Year |
Citation |
Score |
2020 |
Cezar A, Raghunathan S, Sarkar S. Adversarial Classification: Impact of Agents’ Faking Cost on Firms and Agents Production and Operations Management. DOI: 10.1111/Poms.13251 |
0.352 |
|
2019 |
Koh B, Hann IH, Raghunathan S. Digitization of Music: Consumer Adoption Amidst Piracy, Unbundling, and Rebundling Management Information Systems Quarterly. 43: 25-45. DOI: 10.25300/Misq/2019/14812 |
0.539 |
|
2018 |
Li L, Chen J, Raghunathan S. Recommender System Rethink: Implications for an Electronic Marketplace with Competing Manufacturers Information Systems Research. 29: 1003-1023. DOI: 10.1287/Isre.2017.0765 |
0.338 |
|
2017 |
Koh B, Raghunathan S, Nault BR. Is voluntary profiling welfare enhancing Management Information Systems Quarterly. 41: 23-41. DOI: 10.25300/Misq/2017/41.1.02 |
0.607 |
|
2017 |
Kwark Y, Chen J, Raghunathan S. User-Generated Content and Competing Firms' Product Design Management Science. 64: 4608-4628. DOI: 10.2139/Ssrn.2492840 |
0.595 |
|
2017 |
Kwark Y, Chen J, Raghunathan S. Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information Management Information Systems Quarterly. 41: 763-785. DOI: 10.2139/Ssrn.2335745 |
0.611 |
|
2017 |
Raghunathan S, Tang CS, Yue X. Analysis of the Bullwhip Effect in a Multiproduct Setting with Interdependent Demands Operations Research. 65: 424-432. DOI: 10.1287/Opre.2016.1571 |
0.346 |
|
2017 |
Cezar A, Cavusoglu H, Raghunathan S. Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions Production and Operations Management. 26: 860-879. DOI: 10.1111/Poms.12681 |
0.776 |
|
2017 |
Ayvaci MUS, Ahsen ME, Raghunathan S, Gharibi Z. Timing the Use of Breast Cancer Risk Information in Biopsy Decision-Making Production and Operations Management. 26: 1333-1358. DOI: 10.1111/Poms.12679 |
0.356 |
|
2016 |
Raghunathan S, Sarkar S. Competitive bundling in information markets: A seller-side analysis Mis Quarterly: Management Information Systems. 40: 111-132. DOI: 10.25300/Misq/2016/40.1.05 |
0.404 |
|
2016 |
Lee CH, Geng X, Raghunathan S. Mandatory standards and organizational information security Information Systems Research. 27: 70-86. DOI: 10.1287/Isre.2015.0607 |
0.479 |
|
2015 |
Oh J, Koh B, Raghunathan S. Value appropriation between the platform provider and app developers in mobile platform mediated networks Journal of Information Technology. 30: 245-259. DOI: 10.1057/Jit.2015.21 |
0.563 |
|
2014 |
Cezar A, Cavusoglu H, Raghunathan S. Outsourcing information security: Contracting issues and security implications Management Science. 60: 638-657. DOI: 10.1287/Mnsc.2013.1763 |
0.759 |
|
2014 |
Kwark Y, Jianqing C, Raghunathan S. Online product reviews: Implications for retailers and competing manufacturers Information Systems Research. 25: 93-110. DOI: 10.1287/Isre.2013.0511 |
0.594 |
|
2014 |
Ganesh M, Raghunathan S, Rajendran C. Distribution and equitable sharing of value from information sharing within serial supply chains Ieee Transactions On Engineering Management. 61: 225-236. DOI: 10.1109/Tem.2013.2271534 |
0.413 |
|
2014 |
Koh B, Murthi BPS, Raghunathan S. Shifting Demand: Online Music Piracy, Physical Music Sales, and Digital Music Sales Journal of Organizational Computing and Electronic Commerce. 24: 366-387. DOI: 10.1080/10919392.2014.956592 |
0.54 |
|
2013 |
Lee CH, Geng X, Raghunathan S. Contracting information security in the presence of double moral hazard Information Systems Research. 24: 295-311. DOI: 10.1287/Isre.1120.0447 |
0.476 |
|
2013 |
Cavusoglu H, Kwark Y, Mai B, Raghunathan S. Passenger profiling and screening for aviation security in the presence of strategic attackers Decision Analysis. 10: 63-81. DOI: 10.1287/Deca.1120.0258 |
0.71 |
|
2012 |
K. Mishra B, Raghunathan S. Information Sharing in a Supply Chain with Horizontal Competition: The Case of Discount Based Incentive Scheme Theoretical Economics Letters. 2: 373-378. DOI: 10.4236/Tel.2012.24069 |
0.405 |
|
2012 |
Cavusoglu H, Raghunathan S. Value of and interaction between production postponement and information sharing strategies for supply chain firms Production and Operations Management. 21: 470-488. DOI: 10.1111/J.1937-5956.2011.01286.X |
0.67 |
|
2011 |
Oğüt H, Raghunathan S, Menon N. Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection. Risk Analysis : An Official Publication of the Society For Risk Analysis. 31: 497-512. PMID 20807381 DOI: 10.1111/J.1539-6924.2010.01478.X |
0.684 |
|
2010 |
Cavusoglu H, Koh B, Raghunathan S. An analysis of the impact of passenger profiling for transportation security Operations Research. 58: 1287-1302. DOI: 10.1287/Opre.1090.0793 |
0.692 |
