Rahul Telang

Orcid: 0000-0002-9353-7661

According to our database1, Rahul Telang authored at least 85 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sound and Fury, Signifying Nothing? Impact of Data Breach Disclosure Laws.
CoRR, 2024

Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software Vendors.
CoRR, 2024

2023
The Impact of Ride-Hailing Services on Congestion: Evidence from Indian Cities.
Manuf. Serv. Oper. Manag., May, 2023

Incentive Misalignments in Programmatic Advertising: Evidence from a Randomized Field Experiment.
Manag. Sci., March, 2023

The Consequences of Rating Inflation on Platforms: Evidence from a Quasi-Experiment.
Inf. Syst. Res., 2023

2022
Frontiers: Virus Shook the Streaming Star: Estimating the COVID-19 Impact on Music Consumption.
Mark. Sci., 2022

2020
The Effect of Piracy Website Blocking on Consumer Behavior.
MIS Q., 2020

2019
Do Search Engines Influence Media Piracy? Evidence from a Randomized Study.
MIS Q., 2019

Saving Patient Ryan - Can Advanced Electronic Medical Records Make Patient Care Safer?
Manag. Sci., 2019

Effect of Friends' Churn on Consumer Behavior in Mobile Networks.
J. Manag. Inf. Syst., 2019

Modeling social learning on consumers' long-term usage of a mobile technology: a Bayesian estimation of a Bayesian learning model.
Electron. Commer. Res., 2019

2018
To Be or Not to Be Linked: Online Social Networks and Job Search by Unemployed Workforce.
Manag. Sci., 2018

Quantifying the Impact of Social Influence on the Information Technology Implementation Process by Physicians: A Hierarchical Bayesian Learning Approach.
Inf. Syst. Res., 2018

Piracy and new product creation: A Bollywood story.
Inf. Econ. Policy, 2018

2017
An empirical analysis of the frequency and location of concerts in the digital age.
Inf. Econ. Policy, 2017

Copyright enforcement in the digital age: empirical evidence and policy implications.
Commun. ACM, 2017

Bayesian multi-view models for member-job matching and personalized skill recommendations.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Culling the Herd: Using Real-World Randomized Experiments to Measure Social Bias with Known Costly Goods.
Manag. Sci., 2016

Spillovers from Wiring Schools with Broadband: The Critical Role of Children.
Manag. Sci., 2016

The Impact of Privacy Regulation and Technology Incentives: The Case of Health Information Exchanges.
Manag. Sci., 2016

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Security, Fraudulent transactions and Customer Loyalty: A Field Study.
Proceedings of the International Conference on Information Systems, 2016

When Streams Come True: Estimating the Impact of Free Streaming Availability on EST Sales.
Proceedings of the International Conference on Information Systems, 2016

2015
Policy Framework for Data Breaches.
IEEE Secur. Priv., 2015

Electronic health records and patient safety.
Commun. ACM, 2015

What is a Cookie Worth?
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

2014
Information Discovery and the Long Tail of Motion Picture Content.
MIS Q., 2014

An Empirical Analysis of Digital Music Bundling Strategies.
Manag. Sci., 2014

Broadband in School: Impact on Student Performance.
Manag. Sci., 2014

Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Examining the Social Influence on Information Technology Sustained Use in a Community Health System: A Hierarchical Bayesian Learning Method Analysis.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Inferring App Demand from Publicly Available Data.
MIS Q., 2013

Physician's Usage Of Mobile Clinical Applications In A Community Hospital: A Longitudinal Analysis Of Adoption Behavior.
Proceedings of the UKAIS 2013, 2013

2012
What's in a "Name"? Impact of Use of Customer Information in E-Mail Advertisements.
Inf. Syst. Res., 2012

Does the Web Reduce Customer Service Cost? Empirical Evidence from a Call Center.
Inf. Syst. Res., 2012

The Impact of Information on Movie Sales Skewness.
Proceedings of the International Conference on Information Systems, 2012

Is Patient Data Better Protected in Competitive Healthcare Markets?
Proceedings of the International Conference on Information Systems, 2012

Role of Online Social Networks in Job Search by Unemployed Individuals.
Proceedings of the International Conference on Information Systems, 2012

Live Show Everywhere: Distribution Dynamics and Internet Influence on Concert Location.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Product Customization and Customer Service Costs: An Empirical Analysis.
Manuf. Serv. Oper. Manag., 2011

Measuring Information Diffusion in an Online Community.
J. Manag. Inf. Syst., 2011

Health Disclosure Laws and Health Information Exchanges.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Discovery of Music through Peers in an Online Community.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Converting Pirates Without Cannibalizing Purchasers: The Impact of Digital Distribution on Physical Sales and Internet Piracy.
Mark. Sci., 2010

An Empirical Analysis of Mobile Voice Service and SMS: A Structural Model.
Manag. Sci., 2010

An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure.
Inf. Syst. Res., 2010

Piracy or promotion? The impact of broadband Internet penetration on DVD sales.
Inf. Econ. Policy, 2010

Competition and patching of security vulnerabilities: An empirical analysis.
Inf. Econ. Policy, 2010

Broadband in Schools: Does IT Help or Hurt Student Performance?
Proceedings of the International Conference on Information Systems, 2010

2009
Competing with Free: The Impact of Movie Broadcasts on DVD Sales and Internet Piracy.
MIS Q., 2009

Information Personalization in a Two-Dimensional Product Differentiation Model.
J. Manag. Inf. Syst., 2009

To theme or not to theme: Can theme strength be the music industry's "killer app"?
Decis. Support Syst., 2009

Information Personalization in a Two Dimensional Product Differentiation Model: Impact of Market Structure and the Quality-Fit Ratio.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Optimal Policy for Software Vulnerability Disclosure.
Manag. Sci., 2008

Do Data Breaches Disclosure Laws Reduce Identity Theft?
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

2007
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price.
IEEE Trans. Software Eng., 2007

The Effect of Digital Sharing Technologies on Music Markets: A Survival Analysis of Albums on Ranking Charts.
Manag. Sci., 2007

Optimally Securing Enterprise Information Systems and Assets.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Analysis of the Impact of Movie Broadcasts on DVD Sales and Internet Piracy.
Proceedings of the International Conference on Information Systems, 2007

Empirical Analysis of Mobile Voice and SMS Service: A Structural Model.
Proceedings of the International Conference on Information Systems, 2007

2006
Research Note - Sell First, Fix Later: Impact of Patching on Software Quality.
Manag. Sci., 2006

Internet Exchanges for Used Books: An Empirical Analysis of Product Cannibalization and Welfare Impact.
Inf. Syst. Res., 2006

Does information security attack frequency increase with vulnerability disclosure? An empirical analysis.
Inf. Syst. Frontiers, 2006

Enterprise Information Security: Who Should Manage it and How?
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Competitive and Strategic Effects in the Timing of Patch Release.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

An Empirical Analysis of Software Vendors' Patching Behavior: Impact of Vulnerability Disclosure.
Proceedings of the International Conference on Information Systems, 2006

Is There a Cost to Privacy Breaches? An Event Study.
Proceedings of the International Conference on Information Systems, 2006

2005
Market for Software Vulnerabilities? Think Again.
Manag. Sci., 2005

Effect of Electronic Secondary Markets on the Supply Chain.
J. Manag. Inf. Syst., 2005

Economics of Software Vulnerability Disclosure.
IEEE Secur. Priv., 2005

Pricing Electronic Mail to Solve the Problem of Spam.
Hum. Comput. Interact., 2005

Drivers of Web portal use.
Electron. Commer. Res. Appl., 2005

Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

An Empirical Analysis of Vendor Response to Disclosure Policy.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

Welfare Implications of Secondary Electronic Markets.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Do Security Vulnerability Announcemnets Impact Software Vendors - An Event Study Analysis.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
The Market Structure for Internet Search Engines.
J. Manag. Inf. Syst., 2004

Measuring the Risk-Based Value of IT Security Solutions.
IT Prof., 2004

Price Elasticities and Social Welfare in Secondary Electronic Markets.
Proceedings of the International Conference on Information Systems, 2004

Competition between Internet Search Engines.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

The Impact of Free-Riding on Peer-to-Peer Networks.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Economic Analysis of the Market for Software Vulnerability Disclosure.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Durable Goods Competition in Secondary Electronic Markets.
Proceedings of the International Conference on Information Systems, 2003

2002
The Virtual Commons: Why Free-Riding Can Be Tolerated in File Sharing Networks.
Proceedings of the International Conference on Information Systems, 2002

Markets for attention: will postage for email help?
Proceedings of the CSCW 2002, 2002


  Loading...