H. Raghav Rao
Orcid: 0000-0002-2307-231XAffiliations:
- University of Texas at San Antonio, College of Business, TX, USA
- State University of New York at Buffalo, Department of Management Science and Systems, NY, USA
- Purdue University, Krannert Graduate School of Management, West Lafayette, IN, USA (PhD)
According to our database1,
H. Raghav Rao
authored at least 311 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Use of Body Worn Camera (BWC) In Gray Scenarios: a Law Enforcement Officers' Perspective.
Eur. J. Inf. Syst., July, 2024
Preparedness and Response in the Century of Disasters: Overview of Information Systems Research Frontiers.
Inf. Syst. Res., 2024
Blockchain technology and privacy regulation: Reviewing frictions and synthesizing opportunities.
Int. J. Inf. Manag., 2024
Automating Information Categorization using LLMs in Crisis Mapping Platforms: An Examination of "Requests for Help" during the 2010 Haiti Earthquake.
Proceedings of the 45th International Conference on Information Systems, 2024
Exploring Discourses on Generative AI's Impacts on Job Market: Innovation-Induced Emotions and Information Sharing.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
Social media communication by emergency management authorities during a major Winter Storm.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
User Privacy, Surveillance and Public Health during COVID-19 - An Examination of Twitterverse.
Inf. Syst. Frontiers, October, 2023
Guest Editorial: Big data-driven theory building: Philosophies, guiding principles, and common traps.
Int. J. Inf. Manag., August, 2023
Machine and human roles for mitigation of misinformation harms during crises: An activity theory conceptualization and validation.
Int. J. Inf. Manag., June, 2023
Design of a Compliance Index for Privacy Policies: A Study of Mobile Wallet and Remittance Services.
IEEE Trans. Engineering Management, March, 2023
Assessing challenges to the mobile wallet usage in India: an interpretive structural modelling approach.
Inf. Technol. People, 2023
Great Divisions: The Evolution of Polarization During the Man-made Emergency of January 6, 2021.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Why would microentrepreneurs continue using mobile payments? An entrepreneurial perspective with evidence from India.
Proceedings of the 31st European Conference on Information Systems, 2023
I am Safe, so I will Help: Prosocial Impact of Marking Oneself Safe during Disasters.
Proceedings of the Australasian Conference on Information Systems, 2023
2022
Health-related Misinformation Harm during the COVID- 19 Pandemic: An Investigation of Non-comparative and Comparative Harm Perceptions.
AIS Trans. Hum. Comput. Interact., June, 2022
MIS Q., May, 2022
IEEE Trans. Dependable Secur. Comput., 2022
To Participate Or Not To Participate: An Investigation Of Strategic Participation In Standards.
CoRR, 2022
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach.
Comput. Secur., 2022
Do individual employees' security compliance intentions relate to workgroup security effectiveness?
Proceedings of the 43rd International Conference on Information Systems, 2022
Examining the Public Response to Vigilantism: A Multi-dimensional Model of Social Media Discourse.
Proceedings of the 43rd International Conference on Information Systems, 2022
2021
Influence in Social Media: An Investigation of Tweets Spanning the 2011 Egyptian Revolution.
MIS Q., December, 2021
Design of an Inclusive Financial Privacy Index (INF-PIE): A Financial Privacy and Digital Financial Inclusion Perspective.
ACM Trans. Manag. Inf. Syst., 2021
An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI).
J. Assoc. Inf. Syst., 2021
Call for Papers - Special Issue of <i>Information Systems Research</i> - Unleashing the Power of Information Technology for Strategic Management of Disasters.
Inf. Syst. Res., 2021
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises.
Inf. Syst. Frontiers, 2021
Inf. Syst. Frontiers, 2021
Misinformation Sharing on Twitter During Zika: An Investigation of the Effect of Threat and Distance.
IEEE Internet Comput., 2021
Artificial Intelligence in Tactical Human Resource Management: A Systematic Literature Review.
Int. J. Inf. Manag. Data Insights, 2021
The Egyptian protest movement in the twittersphere: An investigation of dual sentiment pathways of communication.
Int. J. Inf. Manag., 2021
A study of social networking site use from a three-pronged security and privacy threat assessment perspective.
Inf. Manag., 2021
Fake News Sharing: An Investigation of Threat and Coping Cues in the Context of the Zika Virus.
DTRAP, 2021
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
2020
IEEE Trans. Prof. Commun., 2020
Is Cybersecurity a Team Sport? A Multilevel Examination of Workgroup Information Security Effectiveness.
