Huseyin Cavusoglu

Orcid: 0000-0002-7982-3602

According to our database1, Huseyin Cavusoglu authored at least 45 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Two-Sided Sharing Platforms: Sell Upfront Subscriptions or Not?
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Mobile app portfolio management and developers' performance: An empirical study of the apple app store.
Inf. Manag., 2022

2021
Online Product Reviews: Is a Finer-Grained Rating Scheme Superior to a Coarser One?
MIS Q., December, 2021

Designing Payment Contracts for Healthcare Services to Induce Information Sharing: The Adoption and the Value of Health Information Exchanges (HIEs).
MIS Q., 2021

How do Virtual Badges Incentivize Voluntary Contributions to Online Communities?
Inf. Manag., 2021

2020
Bloatware and Jailbreaking: Strategic Impacts of Consumer-Initiated Modification of Technology Products.
Inf. Syst. Res., 2020

2019
Special Issue: Immersive Systems.
J. Manag. Inf. Syst., 2019

Two-sided Adverse Selection and Bilateral Reviews in the Sharing Economy.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Membership-Based Free Shipping Programs: A New Vehicle to Gain Competitive Advantage for Online Retailers?
Proceedings of the International Conference on Information Systems, 2018

2017
Single-Dimensional Versus Multi-Dimensional Product Ratings in Online Marketplaces for Experience Goods.
Proceedings of the International Conference on Information Systems, 2017

An Analysis of Membership-Based Free Shipping Programs of Online Marketplaces.
Proceedings of the International Conference on Information Systems, 2017

2016
Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook.
Inf. Syst. Res., 2016

2015
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources.
Inf. Manag., 2015

Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus.
Proceedings of the International Conference on Information Systems, 2015

Can Gamification Motivate Voluntary Contributions?: The Case of StackOverflow Q&A Community.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Privacy Controls and Disclosure Behavior.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Outsourcing Information Security: Contracting Issues and Security Implications.
Manag. Sci., 2014

What is IT in a Name? An Empirical Examination of Brand Imitation in Mobile App Market.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Investigating Developers' entry to Mobile App Platforms: a Network Externality View.
Proceedings of the 22st European Conference on Information Systems, 2014

2013
Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers.
Decis. Anal., 2013

Mobile App Portfolio Management and Developers' Performance: An Empirical Study of the Apple iOS Platform.
Proceedings of the International Conference on Information Systems, 2013

Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment.
Proceedings of the International Conference on Information Systems, 2013

2012
The Effect of Customers' Emotion on Service Recovery Strategy in IT Service Failures.
Proceedings of the International Conference on Information Systems, 2012

Quantifying the Impact of Badges on User Engagement in Online Q&A Communities.
Proceedings of the International Conference on Information Systems, 2012

Gamification: A New Paradigm for Online User Engagement.
Proceedings of the International Conference on Information Systems, 2012

2010
An Analysis of the Impact of Passenger Profiling for Transportation Security.
Oper. Res., 2010

2009
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
Inf. Syst. Res., 2009

The critical elements of the patch management process.
Commun. ACM, 2009

2008
Security Patch Management: Share the Burden or Share the Damage?
Manag. Sci., 2008

Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment.
J. Manag. Inf. Syst., 2008

Intrusion-Detection Policies for IT Security Breaches.
INFORMS J. Comput., 2008

2007
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge.
IEEE Trans. Software Eng., 2007

Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation.
IEEE Trans. Engineering Management, 2007

Economics of User Segmentation, Profiling, and Detection in Security.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

2006
Economics of Security Patch Management.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

2005
The Value of Intrusion Detection Systems in Information Technology Security Architecture.
Inf. Syst. Res., 2005

Emerging Issues in Responsible Vulnerability Disclosure.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

The critical elements of patch management.
Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, 2005

2004
Economics of IT Security Management.
Proceedings of the Economics of Information Security, 2004

The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers.
Int. J. Electron. Commer., 2004

Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches.
Decis. Anal., 2004

Economics of ITSecurity Management: Four Improvements to Current Security Practices.
Commun. Assoc. Inf. Syst., 2004

A model for evaluating IT security investments.
Commun. ACM, 2004

2003
Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches.
Proceedings of the International Conference on Information Systems, 2003

2002
Optimal Design of Information Technology Security Architecture.
Proceedings of the International Conference on Information Systems, 2002


  Loading...