1. Ernst, Young: Moving beyond compliance. Global Information Security Survey (2008)
2. Mattia, A., Dhillon, G.: Applying Double Loop Learning to Interpret Implications for Information Systems Security Design. In: The IEEE Systems, Man & Cybernetics Conference, Washington, DC, October 5-8 (2003)
3. Lapke, M., Dhillon, G.: Power relationships in information systems security policy formulation and implementation. In: The 16th Annual European Conference on Information Systems (ECIS), Galway, Ireland (2008)
4. Mishra, S., Dhillon, G.: Information systems security governance research: a behavioral perspective. In: The 1st Annual Symposium on Information Assurance, Academic Track of 9th Annual NYS Cyber Security Conference, New York, USA (2006)
5. Thomson, K.L.: Information Security Conscience: a precondition to an Information Security Culture. In: 8th Annual Security Conference, Las Vegas, NV, USA, April 15-16 (2009)