Indranil Bose

According to our database1, Indranil Bose authored at least 96 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Adoption of Identity Theft Countermeasures and its Short- and Long-Term Impact on Firm Value.
MIS Quarterly, 2019

Systems theoretic process analysis of information security: the case of aadhaar.
J. Org. Computing and E. Commerce, 2019

Conflict and Development: A Headquarter Intervention View of IT Subsidiary Evolution.
CAIS, 2019

Application of Image Analytics for Disaster Response in Smart Cities.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Time-contingent Impact of Inconsistent Action-based Information Cues on Social Commerce Purchases: An Experimental Investigation.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Detection of financial rumors using big data analytics: the case of the Bombay Stock Exchange.
J. Org. Computing and E. Commerce, 2018

My words for your pizza: An analysis of persuasive narratives in online crowdfunding.
Information & Management, 2018

Business intelligence for performance measurement: A case based analysis.
Decision Support Systems, 2018

Rabbit or Tortoise? Rethinking Customer Acquisition at Dravya Bank.
CAIS, 2018

Transforming temporary organizations to permanence: Examining the role of information systems.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Low Profile Open MEMS and ASIC Packages manufactured by Flexible Hybrid Integration in a Roll-to-Roll compatible process.
Proceedings of the 48th European Solid-State Device Research Conference, 2018

2017
Follow the herd or be myself? An analysis of consistency in behavior of reviewers and helpfulness of their reviews.
Decision Support Systems, 2017

User segmentation for retention management in online social games.
Decision Support Systems, 2017

Whose online reviews to trust? Understanding reviewer trustworthiness and its impact on business.
Decision Support Systems, 2017

Persevere or Exit: What is the Right Strategy?
CAIS, 2017

Patronizing Technology: An Emergent Technophilic Behavior.
Proceedings of the International Conference on Information Systems, 2017

New Venture Ambidexterity in Emerging Markets: the Case of Crowdfunding in India.
Proceedings of the 25th European Conference on Information Systems, 2017

2016
Innovation in IT firms: An investigation of intramural and extramural R&D activities and their impact.
Information & Management, 2016

Innovation research in information systems: A commentary on contemporary trends and issues.
Information & Management, 2016

A knowledge based scheme for risk assessment in loan processing by banks.
Decision Support Systems, 2016

Predicting Online Reviewer Popularity: A Comparative Analysis of Machine Learning Techniques.
Proceedings of the Internetworked World, 2016

2015
Detecting the migration of mobile service customers using fuzzy clustering.
Information & Management, 2015

Prediction of financial distress: An empirical study of listed Chinese companies using data mining.
European Journal of Operational Research, 2015

Does director interlock impact corporate R&D investment?
Decision Support Systems, 2015

An IT Risk-Return Model to Study IT Governance of Indian Firms.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

Privacy Calculus Theory and Its Applicability for Emerging Technologies.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

Empirical Investigation of Partnership and Mediating Effect of Mode of Partnership on Innovation Outcome of IT Firms.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

Framework for Using New Age Technology to Increase Effectiveness of Project Communication for Outsourced IT Projects Executed from Offshore.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

2014
Air-stable, high current density, solution-processable, amorphous organic rectifying diodes (ORDs) for low-cost fabrication of flexible passive low frequency RFID tags.
Microelectronics Reliability, 2014

A Case-Based Analysis of Active Data Warehousing.
IT Professional, 2014

Do phishing alerts impact global corporations? A firm value analysis.
Decision Support Systems, 2014

Fraud Detection in Financial Statements Using Evolutionary Computation Based Rule Miners.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2014

Adoption of RFID and its Long Term Impact on Firm Value.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
Core versus peripheral information technology employees and their impact on firm performance.
Decision Support Systems, 2013

The impact of adoption of identity theft countermeasures on firm value.
Decision Support Systems, 2013

2012
Teaching Case: Implementation of an Interorganizational System: The Case of Medical Insurance E-Clearance.
JISE, 2012

The Many Faces of Green IT.
IJBDCN, 2012

Soft computing based imputation and hybrid data and text mining: The case of predicting the severity of phishing alerts.
Expert Syst. Appl., 2012

Manipulation of online reviews: An analysis of ratings, readability, and sentiments.
Decision Support Systems, 2012

Preprocessing unbalanced data using support vector machine.
Decision Support Systems, 2012

Do green supply chain management initiatives impact stock prices of firms?
Decision Support Systems, 2012

Sanchari: Moving Up the Value Chain Through Telecommunication Services.
CAIS, 2012

2011
The Impact of RFID Adoption on the Market Value of Firms: An Empirical Analysis.
J. Org. Computing and E. Commerce, 2011

The Green Potential of RFID Projects: A Case-Based Analysis.
IT Professional, 2011

Detection of financial statement fraud and feature selection using data mining techniques.
Decision Support Systems, 2011

