Defining Objectives for Preventing Cyberstalking G Dhillon, KJ Smith Journal of Business Ethics 157 (1), 137-158, 2019 | 62 | 2019 |
Information systems security research agenda: Exploring the gap between research and practice G Dhillon, K Smith, I Dissanayaka The journal of strategic information systems 30 (4), 101693, 2021 | 61 | 2021 |
Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions KJ Smith, G Dhillon Managerial Finance, 2019 | 38 | 2019 |
User values and the development of a cybersecurity public policy for the IoT KJ Smith, G Dhillon, L Carter International Journal of Information Management 56, 102123, 2021 | 32 | 2021 |
Supply chain virtualization: Facilitating agent trust utilizing blockchain technology KJ Smith, G Dhillon Revisiting Supply Chain Risk, 299-311, 2019 | 27* | 2019 |
Blockchain for Digital Crime Prevention: The Case of Health Informatics K Smith, G Dhillon AIS Electronic Library, AMCIS 2017, 2017 | 20 | 2017 |
The relationship between social capital and social media addiction: The role of privacy self-efficacy F Soh, K Smith, G Dhillon Australasian Journal of Information Systems 26, 2022 | 8 | 2022 |
Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management. DL Coss, K Smith, J Foster, S Dhillon Journal of Information System Security 15 (2), 2019 | 6 | 2019 |
Reconciling Value-based Objectives for Security & Identity Management KJ Smith, G Dhillon, K Hedström Information & Computer Security 26 (2), 194-212, 2018 | 6 | 2018 |
System Theory: Should Information Systems Researchers Even Care? KJ Smith, HR Weistroffer SAIS 2016 Proceedings, 14, 2016 | 6* | 2016 |
Defining objectives for preventing cyberstalking G Dhillon, C Challa, K Smith ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 5 | 2016 |
Re-framing the policy conversation for preventing cyberstalking K Smith, G Dhillon Internet Research 33 (1), 84-123, 2023 | 4 | 2023 |
iGen user (over) attachment to social media: reframing the policy intervention conversation KJ Smith, G Dhillon, BA Otoo Information Systems Frontiers 24 (6), 1989-2006, 2022 | 4 | 2022 |
Bad employees: examining deviant security behaviors KJ Smith Journal of Computer Information Systems 64 (1), 17-30, 2024 | 2 | 2024 |
Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential K Smith, G Dhillon AIS Electronic Library, AMCIS 2019, 2019 | 2 | 2019 |
Ensuring core competencies for cybersecurity specialists G Dhillon, K Smith, K Hedström Cybersecurity Education for Awareness and Compliance, 1-13, 2019 | 2 | 2019 |
Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain KJ Smith, M Gupta, P Prakash, NK Rangan Internet Research, 2023 | | 2023 |
Understanding Generation Z’s Information Security Behaviors Regarding Penalties, Pressures and Perceived Effectiveness A Madhuvarshi, G Dhillon, KJ Smith, J Kaur | | 2023 |
Antecedents and Outcomes of Information Privacy Concerns: A Replication Study in Rural India M Kaur, G Dhillon, KJ Smith, J Kaur | | 2023 |
Examining Ethics Washing & Consumer Trust in the Smart Device Context KJ Smith, X Liang | | 2023 |