H. Raghav Rao

According to our database1, H. Raghav Rao authored at least 269 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Is Cybersecurity a Team Sport? A Multilevel Examination of Workgroup Information Security Effectiveness.
MIS Q., 2020

Key challenges to digital financial services in emerging economies: the Indian context.
Inf. Technol. People, 2020

Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India.
IT for Development, 2020

ISF Editorial 2020.
Inf. Syst. Frontiers, 2020

An examination of the effect of recent phishing encounters on phishing susceptibility.
Decis. Support Syst., 2020

An Exploratory Analysis of Alarming and Reassuring Messages in Twitterverse during the Coronavirus Epidemic.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Cybersecurity Interventions for Teens: Two Time-Based Approaches.
IEEE Trans. Educ., 2019

A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts.
MIS Q., 2019

An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response.
J. Assoc. Inf. Syst., 2019

Responding to identity theft: A victimization perspective.
Decis. Support Syst., 2019

Ethical Challenges in the Future of Work.
IEEE Data Eng. Bull., 2019

The Effect of Threat and Proximity on Cyber-Rumor Sharing.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

An Investigation of Misinformation Harms Related to Social Media During Humanitarian Crises.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

Misinformation Harms During Crises: When The Human And Machine Loops Interact.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

2018
Examining employee security violations: moral disengagement and its environmental influences.
Inf. Technol. People, 2018

ICT mediated rumor beliefs and resulting user actions during a community crisis.
Gov. Inf. Q., 2018

Use of online information and suitability of target in shoplifting: A routine activity based analysis.
Decis. Support Syst., 2018

A system for intergroup prejudice detection: The case of microblogging under terrorist attacks.
Decis. Support Syst., 2018

Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model.
AIS Trans. Replication Res., 2018

Effects of Leaderboards in Games on Consumer Engagement.
Proceedings of the 2018 ACM SIGMIS Conference on Computers and People Research, 2018

Developing a Framework using Interpretive Structural Modeling for the Challenges of Digital Financial Services in India.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Factors facilitating Adoption of Mobile Payment Services over Credit/Debit Cards: An Investigation after the Demonetization Policy Shock in India.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

A Model for Assessing Label Quality in Crowdsourced Crisis Mapping Systems: A Case of 2010 Haiti Earthquake.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

A Prediction Model of Privacy Control for Online Social Networking Users.
Proceedings of the Designing for a Digital and Globalized World, 2018

Cyber-rumor Sharing: The Case of Zika Virus.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Using Cognitive Dissonance Theory to Explain Information Security Policy Violations.
Proceedings of the 24th Americas Conference on Information Systems, 2018

How Do You Cope: Individuals' Responses to Identity Theft Victimization.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
Inf. Syst. Res., 2017

Professor Kenneth Arrow and Information Systems Frontiers: In memoriam.
Inf. Syst. Frontiers, 2017

Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests.
Inf. Syst. Frontiers, 2017

From social capital to continuous use of social networking sites: a conceptualisation.
Int. J. Inf. Technol. Manag., 2017

Cyber-rumor sharing under a homeland security threat in the context of government Internet surveillance: The case of South-North Korea conflict.
Gov. Inf. Q., 2017

Opting for Identity Theft Protection Services: The Role of Anticipated Distress.
Proceedings of the International Conference on Information Systems, 2017

Data Breaches and the Individual: An Exploratory Study of the OPM Hack.
Proceedings of the International Conference on Information Systems, 2017

Information Risk Communication in the Context of Zika Virus: A Pilot Study.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Modeling Public Response to Data Breaches.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Unpacking Privacy Paradox: A Dual Process Theory Approach.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Overconfidence in Phishing Email Detection.
J. Assoc. Inf. Syst., 2016

Web assurance seal services, trust and consumers' concerns: an investigation of e-commerce transaction intentions across two nations.
Eur. J. Inf. Syst., 2016

Members' site use continuance on Facebook: Examining the role of relational capital.
Decis. Support Syst., 2016

Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults.
Decis. Support Syst., 2016

An Exploration of Public Reaction to the OPM Data Breach Notifications.
Proceedings of the Internetworked World, 2016

Management of Digital Evidence: Police Judgment about Ethical Use of Body Worn Camera.
Proceedings of the International Conference on Information Systems, 2016

A User-Centered Approach to Phishing Susceptibility: The Role of a Suspicious Personality in Protecting Against Phishing.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

