Divakaran Liginlal

Orcid: 0000-0003-0132-6507

According to our database1, Divakaran Liginlal authored at least 32 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Scaffolding Case Analysis Writing: A Collaboration between Information Systems and Writing Faculty.
J. Inf. Syst. Educ., 2019

2018
A Study of Natural Interactions with Digital Heritage Artifacts.
Proceedings of the 3rd Digital Heritage International Congress, 2018

Measuring Corporate Transparency in Sustainability Reporting.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Applying the Onion Model to Scaffold Writing Development in Information Systems Courses.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Web Accessibility as a Barrier to Successful Digital Governance: A Case Study of the Arabian Gulf Region.
Proceedings of the 2017 International Conference on Information Resources Management, 2017

2016
Applying the Cox Model to Study Online Gambling Behavior.
Proceedings of the International Conference on Information Systems, 2016

2015
Understanding Members' Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis.
J. Manag. Inf. Syst., 2015

Wish Lists and Shopping Carts: A Study of Visual Metaphors on Arab E-Commerce Websites.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

Voices of Al-Khor a study in digital cultural heritage.
Proceedings of the 2nd Digital Heritage International Congress, 2015

Combining Morphological Analysis and Bayesian Belief Networks: A DSS for Safer Construction of a Smart City.
Proceedings of the 21st Americas Conference on Information Systems, 2015

HIPAA and Human Error: The Role of Enhanced Situation Awareness in Protecting Health Information.
Proceedings of the Medical Data Privacy Handbook, 2015

2012
Information Privacy Situation Awareness: Construct and Validation.
J. Comput. Inf. Syst., 2012

Regulatory Influence and the Imperative of Innovation in Identity and Access Management.
Inf. Resour. Manag. J., 2012

Whither information security? Examining the complementarities and substitutive effects among IT and information security firms.
Int. J. Inf. Manag., 2012

HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory.
Comput. Secur., 2012

2011
Technology and U.S. Politics.
IEEE Technol. Soc. Mag., 2011

Predicting stock market returns from malicious attacks: A comparative analysis of vector autoregression and time-delayed neural networks.
Decis. Support Syst., 2011

2010
Using Real Options Theory to Evaluate Strategic Investment Options for Mobile Content Delivery: A Case Study.
Int. J. Bus. Data Commun. Netw., 2010

2009
Valuing the flexibility of investing in security process innovations.
Eur. J. Oper. Res., 2009

How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management.
Comput. Secur., 2009

Quantifying the benefits of investing in information security.
Commun. ACM, 2009

Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009

Human Error and Privacy Breaches in Healthcare Organizations: Causes and Management Strategies.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Has Decreasing Innovation Hurt the Stock Price of Information Security Firms? A Time Series Analysis.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Will the Information Security Industry Die? Applying Social Network Analysis to Sturdy Industry Convergence.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
A maximum entropy approach to feature selection in knowledge-based authentication.
Decis. Support Syst., 2008

2007
Bayesian Networks for Knowledge-Based Authentication.
IEEE Trans. Knowl. Data Eng., 2007

The Influence of Regulations on Innovation in Information Security.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

An Empirical Investigation of Knowledge-Based Authentication.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Fuzzy measure theoretical approach to screening product innovations.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Modeling attitude to risk in human decision processes: An application of fuzzy measures.
Fuzzy Sets Syst., 2006

2005
On policy capturing with fuzzy measures.
Eur. J. Oper. Res., 2005


  Loading...