MIS Q., 2020
Key challenges to digital financial services in emerging economies: the Indian context.
Inf. Technol. People, 2020
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India.
Inf. Technol. Dev., 2020
Retweets of officials' alarming vs reassuring messages during the COVID-19 pandemic: Implications for crisis management.
Int. J. Inf. Manag., 2020
Effects of structural and trait competitiveness stimulated by points and leaderboards on user engagement and performance growth: A natural experiment with gamification in an informal learning environment.
Eur. J. Inf. Syst., 2020
An examination of the effect of recent phishing encounters on phishing susceptibility.
Decis. Support Syst., 2020
Comput. Secur., 2020
Assessing Challenges to Mobile Wallet Usage in India: An Interpretive Structural Modeling Approach.
Proceedings of the Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, 2020
An Exploratory Analysis of Alarming and Reassuring Messages in Twitterverse during the Coronavirus Epidemic.
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
IEEE Trans. Educ., 2019
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts.
MIS Q., 2019
J. Bank. Financial Technol., 2019
J. Assoc. Inf. Syst., 2019
Decis. Support Syst., 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
An Investigation of Misinformation Harms Related to Social Media During Humanitarian Crises.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Examining employee security violations: moral disengagement and its environmental influences.
Inf. Technol. People, 2018
Gov. Inf. Q., 2018
Use of online information and suitability of target in shoplifting: A routine activity based analysis.
Decis. Support Syst., 2018
A system for intergroup prejudice detection: The case of microblogging under terrorist attacks.
Decis. Support Syst., 2018
Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model.
AIS Trans. Replication Res., 2018
Proceedings of the 2018 ACM SIGMIS Conference on Computers and People Research, 2018
Developing a Framework using Interpretive Structural Modeling for the Challenges of Digital Financial Services in India.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
Factors facilitating Adoption of Mobile Payment Services over Credit/Debit Cards: An Investigation after the Demonetization Policy Shock in India.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
A Model for Assessing Label Quality in Crowdsourced Crisis Mapping Systems: A Case of 2010 Haiti Earthquake.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018
Proceedings of the Designing for a Digital and Globalized World, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
Inf. Syst. Res., 2017
Inf. Syst. Frontiers, 2017
Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests.
Inf. Syst. Frontiers, 2017
From social capital to continuous use of social networking sites: a conceptualisation.
Int. J. Inf. Technol. Manag., 2017
Cyber-rumor sharing under a homeland security threat in the context of government Internet surveillance: The case of South-North Korea conflict.
Gov. Inf. Q., 2017
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Web assurance seal services, trust and consumers' concerns: an investigation of e-commerce transaction intentions across two nations.
Eur. J. Inf. Syst., 2016
Decis. Support Syst., 2016
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults.
Decis. Support Syst., 2016
Proceedings of the Internetworked World, 2016
Management of Digital Evidence: Police Judgment about Ethical Use of Body Worn Camera.
Proceedings of the International Conference on Information Systems, 2016
A User-Centered Approach to Phishing Susceptibility: The Role of a Suspicious Personality in Protecting Against Phishing.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Response to the Office of Personnel Management Data Breaches: A Conceptual Exploration.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
Secur. Informatics, 2015
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications.
MIS Q., 2015
Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness.
MIS Q., 2015
Campus Emergency Notification Systems: An Examination of Factors Affecting Compliance with Alerts.
MIS Q., 2015
Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior.
Inf. Syst. Res., 2015
Research Note - Role of Social Media in Social Change: An Analysis of Collective Sense Making During the 2011 Egypt Revolution.
Inf. Syst. Res., 2015
Inf. Syst. Frontiers, 2015
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013.
Inf. Syst. Frontiers, 2015
The Dynamics of Pre- and Post-purchase Service and Consumer Evaluation of Online Retailers: A Comparative Analysis of Dissonance and Disconfirmation Models.
Decis. Sci., 2015
Sentiment Analysis of Twitter Users Over Time: The Case of the Boston Bombing Tragedy.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015
Investigating the Antecedents of Healthcare Workers' Perceptions of Organizational Resilience in Hospitals.
Proceedings of the International Conference on Information Systems, 2015
Understanding Switching Subscription Behavior in the Context of Campus Emergency Notification Services: An Extended Privacy Calculus Model.
Proceedings of the International Conference on Information Systems, 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
Inf. Syst. J., 2014
Factors influencing online health information search: An empirical analysis of a national cancer-related survey.
