Google

Aviso: Se está a ler esta mensagem, provavelmente, o browser que utiliza não é compatível com os "standards" recomendados pela W3C. Sugerimos vivamente que actualize o seu browser para ter uma melhor experiência de utilização deste "website". Mais informações em webstandards.org.

Warning: If you are reading this message, probably, your browser is not compliant with the standards recommended by the W3C. We suggest that you upgrade your browser to enjoy a better user experience of this website. More informations on webstandards.org.

ISEG  >  Gestão  >  GURPREET SINGH DHILLON

Publicações

    ARTIGOS EM REVISTAS ACADÉMICAS:

    42. Dhillon, G. (2008). "Organizational competence in harnessing IT: a case study". Information & Management Vol 45.

    41. Dhillon, G. and Caldeira, M. (2008). "A bumpy road to success (or not): The case of Project Genesis at Nevada DMV". International Journal of Information Management. Vol 28 No3..

    40. Choobineh, J., Dhillon, G., Grimalla, M. and Rees, J. (2007). "Management of information security: challenges and research directions". Communications of the AIS. Vol. 20 (December).

    39. Fabian, F., and Dhillon, G. (2007). "Losing Managerial Discretion: The Unexplored Risk of Collaborative Information Sharing". Journal of Information Science and Technology. Vol 4, No 1.

    38. Dhillon, G. and Hall, C. (2007) "Introducing IT to Partners Financial Services: the case of vision without direction". International Journal of Information Management Vol. 27.

    37. Dhillon, G. and Torkzadeh, G. (2006) "Value Focused Assessment of Information System Security in Organizations". Information Systems Journal. Vol 16. No 3.

    36. Dhillon, G. and Chapman, S. (2006) "To opt-in, or to opt-out? That is the question. A Case Study". Journal of Information System Security. Vol 2. No 2.

    35. Dhillon, G. (2005). "Gaining Benefits from IS/IT Implementation: interpretations from case studies" International Journal of Information Management. Vol. 25. No 6.

    34. Dhillon, G. and Fabian, F. (2005) "A Fractal Perspective on Competencies Necessary for Managing Information Systems", International Journal of Technology Management.

    33. Dhillon, G; Silva, L and Backhouse, J. (2004) "Computer Crime at CEFORMA: a case study", International Journal of Information Management. Vol 24, No 6.

    32. Chang, J, Torkzadeh, G and Dhillon, G. (2004) "Reexamining the Measurement Models of Success for Internet Commerce". Information and Management. Vol 41, No 5.

    31. Dhillon, G. (2004) "Dimensions of Power and IS implementation". Information and Management. Vol 41, No 5.

    30. Moores, T. and Dhillon, G. (2003) "Do privacy seals in e-commerce really work?" Communications of the ACM. Vol 46, No. 12.

    29. Chen, S and Dhillon, G. (2003) "Interpreting dimensions of consumer trust in E-commerce" Information Technology & Management. Vol 4. No. 2/3.

    28. Reid, R and Dhillon G. (2003) "Integrating digital signatures with relational databases: issues and organizational implications". Journal of Database Management. Vol 14, No. 2.

    27. Dhillon, G and Hackney, R. (2003) "Positioning IS/IT in networked firms". International Journal of Information Management. Vol 23, No 2..

    26. Torkzadeh, G. and Dhillon, G. (2002) "Measuring factors that influence the success of Internet commerce". Information Systems Research. Vol 13, No2.

    25. Dhillon, G and Ward, J. (2002) "Chaos Theory as a framework for information systems research". Information Resources Management Journal. Vol 15, No 2.

    24. Dhillon, G and Moore, S. (2001) "Computer Crime: theorizing about the enemy within". Computers & Security. Vol 20, No 8.

    23. Dhillon, G. (2001) "Violation of safeguards by trusted personnel and understanding related information security concerns". Computers & Security. Vol 20, No 2.

    22. Dhillon, G. and Backhouse, J. (2001) "Current directions in IS security research: toward socio-organizational perspectives". Information Systems Journal. Vol 11, No 2.

    21. Dhillon, G. and Moores, T. (2001) "Internet privacy: interpreting key issues". Information Resources Management Journal. Vol 14, No 4.

