Utkarsh Shrivastava

Orcid: 0000-0003-1063-1642

According to our database1, Utkarsh Shrivastava authored at least 21 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Quantifying the impacts of online fake news on the equity value of social media platforms - Evidence from Twitter.
Int. J. Inf. Manag., 2022

2021
Direct and Indirect Effects of ICT Infrastructure, Skills, and Use on Entrepreneurship: A Cross-Countr y Empirical Investigation.
J. Glob. Inf. Manag., 2021

Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability.
Ind. Manag. Data Syst., 2021

Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation.
Int. J. Medical Informatics, 2021

2019
The implications of patient data security considerations for EHR interoperability and downtime recovery.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Machine learning for psychiatric patient triaging: an investigation of cascading classifiers.
J. Am. Medical Informatics Assoc., 2018

The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective.
Gov. Inf. Q., 2018

Detection and Classification of Attacks on IoT Networks.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
A Cybersecurity Executive DBA?
J. Inf. Technol. Educ. Discuss. Cases, 2017

Grandon.com Got Hacked!
J. Inf. Technol. Educ. Discuss. Cases, 2017

2015
ICT as a corruption deterrent: a research note.
Proceedings of the Seventh International Conference on Information and Communication Technologies and Development, 2015

A data driven framework for early prediction of customer response to promotions.
Proceedings of the 21st Americas Conference on Information Systems, 2015

ICT as a Corruption Deterrent: A Theoretical Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Extreme value theory and neural network for catastrophic fall prediction: a study of year 2008-2009.
Int. J. Inf. Decis. Sci., 2014

2012
On a deadlock and performance analysis of ALBR and DAR algorithm on X-Torus topology by optimal utilization of Cross Links and minimal lookups.
J. Supercomput., 2012

2009
Improved-AntNet: ACO Routing Algorithm in Practice.
Proceedings of the UKSim'11, 2009

Adaptive Load Balanced Routing Algorithm for X-Torus Topology.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

Single Tape Deterministic Turing Machine of Routing Algorithms Designed for Torus Network.
Proceedings of the 2009 International Conference on Foundations of Computer Science, 2009

A Single Tape Deterministic Turing Machine of Adaptive Deterministic Routing Algorithm Designed for Torus Network.
Proceedings of the 2009 International Conference on Foundations of Computer Science, 2009

2008
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

Finite-State Modeling and Testing of Image Based Authentication System.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008


  Loading...