Decis. Support Syst., 2014
Proceedings of the International Conference on Information Systems, 2014
Proceedings of the International Conference on Information Systems, 2014
An Activity Theory Approach to Specification of Access Control Policies in Transitive Health Workflows.
Proceedings of the International Conference on Information Systems, 2014
2013
ACM Trans. Manag. Inf. Syst., 2013
Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises.
MIS Q., 2013
MIS Q., 2013
Competition In Mediation Services: Modeling The Role of Expertise, Satisfaction, and Switching Costs.
J. Organ. Comput. Electron. Commer., 2013
A case study of private-public collaboration for humanitarian free and open source disaster management software deployment.
Decis. Support Syst., 2013
Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing.
Decis. Support Syst., 2013
Decis. Support Syst., 2013
Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users.
Comput. Hum. Behav., 2013
Role of Trust in Privacy Assurance and Perceived Disease Severity on Personal Health Information Disclosure.
Proceedings of the International Conference on Information Systems, 2013
An Exploration of Collaboration over Time in Collective Crisis Response during the Haiti 2010 Earthquake.
Proceedings of the International Conference on Information Systems, 2013
Proceedings of the 19th Americas Conference on Information Systems, 2013
2012
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email.
IEEE Trans. Prof. Commun., 2012
A Quality-Distinction Model of IT Capabilities: Conceptualization and Two-Stage Empirical Validation Using CMMi Processes.
IEEE Trans. Engineering Management, 2012
An activity theory analysis of boundary objects in cross-border information systems development for disaster management.
Secur. Informatics, 2012
J. Manag. Inf. Syst., 2012
Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain.
Inf. Syst. J., 2012
Exploring the grand challenges for next generation e-Business: selected papers from the workshop on e-Business 2009.
Inf. Syst. E Bus. Manag., 2012
An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security.
Decis. Support Syst., 2012
The effect of pre- and post-service performance on consumer evaluation of online retailers.
Decis. Support Syst., 2012
Assessing roles of people, technology and structure in emergency management systems: a public sector perspective.
Behav. Inf. Technol., 2012
Proceedings of the International Conference on Information Systems, 2012
A Sociotechnical View of Information Diffusion and Social Changes: From Reprint to Retweet.
Proceedings of the International Conference on Information Systems, 2012
Collective Sense-Making through the Twitter Service during the 2011 Egypt Revolution.
Proceedings of the International Conference on Information Systems, 2012
Emergency Response System Design: An Examination of Emergency Communication Messages.
Proceedings of the Design Science Research in Information Systems. Advances in Theory and Practice, 2012
Design Principles for Emergency Collaborative Systems: A Situation Awareness Study of Buffalo Plane Crash.
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Proceedings of the Encyclopedia of Knowledge Management, Second Edition, 2011
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter.
Inf. Syst. Frontiers, 2011
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model.
Decis. Support Syst., 2011
Group value and intention to use - A study of multi-agency disaster management information systems for public safety.
Decis. Support Syst., 2011
Decis. Support Syst., 2011
Firms' information security investment decisions: Stock market evidence of investors' behavior.
Decis. Support Syst., 2011
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011
Does 'Meaningful Use' of EMR Improve the Quality and Efficiency of Health Care? An Exploratory Analysis of Ambulatory EMR Usage.
Proceedings of the International Conference on Information Systems, 2011
Choice of Information: A Study of Twitter News Sharing during the 2009 Israel-Gaza Conflict.
Proceedings of the International Conference on Information Systems, 2011
Proceedings of the International Conference on Information Systems, 2011
EHR Adoption and Patient Safety: The Role of EHR and Health Care Provider Characteristics.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
2010
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures.
ACM Trans. Manag. Inf. Syst., 2010
Publicly Available Computers: An Investigation of Transactional Website Use through Computers in Public Locations.
J. Electron. Commer. Organ., 2010
Int. J. Electron. Commer., 2010
Security protection design for deception and real system regimes: A model and analysis.
Eur. J. Oper. Res., 2010
Twitter as a Rapid Response News Service: An Exploration in the Context of the 2008 China Earthquake.
Electron. J. Inf. Syst. Dev. Ctries., 2010
An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita.
Commun. Assoc. Inf. Syst., 2010
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010
An Exploration of Social Media in Extreme Events: Rumor Theory and Twitter during the Haiti Earthquake 2010.
