You are here: Home Contents V20 N1 V20N1_Dhillon.html
Personal tools

Coordinating in Threes: Unraveling Complexity in Information Systems Security Management

 

 

Full text
View

Source
Journal of Information Systems Security
Volume 20, Number 1 (2024)
Pages 310
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Gurpreet Dhillon — University of North Texas, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

Editorial Note

 

 

Keywords

Information Systems Security Definition, Integrity, Coordination in Threes, Technical Controls, Formal Controls, Informal Controls, TFI Model.

 

 

References

Backhouse, J., & Dhillon, G. (1995). Managing computer crime: a research outlook. Computers & Security, 14(7), 645-651.

Backhouse, J., & Dhillon, G. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1), 2-9.

Dhillon, G. (1995). Interpreting the management of information systems security [PhD, London School of Economics and Political Science, University of London]. London.

Dhillon, G. (1997a). The Clinical Information System: a case of misleading design decisions. In J. Liebowitz & M. Khosrowpour (Eds.), Cases in information technology management in modern organizations (pp. 275-287). Idea Group Publishing.

Dhillon, G. (1997b). Managing information system security. Macmillan.

Dhillon, G. (1999). Managing and controlling computer misuse. Information Management & Computer Security, 7(5).

Dhillon, G. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security, 20(2), 165-172.

Dhillon, G. (2004). The Challenge of Managing Information Security. International Journal of Information Management, 24(1), 3-4.

Dhillon, G. (2007). Principles of information systems security: text and cases. John Wiley & Sons.

Dhillon, G. (2023). The Intellectual Core of Information Systems Security. Journal of Information Systems Security, 10(2), 91-95.

Dhillon, G., & Backhouse, J. (1996). Risks in the use of information technology within organizations. International Journal of Information Management, 16(1), 65-74.

Dhillon, G., & Chowdhuri, R. (2014). Organizational Transformation and Information Security Culture: A Telecom Case Study. In S. Jajodia, F. Cuppens, & N. Cuppens-Boulahia (Eds.), ICT Systems Security and Privacy Protection. Springer.

Thomas, M., & Dhillon, G. (2012). Interpreting Deep Structures of Information Systems Security. The Computer Journal, 55(10), 1148-1156.