Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness B Bulgurcu, H Cavusoglu, I Benbasat MIS quarterly, 523-548, 2010 | 2910 | 2010 |
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers H Cavusoglu, B Mishra, S Raghunathan International Journal of Electronic Commerce 9 (1), 70-104, 2004 | 1001 | 2004 |
A model for evaluating IT security investments H Cavusoglu, B Mishra, S Raghunathan Communications of the ACM 47 (7), 87-92, 2004 | 599 | 2004 |
The value of intrusion detection systems in information technology security architecture H Cavusoglu, B Mishra, S Raghunathan Information Systems Research 16 (1), 28-46, 2005 | 350 | 2005 |
Decision-theoretic and game-theoretic approaches to IT security investment H Cavusoglu, S Raghunathan, WT Yue Journal of Management Information Systems 25 (2), 281-304, 2008 | 292 | 2008 |
Security patch management: Share the burden or share the damage? H Cavusoglu, H Cavusoglu, J Zhang Management Science 54 (4), 657-670, 2008 | 235 | 2008 |
Gamification: A new paradigm for online user engagement A Kankanhalli, M Taher, H Cavusoglu, SH Kim | 185 | 2012 |
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources H Cavusoglu, H Cavusoglu, JY Son, I Benbasat Information & Management 52 (4), 385-400, 2015 | 180 | 2015 |
Economics of ITSecurity management: four improvements to current security practices H Cavusoglu, H Cavusoglu, S Raghunathan Communications of the Association for Information Systems 14 (1), 3, 2004 | 162 | 2004 |
Can gamification motivate voluntary contributions? The case of StackOverflow Q&A community H Cavusoglu, Z Li, KW Huang Proceedings of the 18th ACM conference companion on computer supported …, 2015 | 144 | 2015 |
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems H Cavusoglu, S Raghunathan, H Cavusoglu Information Systems Research 20 (2), 198-217, 2009 | 137 | 2009 |
Early mover advantage in e-commerce platforms with low entry barriers: The role of customer relationship management capabilities S Wang, H Cavusoglu, Z Deng Information & Management 53 (2), 197-206, 2016 | 131 | 2016 |
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge H Cavusoglu, H Cavusoglu, S Raghunathan IEEE Transactions on Software Engineering 33 (3), 171-185, 2007 | 130 | 2007 |
Configuration of detection software: A comparison of decision and game theory approaches H Cavusoglu, S Raghunathan Decision Analysis 1 (3), 131-148, 2004 | 127 | 2004 |
Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook H Cavusoglu, TQ Phan, H Cavusoglu, EM Airoldi Information Systems Research 27 (4), 848-879, 2016 | 116 | 2016 |
Outsourcing information security: Contracting issues and security implications A Cezar, H Cavusoglu, S Raghunathan Management Science 60 (3), 638-657, 2014 | 112 | 2014 |
Economics of it security management H Cavusoglu Economics of Information Security, 71-83, 2004 | 112 | 2004 |
Information technology diffusion with influentials, imitators, and opponents H Cavusoglu, N Hu, Y Li, D Ma Journal of Management Information Systems 27 (2), 305-334, 2010 | 99 | 2010 |
Roles of information security awareness and perceived fairness in information security policy compliance B Bulgurcu, H Cavusoglu, I Benbasat AMCIS 2009 proceedings, 419, 2009 | 93 | 2009 |
An empirical investigation of the antecedents and consequences of privacy uncertainty in the context of mobile apps S Al-Natour, H Cavusoglu, I Benbasat, U Aleem Information Systems Research 31 (4), 1037-1063, 2020 | 84 | 2020 |