Below, you’ll find some select publications. Detailed listing can be found through my Google Scholar profile.

Select Books

Dhillon, G. (2018). Information Security. Text and Cases. Prospect Press [Buy]

Dhillon, G. (2007). Principles of Information Systems Security. John Wiley [Buy]

Dhillon, G. (2015). Enterprise Cyber Security. Paradigm Books [Buy]

Dhillon, G. (2014). Essentials of Cyber Security. Paradigm Books [Buy]

Dhillon, G. (2002). Information Security Management: Global Challenges in the New Millennium. Idea Group [Buy]

Dhillon, G. (2001). Social Responsibility in the Information Age: Issues and Controversies. Idea Group, USA [Buy]

Dhillon, G., (1997). Managing Information System Security. Macmillan. Basignstoke, UK [Buy]

Select Research Papers

Dhillon, G., Smith, K., & Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. The Journal of Strategic Information Systems, 30(4), 101693.

Kolotylo-Kulkarni, M., Xia, W., & Dhillon, G. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research, 126, 221-238.

Dhillon, G., Abdul Talib, Y. Y., & Picoto, W. N. (2020). The mediating role of psychological empowerment in information security compliance intentions. Journal of the Association for Information Systems, 21(1), 5.

Dhillon, G., & Smith, K. J. (2019). Defining objectives for preventing cyberstalking. Journal of Business Ethics, 157, 137-158.

Hong, W., Chan, F. K., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111-136.

May, J., Dhillon, G., & Caldeira, M. (2013). Defining value-based objectives for ERP systems planning. Decision Support Systems55(1), 98-109.

Hong, W., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2011). User acceptance of agile information systems: A model and empirical test. Journal of Management Information Systems28(1), 235-272.

Dhillon, G. S., Caldeira, M., & Wenger, M. R. (2011). Intentionality and power interplay in IS implementation: The case of an asset management firm. The Journal of Strategic Information Systems, 20(4), 438-448.

Dhillon, G., & Torkzadeh, G. (2006). Value‐focused assessment of information system security in organizations. Information Systems Journal, 16(3), 293-314.

Torkzadeh, G., & Dhillon, G. (2002). Measuring factors that influence the success of Internet commerce. Information Systems Research, 13(2), 187-204.

Dhillon, G. & Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM. 43(7), 125-128.

Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: towards socio‐organizational perspectives. Information Systems Journal11(2), 127-153.

Backhouse, J., & Dhillon, G. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems5, 2-9.

Select Editorials and Opinions

Dhillon, G., (2024). Coordinating in threes: unraveling complexity in information systems security management. Journal of Information Systems Security. 20(1). [Open Access]

Dhillon, G., (2023). Cybersecurity challenges in an AI enabled world. Journal of Information Systems Security. 19(3). [Open Access]

Dhillon, G., (2023). The intellectual core of information systems security.  Journal of Information Systems Security. 19(2). [Open Access]

Dhillon, G., (2022). The four principles for reviewing research manuscripts.  Journal of Information Systems Security. 18(3). [Open Access]