Divakaran Liginlal
Affiliations: | University of Wisconsin, Madison, Madison, WI |
Area:
Management Business Administration, Computer ScienceGoogle:
"Divakaran Liginlal"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Khansa L, Ma X, Liginlal D, et al. (2015) Understanding Members' Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis Journal of Management Information Systems. 32: 162-203 |
Liginlal D. (2015) HIPAA and human error: The role of enhanced situation awareness in protecting health information Medical Data Privacy Handbook. 679-696 |
Khansa L, Liginlal D. (2012) Regulatory influence and the imperative of innovation in identity and access management Information Resources Management Journal. 25: 78-97 |
Khansa L, Liginlal D. (2012) Whither information security? Examining the complementarities and substitutive effects among IT and information security firms International Journal of Information Management. 32: 271-281 |
Liginlal D, Sim I, Khansa L, et al. (2012) HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory Computers and Security. 31: 206-220 |
Inkook SIM, Liginlal D, Khansa L. (2012) Information privacy situation awareness: Construct and validation Journal of Computer Information Systems. 53: 57-64 |
James T, Khansa L, Cook D, et al. (2011) Technology and U.S. politics Ieee Technology and Society Magazine. 30: 20-27 |
Khansa L, Liginlal D. (2011) Predicting stock market returns from malicious attacks: A comparative analysis of vector autoregression and time-delayed neural networks Decision Support Systems. 51: 745-759 |
Liginlal D, Khansa L, Chia SC. (2010) Using real options theory to evaluate strategic investment options for mobile content delivery: A case study International Journal of Business Data Communications and Networking. 6: 18-39 |
Khansa L, Liginlal D. (2009) Quantifying the benefits of investing in information security Communications of the Acm. 52: 113-117 |