Information Systems Security Research Agenda: Exploring the Gap Between Research and Practice G Dhillon, KJ Smith, I Dissanayaka The Journal of Strategic Information Systems 30 (4), 101693, 2021 | 89 | 2021 |
Defining Objectives for Preventing Cyberstalking G Dhillon, KJ Smith Journal of Business Ethics 157 (1), 137-158, 2019 | 69 | 2019 |
Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions KJ Smith, G Dhillon Managerial Finance, 2019 | 55 | 2019 |
User values and the development of a cybersecurity public policy for the IoT KJ Smith, G Dhillon, L Carter International Journal of Information Management 56, 102123, 2021 | 42 | 2021 |
Supply chain virtualization: Facilitating agent trust utilizing blockchain technology KJ Smith, G Dhillon Revisiting Supply Chain Risk, 299-311, 2019 | 33* | 2019 |
Blockchain for Digital Crime Prevention: The Case of Health Informatics K Smith, G Dhillon AIS Electronic Library, AMCIS 2017, 2017 | 24 | 2017 |
The relationship between social capital and social media addiction: The role of privacy self-efficacy F Soh, KJ Smith, G Dhillon Australasian Journal of Information Systems 26, 2022 | 10 | 2022 |
Reconciling Value-based Objectives for Security & Identity Management KJ Smith, G Dhillon, K Hedström Information & Computer Security 26 (2), 194-212, 2018 | 7 | 2018 |
Bad employees: Examining deviant security behaviors KJ Smith Journal of Computer Information Systems 64 (1), 17-30, 2024 | 6 | 2024 |
Re-framing the policy conversation for preventing cyberstalking KJ Smith, G Dhillon Internet Research 33 (1), 84-123, 2023 | 6 | 2023 |
iGen user (over) attachment to social media: reframing the policy intervention conversation KJ Smith, G Dhillon, BA Otoo Information Systems Frontiers 24 (6), 1989-2006, 2022 | 6 | 2022 |
Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management. DL Coss, KJ Smith, J Foster, S Dhillon Journal of Information System Security 15 (2), 2019 | 6 | 2019 |
Defining objectives for preventing cyberstalking G Dhillon, C Challa, K Smith ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 6 | 2016 |
System Theory: Should Information Systems Researchers Even Care? KJ Smith, HR Weistroffer SAIS 2016 Proceedings, 14, 2016 | 6* | 2016 |
Examining the effects of cognitive load on information systems security policy compliance D Ganye, KJ Smith Internet Research, 2024 | 2 | 2024 |
Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain KJ Smith, M Gupta, P Prakash, NK Rangan Internet Research, 2023 | 2 | 2023 |
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential K Smith, G Dhillon AIS Electronic Library, AMCIS 2019, 2019 | 2 | 2019 |
Ensuring core competencies for cybersecurity specialists G Dhillon, K Smith, K Hedström Cybersecurity Education for Awareness and Compliance, 1-13, 2019 | 2 | 2019 |
Work Tactics in Hybrid Work Environment: A Gender Perspective G Dhillon, K Smith, J Kaur, S Dhillon | 1 | 2023 |
The Role of Penalties, Pressures and Perceived Effectiveness: A Replication Study of Generation Z's Information Security Behaviors J Kaur, A Madhuvarshi, KJ Smith, S Dhillon, G Dhillon AIS Transactions on Replication Research 10 (1), 4, 2024 | | 2024 |