LSE creators

Number of items: 9.
2004
  • Dhillon, Gurpreet, Silva, Leiser, Backhouse, James (2004). Computer crime at CEFORMA: a case study. International Journal of Information Management, 24(6), 551-561. https://doi.org/10.1016/j.ijinfomgt.2004.08.009
  • 2001
  • Dhillon, Gurpreet, Backhouse, James (2001). Current directions in IS security research : towards socio-organizational perspectives. Information Systems Journal, 11(2), 127-154.
  • 2000
  • Dhillon, Gurpreet, Backhouse, James (2000). Information system security management in the new millennium [technical opinion]. Communications of the ACM, 43(7), 125-128. https://doi.org/10.1145/341852.341877
  • 1997
  • Backhouse, James, Dhillon, Gurpreet (1997). Managing for secure organizations: a review of information systems security research approaches. In Avison, David (Ed.), Key Issues in Information Systems: Proceedings of the 2nd Ukais Conference, University of Southampton, 2-4 April 1997 (pp. 377-390). McGraw-Hill Publishing Company.
  • 1996
  • Backhouse, James, Dhillon, Gurpreet (1996). Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1), 2-9. https://doi.org/10.1057/ejis.1996.7
  • 1995
  • Dhillon, Gurpreet (1995). Interpreting the management of information systems security [Doctoral thesis]. London School of Economics and Political Science. picture_as_pdf
  • Dhillon, Gurpreet, Backhouse, James (1995). Computer fraud: its management and control. In Reuvid, Jonathan (Ed.), The Regulation and Prevention of Economic Crime Internationally (pp. 81-89). Kogan Page (Firm).
  • Dhillon, Gurpreet, Backhouse, James (1995). Risks in the use of information technology within organizations. International Journal of Information Management, 16(1), 65-74. https://doi.org/10.1016/0268-4012(95)00062-3
  • Backhouse, James, Dhillon, G (1995). Managing computer crime: a research outlook. Computers and Security, 14(7), 645-651. https://doi.org/10.1016/0167-4048(95)00024-0