The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors H Li, R Sarathy, H Xu Decision support systems 51 (3), 434-445, 2011 | 528 | 2011 |
Understanding situational online information disclosure as a privacy calculus H Li, R Sarathy, H Xu Journal of Computer Information Systems 51 (1), 62-71, 2010 | 419 | 2010 |
Understanding compliance with internet use policy from the perspective of rational choice theory H Li, J Zhang, R Sarathy Decision Support Systems 48 (4), 635-645, 2010 | 378 | 2010 |
An experimental investigation of the influence of website emotional design features on trust in unfamiliar online vendors SF Pengnate, R Sarathy Computers in Human Behavior 67, 49-60, 2017 | 258 | 2017 |
A general additive data perturbation method for database security K Muralidhar, R Parsa, R Sarathy management science 45 (10), 1399-1415, 1999 | 247 | 1999 |
Data shuffling—A new masking approach for numerical data K Muralidhar, R Sarathy Management Science 52 (5), 658-670, 2006 | 208 | 2006 |
Evaluating Laplace noise addition to satisfy differential privacy for numeric data. R Sarathy, K Muralidhar Trans. Data Priv. 4 (1), 1-17, 2011 | 205 | 2011 |
Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance H Li, R Sarathy, J Zhang, X Luo Information Systems Journal 24 (6), 479-502, 2014 | 183 | 2014 |
The effect of product review balance and volume on online Shoppers' risk perception and purchase intention J Yang, R Sarathy, JK Lee Decision Support Systems 89, 66-76, 2016 | 172 | 2016 |
Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract H Li, A Gupta, J Zhang, R Sarathy Decision Support Systems 57, 376-386, 2014 | 169 | 2014 |
Fool's gold: an illustrated critique of differential privacy J Bambauer, K Muralidhar, R Sarathy Vand. J. Ent. & Tech. L. 16, 701, 2013 | 111 | 2013 |
Security of random data perturbation methods K Muralidhar, R Sarathy ACM Transactions on Database Systems (TODS) 24 (4), 487-493, 1999 | 107 | 1999 |
Self-control, organizational context, and rational choice in Internet abuses at work H Li, XR Luo, J Zhang, R Sarathy Information & Management 55 (3), 358-367, 2018 | 79 | 2018 |
A theoretical basis for perturbation methods K Muralidhar, R Sarathy Statistics and Computing 13, 329-335, 2003 | 74 | 2003 |
The security of confidential numerical data in databases R Sarathy, K Muralidhar information systems research 13 (4), 389-403, 2002 | 71 | 2002 |
Secure and useful data sharing R Sarathy, K Muralidhar Decision Support Systems 42 (1), 204-220, 2006 | 59 | 2006 |
Perturbing nonnormal confidential attributes: The copula approach R Sarathy, K Muralidhar, R Parsa Management Science 48 (12), 1613-1627, 2002 | 59 | 2002 |
Generating Sufficiency-based Non-Synthetic Perturbed Data. K Muralidhar, R Sarathy Trans. Data Priv. 1 (1), 17-33, 2008 | 51 | 2008 |
Some additional insights on applying differential privacy for numeric data R Sarathy, K Muralidhar Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010 | 48 | 2010 |
Do review valence and review volume impact consumers’ purchase decisions as assumed? J Yang, R Sarathy, SM Walsh Nankai Business Review International 7 (2), 231-257, 2016 | 45 | 2016 |