Manipulation in digital word-of-mouth: A reality check for book reviews.
Decision Support Systems, 2011

Assessing the severity of phishing attacks: A hybrid data mining approach.
Decision Support Systems, 2011

Enter the Dragon: Khillwar's Foray into the Mobile Gaming Market of China.
CAIS, 2011

2010
Does sampling influence customers in online retailing of digital music?
Inf. Syst. E-Business Management, 2010

Failure prediction of dotcom companies using neural network-genetic programming hybrids.
Inf. Sci., 2010

Exploring business opportunities from mobile services data of customers: An inter-cluster analysis approach.
Electronic Commerce Research and Applications, 2010

2009
Financial Time Series Data Mining.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn.
J. Org. Computing and E. Commerce, 2009

Quantitative Models in Support of Direct Marketing in Electronic Channels.
J. Org. Computing and E. Commerce, 2009

A method for extension of generative topographic mapping for fuzzy clustering.
JASIST, 2009

Failure prediction of dotcom companies using hybrid intelligent techniques.
Expert Syst. Appl., 2009

An optimization based approach for deployment of roadway incident response vehicles with reliability constraints.
European Journal of Operational Research, 2009

Quantitative models for direct marketing: A review from systems perspective.
European Journal of Operational Research, 2009

Bandwidth packing with priority classes.
European Journal of Operational Research, 2009

Managing RFID projects in organizations.
EJIS, 2009

A framework for context sensitive services: A knowledge discovery based approach.
Decision Support Systems, 2009

Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks?
Commun. ACM, 2009

Business Data Warehouse.
Proceedings of the Selected Readings on Database Technologies and Applications., 2009

2008
Facing the Challenges of RFID Data Management.
IJISSCM, 2008

ERP and SCM systems integration: The case of a valve manufacturer in China.
Information & Management, 2008

Erratum to "On returns policies with exogenous price" [European Journal of Operational Research 178 (3) (2007) 782-788].
European Journal of Operational Research, 2008

Assessing anti-phishing preparedness: A study of online banks in Hong Kong.
Decision Support Systems, 2008

Role of Pilot Study in Assessing Viability of New Technology Projects: The Case of RFID in Parking Operations.
CAIS, 2008

Editorial: RFID in Retailing and Customer Relationship Management.
CAIS, 2008

Lessons Learned from Distributed Agile Software Projects: A Case-Based Analysis.
CAIS, 2008

Indirect Financial Loss of Phishing to Global Market.
Proceedings of the International Conference on Information Systems, 2008

Assessment of Phishing Announcements on Market Value of Firms.
Proceedings of the 2008 International Conference on Information Technology, 2008

2007
On returns policies with exogenous price.
European Journal of Operational Research, 2007

Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities.
CAIS, 2007

A Framework for Assessment of Anti-phishing Preparedness.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

2006
Deciding the financial health of dot-coms using rough sets.
Information & Management, 2006

Predicting the survival or failure of click-and-mortar corporations: A knowledge discovery approach.
European Journal of Operational Research, 2006

Fourth Generation Wireless Systems: Requirements and Challenges for the Next Frontier.
CAIS, 2006

Applying Kohonen Vector Quantization Networks for Profiling Customers of Mobile Telecommunication Services.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Phishing is here: Are we ready.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

Exploring Business Opportunities from Mobile Service Data of Customers Using Inter-cluster Analysis.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Multi-period design of survivable wireless access networks under capacity constraints.
Decision Support Systems, 2005

Auto-ID: managing anything, anywhere, anytime in the supply chain.
Commun. ACM, 2005

Using Support Vector Machines to Evaluate Financial Fate of Dotcoms.
Proceedings of the Pacific Asia Conference on Information Systems, 2005

Predicting the Survival or Failure of Click-and-Mortar Corporations.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Databases for Mobile Applications.
Proceedings of the Encyclopedia of Database Technologies and Applications, 2005

2004
Demand variability and incentives in inventory-based contracts.
Oper. Res. Lett., 2004

Performance models of a proxy cache server: The impact of multimedia traffic.
European Journal of Operational Research, 2004

Design of a web site for guaranteed delay and blocking probability bounds.
Decision Support Systems, 2004

2003
Asynchronous transfer mode networks with parallel links and multiple service classes.
European Journal of Operational Research, 2003

Tradeoff decisions in the design of a backbone computer network using visualization.
Decision Support Systems, 2003

2002
Average waiting time of customers in a priority M/D/k queue with finite buffers.
Computers & OR, 2002

2001
Business data mining - a machine learning perspective.
Information & Management, 2001

2000
Performance models of a firm's proxy cache server.
Decision Support Systems, 2000

1999
Queuing Model for Performance Analysis of a Web Server.
Proceedings of WebNet 99, 1999

1998
Average waiting time of customers in an M/D/k queue with nonpreemptive priorities.
Computers & OR, 1998


  Loading...