Technostress: Technological antecedents and implications R Ayyagari, V Grover, R Purvis MIS quarterly, 831-858, 2011 | 2690 | 2011 |
Can we have fun@ work? The role of intrinsic motivation for utilitarian systems JE Gerow, R Ayyagari, JB Thatcher, PL Roth European Journal of Information Systems 22 (3), 360-380, 2013 | 206 | 2013 |
A citation analysis of the evolution and state of information systems within a constellation of reference disciplines V Grover, R Gokhale, J Lim, J Coffey, R Ayyagari Journal of the Association for Information Systems 7 (1), 13, 2006 | 149 | 2006 |
An exploratory analysis of data breaches from 2005-2011: Trends and insights R Ayyagari Journal of Information Privacy and Security 8 (2), 33-56, 2012 | 127 | 2012 |
The dark side of information and market efficiency in e‐markets V Grover, J Lim, R Ayyagari Decision Sciences 37 (3), 297-324, 2006 | 119 | 2006 |
Impact of information overload and task-technology fit on technostress R Ayyagari | 105 | 2012 |
Investigating the determinants of telepresence in the e-commerce setting J Lim, R Ayyagari Computers in Human Behavior 85, 360-371, 2018 | 81 | 2018 |
What and why of technostress: Technology antecedents and implications R Ayyagari Clemson University, 2007 | 74 | 2007 |
Hands-on ERP learning: Using OpenERP®, an alternative to SAP® R Ayyagari Journal of Information Systems Education 22 (2), 123-134, 2011 | 69 | 2011 |
Examination of hedonism in TAM research R Ayyagari | 50 | 2006 |
Disaster at a university: A case study in information security R Ayyagari, J Tyks Journal of Information Technology Education. Innovations in Practice 11, 85, 2012 | 46 | 2012 |
Is seeing believing? Training users on information security: Evidence from Java Applets R Ayyagari, N Figueroa Journal of Information Systems Education 28 (2), 115, 2017 | 33 | 2017 |
About reference disciplines and reference differences: A critique of Wade et al. V Grover, R Gokhale, J Lim, R Ayyagari Journal of the Association for Information Systems 7 (5), 11, 2006 | 32 | 2006 |
Role of interaction quality and trust in use of AI-based voice-assistant systems OKD Lee, R Ayyagari, F Nasirian, M Ahmadian Journal of Systems and Information Technology 23 (2), 154-170, 2021 | 30 | 2021 |
Why do not we use password managers? A study on the intention to use password managers R Ayyagari, J Lim, O Hoxha Contemporary Management Research 15 (4), 227-245, 2019 | 24 | 2019 |
Analyzing information systems security research to find key topics, trends, and opportunities R Blake, R Ayyagari Journal of Information Privacy and Security 8 (3), 37-67, 2012 | 15 | 2012 |
A conceptual framework of the alignment of the project management office (PMO) with the organizational structure R Ayyagari, R Henry, R Purvis AMCIS 2006 Proceedings, 449, 2006 | 15 | 2006 |
Risk and demographics’ influence on security behavior intentions R Ayyagari, A Crowell The Journal of the Southern Association for Information Systems 7 (1), 1-12, 2020 | 10 | 2020 |
Is intrinsic motivation as important in utilitarian systems as it is in hedonic systems? A preliminary meta-analysis JE Gerow, R Ayyagari, JB Thatcher, PL Roth AMCIS 2009 Proceedings, 671, 2009 | 8 | 2009 |
Examining the effectiveness of compensatory adaptation from a consumer's perspective in evaluating products online J Lim, JR Wollscheid, R Ayyagari American Journal of Business 35 (2), 61-81, 2020 | 4 | 2020 |