Lakshmi Iyer
Affiliations: | School of Business & Economics: Information Systems and Operations Management | The University of North Carolina at Greensboro, Greensboro, NC, United States |
Area:
Management Business Administration, Computer ScienceGoogle:
"Lakshmi Iyer"Children
Sign in to add traineeSherrie D. Cannoy | grad student | 2008 | The University of North Carolina at Greensboro |
Fergle D'Aubeterre | grad student | 2008 | The University of North Carolina at Greensboro |
Richard A. Schilhavy | grad student | 2012 | The University of North Carolina at Greensboro |
Earnie M. Church | grad student | 2013 | The University of North Carolina at Greensboro |
Richelle L. Oakley | grad student | 2014 | The University of North Carolina at Greensboro |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Modaresnezhad M, Iyer L, Palvia P, et al. (2020) Information Technology (IT) enabled crowdsourcing: A conceptual framework Information Processing and Management. 57: 102135 |
Oakley RL, Iyer L, Salam AF. (2015) Examining the role of business intelligence in non-profit organizations to support strategic social goals Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 4641-4650 |
Oakley RL, Salam AF, Iyer L. (2013) Examining the affordances and constraints of organization-ICT practices in addressing complex social problems 19th Americas Conference On Information Systems, Amcis 2013 - Hyperconnected World: Anything, Anywhere, Anytime. 2: 1530-1536 |
Wall JD, Iyer L, Salam F. (2013) Are conceptualizations of employee compliance and noncompliance in information security research adequate? developing taxonomies of compliance and noncompliance 19th Americas Conference On Information Systems, Amcis 2013 - Hyperconnected World: Anything, Anywhere, Anytime. 1: 483-490 |
Wall JD, Iyer LS. (2012) The dark side of leadership in information systems security: A model of the effect of manager transgressions on employee security behaviors 18th Americas Conference On Information Systems 2012, Amcis 2012. 2: 1643-1650 |
D'Aubeterre F, Singh R, Iyer L. (2008) A Semantic Approach to Secure Collaborative Inter-Organizational eBusiness Proceses (SSCIOBP) Journal of the Association of Information Systems. 9: 231-266 |
D'Aubeterre F, Singh R, Iyer L. (2008) Secure activity resource coordination: Empirical evidence of enhanced security awareness in designing secure business processes European Journal of Information Systems. 17: 528-542 |
D'Aubeterre F, Singh R, Iyer L. (2008) Secure activity resource coordination: A method to design secure business processes Proceedings of the 3rd International Conference On Design Science Research in Information Systems and Technology, Desrist 2008. 249-265 |
Cannoy SD, Salam AF, Iyer L. (2008) Finding a grassroots voice for consumer empowerment in E-healthcare: A state level perspective using the grounded theory investigation 14th Americas Conference On Information Systems, Amcis 2008. 6: 4072-4082 |
D'Aubeterre F, Iyer L, Singh R. (2007) Designing secure business processes through secure activity resource coordination (SARC) Icis 2007 Proceedings - Twenty Eighth International Conference On Information Systems |