed, R., Dhillon, G. S., Merrick, J. (2019). The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media. Decision Sciences. 50(3), 498-536. https://api.elsevier.com/content/abstract/scopus_id/85052919985
Coss, D. L., Dhillon, G. S. (2019). Cloud privacy objectives a value based approach. Other. 27(2), 189-220. https://api.elsevier.com/content/abstract/scopus_id/85061724860
Smith, K., Dhillon, G. S., Hedstr\"om, Karin, (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26(2), 194--212. Emerald Publishing Limited.
Dhillon, G. S., Oliveira, T., Syed, R. (2018). Value-based information privacy objectives for Internet Commerce. Computers in Human Behavior. 87, 292-307. https://api.elsevier.com/content/abstract/scopus_id/85049307208
Smith, K. J., Dhillon, G. S., Hedström, K. (2018). Reconciling value-based objectives for security and identity management. Other. 26(2), 194-212. https://api.elsevier.com/content/abstract/scopus_id/85049889857
Dhillon, G. S., Syed, R., Sá-Soares, F. d. (2017). Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors. Other. 54(4), 452-464. https://api.elsevier.com/content/abstract/scopus_id/85008613613
Oliveira, T., Alhinho, M., Rita, P., Dhillon, G. S. (2017). Modelling and testing consumer trust dimensions in e-commerce. Computers in Human Behavior. 71, 153-164. https://api.elsevier.com/content/abstract/scopus_id/85011599434
Dhillon, G. S., Oliveira, T., Susarapu, S., Caldeira, M. (2016). Deciding between information security and usability: Developing value based objectives. Computers in Human Behavior. 61, 656-666. https://api.elsevier.com/content/abstract/scopus_id/84961933307
Pedron, C. D., Picoto, W. N., Dhillon, G. S., Caldeira, M. (2016). Value-focused objectives for CRM system adoption. Other. 116(3), 526-545. https://api.elsevier.com/content/abstract/scopus_id/84962339896
Dhillon, G. S., Syed, R., Pedron, C. (2016). Interpreting information security culture: An organizational transformation case study. Other. 56, 63-69. https://api.elsevier.com/content/abstract/scopus_id/84946820899
Lapke, M., Dhillon, G. S. (2015). Disassociations in security policy lifecycles. Other. 9(1), 62-77. https://api.elsevier.com/content/abstract/scopus_id/84958061019
Oliveira, T., Dhillon, G. S. (2015). From adoption to routinization of B2B e-Commerce: Understanding patterns across Europe. Journal of Global Information Management. 23(1), 24-43. https://api.elsevier.com/content/abstract/scopus_id/84934268135
Hong, W., Chan, F. K., Thong, J. Y., Chasalow, L. C., Dhillon, G. S. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research. 25(1), 111-136. https://api.elsevier.com/content/abstract/scopus_id/84897933983
May, J., Dhillon, G. S., Caldeira, M. (2013). Defining value-based objectives for ERP systems planning. Decision Support Systems. 55(1), 98-109. https://api.elsevier.com/content/abstract/scopus_id/84877779058
Kolkowska, E., Dhillon, G. S. (2013). Organizational power and information security rule compliance. Other. 33, 3-11. https://api.elsevier.com/content/abstract/scopus_id/85027950618
Ramachandran, S., Rao, C., Goles, T., Dhillon, G. S. (2013). Variations in information security cultures across professions: A qualitative study. Communications of the Association for Information Systems. 33(1), 163-204. https://api.elsevier.com/content/abstract/scopus_id/84890538511
Thomas, M., Dhillon, G. S. (2012). Interpreting deep structures of information systems security. Other. 55(10), 1148-1156. https://api.elsevier.com/content/abstract/scopus_id/84867311818
Dhillon, G. S., Caldeira, M., Wenger, M. R. (2011). Intentionality and power interplay in IS implementation: The case of an asset management firm. Journal of Strategic Information Systems. 20(4), 438-448. https://api.elsevier.com/content/abstract/scopus_id/82955162956
