Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gurpreet Dhillon is active.

Publication


Featured researches published by Gurpreet Dhillon.


Information Systems Research | 2002

Measuring Factors that Influence the Success of Internet Commerce

Gholamreza Torkzadeh; Gurpreet Dhillon

Efforts to develop measures of Internet commerce success have been hampered by (1) the rapid development and use of Internet technologies and (2) the lack of conceptual bases necessary to develop success measures. In a recent study, Keeney (1999) proposed two sets of variables labeled asmeans objectives andfundamental objectives that influence Internet shopping. Means objectives, he argues, help businesses achieve what is important for their customers--fundamental objectives. Based on Keeneys work, this paper describes the development of two instruments that together measure the factors that influence Internet commerce success. One instrument measures the means objectives that influence online purchase (e.g., Internet vendor trust) and the other measures the fundamental objectives that customers perceive to be important for Internet commerce (e.g., Internet product value). In phase one of the instrument development process, we generated 125 items for means and fundamental objectives. Using a sample of 199 responses by individuals with Internet shopping experience, these constructs were examined for reliability and validity. The Phase 1 results suggested a 4-factor, 21-item instrument to measure means objectives and a 4-factor, 17-item instrument to measure fundamental objectives. In Phase 2 of the instrument development process, we gathered a sample of 421 responses to further explore the 2 instruments. With minor modifications, the Phase 2 data support the 2 models. The Phase 2 results suggest a 5-factor, 21-item instrument that measures means objectives in terms ofInternet product choice, online payment, Internet vendor trust, shopping travel, andInternet shipping errors. Results also suggest a 4-factor, 16-item instrument that measures fundamental objectives in terms ofInternet shopping convenience, Internet ecology, Internet customer relation, andInternet product value. Evidence of reliability and discriminant, construct, and content validity is presented for the hypothesized measurement models. The paper concludes with discussions on the usefulness of these measures and future research ideas.


Information Systems Journal | 2001

Current directions in IS security research : towards socio-organizational perspectives

Gurpreet Dhillon; James Backhouse

Abstract. The purpose of this paper is to map the current territory of information systems and security research. It uses the Burrell and Morgan framework as an intellectual map to analyse the socio‐philosophical concerns in various information systems and security approaches. The papers contributions are in its analysis of trends in information systems and security research, the former in stressing the socio‐organizational perspectives and the latter in criticizing the preponderance of technical solutions. The paper also sets an agenda for a future research emphasis.


Communications of The ACM | 2000

Technical opinion: Information system security management in the new millennium

Gurpreet Dhillon; James Backhouse

R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process, store, and transmit digital data in most business sectors. This has transformed the way we conduct trade, deliver government services, and provide health care. Changes in communication and information technologies and particularly their confluence has raised a number of concerns connected with the protection of organizational information assets. Achieving consensus regarding safeguards for an information system, among different stakeholders in an organization, has become more difficult than solving many technical problems that might arise. This “Technical Opinion” focuses on understanding the nature of information security in the next millennium. Based on this understanding it suggests a set of principles that would help in managing information security in the future.


Information Technology & Management | 2003

Interpreting Dimensions of Consumer Trust in E-Commerce

Sandy C. Chen; Gurpreet Dhillon

Consumer trust in an Internet vendor is an issue commanding ever more attention. Based on an extensive review of literature, this paper proposes dimensions of trust in an Internet vendor. These are competence, integrity and benevolence. Competence refers to a companys ability to fulfill promises made with the consumers. Integrity suggests that a company acts in a consistent, reliable, and honest manner. Benevolence is the ability of a company to hold consumer interests ahead of its own self-interest and indicates sincere concern for the welfare of the customers. In a further analysis various sources where trust might reside are also identified. Drawing on the literature in marketing and general management, the sources of trust are classified as characteristics of the consumer, the firm, the website and the interaction between the consumer and the firm. Given the dimensions and sources of trust, a path model for developing consumer trust in E-commerce is suggested. This research makes a contribution to the development of a theoretical understanding of trust in E-commerce. Although the concepts presented in this paper can be used to carry out further empirical research, they can also be used by practitioners to identify particular trust characteristics for realizing the potential of business to consumer E-commerce venture.


Information Systems Journal | 2006

Value‐focused assessment of information system security in organizations

Gurpreet Dhillon; Gholamreza Torkzadeh

Abstract.  Information system (IS) security continues to present a challenge for executives and professionals. A large part of IS security research is technical in nature with limited consideration of people and organizational issues. The study presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of the values of people from an organizational perspective. It uses the value‐focused thinking approach to identify ‘fundamental’ objectives for IS security and ‘means’ of achieving them in an organization. Data for the study were collected through in‐depth interviews with 103 managers about their values in managing IS security. Interview results suggest 86 objectives that are essential in managing IS security. The 86 objectives are organized into 25 clusters of nine fundamental and 16 means categories. These results are validated by a panel of seven IS security experts. The findings suggest that for maintaining IS security in organizations, it is necessary to go beyond technical considerations and adopt organizationally grounded principles and values.


Communications of The ACM | 2000

Software piracy: a view from Hong Kong

Trevor T. Moores; Gurpreet Dhillon

Software piracy is defined as the unauthorized use, duplication, distribution or sale of commercially available software. Although it has been argued that the existence of pirated software stimulates an interest in legal copies [4], estimated losses for the software industry over the past five years (1994–1998) are approaching


Computers & Security | 2001

Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns

Gurpreet Dhillon

60 billion. Losses due to software piracy are estimated by assuming that for each new personal computer sold there will be a set of accompanying software sales. For instance, to make the PC work the user must buy an operating system, and to make the PC useful the user would have to buy a set of productivity software, such as a word processor, and so on. On this basis, the shortfall between expected and actual sales must be due to software piracy, and the cost of these missing sales represents the financial loss to the software industry. Using this method, the Software Publishers Association (SPA) and the Business Software Alliance (BSA) estimated that more than


Computers & Security | 2001

Refereed papers: Computer crimes: theorizing about the enemy within

Gurpreet Dhillon; Steve Moores

12.3 billion was lost in worldwide sales in 1994, and


Information Systems Research | 2014

A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research

Weiyin Hong; Frank Kwok Yue Chan; James Y.L. Thong; Lewis C. Chasalow; Gurpreet Dhillon

13.3 billion in 1995. Despite a drop to


Information Management & Computer Security | 1999

Managing and controlling computer misuse

Gurpreet Dhillon

11.2 billion in 1996—attributed by SPA/BSA to cheaper software prices rather than a decline in piracy rates—the figures for 1997 showed a rise to

Collaboration


Dive into the Gurpreet Dhillon's collaboration.

Top Co-Authors

Avatar

Ray Hackney

Manchester Metropolitan University

View shared research outputs
Top Co-Authors

Avatar

James Backhouse

London School of Economics and Political Science

View shared research outputs
Top Co-Authors

Avatar

Mário Caldeira

Technical University of Lisbon

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Santa R. Susarapu

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar

Tiago Oliveira

Universidade Nova de Lisboa

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge