Ivan P. L. Png

Orcid: 0000-0001-7463-5517

According to our database1, Ivan P. L. Png authored at least 19 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automation Enables Specialization: Field Evidence.
Manag. Sci., 2024

2018
Sunk Cost Fallacy in Driving the World's Costliest Cars.
Manag. Sci., 2018

2015
Privacy and Marketing Externalities: Evidence from Do Not Call.
Manag. Sci., 2015

Research Note - Migration of Service to the Internet: Evidence from a Federal Natural Experiment.
Inf. Syst. Res., 2015

2011
Newspaper Reports and Consumer Choice: Evidence from the Do Not Call Registry.
Manag. Sci., 2011

2010
Buyer Uncertainty and Two-Part Pricing: Theory and Applications.
Manag. Sci., 2010

On the reliability of software piracy statistics.
Electron. Commer. Res. Appl., 2010

2009
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers.
J. Manag. Inf. Syst., 2009

Information Security: User Precautions, Attacker Efforts, and Enforcement.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Consumer Privacy and Marketing Avoidance: A Static Model.
Manag. Sci., 2008

The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence.
J. Manag. Inf. Syst., 2008

2007
Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach.
J. Manag. Inf. Syst., 2007

The Deterrent Effect of Enforcement Against Computer Hackers: Cross-Country Evidence.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Who gets spammed?
Commun. ACM, 2006

Hackers, Users, Information Security.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

2002
Online Information Privacy: Measuring the Cost-Benefit Trade-Off.
Proceedings of the International Conference on Information Systems, 2002

2001
Dimensions of national culture and corporate adoption of IT infrastructure.
IEEE Trans. Engineering Management, 2001

1999
Software pricing and copyright enforcement: private profit vis-a-vis social welfare.
Proceedings of the Twentieth International Conference on Information Systems, 1999


  Loading...