Srinivasan Raghunathan

Orcid: 0000-0002-2782-3520

According to our database1, Srinivasan Raghunathan authored at least 75 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Contests for Predictive Algorithms: Ensembling, Interdependency, and Optimal Rewards Design.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
The Business of Healthcare: The Role of Physician Integration in Bundled Payments.
Manuf. Serv. Oper. Manag., May, 2023

Competitive location-based and trajectory-based mobile targeting.
Decis. Sci., April, 2023

Two-Sided Sharing Platforms: Sell Upfront Subscriptions or Not?
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Two-Sided Platform Competition in a Sharing Economy.
Manag. Sci., December, 2022

2021
Online Product Reviews: Is a Finer-Grained Rating Scheme Superior to a Coarser One?
MIS Q., December, 2021

Is More Better? Divide Between Retailer's and Manufacturers' Preferences for Reviews and Review Monetization.
MIS Q., 2021

Designing Payment Contracts for Healthcare Services to Induce Information Sharing: The Adoption and the Value of Health Information Exchanges (HIEs).
MIS Q., 2021

Mobile Consumer Scanning Technology: A Replacement for Interorganizational Information Systems for Demand Information Learning in Supply Chains?
Inf. Syst. Res., 2021

2020
Informative Role of Recommender Systems in Electronic Marketplaces: A Boon or a Bane for Competing Sellers.
MIS Q., 2020

An empirical examination of voluntary profiling: Privacy and quid pro quo.
Decis. Support Syst., 2020

2019
Digitization of Music: Consumer Adoption Amidst Piracy, Unbundling, and Rebundling.
MIS Q., 2019

When Algorithmic Predictions Use Human-Generated Data: A Bias-Aware Classification Algorithm for Breast Cancer Diagnosis.
Inf. Syst. Res., 2019

Two-sided Adverse Selection and Bilateral Reviews in the Sharing Economy.
Proceedings of the 40th International Conference on Information Systems, 2019

Repairing the Digital Divide Can Increase the Service Divide: The Effects of Patient Portals on Kidney Allocation.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
User-Generated Content and Competing Firms' Product Design.
Manag. Sci., 2018

Student Attitudes toward Information Systems Graduate Program Design and Delivery.
J. Inf. Syst. Educ., 2018

Recommender System Rethink: Implications for an Electronic Marketplace with Competing Manufacturers.
Inf. Syst. Res., 2018

Membership-Based Free Shipping Programs: A New Vehicle to Gain Competitive Advantage for Online Retailers?
Proceedings of the International Conference on Information Systems, 2018

2017
Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information.
MIS Q., 2017

Is Voluntary Profiling Welfare Enhancing?
MIS Q., 2017

Analysis of the Bullwhip Effect in a Multiproduct Setting with Interdependent Demands.
Oper. Res., 2017

Single-Dimensional Versus Multi-Dimensional Product Ratings in Online Marketplaces for Experience Goods.
Proceedings of the International Conference on Information Systems, 2017

An Analysis of Membership-Based Free Shipping Programs of Online Marketplaces.
Proceedings of the International Conference on Information Systems, 2017

2016
Competitive Bundling in Information Markets: A Seller-Side Analysis.
MIS Q., 2016

Mandatory Standards and Organizational Information Security.
Inf. Syst. Res., 2016

Competitive Mobile Marketing and its Impact on the Mobile Eco System.
Proceedings of the 24th European Conference on Information Systems, 2016

2015
Value appropriation between the platform provider and app developers in mobile platform mediated networks.
J. Inf. Technol., 2015

Economics of Cloud Security.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Distribution and Equitable Sharing of Value From Information Sharing Within Serial Supply Chains.
IEEE Trans. Engineering Management, 2014

Outsourcing Information Security: Contracting Issues and Security Implications.
Manag. Sci., 2014

Shifting Demand: Online Music Piracy, Physical Music Sales, and Digital Music Sales.
J. Organ. Comput. Electron. Commer., 2014

Online Product Reviews: Implications for Retailers and Competing Manufacturers.
Inf. Syst. Res., 2014

Pricing and disseminating customer data with privacy awareness.
Decis. Support Syst., 2014