An Examination of the Calibration and Resolution Skills in Phishing Email Detection.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Response to the Office of Personnel Management Data Breaches: A Conceptual Exploration.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Emerging issues for education in E-discovery for electronic health records.
Security Informatics, 2015

Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications.
MIS Q., 2015

Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness.
MIS Q., 2015

Campus Emergency Notification Systems: An Examination of Factors Affecting Compliance with Alerts.
MIS Q., 2015

Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior.
Inf. Syst. Res., 2015

Research Note - Role of Social Media in Social Change: An Analysis of Collective Sense Making During the 2011 Egypt Revolution.
Inf. Syst. Res., 2015

Foreword: Information Systems Frontiers - Volume 17, Number 1, 2015.
Inf. Syst. Frontiers, 2015

Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013.
Inf. Syst. Frontiers, 2015

The Dynamics of Pre- and Post-purchase Service and Consumer Evaluation of Online Retailers: A Comparative Analysis of Dissonance and Disconfirmation Models.
Decis. Sci., 2015

Sentiment Analysis of Twitter Users Over Time: The Case of the Boston Bombing Tragedy.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

Investigating the Antecedents of Healthcare Workers' Perceptions of Organizational Resilience in Hospitals.
Proceedings of the International Conference on Information Systems, 2015

Understanding Switching Subscription Behavior in the Context of Campus Emergency Notification Services: An Extended Privacy Calculus Model.
Proceedings of the International Conference on Information Systems, 2015

Examining the Impact of Presence on Individual Phishing Victimization.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

An Examination of Emotions in the Boston Bombing Twitterverse.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
Inf. Syst. J., 2014

Factors influencing online health information search: An empirical analysis of a national cancer-related survey.
Decis. Support Syst., 2014

Retweeting the Fukushima nuclear radiation disaster.
Commun. ACM, 2014

Collective Security Efficacy and Group Security Compliance.
Proceedings of the International Conference on Information Systems, 2014

Exploring multiplexity in Twitter - the 2013 Boston Marathon Bombing Case.
Proceedings of the International Conference on Information Systems, 2014

An Activity Theory Approach to Specification of Access Control Policies in Transitive Health Workflows.
Proceedings of the International Conference on Information Systems, 2014

2013
A Dispatch-Mediated Communication Model for Emergency Response Systems.
ACM Trans. Management Inf. Syst., 2013

Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises.
MIS Q., 2013

Data Model Development for Fire Related Extreme Events: An Activity Theory Approach.
MIS Q., 2013

Competition In Mediation Services: Modeling The Role of Expertise, Satisfaction, and Switching Costs.
J. Org. Computing and E. Commerce, 2013

A case study of private-public collaboration for humanitarian free and open source disaster management software deployment.
Decis. Support Syst., 2013

Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing.
Decis. Support Syst., 2013

DSS special issue on the Theory and Applications of Social Networks.
Decis. Support Syst., 2013

Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users.
Comput. Hum. Behav., 2013

Role of Trust in Privacy Assurance and Perceived Disease Severity on Personal Health Information Disclosure.
Proceedings of the International Conference on Information Systems, 2013

An Exploration of Collaboration over Time in Collective Crisis Response during the Haiti 2010 Earthquake.
Proceedings of the International Conference on Information Systems, 2013

A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email.
IEEE Trans. Prof. Communication, 2012

A Quality-Distinction Model of IT Capabilities: Conceptualization and Two-Stage Empirical Validation Using CMMi Processes.
IEEE Trans. Engineering Management, 2012

An activity theory analysis of boundary objects in cross-border information systems development for disaster management.
Security Informatics, 2012

Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender.
J. Manag. Inf. Syst., 2012

Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain.
Inf. Syst. J., 2012

Information systems frontiers editorial December 2012.
Inf. Syst. Frontiers, 2012

Exploring the grand challenges for next generation e-Business: selected papers from the workshop on e-Business 2009.
Inf. Syst. E-Business Management, 2012

An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security.
Decis. Support Syst., 2012

The effect of pre- and post-service performance on consumer evaluation of online retailers.
Decis. Support Syst., 2012

Assessing roles of people, technology and structure in emergency management systems: a public sector perspective.
Behav. Inf. Technol., 2012

An Exploration of the Impact of Information Privacy Invasion.
Proceedings of the International Conference on Information Systems, 2012

A Sociotechnical View of Information Diffusion and Social Changes: From Reprint to Retweet.
Proceedings of the International Conference on Information Systems, 2012

Collective Sense-Making through the Twitter Service during the 2011 Egypt Revolution.
Proceedings of the International Conference on Information Systems, 2012

Emergency Response System Design: An Examination of Emergency Communication Messages.
Proceedings of the Design Science Research in Information Systems. Advances in Theory and Practice, 2012

Design Principles for Emergency Collaborative Systems: A Situation Awareness Study of Buffalo Plane Crash.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Secure Knowledge Management.
Proceedings of the Encyclopedia of Knowledge Management, Second Edition, 2011

Information control and terrorism: Tracking the Mumbai terrorist attack through twitter.
Inf. Syst. Frontiers, 2011

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model.
Decis. Support Syst., 2011

Group value and intention to use - A study of multi-agency disaster management information systems for public safety.
Decis. Support Syst., 2011

An investigation of email processing from a risky decision making perspective.
Decis. Support Syst., 2011

Firms' information security investment decisions: Stock market evidence of investors' behavior.
Decis. Support Syst., 2011

Using social media to study social pheonomena: An example using Twitter data.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

Does 'Meaningful Use' of EMR Improve the Quality and Efficiency of Health Care? An Exploratory Analysis of Ambulatory EMR Usage.
Proceedings of the International Conference on Information Systems, 2011

Choice of Information: A Study of Twitter News Sharing during the 2009 Israel-Gaza Conflict.
Proceedings of the International Conference on Information Systems, 2011

Critical Factors Affecting Compliance to Campus Alerts.
Proceedings of the International Conference on Information Systems, 2011

EHR Adoption and Patient Safety: The Role of EHR and Health Care Provider Characteristics.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Impact of Cloud Computing Announcements on Firm Valuation.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Critical Success Factors to Improve Compliance with Campus Emergency Notifications.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

The UID Project: Lessons Learned from the West and Challenges Identified for India.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures.
ACM Trans. Management Inf. Syst., 2010

Publicly Available Computers: An Investigation of Transactional Website Use through Computers in Public Locations.
J. Electron. Commer. Organ., 2010

Anatomy of the Information Security Workforce.
IT Prof., 2010

The Information Assurance Practices of Cloud Computing Vendors.
IT Prof., 2010

Women in Cybersecurity: A Study of Career Advancement.
IT Prof., 2010

Assurance Seals, On-Line Customer Satisfaction, and Repurchase Intention.
Int. J. Electron. Commer., 2010

Security protection design for deception and real system regimes: A model and analysis.
Eur. J. Oper. Res., 2010

An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita.
Commun. Assoc. Inf. Syst., 2010

Design of a FOSS system for flood disaster management.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

Examination of emergency response from knowledge and psychology perspectives.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

An Exploration of Social Media in Extreme Events: Rumor Theory and Twitter during the Haiti Earthquake 2010.
Proceedings of the International Conference on Information Systems, 2010

Online Social Networking Site (SNS) Use at the Campus Emergencies.
Proceedings of the International Conference on Information Systems, 2010

The Unique Identification Number Project: Challenges and Recommendations.
Proceedings of the Ethics and Policy of Biometrics, 2010

Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Ethical Dimensions of the Information Society.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study.
MIS Q., 2009

Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration.
Inf. Syst. Res., 2009

Protection motivation and deterrence: a framework for security policy compliance in organisations.
Eur. J. Inf. Syst., 2009

Visual e-mail authentication and identification services: An investigation of the effects on e-mail use.
Decis. Support Syst., 2009

Task complexity and different decision criteria for online service acceptance: A comparison of two e-government compliance service domains.
Decis. Support Syst., 2009

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness.
Decis. Support Syst., 2009

Journal Self-Citation VIII: An IS Researcher in the Dual Worlds of Author-Reader and Author-Institution.
Commun. Assoc. Inf. Syst., 2009

An Exploration of the Search for Information Security.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009

On the Two Factors Affecting Information Systems Success in the Extreme Event Context.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009

Emergency communication and system design: The case of Indian Ocean Tsunami.
Proceedings of the 2009 International Conference on Information and Communication Technologies and Development, 2009

An exploration of unintended online private information disclosure in educational institutions across four countries.
Proceedings of the 2009 eCrime Researchers Summit, 2009

A case study of information flows in multi-agency emergency response exercises.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

A Simulation Based Study in a Hospital Emergency Department: Capacity and Workflow Issues.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Security analysis of Internet technology components enabling globally distributed workplaces - a framework.
ACM Trans. Internet Techn., 2008

Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model.
J. Assoc. Inf. Syst., 2008

Research Note - A Value-at-Risk Approach to Information Security Investment.
Inf. Syst. Res., 2008

Editorial.
Inf. Syst. Frontiers, 2008

Market reaction to patent infringement litigations in the information technology industry.
Inf. Syst. Frontiers, 2008

A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents.
Decis. Support Syst., 2008

Security in grid computing: A review and synthesis.
Decis. Support Syst., 2008

Role of word of mouth in online store loyalty.
Commun. ACM, 2008

Coordination in emergency response management.
Commun. ACM, 2008

Data Model Development for Fire Related Extreme Events - An Activity Theory and Semiotics Approach.
Proceedings of the International Conference on Information Systems, 2008

Complexity of compliance tasks and user acceptance of G2C online compliance services.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

Infastructure Interdependencies Modeling and Analysis - A Review and Synthesis.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Perceived Risk and Resilience in the Face of Natural Disasters: A Study of Hospital.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Information Theoretic Approach to Design of Emergency Response Systems.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Mediated Internet Experience for Senior Citizens.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

An Exploratory Study of Bloggers' Information Sharing Behavior: The Role of Online Privacy Concerns.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements.
Inf. Syst. Frontiers, 2007

An examination of private intermediaries' roles in software vulnerabilities disclosure.
Inf. Syst. Frontiers, 2007

Design principles for critical incident response systems.
Inf. Syst. E-Business Management, 2007

Short Term and Total Life Impact analysis of email worms in computer systems.
Decis. Support Syst., 2007

Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment.
Decis. Support Syst., 2007

Efficiency of critical incident management systems: Instrument development and validation.
Decis. Support Syst., 2007

An investigation of factors that influence the duration of IT outsourcing relationships.
Decis. Support Syst., 2007

Self-healing systems - survey and synthesis.
Decis. Support Syst., 2007

Surface Transportation and Cyber-Infrastructure: An Exploratory Study.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

The Effect of Third Party Seals on Consumers' Repurchase Process in Online Shopping: A Multi-Group Analysis.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Emergency Response Coordination and IT Support: Contingency and Strategies.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
A Parallel Hypercube Algorithm for Discrete Resource Allocation Problems.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use.
J. Assoc. Inf. Syst., 2006

Repeated Use of E-Gov Web Sites: A Satisfaction and Confidentiality Perspective.
IJEGR, 2006

Market reactions to E-business outsourcing announcements: An event study.
Inf. Manag., 2006

Impact of IT Service Provider Process Capabilities on Service Provider Performance: An Empirical Study.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Publicly Accessible Computers: An Exploratory Study of the Determinants of Transactional Website Use in Public Locations.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Framework for Analyzing Critical Incident Management Systems (CIMS).
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Citizen centric analysis of anti/counter-terrorism e-government services.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

A Framework for Understanding Minority Students' Cyber Security Career Interests.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Internet skeptics: an analysis of intermittent users and net dropouts.
IEEE Technol. Soc. Mag., 2005

Knowledge Acquisition via Three Learning Processes in Enterprise Information Portals: Learning-by-Investment, Learning-by-Doing, and Learning-from-Others.
MIS Q., 2005

Foreword Design Science and Information Systems.
Inf. Syst. Frontiers, 2005

Gender Divide in the Use of Internet Applications.
IJEBR, 2005

Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis.
Decis. Support Syst., 2005

A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia/practitioner perspectives.
Decis. Support Syst., 2005

Matching intermediaries for information goods in the presence of direct search: an examination of switching costs and obsolescence of information.
Decis. Support Syst., 2005

Secure knowledge management and the semantic web.
Commun. ACM, 2005

Design Principles of Coordinated Multi-incident Emergency Response Systems.
Proceedings of the Intelligence and Security Informatics, 2005

A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field .
Proceedings of the Information Systems Security, First International Conference, 2005

An Extreme Value Approach to Information Technology Security Investment.
Proceedings of the International Conference on Information Systems, 2005

Exploring the Moderating Effect of Trust and Privacy in the Adoption of Application Service Providers in the Healthcare Industry.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Managing Security Service Providers: Issues in Outsourcing Security.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

An Examination of Trust Effects and Pre-Existing Relational Risks in eGovernment Services.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

An Investigation of Risk Management Issues in the Context of Emergency Response Systems.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Electronic Banking and Information Assurance Issues: Surveys and Synthesis.
J. Organ. End User Comput., 2004

Determinants of Sourcing During Technology Growth and Maturity: An Empirical Study of e-Commerce Sourcing.
J. Manag. Inf. Syst., 2004

Bringing E-Government into the Classroom: A Case of E-Commerce Education.
J. Inf. Syst. Educ., 2004

Toward an Integration of Agent- and Activity-Centric Approaches in Organizational Process Modeling: Incorporating Incentive Mechanisms.
Inf. Syst. Res., 2004

E-health and assurance: curing hospital websites.
IJEH, 2004

Information Assurance in B2C Websites for Information Goods/Services.
Electron. Mark., 2004

A Framework for a Secure Federated Patient Healthcare System.
Proceedings of the Intelligence and Security Informatics, 2004

Management of Information Technology Outsourcing Relationships: The Role of Service Level Agreements.
Proceedings of the International Conference on Information Systems, 2004

A Solution Architecture for Financial Institutions to Handle Illegal Activities: A Neural Networks Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

The Effects of Power and Partnership on Application Service Provider Commitment, Cooperation, and Compliance.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Functionality Defense by Heterogeneity: A new paradigm for Securing Systems.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Metrics for Information Security - A literature review.
Proceedings of the 10th Americas Conference on Information Systems, 2004

Digital Democracy: The Influence of the Internet on Voting Intention.
Proceedings of the 10th Americas Conference on Information Systems, 2004

Managing IT Outsourcing Relationships Using Service Level Agreements (SLAs): A Multi-Dimensional Fit Approach.
Proceedings of the 10th Americas Conference on Information Systems, 2004

A conceptual approach to information security in financial account aggregation.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Relative Performance of Incentive Mechanisms: Computational Modeling and Simulation of Delegated Investment Decisions.
Manag. Sci., 2003

Impact of Mobile Computing Terminals in Police Work.
J. Org. Computing and E. Commerce, 2003

Foreword: Featured Sections-Business Applications of Uncertain Reasoning and Informatics Support for Medical Research.
Inf. Syst. Frontiers, 2003

Consumer-perceived risk in e-commerce transactions.
Commun. ACM, 2003

A relationship perspective on IT outsourcing.
Commun. ACM, 2003

A comparison of B2B e-service solutions.
Commun. ACM, 2003

An Investigation of Consumer Online Trust and Purchase-Repurchase Intentions.
Proceedings of the International Conference on Information Systems, 2003

Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security.
Proceedings of the IEEE Systems, 2003

A Study of Customers' Trusting Beliefs in Government-to-Customer Online Services.
Proceedings of the 9th Americas Conference on Information Systems, 2003

Trust, Risk and Benefit in Electronic Commerce: What Are the Relationships?
Proceedings of the 9th Americas Conference on Information Systems, 2003

Antecedents of Consumer Trust in B-to-C Electronic Commerce.
Proceedings of the 9th Americas Conference on Information Systems, 2003

Managing IT Sourcing Relationships Using Service Level Agreements: A Relational Exchange Theory Approach.
Proceedings of the 9th Americas Conference on Information Systems, 2003

A study of the effect of consumer trust on consumer expectations and satisfaction: the Korean experience.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Electronic Commerce, Infrastructure for.
Proceedings of the Encyclopedia of Information Systems, 2002

Foreword Next Generation Enterprises-Virtual Organizations and Pervasive/Mobile Technologies.
Inf. Syst. Frontiers, 2002

Foreword Information Systems: Modeling and Analysis.
Inf. Syst. Frontiers, 2002

2001
A comparative analysis of information acquisition mechanisms for discrete resource allocation.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Dynamic profiling of consumers for customized offerings over the Internet: a model and analysis.
Decis. Support Syst., 2001

Introduction to the special issue: decision support issues in customer relationship management and interactive marketing for e-commerce.
Decis. Support Syst., 2001

Web channels in e-commerce.
Commun. ACM, 2001

2000
An empirical investigation into the validity of transitivity and non-satiety assumptions in partial order structures: a note.
IEEE Trans. Syst. Man Cybern. Part A, 2000

