Hasan Cavusoglu

Orcid: 0000-0001-9734-785X

According to our database1, Hasan Cavusoglu authored at least 50 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FinTral: A Family of GPT-4 Level Multimodal Financial Large Language Models.
CoRR, 2024

2023
How "What you think you know about cybersecurity" can help users make more secure decisions.
Inf. Manag., November, 2023

Understanding the Board's Involvement in Information Technology Governance.
Inf. Syst. Manag., April, 2023

Market Reaction to Cyber Strategy Disclosure: Word Embedding Derived Approach.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
The Dark Side of Technological Modularity: Opportunistic Information Hiding During Interorganizational System Adoption.
Inf. Syst. Res., 2022

Market Value of Cybersecurity Strategies.
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022

The Role of Heuristics in Information Security Decision Making.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Too Close to Home: The Drivers of Perceived Risk of Home Automation.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
IndT5: A Text-to-Text Transformer for 10 Indigenous Languages.
CoRR, 2021

2020
Bloatware and Jailbreaking: Strategic Impacts of Consumer-Initiated Modification of Technology Products.
Inf. Syst. Res., 2020

An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps.
Inf. Syst. Res., 2020

Machine Generation and Detection of Arabic Manipulated and Fake News.
CoRR, 2020

Role of Feedback in Improving Novice Users' Security Performance Using Construal Level and Valance Framing.
Proceedings of the 41st International Conference on Information Systems, 2020

IT Risk Factor Disclosure and Stock Price Crashes.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Growing Together: Modeling Human Language Learning With n-Best Multi-Checkpoint Machine Translation.
Proceedings of the Fourth Workshop on Neural Generation and Translation, 2020

2019
Transparency in Advice-Giving Systems: A Framework and a Research Model for Transparency Provision.
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019

Do Users Always Want to Know More? Investigating the Relationship between System Transparency and Users' Trust in Advice-Giving Systems.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Escalation of commitment as an antecedent to noncompliance with information security policy.
Inf. Comput. Secur., 2018

2017
Effects of Heterogeneity in Board IT Capital on Firm Innovation.
Proceedings of the International Conference on Information Systems, 2017

Supporting Online Consumers by Identifying Consistency Distance Among Advice Sources.
Proceedings of the International Conference on Information Systems, 2017

Online Consumers' Attribution of Inconsistency Between Advice Sources.
Proceedings of the International Conference on Information Systems, 2017

2016
Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook.
Inf. Syst. Res., 2016

Early mover advantage in e-commerce platforms with low entry barriers: The role of customer relationship management capabilities.
Inf. Manag., 2016

2015
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources.
Inf. Manag., 2015

Small and medium sized manufacturer performance on third party B2B electronic marketplaces: The role of enabling and IT capabilities.
Decis. Support Syst., 2015

Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus.
Proceedings of the International Conference on Information Systems, 2015

Enhancing Strategic IT Alignment through Common Language: Using the Terminology of the Resource-based View or the Capability-based View?
Proceedings of the International Conference on Information Systems, 2015

Privacy Controls and Disclosure Behavior.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing.
Proceedings of the International Conference on Information Systems, 2014

Assessing Sunk Cost Effect on Employees' Intentions to Violate Information Security Policies in Organizations.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Early Mover Advantage in an Industry with Low Entry Barrier: Evidence from Etailers on Third Party ECommerce Platforms.
Proceedings of the International Conference on Information Systems, 2013

Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment.
Proceedings of the International Conference on Information Systems, 2013

Assessing Self-Justification as an Antecedent of Noncompliance with Information Security Policies.
Proceedings of the Australasian Conference on Information Systems, 2013

Guilt Proneness as a Mechanism Towards Information Security Policy Compliance.
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Do Vendors' Pricing Decisions Fully Reflect Information in Online Reviews?
ACM Trans. Manag. Inf. Syst., 2012

Trusting those who trust you: A study on trust and privacy on Facebook.
Proceedings of the International Conference on Information Systems, 2012

2010
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness.
MIS Q., 2010

Information Technology Diffusion with Influentials, Imitators, and Opponents.
J. Manag. Inf. Syst., 2010

Understanding Emergence and Outcomes of Information Privacy Concerns: a Case of Facebook.
Proceedings of the International Conference on Information Systems, 2010

Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Empirical Investigation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
The strategic knowledge-based dependency diagrams: a tool for analyzing strategic knowledge dependencies for the purposes of understanding and communicating.
Inf. Technol. Manag., 2009

Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
Inf. Syst. Res., 2009

Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Security Patch Management: Share the Burden or Share the Damage?
Manag. Sci., 2008

2007
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge.
IEEE Trans. Software Eng., 2007

Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation.
IEEE Trans. Engineering Management, 2007

2006
Economics of Security Patch Management.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

2005
Emerging Issues in Responsible Vulnerability Disclosure.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2004
Economics of ITSecurity Management: Four Improvements to Current Security Practices.
Commun. Assoc. Inf. Syst., 2004


  Loading...