Hasan Cavusoglu

According to our database1, Hasan Cavusoglu authored at least 33 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Transparency in Advice-Giving Systems: A Framework and a Research Model for Transparency Provision.
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019

Do Users Always Want to Know More? Investigating the Relationship between System Transparency and Users' Trust in Advice-Giving Systems.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Escalation of commitment as an antecedent to noncompliance with information security policy.
Inf. & Comput. Security, 2018

2017
Effects of Heterogeneity in Board IT Capital on Firm Innovation.
Proceedings of the International Conference on Information Systems, 2017

Supporting Online Consumers by Identifying Consistency Distance Among Advice Sources.
Proceedings of the International Conference on Information Systems, 2017

Online Consumers' Attribution of Inconsistency Between Advice Sources.
Proceedings of the International Conference on Information Systems, 2017

2016
Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook.
Information Systems Research, 2016

Early mover advantage in e-commerce platforms with low entry barriers: The role of customer relationship management capabilities.
Information & Management, 2016

2015
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources.
Information & Management, 2015

Small and medium sized manufacturer performance on third party B2B electronic marketplaces: The role of enabling and IT capabilities.
Decision Support Systems, 2015

Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus.
Proceedings of the International Conference on Information Systems, 2015

Enhancing Strategic IT Alignment through Common Language: Using the Terminology of the Resource-based View or the Capability-based View?
Proceedings of the International Conference on Information Systems, 2015

Privacy Controls and Disclosure Behavior.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing.
Proceedings of the International Conference on Information Systems, 2014

Assessing Sunk Cost Effect on Employees' Intentions to Violate Information Security Policies in Organizations.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Early Mover Advantage in an Industry with Low Entry Barrier: Evidence from Etailers on Third Party ECommerce Platforms.
Proceedings of the International Conference on Information Systems, 2013

Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment.
Proceedings of the International Conference on Information Systems, 2013

2012
Do Vendors' Pricing Decisions Fully Reflect Information in Online Reviews?
ACM Trans. Management Inf. Syst., 2012

Trusting those who trust you: A study on trust and privacy on Facebook.
Proceedings of the International Conference on Information Systems, 2012

2010
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness.
MIS Quarterly, 2010

Information Technology Diffusion with Influentials, Imitators, and Opponents.
J. of Management Information Systems, 2010

Understanding Emergence and Outcomes of Information Privacy Concerns: a Case of Facebook.
Proceedings of the International Conference on Information Systems, 2010

Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Empirical Investigation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
The strategic knowledge-based dependency diagrams: a tool for analyzing strategic knowledge dependencies for the purposes of understanding and communicating.
Information Technology and Management, 2009

Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
Information Systems Research, 2009

Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Security Patch Management: Share the Burden or Share the Damage?
Management Science, 2008

2007
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge.
IEEE Trans. Software Eng., 2007

Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation.
IEEE Trans. Engineering Management, 2007

2006
Economics of Security Patch Management.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

2005
Emerging Issues in Responsible Vulnerability Disclosure.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2004
Economics of ITSecurity Management: Four Improvements to Current Security Practices.
CAIS, 2004


  Loading...