    20. Dhillon, G., Coss, D. and Hackney, R. (2001) "Interpreting the role of disruptive technologies in e-businesses" Logistics Information Management. Vol 14, No 1.

    19. Dhillon, G., Moores, T. and Hackney, R. (2001) "The emergence of networked organizations in India: a misalignment of interests?" Journal of Global Information Management, Vol 9, No 1. Pp 25-30.

    18. Dhillon, G. and Orton, J. D. (2001) "Schizoid incoherence, microstrategic options and strategic management of new organizational forms". M@n@gement. Vol 4, No 4.

    17 Phukan, S. and Dhillon, G. (2001) "Ethical and intellectual property concerns in a multicultural global economy" Electronic Journal of Information Systems in Developing Countries. Vol 7 (3).

    16. Brock, F. and Dhillon, G. (2001) "Managerial information, the basics" Journal of International Information Management. Vol 10, No 2.

    15. Moores, T. and Dhillon, G. (2000) "Software piracy: a view from Hong Kong". Communications of the ACM, Vol 43, No 12. Pp 88-93.

    14. Dhillon, G and Backhouse, J. (2000) "Information system security management in the new millennium". Communications of the ACM, Vol 43, No 7. Pp 125-128.

    13. Hackney, R, Burns, J and Dhillon, G. (2000) "Challenging assumptions for strategic information systems planning: theoretical perspectives". Communications of the AIS, Vol 3, April.

    12. Phukan, S and Dhillon, G. (2000) "Ethics and information technology use: a survey of US based SMEs". Information Management & Computer Security. Vol 8, No 5. Pp 239-243.

    11. Dhillon, G. and Caldeira, M (2000) "Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry". Information Management & Computer Security. Vol 8 No 3.

    10. Dhillon, G and Hackney, R. (1999) "IS/IT market support systems: augmenting UK primary care groups". Topics in Health Information Management, Vol 20, No 2. Pp 83-90.

    9. Dhillon, G. (1999) "Managing and controlling computer misuse". Information Management & Computer Security, Vol 7, No 5.

    8. Hackney, H, Kawalek, J. and Dhillon, G. (1999) "Strategic information systems planning: perspectives on the role of the end user revisited". Journal of End User Computing, Vol 11, No 2. Pp 3-12.

    7. Hackney, R. and Dhillon, G. (1998) "Developing a Clinical Information System: an interpretive case analysis within a UK hospital", Health Services Management Research, Vol 11 No 4. Pp 238-245.

    6. Hackney, R., Dhillon, G. and McBride, N. (1997) "Primary care information technology within the NHS: the concept of markets and hierarchies on systems exploitation". International Journal of Public Sector Management. Vol 10. No 4/5. Pp 388-395.

    5. Dhillon, G. and Hackney, R. (1997) "Drug use management and IT-based medical thesauri: issues of semantics and linguistics". Health Manpower Management. Vol 23 No 2/3. Pp 58-64.

    4. Bytheway, A. and Dhillon, G. (1996) "Significance of partnerships in the management of inter organizational systems". International Journal of Information Management. Vol 16. No 5. Pp 369-380.

    3. Dhillon, G. and Backhouse, J. (1996) "Risks in the use of information technology within organizations". International Journal of Information Management. Vol 16. No 1. Pp 65-74.

    2. Backhouse, J. and Dhillon, G. (1996) "Structures of responsibility and security of information systems". European Journal of Information Systems. Vol 5. No 1. Pp 2-9.

    1. Backhouse, J. and Dhillon, G. (1995) "Managing computer crime: a research outlook". Computers & Security. Vol 14. No 7. Pp 645-651.


    LIVROS:
    Dhillon, G. (2007) Principles of Information Systems Security: text and cases. New York: John Wiley and Sons. Textbook.

    Dhillon, G. (2002) Social responsibility in the information age: issues and controversies. Hershey: Idea Group Publications.

    Dhillon, G. (2001) Information security management: global challenges in the new millennium. Hershey: Idea Group Publications.

    Banerjee, P., Hackney, R., Dhillon, G., and Jain, R. (1998) Business information technology management: closing the international divide. Delhi: Har-Anand Publications.

    Dhillon, G. (1997) Managing information system security. London: Macmillan. Research manuscript