Baidyanath Biswas

Orcid: 0000-0002-0609-3530

According to our database1, Baidyanath Biswas authored at least 20 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks.
Decis. Support Syst., February, 2024

Disease Topic Modeling of Users' Inquiry Texts: A Text Mining-Based PQDR-LDA Model for Analyzing the Online Medical Records.
IEEE Trans. Engineering Management, 2024

2023
Profitability and pricing decision-making structures in presence of uncertain demand and green technology investment for a three tier supply chain.
Comput. Ind. Eng., May, 2023

2022
Post-epidemic factors influencing customer's booking intent for a hotel or leisure spot: an empirical study.
J. Enterp. Inf. Manag., 2022

Collaborative consumption continuance: a mixed-methods analysis of the service quality-loyalty relationship in ride-sharing services.
Electron. Mark., 2022

Your reviews or mine? Exploring the determinants of "perceived helpfulness" of online reviews: a cross-cultural study.
Electron. Mark., 2022

A critical assessment of consumer reviews: A hybrid NLP-based methodology.
Decis. Support Syst., 2022

A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums.
Decis. Support Syst., 2022

Decision-making framework for identifying regions vulnerable to transmission of COVID-19 pandemic.
Comput. Ind. Eng., 2022

2021
Antecedents for enhanced level of cyber-security in organisations.
J. Enterp. Inf. Manag., 2021

Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach.
Inf. Comput. Secur., 2021

2020
Examining the determinants of the count of customer reviews in peer-to-peer home-sharing platforms using clustering and count regression techniques.
Decis. Support Syst., 2020

2019
Analysis of barriers to implement blockchain in industry and service sectors.
Comput. Ind. Eng., 2019

Why do I get phished? The role of persuasion, design authenticity and contextualization.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
G-RAM framework for software risk assessment and mitigation strategies in organisations.
J. Enterp. Inf. Manag., 2018

"Leadership in Action: How Top Hackers Behave" A Big-Data Approach with Text-Mining and Sentiment Analysis.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

C-R-P-M-I: A framework to model cyber risk from phishing and mitigation through insurance.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2016
Can HIT Work Alone? A Security and Socio-Economic Perspective of Healthcare Quality.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

AVICS-Eco Framework: An Approach to Attack Prediction and Vulnerability Assessment in a Cyber Ecosystem.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2012
Elimination of truncation and round off error and enhancement of stability using a new split loop DPLL.
Int. J. Commun. Syst., 2012


  Loading...