Hasan Cavusoglu
Orcid: 0000-0001-9734-785X
According to our database1,
Hasan Cavusoglu
authored at least 50 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
How "What you think you know about cybersecurity" can help users make more secure decisions.
Inf. Manag., November, 2023
Inf. Syst. Manag., April, 2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
The Dark Side of Technological Modularity: Opportunistic Information Hiding During Interorganizational System Adoption.
Inf. Syst. Res., 2022
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 28th Americas Conference on Information Systems, 2022
2021
2020
Bloatware and Jailbreaking: Strategic Impacts of Consumer-Initiated Modification of Technology Products.
Inf. Syst. Res., 2020
An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps.
Inf. Syst. Res., 2020
Role of Feedback in Improving Novice Users' Security Performance Using Construal Level and Valance Framing.
Proceedings of the 41st International Conference on Information Systems, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Growing Together: Modeling Human Language Learning With n-Best Multi-Checkpoint Machine Translation.
Proceedings of the Fourth Workshop on Neural Generation and Translation, 2020
2019
Transparency in Advice-Giving Systems: A Framework and a Research Model for Transparency Provision.
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019
Do Users Always Want to Know More? Investigating the Relationship between System Transparency and Users' Trust in Advice-Giving Systems.
Proceedings of the 27th European Conference on Information Systems, 2019
2018
Escalation of commitment as an antecedent to noncompliance with information security policy.
Inf. Comput. Secur., 2018
2017
Proceedings of the International Conference on Information Systems, 2017
Supporting Online Consumers by Identifying Consistency Distance Among Advice Sources.
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the International Conference on Information Systems, 2017
2016
Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook.
Inf. Syst. Res., 2016
Early mover advantage in e-commerce platforms with low entry barriers: The role of customer relationship management capabilities.
Inf. Manag., 2016
2015
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources.
Inf. Manag., 2015
Small and medium sized manufacturer performance on third party B2B electronic marketplaces: The role of enabling and IT capabilities.
Decis. Support Syst., 2015
Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus.
Proceedings of the International Conference on Information Systems, 2015
Enhancing Strategic IT Alignment through Common Language: Using the Terminology of the Resource-based View or the Capability-based View?
Proceedings of the International Conference on Information Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing.
Proceedings of the International Conference on Information Systems, 2014
Assessing Sunk Cost Effect on Employees' Intentions to Violate Information Security Policies in Organizations.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Early Mover Advantage in an Industry with Low Entry Barrier: Evidence from Etailers on Third Party ECommerce Platforms.
Proceedings of the International Conference on Information Systems, 2013
Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment.
Proceedings of the International Conference on Information Systems, 2013
Assessing Self-Justification as an Antecedent of Noncompliance with Information Security Policies.
Proceedings of the Australasian Conference on Information Systems, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2012
ACM Trans. Manag. Inf. Syst., 2012
Proceedings of the International Conference on Information Systems, 2012
2010
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness.
MIS Q., 2010
J. Manag. Inf. Syst., 2010
Understanding Emergence and Outcomes of Information Privacy Concerns: a Case of Facebook.
Proceedings of the International Conference on Information Systems, 2010
Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Empirical Investigation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
The strategic knowledge-based dependency diagrams: a tool for analyzing strategic knowledge dependencies for the purposes of understanding and communicating.
Inf. Technol. Manag., 2009
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
Inf. Syst. Res., 2009
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance.
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
2007
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge.
IEEE Trans. Software Eng., 2007
Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation.
IEEE Trans. Engineering Management, 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
2004
Commun. Assoc. Inf. Syst., 2004