Why IT managers don't go for cyber-insurance products T Bandyopadhyay, VS Mookerjee, RC Rao Communications of the ACM 52 (11), 68-73, 2009 | 159 | 2009 |
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest T Bandyopadhyay, V Jacob, S Raghunathan Information Technology and Management 11, 7-23, 2010 | 93 | 2010 |
Dynamic competition in IT security: A differential games approach T Bandyopadhyay, D Liu, VS Mookerjee, AW Wilhite Information Systems Frontiers 16, 643-661, 2014 | 31 | 2014 |
A model to analyze the challenge of using cyber insurance T Bandyopadhyay, V Mookerjee Information systems frontiers 21, 301-325, 2019 | 29 | 2019 |
Organizational adoption of cyber insurance instruments in IT security risk management–a modeling approach T Bandyopadhyay | 28 | 2012 |
ICT integration efforts in higher education in developing economies: The case of Addis Ababa University, Ethiopia D Tibebu, T Bandyopadhyay, S Negash International Journal of Information and Communication Technology Education …, 2009 | 23 | 2009 |
Role of intelligence inputs in defending against cyber warfare and cyberterrorism A Bagchi, T Bandyopadhyay Decision Analysis 15 (3), 174-193, 2018 | 12 | 2018 |
Electronic payment adoption in the banking sector of low-income countries T Alemu, T Bandyopadhyay, S Negash International Journal of Information Systems in the Service Sector (IJISSS …, 2015 | 12 | 2015 |
Mitigation and transfer of information security risk: Investment in financial instruments and technology T Bandyopadhyay The University of Texas at Dallas, 2006 | 12 | 2006 |
Mobile IT in health–the case of short messaging service in an HIV awareness program T Bandyopadhyay, P Meso, S Negash Information Technology for Development 24 (2), 359-397, 2018 | 11 | 2018 |
Mobile healthcare services adoption G Shanko, S Negash, T Bandyopadhyay International Journal of Networking and Virtual Organisations 16 (2), 143-156, 2016 | 11 | 2016 |
A model to analyze the unfulfilled promise of cyber insurance: The impact of secondary loss T Bandyopadhyay, VS Mookerjee, RC Rao Working Paper, 2010 | 10 | 2010 |
Simulation model development in information security education JM Garrido, T Bandyopadhyay 2009 Information Security Curriculum Development Conference, 21-26, 2009 | 10 | 2009 |
Influence of information overload on IT security behavior: a theoretical framework T Bandyopadhyay, H Zafar | 9 | 2017 |
Towards a managerial decision framework for utilization of cyber insurance instruments in IT security T Bandyopadhyay, S Shidore | 9 | 2011 |
Agile course design: Multi-university faculty collaboration to design the MIS course for an online MBA program AB Woszczynski, JL Pridmore, T Bandyopadhyay, J Godin, BJ Prince Journal of Information Systems Education 32 (1), 9-26, 2021 | 8 | 2021 |
Countering cyber terrorism: Investment models under decision and game theoretic frameworks T Bandyopadhyay, R Sebalia | 7 | 2008 |
Employing cost effective internet-based networking technologies to manage B2B relationship: The strategic impact on IT security risk T Bandyopadhyay International Journal of Risk and Contingency Management (IJRCM) 1 (1), 12-28, 2012 | 6 | 2012 |
Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology. T Bandyopadhyay, VS Jacob, S Raghunathan AMCIS, 456, 2005 | 6 | 2005 |
IT outsourcing risk management practices in higher educational institutes in Ethiopia–A qualitative study T Bandyopadhyay, D Beyene, S Negash | 3 | 2015 |