Interpreting dimensions of consumer trust in e-commerce SC Chen, GS Dhillon Information Technology and Management 4 (2), 303-318, 2003 | 1066 | 2003 |
Information system security management in the new millennium G Dhillon, J Backhouse Communications of the ACM 43 (7), 125-128, 2000 | 968* | 2000 |
Measuring factors that influence the success of Internet commerce G Torkzadeh, G Dhillon Information Systems Research 13 (2), 187-204, 2002 | 931 | 2002 |
Current directions in IS security research: towards socio‐organizational perspectives G Dhillon, J Backhouse Information Systems Journal 11 (2), 127-153, 2001 | 911 | 2001 |
A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research W Hong, FKY Chan, JYL Thong, LC Chasalow, G Dhillon Information Systems Research 25 (1), 111-136, 2014 | 687 | 2014 |
Modelling and testing consumer trust dimensions in e-commerce T Oliveira, M Alhinho, P Rita, G Dhillon Computers in Human Behavior 71, 153-164, 2017 | 667 | 2017 |
Value‐focused assessment of information system security in organizations G Dhillon, G Torkzadeh Information Systems Journal 16 (3), 293-314, 2006 | 530 | 2006 |
Principles of Information Systems Security: text and cases G Dhillon (No Title), 2007 | 355 | 2007 |
User acceptance of agile information systems: A model and empirical test W Hong, JYL Thong, LC Chasalow, G Dhillon Journal of Management Information Systems 28 (1), 235-272, 2011 | 320 | 2011 |
Software piracy: A view from Hong Kong T Moores, G Dhillon Communications of the ACM 43 (12), 88-93, 2000 | 220 | 2000 |
Structures of responsibility and security of information systems J Backhouse, G Dhillon European Journal of Information Systems 5 (1), 2-9, 1996 | 214 | 1996 |
Violation of safeguards by trusted personnel and understanding related information security concerns G Dhillon Computers & Security 20 (2), 165-172, 2001 | 209 | 2001 |
Managing information system security G Dhillon Bloomsbury Publishing, 1997 | 207* | 1997 |
Computer crimes: theorizing about the enemy within G Dhillon, S Moores Computers & Security 20 (8), 715-723, 2001 | 197 | 2001 |
Managing and controlling computer misuse G Dhillon Information Management & Computer Security 7 (4), 171-175, 1999 | 193 | 1999 |
Defining value-based objectives for ERP systems planning J May, G Dhillon, M Caldeira Decision Support Systems 55 (1), 98-109, 2013 | 144 | 2013 |
Risks in the use of information technology within organizations G Dhillon, J Backhouse International Journal of Information Management 16 (1), 65-74, 1996 | 143 | 1996 |
Organizational power and information security rule compliance E Kolkowska, G Dhillon Computers & Security 33, 3-11, 2013 | 133 | 2013 |
Information systems security governance research: a behavioral perspective S Mishra, G Dhillon 1st annual symposium on information assurance, academic track of 9th annual …, 2006 | 120 | 2006 |
Gaining benefits from IS/IT implementation: Interpretations from case studies G Dhillon International Journal of Information Management 25 (6), 502-515, 2005 | 118 | 2005 |