51
TITLE: When convenience trumps security: Defining objectives for security and usability of systems
AUTHORS: Dhillon, G ; Oliveira, T ; Susarapu, S; Caldeira, M ;
PUBLISHED: 2012, SOURCE: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 in IFIP Advances in Information and Communication Technology, VOLUME: 376 AICT
INDEXED IN: Scopus CrossRef
52
TITLE: Can a cloud be really secure? A socratic dialogue
AUTHORS: Gurpreet Dhillon ; Ella Kolkowska;
PUBLISHED: 2011, SOURCE: Computers, Privacy and Data Protection: an Element of Choice
INDEXED IN: Scopus CrossRef: 1
53
TITLE: Information security and privacy-rethinking governance models
AUTHORS: Gillon, K; Branz, L; Culnan, M; Dhillon, G ; Hodgkinson, R; MacWillson, A;
PUBLISHED: 2011, SOURCE: Communications of the Association for Information Systems, VOLUME: 28, ISSUE: 1
INDEXED IN: Scopus
54
TITLE: Intentionality and power interplay in IS implementation: The case of an asset management firm  Full Text
AUTHORS: Gurpreet S Dhillon ; Mario Caldeira ; Mitchell R Wenger;
PUBLISHED: 2011, SOURCE: JOURNAL OF STRATEGIC INFORMATION SYSTEMS, VOLUME: 20, ISSUE: 4
INDEXED IN: Scopus WOS CrossRef
55
TITLE: Organizational power and information security rule compliance
AUTHORS: Ella Kolkowska; Gurpreet Dhillon ;
PUBLISHED: 2011, SOURCE: IFIP Advances in Information and Communication Technology, VOLUME: 354 AICT
INDEXED IN: Scopus
56
TITLE: User acceptance of agile information systems: A model and empirical test  Full Text
AUTHORS: Hong, W; Thong, JYL; Chasalow, L; Dhillon, G ;
PUBLISHED: 2011, SOURCE: Journal of Management Information Systems, VOLUME: 28, ISSUE: 1
INDEXED IN: Scopus CrossRef
57
TITLE: A holistic approach for enriching information security analysis and security policy formation
AUTHORS: May, J; Dhillon, G ;
PUBLISHED: 2010, SOURCE: 18th European Conference on Information Systems, ECIS 2010 in 18th European Conference on Information Systems, ECIS 2010
INDEXED IN: Scopus
58
TITLE: Are we really competent?. Assessing organizational ability in delivering IT benefits
AUTHORS: Mário Caldeira; Gurpreet Dhillon ;
PUBLISHED: 2010, SOURCE: Business Process Mgmt Journal - Business Process Management Journal, VOLUME: 16, ISSUE: 1
INDEXED IN: CrossRef
59
TITLE: Information security and privacy: Rethinking governance models
AUTHORS: Hodgkinson, R; Branz, L; Culnan, M; Dhillon, G ; Macwillson, A; Ponemon, L;
PUBLISHED: 2010, SOURCE: 31st International Conference on Information Systems, ICIS 2010 in ICIS 2010 Proceedings - Thirty First International Conference on Information Systems
INDEXED IN: Scopus
60
TITLE: The implementation of the Spa Select System: Coming to grips with the cog in the machine  Full Text
AUTHORS: Gurpreet Dhillon ; Mario Caldeira ;
PUBLISHED: 2010, SOURCE: INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, VOLUME: 30, ISSUE: 1
INDEXED IN: Scopus WOS CrossRef
Page 6 of 13. Total results: 128.