increased, increase, number, response, emergency, monitoring, warning, study, reduce, messages, using, reduced, decreased, reduction, decrease, act, sessions, cost, good, key
Kumar, Subodha (0.54) |
Mookerjee, Vijay S. (0.45) |
Sharman, Raj (0.41) |
Ji, Yonghua (0.37) |
Anderson, Bonnie Brinton (0.31) |
Eargle, David (0.31) |
Jenkins, Jeffrey L. (0.31) |
Vance, Anthony (0.31) |
Gopal, Ram D. (0.26) |
Benbasat, Izak (0.25) |
Banker, Rajiv D. (0.22) |
Kalvenes, Joakim (0.22) |
Patterson, Raymond A. (0.22) |
Ada, Serkan (0.21) |
Han, Wencui (0.21) |
Rao, Raghav (0.21) |
Chen, Rui (0.20) |
Rao, H. Raghav (0.20) |
Shambhu, Upadhyaya J. (0.20) |
Grover, Varun (0.20) |
Dennis, Alan R. (0.19) |
Xiao, Bo (0.19) |
Briggs, Robert O. (0.17) |
Reinig, Bruce A. (0.17) |
Aggarwal, Nitin (0.15) |
Dai, Qizhi (0.15) |
Walden, Eric A. (0.15) |
Kirwan, C. Brock (0.15) |
Kirwan, C Brock (0.15) |
Curtis, Aaron M. (0.13) |
Hasty, Bryan K. (0.13) |
Kowalczyk, Stacy T. (0.13) |
Robert Jr., Lionel P. (0.13) |
Aggarwal, Rohit (0.13) |
Sankaranarayanan, Ramesh (0.13) |
Singh, Param Vir (0.13) |
Chin, Wynne W. (0.13) |
Gopal, Abhijit (0.13) |
Newsted, Peter R. (0.13) |
Salisbury, David (0.13) |
Das, Sanjukta (0.12) |
Du, Anna Ye (0.12) |
Ramesh, Ram (0.12) |
Kraemer, Kenneth L. (0.12) |
Pinsonneault, Alain (0.12) |
Weber, Ron (0.12) |
Su, Guofeng (0.11) |
Yang, Lili (0.11) |
Yuan, Hongyong (0.11) |
Sarkar, Sumit (0.11) |
Dekleva, Sasa M. (0.10) |
Articles (38)
Title
|
Topic Weight
|
Author
|
Year
|
Journal
|
When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security |
0.370 |
Ji, Yonghua;
Kumar, Subodha;
Mookerjee, Vijay S.;
|
2016
|
ISR
|
Information Technology, Contract Completeness, and Buyer-Supplier Relationships. |
0.216 |
Banker, Rajiv D.;
Kalvenes, Joakim;
Patterson, Raymond A.;
|
2006
|
ISR
|
Campus Emergency Notification Systems: An Examination of Factors Affecting Compliance with Alerts |
0.213 |
Han, Wencui;
Ada, Serkan;
Sharman, Raj;
Rao, Raghav;
|
2015
|
MISQ
|
DATA MODEL DEVELOPMENT FOR FIRE RELATED EXTREME EVENTS: AN ACTIVITY THEORY APPROACH1. |
0.201 |
Chen, Rui;
Sharman, Raj;
Rao, H. Raghav;
Shambhu, Upadhyaya J.;
|
2013
|
MISQ
|
Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation |
0.189 |
Xiao, Bo;
Benbasat, Izak;
|
2015
|
ISR
|
Bounded Ideation Theory. |
0.169 |
Briggs, Robert O.;
Reinig, Bruce A.;
|
2010
|
JMIS
|
THE MORE, THE MERRIER? HOW THE NUMBER OF PARTNERS IN A STANDARD-SETTING INITIATIVE AFFECTS SHAREHOLDER'S RISK AND RETURN1. |
0.155 |
Aggarwal, Nitin;
Dai, Qizhi;
Walden, Eric A.;
|
2011
|
MISQ
|
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable |
0.154 |
Jenkins, Jeffrey L.;
Anderson, Bonnie Brinton;
Vance, Anthony;
Kirwan, C. Brock;
Eargle, David;
|
2016
|
ISR
|
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It |
0.152 |
Anderson, Bonnie Brinton;
Vance, Anthony;
Kirwan, C Brock;
Jenkins, Jeffrey L.;
Eargle, David;
|
2016
|
JMIS
|
Trust Is in the Eye of the Beholder: A Vignette Study of Postevent Behavioral Controls' Effects on Individual Trust in Virtual Teams. |
0.135 |
Dennis, Alan R.;
Robert Jr., Lionel P.;
Curtis, Aaron M.;
Kowalczyk, Stacy T.;
Hasty, Bryan K.;
|
2012
|
ISR
|
Blog, Blogger, and the Firm: Can Negative Employee Posts Lead to Positive Outcomes? |
0.135 |
Aggarwal, Rohit;
Gopal, Ram D.;
Sankaranarayanan, Ramesh;
Singh, Param Vir;
|
2012
|
ISR
|
Authors' Reply to Allport and Kerler (2003). |
0.132 |
Chin, Wynne W.;
Salisbury, David;
Gopal, Abhijit;
Newsted, Peter R.;
|
2003
|
ISR
|
Risk Management and Optimal Pricing in Online Storage Grids. |
0.121 |
Das, Sanjukta;
Du, Anna Ye;
Gopal, Ram D.;
Ramesh, Ram;
|
2011
|
ISR
|
The Impact of Information Technology on Middle Managers. |
0.118 |
Pinsonneault, Alain;
Kraemer, Kenneth L.;
|
1993
|
MISQ
|
Design Principles of Integrated Information Platform for Emergency Responses: The Case of 2008 Beijing Olympic Games. |
0.112 |
Yang, Lili;
Su, Guofeng;
Yuan, Hongyong;
|
2012
|
ISR
|
The Influence of the Information Systems Development Approach on Maintenance. |
0.101 |
Dekleva, Sasa M.;
|
1992
|
MISQ
|
Do Large Firms Become Smaller by Using Information Technology? |
0.098 |
Im, Kun Shin;
Grover, Varun;
Teng, James T. C.;
|
2013
|
ISR
|
The Impact of Influence Tactics in Information System Development Projects: A Control-Loss Perspective. |
0.098 |
Narayanaswamy, Ravi;
Grover, Varun;
Henry, Raymond M.;
|
2013
|
JMIS
|
BUSINESS FAMILIARITY AS RISK MITIGATION IN SOFTWARE DEVELOPMENT OUTSOURCING CONTRACTS. |
0.093 |
Gefen, David;
Wyss, Simon;
Lichtenstein, Yossi;
|
2008
|
MISQ
|
Sustainability of Healthcare Information Exchanges: A Game-Theoretic Approach |
0.091 |
Demirezen, Emre M.;
Kumar, Subodha;
Sen, Arun;
|
2016
|
ISR
|