E-Commerce Technologies and Information Systems Curricula.
J. Inf. Syst. Educ., 2000

Information Systems Frontiers.
Commun. ACM, 2000

On risk, convenience, and Internet shopping behavior.
Commun. ACM, 2000

An examination of perceived value of secondary knowledge sources for IT projects.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

Effects of consumer lifestyles on purchasing behavior on the Internet: a conceptual framework and empirical validation.
Proceedings of the Twenty-First International Conference on Information Systems, 2000

A content-analytic longitudinal study of the drivers for information technology and systems outsourcing.
Proceedings of the Twenty-First International Conference on Information Systems, 2000

Internet Involvement: Instrument Development, Measurement and Implications for Electronic Commerce.
Proceedings of the Handbook on Electronic Commerce, 2000

1999
Foreword.
Inf. Syst. Frontiers, 1999

Foreword.
Inf. Syst. Frontiers, 1999

1998
Content of Corporate Web Pages as Advertising Media.
Commun. ACM, 1998

Marketing and the Internet - Introduction.
Commun. ACM, 1998

Deterministic Chaos in the Capacity Expansion Race.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
Information Acquisition Policies for Resource Allocation Among Multiple Agents.
Inf. Syst. Res., 1997

Introducing Client/Server Technologies in Information Systems Curricula.
Data Base, 1997

Preface.
Annals OR, 1997

Information systems frontiers (panel session): emerging vistas.
Proceedings of the Eighteenth International Conference on Information Systems, 1997

A simulation test bed for computational modeling of business processes.
Proceedings of the Eighteenth International Conference on Information Systems, 1997

1996
Information Systems Outsourcing (Introduction to the Special Section).
Commun. ACM, 1996

A Two-Level Investigation of Information Systems Outsourcing.
Commun. ACM, 1996

An Exploratory Analysis of Information Content of Corporate Web Pages as Advertising Media.
Proceedings of the Seventeenth International Conference on Information Systems, 1996

Market Reactions to Intellectual Property Infringement Litigations in the Information Technology Industry.
Proceedings of the Seventeenth International Conference on Information Systems, 1996

1995
The effect of team composition on decision scheme, information search, and perceived complexity.
J. Organ. Comput., 1995

Management of Information Systems Outsourcing: A Bidding Perspective.
J. Manag. Inf. Syst., 1995

Modeling Team Processes: Issues and a Specific Example.
Inf. Syst. Res., 1995

The impact of EDI implementation commitment and implementation success on competitive advantage and firm performance.
Inf. Syst. J., 1995

1994
An active intelligent decision support system - Architecture and simulation.
Decis. Support Syst., 1994

Software resue: Issues and an example.
Decis. Support Syst., 1994

Two schemes for information acquisition: An entropic assessment.
Autom., 1994

Synthesizing Expert Systems and Operations Research Techniques: system classification and review.
Australas. J. Inf. Syst., 1994

Dimensions of Information Systems Outsourcing.
Proceedings of the Fifteenth International Conference on Information Systems, 1994

1993
A choice set-sensitive analysis of preference information acquisition about discrete resources.
IEEE Trans. Syst. Man Cybern., 1993

Evaluation of flexible automation investments: a model management perspective.
J. Intelligent Manufacturing, 1993

Hedonic Price Analysis of Workstation Attributes.
Commun. ACM, 1993

1992
Technology Transfer: Making Expert Systems Commercially Successful.
IEEE Expert, 1992

A dynamic learning model for on-line quality control using the TAGUCHI approach.
Applied Artificial Intelligence, 1992

Information Systems Outsourcing: A Mixed Integer Programming Analysis.
Proceedings of the Thirteenth International Conference on Information Systems, 1992

1991
A knowledge-based approach to CIM modeling.
J. Intelligent Manufacturing, 1991

Module base design for a portfolio of institutional decision support systems.
Inf. Manag., 1991

Higher dimensional restricted lattice paths with diagonal steps.
Discret. Appl. Math., 1991

An information and preference theory approach to a discrete resource allocation problem.
Autom., 1991

What can computer programs do to facilitate negotiation processes?
Proceedings of the Conference on Organizational Computing Systems, 1991

1990
Economic Analysis of Microcomputer Hardware.
Commun. ACM, 1990


  Loading...