Dhillon, G. S., Smith, K., Hedstr\"om, Karin, (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
Smith, K., Dhillon, G. S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
Smith, K. (2023). Bad Employees: Examining Deviant Security Behaviors. Journal of Computer Information Systems. 1-14. Taylor & Francis. https://doi.org/10.1080/08874417.2023.2175336
Smith, K., Dhillon, G. S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
Smith, K. (2023). Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain. Internet Research.
Smith, K., Dhillon, G. S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33(1), 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
Smith, K., Dhillon, G. S., Otoo, B. A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
Soh, F., Smith, K., Dhillon, G. S., others, (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26, . Australian Computer Society.
Smith, K., Dhillon, G. S., Otoo, B. A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24(6), 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
Dhillon, G. S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30(4), 101693. North-Holland.
Smith, K., Dhillon, G. S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56, 102123. Pergamon.
Smith, K., Dhillon, G. S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
Coss, D. L., Smith, K., Foster, J., Dhillon, S. (2019). Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management.. Journal of Information System Security. 15(2), .
Dhillon, G. S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157(1), 137--158. Springer Netherlands.
Smith, K., Dhillon, G. S., Hedstr\"om, Karin, (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26(2), 194--212. Emerald Publishing Limited.
Dhillon, G. S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30(4), . https://api.elsevier.com/content/abstract/scopus_id/85116553374