The value of information sharing in a multi-product, multi-level supply chain: Impact of product substitution, demand correlation, and partial information sharing.
Decis. Support Syst., 2014

2013
Contracting Information Security in the Presence of Double Moral Hazard.
Inf. Syst. Res., 2013

Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers.
Decis. Anal., 2013

2012
Platform or Wholesale: Different Effects on Retailers of Online Product Reviews.
Proceedings of the International Conference on Information Systems, 2012

2011
Security Standardization in the Presence of Unverifiable Control.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

2010
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest.
Inf. Technol. Manag., 2010

An Analysis of the Impact of Passenger Profiling for Transportation Security.
Oper. Res., 2010

2009
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
Inf. Syst. Res., 2009

2008
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment.
J. Manag. Inf. Syst., 2008

Intrusion-Detection Policies for IT Security Breaches.
INFORMS J. Comput., 2008

2007
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge.
IEEE Trans. Software Eng., 2007

Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation.
IEEE Trans. Engineering Management, 2007

Strategic IT Investments: The Impact of Switching Cost and Declining IT Cost.
Manag. Sci., 2007

The impacts of the full returns policy on a supply chain with information asymmetry.
Eur. J. Oper. Res., 2007

Economics of User Segmentation, Profiling, and Detection in Security.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

2006
Information Technology Investment Strategies Under Declining Technology Cost.
J. Manag. Inf. Syst., 2006

2005
Open source versus closed source: software quality in monopoly and competitive markets.
IEEE Trans. Syst. Man Cybern. Part A, 2005

The Value of Intrusion Detection Systems in Information Technology Security Architecture.
Inf. Syst. Res., 2005

Cyber Insurance and IT Security Investment: Impact of Interdependence Risk.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

Emerging Issues in Responsible Vulnerability Disclosure.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Retailer- vs. Vendor-Managed Inventory and Brand Competition.
Manag. Sci., 2004

The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers.
Int. J. Electron. Commer., 2004

Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches.
Decis. Anal., 2004

Economics of ITSecurity Management: Four Improvements to Current Security Practices.
Commun. Assoc. Inf. Syst., 2004

A model for evaluating IT security investments.
Commun. ACM, 2004

2003
Impact of demand correlation on the value of and incentives for information sharing in a supply chain.
Eur. J. Oper. Res., 2003

Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches.
Proceedings of the International Conference on Information Systems, 2003

2002
Quality and Profits Under Open Source Versus Closed Source.
Proceedings of the International Conference on Information Systems, 2002

Strategic IT Investments: Impact of Switching Cost and Declining Technology Cost.
Proceedings of the International Conference on Information Systems, 2002

Optimal Design of Information Technology Security Architecture.
Proceedings of the International Conference on Information Systems, 2002

2001
Information Sharing in a Supply Chain: A Note on its Value when Demand Is Nonstationary.
Manag. Sci., 2001

Beyond EDI: Impact of Continuous Replenishment Program (CRP) Between a Manufacturer and Its Retailers.
Inf. Syst. Res., 2001

2000
Software Editions: An Application of Segmentation Theory to the Packaged Software Market.
J. Manag. Inf. Syst., 2000

1999
Impact of information quality and decision-maker quality on decision quality: a theoretical model and simulation analysis.
Decis. Support Syst., 1999

1997
Qualitative reasoning about approximations in quantitative modeling.
IEEE Trans. Syst. Man Cybern. Part A, 1997

1995
On using belief maintenance systems to assist mathematical modeling.
IEEE Trans. Syst. Man Cybern., 1995

1994
An Application of Qualitative Reasoning to Derive Behavior from Structure of Quantitative Models.
J. Manag. Inf. Syst., 1994

1993
KNAMS: a knowledge acquisition tool for modeling systems.
IEEE Trans. Syst. Man Cybern., 1993

MODFORM: A Knowledge-Based Tool to Support the Modeling Process.
Inf. Syst. Res., 1993

1992
A Planning Aid: An Intelligent Modeling System for Planning Problems Based on Constraint Satisfaction.
IEEE Trans. Knowl. Data Eng., 1992


  Loading...