Hong, W., Thong, J. Y., Chasalow, L., Dhillon, G. S. (2011). User acceptance of agile information systems: A model and empirical test. Journal of Management Information Systems. 28(1), 235-272. https://api.elsevier.com/content/abstract/scopus_id/80051718916
Gillon, K., Branz, L., Culnan, M., Dhillon, G. S., Hodgkinson, R., MacWillson, A. (2011). Information security and privacy-rethinking governance models. Communications of the Association for Information Systems. 28(1), 561-570. https://api.elsevier.com/content/abstract/scopus_id/81055124841
Caldeira, M., Dhillon, G. S. (2010). Are we really competent?: Assessing organizational ability in delivering IT benefits. Business Process Management Journal. 16(1), 5-28. https://api.elsevier.com/content/abstract/scopus_id/76449095249
Dhillon, G. S., Caldeira, M. (2010). The implementation of the Spa Select System: Coming to grips with the cog in the machine. International Journal of Information Management. 30(1), 38-46. https://api.elsevier.com/content/abstract/scopus_id/73449141770
Dhillon, G. S. (2008). Organizational competence for harnessing IT: A case study. Other. 45(5), 297-303. https://api.elsevier.com/content/abstract/scopus_id/44649103943
Dhillon, G. S., Caldeira, M. (2008). A bumpy road to success (or not): The case of Project Genesis at Nevada DMV. International Journal of Information Management. 28(3), 222-228. https://api.elsevier.com/content/abstract/scopus_id/44249121443
Dhillon, G. S., Hall, C. (2007). Introducing IT to Partners Financial Services: The case of a vision without direction. International Journal of Information Management. 27(2), 139-148. https://api.elsevier.com/content/abstract/scopus_id/33847418272
Dhillon, G. S., Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal. 16(3), 293-314. https://api.elsevier.com/content/abstract/scopus_id/33744830087
Dhillon, G. S. (2005). Gaining benefits from IS/IT implementation: Interpretations from case studies. International Journal of Information Management. 25(6), 502-515. https://api.elsevier.com/content/abstract/scopus_id/27644437270
Dhillon, G. S. (2004). Realizing benefits of an information security program. Business Process Management Journal. 10(3), . https://api.elsevier.com/content/abstract/scopus_id/70449576952
Dhillon, G. S. (2004). Dimensions of power and IS implementation. Other. 41(5), 635-644. https://api.elsevier.com/content/abstract/scopus_id/1242308514
Chang, J. C., Torkzadeh, G., Dhillon, G. S. (2004). Re-examining the measurement models of success for Internet commerce. Other. 41(5), 577-584. https://api.elsevier.com/content/abstract/scopus_id/1242331021
Moores, T. T., Dhillon, G. S. (2003). Do privacy seals in E-commerce really work?. Communications of the ACM. 46(12), 265-271. https://api.elsevier.com/content/abstract/scopus_id/29844455709
Reid, R., Dhillon, G. S. (2003). Integrating digital signatures with relational databases: Issues and organizational implications. Journal of Database Management. 14(1), 42-51. https://api.elsevier.com/content/abstract/scopus_id/0041379360
Dhillon, G. S., Hackney, R. (2003). Positioning IS/IT in networked firms. International Journal of Information Management. 23(2), 163-169. https://api.elsevier.com/content/abstract/scopus_id/0037399993
Dhillon, G. S., Ward, J. (2002). Chaos Theory as a Framework for Studying Information Systems. Other. 15(2), 1-13. https://api.elsevier.com/content/abstract/scopus_id/85001759469
Torkzadeh, G., Dhillon, G. S. (2002). Measuring factors that influence the success of Internet commerce. Information Systems Research. 13(2), 187-204. https://api.elsevier.com/content/abstract/scopus_id/0036015964
Dhillon, G. S., Moores, S. (2001). Computer crimes: Theorizing about the enemy within. Other. 20(8), 715-723. https://api.elsevier.com/content/abstract/scopus_id/0035658603
Dhillon, G. S., Moores, T. T. (2001). Internet Privacy: Interpreting Key Issues. Other. 14(4), 33-37. https://api.elsevier.com/content/abstract/scopus_id/85001759514
