default search action
Huseyin Cavusoglu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Geng Sun, Huseyin Cavusoglu, Srinivasan Raghunathan:
Strategic Implications of Online Retail Platforms' Membership-Based Free Shipping Programs. Inf. Syst. Res. 35(2): 673-685 (2024) - [c23]Haozhao Zhang, Huseyin Cavusoglu, Srinivasan Raghunathan:
Membership Programs of Ride Hailing Platforms. PACIS 2024 - 2023
- [c22]Haozhao Zhang, Huseyin Cavusoglu, Srinivasan Raghunathan:
Two-Sided Sharing Platforms: Sell Upfront Subscriptions or Not? HICSS 2023: 3537-3546 - 2022
- [j23]Mei Li, Yoon Han, Khim-Yong Goh, Huseyin Cavusoglu:
Mobile app portfolio management and developers' performance: An empirical study of the apple app store. Inf. Manag. 59(8): 103716 (2022) - 2021
- [j22]Huseyin Cavusoglu, Zhuolun Li, Seung-Hyun Kim:
How do Virtual Badges Incentivize Voluntary Contributions to Online Communities? Inf. Manag. 58(5): 103483 (2021) - [j21]Mehmet U. S. Ayvaci, Huseyin Cavusoglu, Yeongin Kim, Srinivasan Raghunathan:
Designing Payment Contracts for Healthcare Services to Induce Information Sharing: The Adoption and the Value of Health Information Exchanges (HIEs). MIS Q. 45(2) (2021) - [j20]Murat Mustafa Tunç, Huseyin Cavusoglu, Srinivasan Raghunathan:
Online Product Reviews: Is a Finer-Grained Rating Scheme Superior to a Coarser One? MIS Q. 45(4): 2193-2234 (2021) - 2020
- [j19]Hasan Cavusoglu, Huseyin Cavusoglu, Xianjun Geng:
Bloatware and Jailbreaking: Strategic Impacts of Consumer-Initiated Modification of Technology Products. Inf. Syst. Res. 31(1): 240-257 (2020)
2010 – 2019
- 2019
- [j18]Huseyin Cavusoglu, Alan R. Dennis, Jeffrey Parsons:
Special Issue: Immersive Systems. J. Manag. Inf. Syst. 36(3): 680-682 (2019) - [c21]Murat Mustafa Tunç, Huseyin Cavusoglu, Srinivasan Raghunathan:
Two-sided Adverse Selection and Bilateral Reviews in the Sharing Economy. ICIS 2019 - 2018
- [c20]Geng Sun, Huseyin Cavusoglu, Srinivasan Raghunathan:
Membership-Based Free Shipping Programs: A New Vehicle to Gain Competitive Advantage for Online Retailers? ICIS 2018 - 2017
- [c19]Geng Sun, Huseyin Cavusoglu, Srinivasan Raghunathan:
An Analysis of Membership-Based Free Shipping Programs of Online Marketplaces. ICIS 2017 - [c18]Murat Mustafa Tunç, Huseyin Cavusoglu, Srinivasan Raghunathan:
Single-Dimensional Versus Multi-Dimensional Product Ratings in Online Marketplaces for Experience Goods. ICIS 2017 - 2016
- [j17]Huseyin Cavusoglu, Tuan Quang Phan, Hasan Cavusoglu, Edoardo M. Airoldi:
Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook. Inf. Syst. Res. 27(4): 848-879 (2016) - 2015
- [j16]Huseyin Cavusoglu, Hasan Cavusoglu, Jai-Yeol Son, Izak Benbasat:
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources. Inf. Manag. 52(4): 385-400 (2015) - [c17]Edoardo M. Airoldi, Hasan Cavusoglu, Huseyin Cavusoglu, Tuan Quang Phan:
Privacy Controls and Disclosure Behavior. AMCIS 2015 - [c16]Huseyin Cavusoglu, Zhuolun Li, Ke-Wei Huang:
Can Gamification Motivate Voluntary Contributions?: The Case of StackOverflow Q&A Community. CSCW Companion 2015: 171-174 - [c15]Hasan Cavusoglu, Huseyin Cavusoglu, Xianjun Geng:
Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus. ICIS 2015 - 2014
- [j15]Asunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan:
Outsourcing Information Security: Contracting Issues and Security Implications. Manag. Sci. 60(3): 638-657 (2014) - [c14]Mei Li, Khim Yong Goh, Huseyin Cavusoglu:
Investigating Developers' entry to Mobile App Platforms: a Network Externality View. ECIS 2014 - [c13]Mei Li, Khim Yong Goh, Huseyin Cavusoglu:
What is IT in a Name? An Empirical Examination of Brand Imitation in Mobile App Market. PACIS 2014: 143 - 2013
- [j14]Huseyin Cavusoglu, Young Kwark, Bin Mai, Srinivasan Raghunathan:
Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers. Decis. Anal. 10(1): 63-81 (2013) - [c12]Huseyin Cavusoglu, Tuan Quang Phan, Hasan Cavusoglu:
Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment. ICIS 2013 - [c11]Mei Li, Khim Yong Goh, Huseyin Cavusoglu:
Mobile App Portfolio Management and Developers' Performance: An Empirical Study of the Apple iOS Platform. ICIS 2013 - 2012
- [c10]Atreyi Kankanhalli, Mahdieh Taher, Huseyin Cavusoglu, Seung-Hyun Kim:
Gamification: A New Paradigm for Online User Engagement. ICIS 2012 - [c9]Zhuolun Li, Ke-Wei Huang, Huseyin Cavusoglu:
Quantifying the Impact of Badges on User Engagement in Online Q&A Communities. ICIS 2012 - [c8]Mun Kiat Sitoh, Huseyin Cavusoglu:
The Effect of Customers' Emotion on Service Recovery Strategy in IT Service Failures. ICIS 2012 - 2010
- [j13]Huseyin Cavusoglu, Byungwan Koh, Srinivasan Raghunathan:
An Analysis of the Impact of Passenger Profiling for Transportation Security. Oper. Res. 58(5): 1287-1302 (2010) - [c7]Asunur Cezar, Huseyin Cavusoglu, Srinivasan Raghunathan:
Outsourcing Information Security: Contracting Issues and Security Implications. WEIS 2010
2000 – 2009
- 2009
- [j12]Thomas A. Gerace, Huseyin Cavusoglu:
The critical elements of the patch management process. Commun. ACM 52(8): 117-121 (2009) - [j11]Huseyin Cavusoglu, Srinivasan Raghunathan, Hasan Cavusoglu:
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. Inf. Syst. Res. 20(2): 198-217 (2009) - 2008
- [j10]Hulisi Ögüt, Huseyin Cavusoglu, Srinivasan Raghunathan:
Intrusion-Detection Policies for IT Security Breaches. INFORMS J. Comput. 20(1): 112-123 (2008) - [j9]Huseyin Cavusoglu, Srinivasan Raghunathan, Wei T. Yue:
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment. J. Manag. Inf. Syst. 25(2): 281-304 (2008) - [j8]Hasan Cavusoglu, Huseyin Cavusoglu, Jun Zhang:
Security Patch Management: Share the Burden or Share the Damage? Manag. Sci. 54(4): 657-670 (2008) - 2007
- [j7]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation. IEEE Trans. Engineering Management 54(1): 12-28 (2007) - [j6]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. IEEE Trans. Software Eng. 33(3): 171-185 (2007) - [c6]Srinivasan Raghunathan, Huseyin Cavusoglu, Byungwan Koh:
Economics of User Segmentation, Profiling, and Detection in Security. WEIS 2007 - 2006
- [c5]Huseyin Cavusoglu, Hasan Cavusoglu, Jun Zhang:
Economics of Security Patch Management. WEIS 2006 - 2005
- [j5]Huseyin Cavusoglu, Birendra K. Mishra, Srinivasan Raghunathan:
The Value of Intrusion Detection Systems in Information Technology Security Architecture. Inf. Syst. Res. 16(1): 28-46 (2005) - [c4]Thomas A. Gerace, Huseyin Cavusoglu:
The critical elements of patch management. SIGUCCS 2005: 98-101 - [c3]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Emerging Issues in Responsible Vulnerability Disclosure. WEIS 2005 - 2004
- [j4]Huseyin Cavusoglu, Birendra K. Mishra, Srinivasan Raghunathan:
A model for evaluating IT security investments. Commun. ACM 47(7): 87-92 (2004) - [j3]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Economics of ITSecurity Management: Four Improvements to Current Security Practices. Commun. Assoc. Inf. Syst. 14: 3 (2004) - [j2]Huseyin Cavusoglu, Srinivasan Raghunathan:
Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches. Decis. Anal. 1(3): 131-148 (2004) - [j1]Huseyin Cavusoglu, Birendra K. Mishra, Srinivasan Raghunathan:
The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. Int. J. Electron. Commer. 9(1): 70-104 (2004) - [p1]Huseyin Cavusoglu:
Economics of IT Security Management. Economics of Information Security 2004: 71-83 - 2003
- [c2]Huseyin Cavusoglu, Srinivasan Raghunathan:
Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches. ICIS 2003: 692-705 - 2002
- [c1]Huseyin Cavusoglu, Srinivasan Raghunathan, Birendra K. Mishra:
Optimal Design of Information Technology Security Architecture. ICIS 2002: 74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint