Year |
Citation |
Score |
2020 |
Modaresnezhad M, Iyer L, Palvia P, Taras V. Information Technology (IT) enabled crowdsourcing: A conceptual framework Information Processing and Management. 57: 102135. DOI: 10.1016/J.Ipm.2019.102135 |
0.419 |
|
2015 |
Oakley RL, Iyer L, Salam AF. Examining the role of business intelligence in non-profit organizations to support strategic social goals Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 4641-4650. DOI: 10.1109/HICSS.2015.553 |
0.714 |
|
2013 |
Oakley RL, Salam AF, Iyer L. Examining the affordances and constraints of organization-ICT practices in addressing complex social problems 19th Americas Conference On Information Systems, Amcis 2013 - Hyperconnected World: Anything, Anywhere, Anytime. 2: 1530-1536. |
0.696 |
|
2013 |
Wall JD, Iyer L, Salam F. Are conceptualizations of employee compliance and noncompliance in information security research adequate? developing taxonomies of compliance and noncompliance 19th Americas Conference On Information Systems, Amcis 2013 - Hyperconnected World: Anything, Anywhere, Anytime. 1: 483-490. |
0.321 |
|
2012 |
Wall JD, Iyer LS. The dark side of leadership in information systems security: A model of the effect of manager transgressions on employee security behaviors 18th Americas Conference On Information Systems 2012, Amcis 2012. 2: 1643-1650. |
0.322 |
|
2008 |
D'Aubeterre F, Singh R, Iyer L. A Semantic Approach to Secure Collaborative Inter-Organizational eBusiness Proceses (SSCIOBP) Journal of the Association of Information Systems. 9: 231-266. DOI: 10.17705/1Jais.00152 |
0.733 |
|
2008 |
D'Aubeterre F, Singh R, Iyer L. Secure activity resource coordination: Empirical evidence of enhanced security awareness in designing secure business processes European Journal of Information Systems. 17: 528-542. DOI: 10.1057/Ejis.2008.42 |
0.755 |
|
2008 |
D'Aubeterre F, Singh R, Iyer L. Secure activity resource coordination: A method to design secure business processes Proceedings of the 3rd International Conference On Design Science Research in Information Systems and Technology, Desrist 2008. 249-265. |
0.747 |
|
2008 |
Cannoy SD, Salam AF, Iyer L. Finding a grassroots voice for consumer empowerment in E-healthcare: A state level perspective using the grounded theory investigation 14th Americas Conference On Information Systems, Amcis 2008. 6: 4072-4082. |
0.693 |
|
2007 |
D'Aubeterre F, Iyer L, Singh R. Designing secure business processes through secure activity resource coordination (SARC) Icis 2007 Proceedings - Twenty Eighth International Conference On Information Systems. |
0.752 |
|
2007 |
Dai H, Iyer LS, Singh R. An investigation of consumer's security and privacy perceptions in mobile commerce Association For Information Systems - 13th Americas Conference On Information Systems, Amcis 2007: Reaching New Heights. 6: 4307-4321. |
0.305 |
|
2006 |
Cannoy SD, Iyer L. Semantic web standards and ontologies in the medical sciences and healthcare Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation. 405-420. DOI: 10.4018/978-1-59904-192-6.ch017 |
0.711 |
|
2006 |
D'Aubeterre F, Singh R, Iyer LS. Semantic knowledge transparency in e-business processes Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation. 255-286. DOI: 10.4018/978-1-59904-192-6.ch011 |
0.738 |
|
2005 |
Singh R, Salam AF, Iyer L. Agents in e-supply chains Communications of the Acm. 48: 108-115. DOI: 10.1145/1064830.1064835 |
0.31 |
|
2005 |
Iyer L, Singh R, Salam AF. Intelligent agents to support information sharing in B2B E-marketplaces Information Systems Management. 22: 37-49. |
0.319 |
|
Show low-probability matches. |