Proceedings of the International Conference on Information Systems, 2010
Proceedings of the International Conference on Information Systems, 2010
Proceedings of the Ethics and Policy of Biometrics, 2010
Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study.
MIS Q., 2009
Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration.
Inf. Syst. Res., 2009
Protection motivation and deterrence: a framework for security policy compliance in organisations.
Eur. J. Inf. Syst., 2009
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use.
Decis. Support Syst., 2009
Task complexity and different decision criteria for online service acceptance: A comparison of two e-government compliance service domains.
Decis. Support Syst., 2009
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness.
Decis. Support Syst., 2009
Journal Self-Citation VIII: An IS Researcher in the Dual Worlds of Author-Reader and Author-Institution.
Commun. Assoc. Inf. Syst., 2009
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009
On the Two Factors Affecting Information Systems Success in the Extreme Event Context.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009
Proceedings of the 2009 International Conference on Information and Communication Technologies and Development, 2009
An exploration of unintended online private information disclosure in educational institutions across four countries.
Proceedings of the 2009 eCrime Researchers Summit, 2009
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009
A Simulation Based Study in a Hospital Emergency Department: Capacity and Workflow Issues.
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
Security analysis of Internet technology components enabling globally distributed workplaces - a framework.
ACM Trans. Internet Techn., 2008
Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model.
J. Assoc. Inf. Syst., 2008
Inf. Syst. Res., 2008
Market reaction to patent infringement litigations in the information technology industry.
Inf. Syst. Frontiers, 2008
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents.
Decis. Support Syst., 2008
Data Model Development for Fire Related Extreme Events - An Activity Theory and Semiotics Approach.
Proceedings of the International Conference on Information Systems, 2008
Complexity of compliance tasks and user acceptance of G2C online compliance services.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
An Exploratory Study of Bloggers' Information Sharing Behavior: The Role of Online Privacy Concerns.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
2007
Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements.
Inf. Syst. Frontiers, 2007
An examination of private intermediaries' roles in software vulnerabilities disclosure.
Inf. Syst. Frontiers, 2007
Inf. Syst. E Bus. Manag., 2007
Decis. Support Syst., 2007
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment.
Decis. Support Syst., 2007
Efficiency of critical incident management systems: Instrument development and validation.
Decis. Support Syst., 2007
An investigation of factors that influence the duration of IT outsourcing relationships.
Decis. Support Syst., 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007
Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007
The Effect of Third Party Seals on Consumers' Repurchase Process in Online Shopping: A Multi-Group Analysis.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use.
J. Assoc. Inf. Syst., 2006
Int. J. Electron. Gov. Res., 2006
Inf. Manag., 2006
Impact of IT Service Provider Process Capabilities on Service Provider Performance: An Empirical Study.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Publicly Accessible Computers: An Exploratory Study of the Determinants of Transactional Website Use in Public Locations.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
IEEE Technol. Soc. Mag., 2005
Knowledge Acquisition via Three Learning Processes in Enterprise Information Portals: Learning-by-Investment, Learning-by-Doing, and Learning-from-Others.
MIS Q., 2005
Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis.
Decis. Support Syst., 2005
A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia/practitioner perspectives.
Decis. Support Syst., 2005
Matching intermediaries for information goods in the presence of direct search: an examination of switching costs and obsolescence of information.
Decis. Support Syst., 2005
Proceedings of the Intelligence and Security Informatics, 2005
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field .
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the International Conference on Information Systems, 2005
Exploring the Moderating Effect of Trust and Privacy in the Adoption of Application Service Providers in the Healthcare Industry.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
An Examination of Trust Effects and Pre-Existing Relational Risks in eGovernment Services.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
An Investigation of Risk Management Issues in the Context of Emergency Response Systems.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
J. Organ. End User Comput., 2004
Determinants of Sourcing During Technology Growth and Maturity: An Empirical Study of e-Commerce Sourcing.
J. Manag. Inf. Syst., 2004
J. Inf. Syst. Educ., 2004
Toward an Integration of Agent- and Activity-Centric Approaches in Organizational Process Modeling: Incorporating Incentive Mechanisms.
Inf. Syst. Res., 2004
Electron. Mark., 2004
Proceedings of the Intelligence and Security Informatics, 2004
Management of Information Technology Outsourcing Relationships: The Role of Service Level Agreements.
