Follow
Huseyin Cavusoglu
Title
Cited by
Cited by
Year
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
B Bulgurcu, H Cavusoglu, I Benbasat
MIS quarterly, 523-548, 2010
28392010
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
H Cavusoglu, B Mishra, S Raghunathan
International Journal of Electronic Commerce 9 (1), 70-104, 2004
9792004
A model for evaluating IT security investments
H Cavusoglu, B Mishra, S Raghunathan
Communications of the ACM 47 (7), 87-92, 2004
5942004
The value of intrusion detection systems in information technology security architecture
H Cavusoglu, B Mishra, S Raghunathan
Information Systems Research 16 (1), 28-46, 2005
3492005
Decision-theoretic and game-theoretic approaches to IT security investment
H Cavusoglu, S Raghunathan, WT Yue
Journal of Management Information Systems 25 (2), 281-304, 2008
2872008
Security patch management: Share the burden or share the damage?
H Cavusoglu, H Cavusoglu, J Zhang
Management Science 54 (4), 657-670, 2008
2322008
Gamification: A new paradigm for online user engagement
A Kankanhalli, M Taher, H Cavusoglu, SH Kim
1802012
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources
H Cavusoglu, H Cavusoglu, JY Son, I Benbasat
Information & Management 52 (4), 385-400, 2015
1752015
Economics of ITSecurity Management: Four Improvements to Current Security Practices
H Cavusoglu, H Cavusoglu, S Raghunathan
Communications of the Association for Information Systems 14 (1), 3, 2004
1612004
Can gamification motivate voluntary contributions? The case of StackOverflow Q&A community
H Cavusoglu, Z Li, KW Huang
Proceedings of the 18th ACM conference companion on computer supported …, 2015
1392015
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
H Cavusoglu, S Raghunathan, H Cavusoglu
Information Systems Research 20 (2), 198-217, 2009
1352009
Configuration of detection software: A comparison of decision and game theory approaches
H Cavusoglu, S Raghunathan
Decision Analysis 1 (3), 131-148, 2004
1292004
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
H Cavusoglu, H Cavusoglu, S Raghunathan
IEEE Transactions on Software Engineering 33 (3), 171-185, 2007
1272007
Early mover advantage in e-commerce platforms with low entry barriers: The role of customer relationship management capabilities
S Wang, H Cavusoglu, Z Deng
Information & Management 53 (2), 197-206, 2016
1262016
Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook
H Cavusoglu, TQ Phan, H Cavusoglu, EM Airoldi
Information Systems Research 27 (4), 848-879, 2016
1142016
Economics of it security management
H Cavusoglu
Economics of Information Security, 71-83, 2004
1122004
Outsourcing information security: Contracting issues and security implications
A Cezar, H Cavusoglu, S Raghunathan
Management Science 60 (3), 638-657, 2014
1112014
Information technology diffusion with influentials, imitators, and opponents
H Cavusoglu, N Hu, Y Li, D Ma
Journal of Management Information Systems 27 (2), 305-334, 2010
952010
Roles of information security awareness and perceived fairness in information security policy compliance
B Bulgurcu, H Cavusoglu, I Benbasat
AMCIS 2009 proceedings, 419, 2009
922009
An empirical investigation of the antecedents and consequences of privacy uncertainty in the context of mobile apps
S Al-Natour, H Cavusoglu, I Benbasat, U Aleem
Information Systems Research 31 (4), 1037-1063, 2020
772020
The system can't perform the operation now. Try again later.
Articles 1–20