|
2010 |
Bandyopadhyay T, Jacob V, Raghunathan S. Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest Information Technology and Management. 11: 7-23. DOI: 10.1007/S10799-010-0066-1 |
0.435 |
|
2010 |
Kwark Y, Raghunathan S. Implications of product reviews in online retailing Proceedings of 20th Annual Workshop On Information Technologies and Systems. |
0.465 |
|
2009 |
Cavusoglu H, Raghunathan S. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems Information Systems Research. 20: 198-217. DOI: 10.1287/Isre.1080.0180 |
0.668 |
|
2009 |
Mishra BK, Raghunathan S, Yue X. Demand forecast sharing in supply chains Production and Operations Management. 18: 152-166. DOI: 10.1111/J.1937-5956.2009.01013.X |
0.456 |
|
2008 |
Cavusoglu H, Raghunathan S, Yue WT. Decision-Theoretic and game-theoretic approaches to IT security investment Journal of Management Information Systems. 25: 281-304. DOI: 10.2753/Mis0742-1222250211 |
0.675 |
|
2008 |
Ogut H, Cavusoglu H, Raghunathan S. Intrusion-detection policies for IT security breaches Informs Journal On Computing. 20: 112-123. DOI: 10.1287/Ijoc.1070.0222 |
0.724 |
|
2008 |
Ganesh M, Raghunathan S, Rajendran C. The value of information sharing in a multi-product supply chain with product substitution Iie Transactions (Institute of Industrial Engineers). 40: 1124-1140. DOI: 10.1080/07408170701745360 |
0.378 |
|
2007 |
Demirhan D, Jacob VS, Raghunathan S. Strategic IT investments: The impact of switching cost and declining IT cost Management Science. 53: 208-226. DOI: 10.1287/Mnsc.1060.0629 |
0.673 |
|
2007 |
Cavusoglu H, Raghunathan S. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge Ieee Transactions On Software Engineering. 33: 171-185. DOI: 10.1109/Tse.2007.26 |
0.658 |
|
2007 |
Cavusoglu H, Raghunathan S. Selecting a customization strategy under competition: Mass customization, targeted mass customization, and product proliferation Ieee Transactions On Engineering Management. 54: 12-28. DOI: 10.1109/Tem.2006.889064 |
0.666 |
|
2007 |
Mishra BK, Raghunathan S, Yue X. Information sharing in supply chains: Incentives for information distortion Iie Transactions (Institute of Industrial Engineers). 39: 863-877. DOI: 10.1080/07408170601019460 |
0.408 |
|
2007 |
Yue X, Raghunathan S. The impacts of the full returns policy on a supply chain with information asymmetry European Journal of Operational Research. 180: 630-647. DOI: 10.1016/J.Ejor.2006.04.032 |
0.377 |
|
2005 |
Demirhan D, Jacob VS, Raghunathan S. Information technology investment strategies under declining technology cost Journal of Management Information Systems. 22: 321-350. DOI: 10.2753/Mis0742-1222220311 |
0.706 |
|
2005 |
Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture Information Systems Research. 16: 28-46. DOI: 10.1287/Isre.1050.0041 |
0.694 |
|
2004 |
Cavusoglu H, Cavusoglu H, Raghunathan S. Economics of IT Security Management: Four Improvements to Current Security Practices Communications of the Association For Information Systems. 14. DOI: 10.17705/1Cais.01403 |
0.677 |
|
2004 |
Mishra BK, Raghunathan S. Retailer- vs. Vendor-managed inventory and brand competition Management Science. 50: 445-457. DOI: 10.1287/Mnsc.1030.0174 |
0.451 |
|
2004 |
Cavusoglu H, Raghunathan S. Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches Decision Analysis. 1: 131-148. DOI: 10.1287/Deca.1040.0022 |
0.628 |
|
2004 |
Cavusoglu H, Mishra B, Raghunathan S. A model for evaluating IT security investments Communications of the Acm. 47: 87-92. DOI: 10.1145/1005817.1005828 |
0.69 |
|
2004 |
Cavusoglu H, Mishra B, Raghunathan S. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers International Journal of Electronic Commerce. 9: 70-104. DOI: 10.1080/10864415.2004.11044320 |
0.704 |
|
2003 |
Raghunathan S. Impact of demand correlation on the value of and incentives for information sharing in a supply chain European Journal of Operational Research. 146: 634-649. DOI: 10.1016/S0377-2217(02)00365-X |
0.405 |
|
2001 |
Raghunathan S. Information sharing in a supply chain: A note on its value when demand is nonstationary Management Science. 47: 605-610. DOI: 10.1287/Mnsc.47.4.605.9833 |
0.402 |
|
2001 |
Raghunathan S, Yeh AB. Beyond EDI: Impact of Continuous Replenishment Program (CRP) between a Manufacturer and Its Retailers Information Systems Research. 12: 406-419. DOI: 10.1287/Isre.12.4.406.9701 |
0.359 |
|
1999 |
Raghunathan S. Interorganizational collaborative forecasting and replenishment systems and supply chain implications Decision Sciences. 30: 1053-1071. DOI: 10.1111/J.1540-5915.1999.Tb00918.X |
0.422 |
|
Show low-probability matches. |