| 2007 |
| 26 | EE | Gurpreet Dhillon,
Gurvirender Tejay,
Weiyin Hong:
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations.
HICSS 2007: 157 |
| 2006 |
| 25 | EE | Gurpreet Dhillon,
Mikko T. Siponen,
Raj Sharman:
Minitrack Introduction.
HICSS 2006 |
| 24 | EE | Gurpreet Dhillon,
Gholamreza Torkzadeh:
Value-focused assessment of information system security in organizations.
Inf. Syst. J. 16(3): 293-314 (2006) |
| 2005 |
| 23 | EE | Richard Baskerville,
Gurpreet Dhillon,
Günther Pernul,
Filipe de Sá-Soares:
Panel: Information systems security standards: The solution or the problem?
ECIS 2005 |
| 22 | EE | Gurpreet Dhillon,
Mikko T. Siponen,
Raj Sharman:
Mini Track: 'Information Systems Security Management'.
HICSS 2005 |
| 21 | EE | Elizabeth F. R. White,
Gurpreet Dhillon:
Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems.
HICSS 2005 |
| 2004 |
| 20 | EE | Mikko T. Siponen,
Gurpreet Dhillon:
Information Systems Security Management: Minitrack Introduction.
HICSS 2004 |
| 2003 |
| 19 | EE | Trevor T. Moores,
Gurpreet Dhillon:
Do privacy seals in e-commerce really work?
Commun. ACM 46(12): 265-271 (2003) |
| 18 | | Randal Reid,
Gurpreet Dhillon:
Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications.
J. Database Manag. 14(2): 42-51 (2003) |
| 2001 |
| 17 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA
Kluwer 2001 |
| 16 | | Gurpreet Dhillon,
Leiser Silva:
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study.
Conference on Information Security Management & Small Systems Security 2001: 167-182 |
| 15 | | Gurpreet Dhillon,
Gholamreza Torkzadeh:
Value-Focused Assessment of Information System Security in Organizations.
ICIS 2001: 561-566 |
| 14 | | Gurpreet Dhillon:
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns.
Computers & Security 20(2): 165-172 (2001) |
| 13 | | Gurpreet Dhillon,
Steve Moore:
Computer crimes: theorizing about the enemy within.
Computers & Security 20(8): 715-723 (2001) |
| 12 | EE | Gurpreet Dhillon,
James Backhouse:
Current directions in IS security research: towards socio-organizational perspectives.
Inf. Syst. J. 11(2): 127-154 (2001) |
| 2000 |
| 11 | EE | Gurpreet Dhillon,
Ray Hackney:
IS/IT and Dynamic Business Change.
HICSS 2000 |
| 10 | EE | Gurpreet Dhillon:
Interpreting Key Issues in IS/IT Benefits Management.
HICSS 2000 |
| 9 | EE | Gurpreet Dhillon,
Jungwoo Lee:
Value assessment of IS/IT service provision within organizations.
ICIS 2000: 647-651 |
| 8 | | Andrew S. Targowski,
Gurpreet Dhillon:
What is information? A review of different perspectives.
IRMA Conference 2000: 1142-1143 |
| 7 | EE | Trevor T. Moores,
Gurpreet Dhillon:
Software piracy: a view from Hong Kong.
Commun. ACM 43(12): 88-93 (2000) |
| 6 | EE | Gurpreet Dhillon,
James Backhouse:
Information system security management in the new millennium.
Commun. ACM 43(7): 125-128 (2000) |
| 5 | EE | Gurpreet Dhillon,
Mário M. Caldeira:
Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry.
Inf. Manag. Comput. Security 8(4): 184-188 (2000) |
| 4 | EE | Sanjeev Phukan,
Gurpreet Dhillon:
Ethics and information technology use: a survey of US based SMEs.
Inf. Manag. Comput. Security 8(5): 239-243 (2000) |
| 1999 |
| 3 | EE | Ray Hackney,
Gurpreet Dhillon,
Neil McBride,
Shalini Kesar:
Interpreting IS/IT Decision Support in the UK Primary Health Care System: Issues of Consumer Orientation and Structures.
HICSS 1999 |
| 2 | EE | Gurpreet Dhillon:
Managing and controlling computer misuse.
Inf. Manag. Comput. Security 7(4): 171-175 (1999) |
| 1995 |
| 1 | EE | James Backhouse,
Gurpreet Dhillon:
Managing computer crime: a research outlook.
Computers & Security 14(7): 645-651 (1995) |