Tridib Bandyopadhyay

According to our database1, Tridib Bandyopadhyay authored at least 18 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A model to analyze the challenge of using cyber insurance.
Inf. Syst. Frontiers, 2019

2018
Mobile IT in health - the case of short messaging service in an HIV awareness program.
Inf. Technol. Dev., 2018

Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism.
Decis. Anal., 2018

2017
Influence of Information Overload on IT Security Behavior: A Theoretical Framework.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Mobile healthcare services adoption.
Int. J. Netw. Virtual Organisations, 2016

2015
Electronic Payment Adoption in the Banking Sector of Low-Income Countries.
Int. J. Inf. Syst. Serv. Sect., 2015

IT Outsourcing Risk Management Practices in Higher Educational Institutes in Ethiopia - A Qualitative Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Dynamic competition in IT security: A differential games approach.
Inf. Syst. Frontiers, 2014

Acceptance of Mobile Health Technology in the Value Chain [Research-in-Progress].
Proceedings of the 20th Americas Conference on Information Systems, 2014

2011
Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach.
Int. J. Cyber Warf. Terror., 2011

Towards a Managerial Decision Framework for Utilization of Cyber Insurance Instruments in IT security.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

IT Security in Supply Chain: Does a Leader-Follower Structure matter?
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest.
Inf. Technol. Manag., 2010

2009
ICT Integration Efforts in Higher Education in Developing Economies: The Case of Addis Ababa University, Ethiopia.
Int. J. Inf. Commun. Technol. Educ., 2009

Why IT managers don't go for cyber-insurance products.
Commun. ACM, 2009

2008
The Impact of Operating System Obsolescence on the Life Cycle of Distributed Teams.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Defending Cyber Terrorism - A Game Theoretic Modeling Approach.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2005
Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005


  Loading...