Defining Objectives for Preventing Cyberstalking G Dhillon, KJ Smith Journal of Business Ethics 157 (1), 137-158, 2019 | 59 | 2019 |
Information systems security research agenda: Exploring the gap between research and practice G Dhillon, K Smith, I Dissanayaka The Journal of Strategic Information Systems 30 (4), 101693, 2021 | 44 | 2021 |
Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions KJ Smith, G Dhillon Managerial Finance, 2019 | 31 | 2019 |
User values and the development of a cybersecurity public policy for the IoT KJ Smith, G Dhillon, L Carter International Journal of Information Management 56, 102123, 2021 | 23 | 2021 |
Blockchain for Digital Crime Prevention: The Case of Health Informatics K Smith, G Dhillon AIS Electronic Library, AMCIS 2017, 2017 | 19 | 2017 |
Supply chain virtualization: Facilitating agent trust utilizing blockchain technology KJ Smith, G Dhillon Revisiting Supply Chain Risk, 299-311, 2018 | 16 | 2018 |
Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management. DL Coss, K Smith, J Foster, S Dhillon Journal of Information System Security 15 (2), 2019 | 6 | 2019 |
Reconciling Value-based Objectives for Security & Identity Management KJ Smith, G Dhillon, K Hedström Information & Computer Security 26 (2), 194-212, 2018 | 6 | 2018 |
The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy F Soh, K Smith, G Dhillon Australasian Journal of Information Systems 26, 2022 | 5 | 2022 |
Revisiting Supply Chain Risk G Baryannis, S Dani, S Validi, G Antoniou, KJ Smith, G Dhillon Supply Chain Virtualization: Facilitating Agent Trust Utilizing Blockchain …, 2019 | 5 | 2019 |
System Theory: Should Information Systems Researchers Even Care? KJ Smith, HR Weistroffer SAIS 2016 Proceedings, 14, 2016 | 5* | 2016 |
Re-framing the policy conversation for preventing cyberstalking K Smith, G Dhillon Internet Research 33 (1), 84-123, 2023 | 3 | 2023 |
iGen user (over) attachment to social media: reframing the policy intervention conversation KJ Smith, G Dhillon, BA Otoo Information Systems Frontiers, 1-18, 2021 | 3 | 2021 |
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential K Smith, G Dhillon AIS Electronic Library, AMCIS 2019, 2019 | 2 | 2019 |
Ensuring core competencies for cybersecurity specialists G Dhillon, K Smith, K Hedström Cybersecurity Education for Awareness and Compliance, 121-133, 2019 | 2 | 2019 |
Bad Employees: Examining Deviant Security Behaviors KJ Smith Journal of Computer Information Systems, 1-14, 2023 | | 2023 |
Examining Ethics Washing & Consumer Trust in the Smart Device Context K Smith, X Liang | | 2023 |
Work Tactics in Hybrid Work Environment: A Gender Perspective G Dhillon, K Smith, J Kaur, S Dhillon Work 7, 1-2023, 2023 | | 2023 |
Examining Cognitive Load and Information Systems Security Compliance D Ganye, K Smith | | 2022 |
Examining Control Balance & Information Security Policy Violations KJ Smith | | 2022 |