Dhillon, G. S. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Other. 20(2), 165-172. https://api.elsevier.com/content/abstract/scopus_id/0035063716
Phukan, S., Dhillon, G. S. (2000). Ethics and information technology use: A survey of US based SMEs. Other. 8(5), 239-243. https://api.elsevier.com/content/abstract/scopus_id/8744280051
Dhillon, G. S., Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM. 43(7), 125-128. https://api.elsevier.com/content/abstract/scopus_id/0002698747
Dhillon, G. S., Caldeira, M. (2000). Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. Other. 8(4), 184-188. https://api.elsevier.com/content/abstract/scopus_id/1842867241
Moores, T., Dhillon, G. S. (2000). Software piracy: A view from Hong Kong. Communications of the ACM. 43(12), 88-93. https://api.elsevier.com/content/abstract/scopus_id/0042223455
Hackney, R., Kawalek, J., Dhillon, G. S. (1999). Strategic information systems planning: Perspectives on the role of the 'end-user' revisited. Journal of End User Computing. 11(2), 3-12. https://api.elsevier.com/content/abstract/scopus_id/0041707328
Dhillon, G. S., Hackney, R. (1999). IS/IT market support systems: augmenting UK primary health care groups.. Topics in Health Information Management. 20(2), 83-90. https://api.elsevier.com/content/abstract/scopus_id/0033220610
Dhillon, G. S. (1999). Managing and controlling computer misuse. Other. 7(3-4), 171-175. https://api.elsevier.com/content/abstract/scopus_id/0007551808
Dhillon, G. S., Hackney, R. (1997). Drug use management and IT-based medical thesauri: issues of semantics and linguistics.. Other. 23(2-3), 58-64. https://api.elsevier.com/content/abstract/scopus_id/0030629336
Hackney, R., Dhillon, G. S., McBride, N. (1997). Primary care information technology within the NHS: The concept of markets and hierarchies on systems exploitation. Other. 10(4-5), 388-395. https://api.elsevier.com/content/abstract/scopus_id/7744225469
Dhillon, G. S., Backhouse, J. (1996). Risks in the use of information technology within organizations. International Journal of Information Management. 16(1), 65-74. https://api.elsevier.com/content/abstract/scopus_id/0040645933
Bytheway, A. J., Dhillon, G. S. (1996). Significance of partnerships in the management of interorganisational systems. International Journal of Information Management. 16(5), 369-380. https://api.elsevier.com/content/abstract/scopus_id/0030269097
Backhouse, J., Dhillon, G. S. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems. 5(1), 2-9. https://api.elsevier.com/content/abstract/scopus_id/21344459955
Backhouse, J., Dhillon, G. S. (1995). Managing computer crime: a research outlook. Other. 14(7), 645-651. https://api.elsevier.com/content/abstract/scopus_id/0001156375
Note, Journal
Dhillon, G. S. (2023). THE INTELLECTUAL CORE OF INFORMATION SYSTEMS SECURITY. Other. 19(2), 91-95. https://api.elsevier.com/content/abstract/scopus_id/85176615369
Review, Journal
Dhillon, G. S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30(4), . https://api.elsevier.com/content/abstract/scopus_id/85116553374
Dhillon, G. S., Orton, J. D. (2001). Schizoid incoherence, microstrategic options, and the strategic management of new organizational forms. Other. 4(4), 229-240. https://api.elsevier.com/content/abstract/scopus_id/0013324007
Hackney, R., Dhillon, G. S. (1998). Developing a clinical information system: An interpretive case analysis within a UK hospital. Health Services Management Research. 11(4), 238-245. https://api.elsevier.com/content/abstract/scopus_id/0031732472
posted-content
Srivastava, S., Dhillon, G. S., Kaur, R., Dhillon, S. Impact of Positive and Negative User Affect on Information Security: Insights from Rural India. Elsevier BV. http://dx.doi.org/10.2139/ssrn.4644568
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE