Gurpreet Dhillon
Virginia Commonwealth University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gurpreet Dhillon.
Information Systems Research | 2002
Gholamreza Torkzadeh; Gurpreet Dhillon
Efforts to develop measures of Internet commerce success have been hampered by (1) the rapid development and use of Internet technologies and (2) the lack of conceptual bases necessary to develop success measures. In a recent study, Keeney (1999) proposed two sets of variables labeled asmeans objectives andfundamental objectives that influence Internet shopping. Means objectives, he argues, help businesses achieve what is important for their customers--fundamental objectives. Based on Keeneys work, this paper describes the development of two instruments that together measure the factors that influence Internet commerce success. One instrument measures the means objectives that influence online purchase (e.g., Internet vendor trust) and the other measures the fundamental objectives that customers perceive to be important for Internet commerce (e.g., Internet product value). In phase one of the instrument development process, we generated 125 items for means and fundamental objectives. Using a sample of 199 responses by individuals with Internet shopping experience, these constructs were examined for reliability and validity. The Phase 1 results suggested a 4-factor, 21-item instrument to measure means objectives and a 4-factor, 17-item instrument to measure fundamental objectives. In Phase 2 of the instrument development process, we gathered a sample of 421 responses to further explore the 2 instruments. With minor modifications, the Phase 2 data support the 2 models. The Phase 2 results suggest a 5-factor, 21-item instrument that measures means objectives in terms ofInternet product choice, online payment, Internet vendor trust, shopping travel, andInternet shipping errors. Results also suggest a 4-factor, 16-item instrument that measures fundamental objectives in terms ofInternet shopping convenience, Internet ecology, Internet customer relation, andInternet product value. Evidence of reliability and discriminant, construct, and content validity is presented for the hypothesized measurement models. The paper concludes with discussions on the usefulness of these measures and future research ideas.
Information Systems Journal | 2001
Gurpreet Dhillon; James Backhouse
Abstract. The purpose of this paper is to map the current territory of information systems and security research. It uses the Burrell and Morgan framework as an intellectual map to analyse the socio‐philosophical concerns in various information systems and security approaches. The papers contributions are in its analysis of trends in information systems and security research, the former in stressing the socio‐organizational perspectives and the latter in criticizing the preponderance of technical solutions. The paper also sets an agenda for a future research emphasis.
Communications of The ACM | 2000
Gurpreet Dhillon; James Backhouse
R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process, store, and transmit digital data in most business sectors. This has transformed the way we conduct trade, deliver government services, and provide health care. Changes in communication and information technologies and particularly their confluence has raised a number of concerns connected with the protection of organizational information assets. Achieving consensus regarding safeguards for an information system, among different stakeholders in an organization, has become more difficult than solving many technical problems that might arise. This “Technical Opinion” focuses on understanding the nature of information security in the next millennium. Based on this understanding it suggests a set of principles that would help in managing information security in the future.
Information Technology & Management | 2003
Sandy C. Chen; Gurpreet Dhillon
Consumer trust in an Internet vendor is an issue commanding ever more attention. Based on an extensive review of literature, this paper proposes dimensions of trust in an Internet vendor. These are competence, integrity and benevolence. Competence refers to a companys ability to fulfill promises made with the consumers. Integrity suggests that a company acts in a consistent, reliable, and honest manner. Benevolence is the ability of a company to hold consumer interests ahead of its own self-interest and indicates sincere concern for the welfare of the customers. In a further analysis various sources where trust might reside are also identified. Drawing on the literature in marketing and general management, the sources of trust are classified as characteristics of the consumer, the firm, the website and the interaction between the consumer and the firm. Given the dimensions and sources of trust, a path model for developing consumer trust in E-commerce is suggested. This research makes a contribution to the development of a theoretical understanding of trust in E-commerce. Although the concepts presented in this paper can be used to carry out further empirical research, they can also be used by practitioners to identify particular trust characteristics for realizing the potential of business to consumer E-commerce venture.
Information Systems Journal | 2006
Gurpreet Dhillon; Gholamreza Torkzadeh
Abstract. Information system (IS) security continues to present a challenge for executives and professionals. A large part of IS security research is technical in nature with limited consideration of people and organizational issues. The study presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of the values of people from an organizational perspective. It uses the value‐focused thinking approach to identify ‘fundamental’ objectives for IS security and ‘means’ of achieving them in an organization. Data for the study were collected through in‐depth interviews with 103 managers about their values in managing IS security. Interview results suggest 86 objectives that are essential in managing IS security. The 86 objectives are organized into 25 clusters of nine fundamental and 16 means categories. These results are validated by a panel of seven IS security experts. The findings suggest that for maintaining IS security in organizations, it is necessary to go beyond technical considerations and adopt organizationally grounded principles and values.
Communications of The ACM | 2000
Trevor T. Moores; Gurpreet Dhillon
Software piracy is defined as the unauthorized use, duplication, distribution or sale of commercially available software. Although it has been argued that the existence of pirated software stimulates an interest in legal copies [4], estimated losses for the software industry over the past five years (1994–1998) are approaching
Computers & Security | 2001
Gurpreet Dhillon
60 billion. Losses due to software piracy are estimated by assuming that for each new personal computer sold there will be a set of accompanying software sales. For instance, to make the PC work the user must buy an operating system, and to make the PC useful the user would have to buy a set of productivity software, such as a word processor, and so on. On this basis, the shortfall between expected and actual sales must be due to software piracy, and the cost of these missing sales represents the financial loss to the software industry. Using this method, the Software Publishers Association (SPA) and the Business Software Alliance (BSA) estimated that more than
Computers & Security | 2001
Gurpreet Dhillon; Steve Moores
12.3 billion was lost in worldwide sales in 1994, and
Information Systems Research | 2014
Weiyin Hong; Frank Kwok Yue Chan; James Y.L. Thong; Lewis C. Chasalow; Gurpreet Dhillon
13.3 billion in 1995. Despite a drop to
Information Management & Computer Security | 1999
Gurpreet Dhillon
11.2 billion in 1996—attributed by SPA/BSA to cheaper software prices rather than a decline in piracy rates—the figures for 1997 showed a rise to