Proceedings of the International Conference on Information Systems, 2004
A Solution Architecture for Financial Institutions to Handle Illegal Activities: A Neural Networks Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
The Effects of Power and Partnership on Application Service Provider Commitment, Cooperation, and Compliance.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 10th Americas Conference on Information Systems, 2004
Proceedings of the 10th Americas Conference on Information Systems, 2004
Managing IT Outsourcing Relationships Using Service Level Agreements (SLAs): A Multi-Dimensional Fit Approach.
Proceedings of the 10th Americas Conference on Information Systems, 2004
Proceedings of the 6th International Conference on Electronic Commerce, 2004
2003
Relative Performance of Incentive Mechanisms: Computational Modeling and Simulation of Delegated Investment Decisions.
Manag. Sci., 2003
J. Organ. Comput. Electron. Commer., 2003
Foreword: Featured Sections-Business Applications of Uncertain Reasoning and Informatics Support for Medical Research.
Inf. Syst. Frontiers, 2003
Proceedings of the International Conference on Information Systems, 2003
Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security.
Proceedings of the IEEE Systems, 2003
Proceedings of the 9th Americas Conference on Information Systems, 2003
Proceedings of the 9th Americas Conference on Information Systems, 2003
Proceedings of the 9th Americas Conference on Information Systems, 2003
Managing IT Sourcing Relationships Using Service Level Agreements: A Relational Exchange Theory Approach.
Proceedings of the 9th Americas Conference on Information Systems, 2003
A study of the effect of consumer trust on consumer expectations and satisfaction: the Korean experience.
Proceedings of the 5th International Conference on Electronic Commerce, 2003
2002
Proceedings of the Encyclopedia of Information Systems, 2002
Foreword Next Generation Enterprises-Virtual Organizations and Pervasive/Mobile Technologies.
Inf. Syst. Frontiers, 2002
2001
A comparative analysis of information acquisition mechanisms for discrete resource allocation.
IEEE Trans. Syst. Man Cybern. Part A, 2001
Dynamic profiling of consumers for customized offerings over the Internet: a model and analysis.
Decis. Support Syst., 2001
Introduction to the special issue: decision support issues in customer relationship management and interactive marketing for e-commerce.
Decis. Support Syst., 2001
2000
An empirical investigation into the validity of transitivity and non-satiety assumptions in partial order structures: a note.
IEEE Trans. Syst. Man Cybern. Part A, 2000
An examination of perceived value of secondary knowledge sources for IT projects.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000
Effects of consumer lifestyles on purchasing behavior on the Internet: a conceptual framework and empirical validation.
Proceedings of the Twenty-First International Conference on Information Systems, 2000
A content-analytic longitudinal study of the drivers for information technology and systems outsourcing.
Proceedings of the Twenty-First International Conference on Information Systems, 2000
Internet Involvement: Instrument Development, Measurement and Implications for Electronic Commerce.
Proceedings of the Handbook on Electronic Commerce, 2000
1999
1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
1997
Inf. Syst. Res., 1997
Data Base, 1997
Proceedings of the Eighteenth International Conference on Information Systems, 1997
Proceedings of the Eighteenth International Conference on Information Systems, 1997
1996
Commun. ACM, 1996
An Exploratory Analysis of Information Content of Corporate Web Pages as Advertising Media.
Proceedings of the Seventeenth International Conference on Information Systems, 1996
Market Reactions to Intellectual Property Infringement Litigations in the Information Technology Industry.
Proceedings of the Seventeenth International Conference on Information Systems, 1996
1995
The effect of team composition on decision scheme, information search, and perceived complexity.
J. Organ. Comput., 1995
J. Manag. Inf. Syst., 1995
The impact of EDI implementation commitment and implementation success on competitive advantage and firm performance.
Inf. Syst. J., 1995
1994
IEEE Trans. Syst. Man Cybern. Syst., 1994
Decis. Support Syst., 1994
Synthesizing Expert Systems and Operations Research Techniques: system classification and review.
Australas. J. Inf. Syst., 1994
Proceedings of the Fifteenth International Conference on Information Systems, 1994
1993
A choice set-sensitive analysis of preference information acquisition about discrete resources.
IEEE Trans. Syst. Man Cybern., 1993
J. Intell. Manuf., 1993
1992
IEEE Expert, 1992
Appl. Artif. Intell., 1992
Proceedings of the Thirteenth International Conference on Information Systems, 1992
1991
Inf. Manag., 1991
Discret. Appl. Math., 1991
An information and preference theory approach to a discrete resource allocation problem.
Autom., 1991
Proceedings of the Conference on Organizational Computing Systems, 1991
1990