H. R. Rao's research

(MSS Department, SOM, SUNY Buffalo)

How to Study: A Brief Guide


Papers on Information Technology and Services Outsourcing

2010

  • Insu Park, Amit Bhatnagar, and H. Raghav Rao "Assurance Seals, On‑Line Customer Satisfaction, and Repurchase Intention," International Journal of Electronic Commerce, Vol. 14 No. 3. [PDF]

2008


  • Jahyun Goo, Rajiv Kishore, H. R. Rao, and Kichan Nam "The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study," MIS Quarterly, Vol. 33 No. 1. [PDF]

  • Swinarski, M., Kishore, R., and Rao, H.R. "Vendor commitment in an ASP outsourcing context: a comparative evaluation of the roles of power and partnership," in: Information Technology Outsourcing, S. Rivard and B.A. Aubert (eds.), M. E. Sharpe, Armonk, NY, 2008, pp. 189-223. [PDF]
  • S. Raghu &Wonseok Woo & S. B. Mohan & H. Raghav Rao,"Market reaction to patent infringement litigations
    in the information technology industry", Information Systems Frontier, 2008, 10:61–75.[PDF]

2007

  • Goo, J., Kishore, R., Nam, K., Rao, H. R., and Song, Y. I. “An investigation of factors that influence the duration of IT outsourcing relationships,” Decision Support Systems (42:4), 2007, pp. 2107-2125. [PDF]

2006
  • Manish Agrawal, Rajiv Kishore, and H. Raghav Rao, "Market Reactions to E-Business Outsourcing Announcements: An Event Study", Information & Management. Oct 2006. Vol. 43, Iss. 7; p. 861 [PDF]

  • Randeree, E., Kishore, R., and Rao, H.R. "Investigating trust in outsourcing: a study in the health care industry," in: Information Technology Outsourcing, S. Rivard and B.A. Aubert (eds.), M. E. Sharpe, Armonk, NY, 2008, pp. 135-160.

  • Sahajpal, G., Agrawal, M., Kishore, R., and Rao, H.R. "Business Process Offshoring to India: An Overview " in: Outsourcing A. Heinzl, J. Dibbern and R. Hirschheim (eds.), 2006.


2005
  • Banerjee, S., and Rao, H.R. "Managing Outsourcing Data Security Risks for Financial Institutions," Financial Services Outsourcing (Fall) 2005, pp 16-22.

2004

2003
  • Kishore, R., Rao, H.R., Nam, K., Rajagopalan, S., and Chaudhury, A. "A Relationship Perspective on IT Outsourcing," Association for Computing Machinery. Communications of the ACM (46:12) 2003, p 86. [PDF]

  • Randeree, E., Judd, S., Kishore, R., and R.Rao, H. "Antecendents of ASP Adoption in Healthcare," Journal of Healthcare Information Management (Fall) 2003.


2002
  • Shin, S., Ramesh, R., and Rao, H.R. "Organizational and Economic Mechanisms for Buyer-Supplier Contracts," in: Business Modelling: Mulitdisciplinary approaches: Economics, Operational and Information Systems Perspectives, C. Holsapple, V. Jacob and H. R. Rao (eds.), Kluwer Academic Publishers, Boston, MA, 2002.

  • Swinarski, M.E., Kishore, R., and Rao, H.R. "Impact of Vendor Capabilities on ASP Performance " in: Information Systems Outsourcing in the New Economy, R. Hirschheim, A. Heinzl and J. Dibbern (eds.), Springer, Verlag, Berlin, Heidelberg, New York, 2002.

Before ~ 2000
  • Chaudhury, A., Nam, K., and Rao, H.R. "Management of information systems outsourcing: A bidding perspective," Journal of Management Information Systems (12:2) 1995, p 131. [Link]

  • Nam, K., Rajagopalan, S., Rao, H.R., and Chaudhury, A. "A two-level investigation of information systems outsourcing," Association for Computing Machinery. Communications of the ACM (39:7) 1996, p 36. [PDF]

  • Rao, H.R., Nam, K., and Chaudhury, A. "Information systems outsourcing," Association for Computing Machinery. Communications of the ACM (39:7) 1996, p 27. [PDF]

Top

 

Papers on e-Business, Knowledge, Information Assurance and Security Services


2011


JinKyu Lee, H. R. Rao, “Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain,” Information Systems Journal 22(4) 2012.[PDF]

 


2010


Jingguo Wang , Nan Xiao, H. R. Rao, “Drivers of Information Security Search Behavior: An Investigation of Network Attacks and Vulnerability Disclosures,” ACM Transactions on Management Information Systems 1(1) 2010.[PDF]

 


2009


 

  • Teju Herath, H. Raghav Rao. "Protection motivation and deterrence: a framework for security policy compliance in o rganisations" European Journal of Information Systems (2009) 18, 106–125 [PDF]

  • JinKyu Lee, Sharmistha Bagchi-Sen, H. Raghav Rao, and Shambhu J. Upadhyaya. "Anatomy of the Information Security Workforce", Forthcoming, IEEE IT Professional [PDF]

  • JinKyu Lee, H. Raghav Rao. "Task Complexity and Different Decision Criteria for Online Service Acceptance: A Comparison of Two e-Government Compliance Service Domains", Forthcoming, Decision Support Systems [PDF]

  • Tejaswini Herath, H.R. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness", Decision Support Systems 47 (2009) 154–165 [PDF]

  • Wang, J., Chen, R., Herath, T. and Rao., H.R. 2009. “An Exploration of the Design Features of Phishing Attacks.” In Annals of Emerging Research in IA, Security and Privacy Services, edited by H.R. Rao and Shambhu Upadhyaya. Emerald Publishers. [PDF]

  • Dan J. Kim , Donald L. Ferrin , and H. Raghav Rao,"Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration", Information Systems Research , 2009, Vol. 20, Number 2, pp-237-257. [PDF]


2008
 
  • Jingguo Wang, Rui Chen, Tejaswini Herath, H. Raghav Rao, "An Empirical Exploration Of The Design Pattern Of Phishing ", Attacks forthcoming in Handbook of Information Assurance, Security and Privacy Services, Emerald Publishers, 2009

  • Dinesh K. Gauri, Amit Bhatnagar, and Raghav Rao, "Role of Word of Mouth in Online Store Loyalty: Comparing online store ratings with other e-store loyalty factors" COMMUNICATIONS OF THE ACM March 2008/Vol. 51, No. 3 [PDF]

  • Jingguo Wang, Aby Chaudhury, H. Raghav Rao, “A Value-at-Risk Approach to Information Security Investment”, Information Systems Research, Vol. 19, No. 1, March 2008, pp. 106–120. [PDF]

  • Manish Gupta, Shamik Banerjee, Manish Agrawal and H.R. Rao, Security Analysis of Internet Technology Components Enabling Globally Distributed Workplaces – A framework, ACM Transactions on Internet Technology, November 2008 (volume 8, number 4). [PDF]

  • Erin Cody, Raj Sharman, Raghav H Rao, Shambhu Upadhyaya, "Security in grid computing: A review and synthesis", in Decision Support Systems, Vol. 44, Iss. 4; p. 749, Mar 2008. [PDF]

  • Dan J. Kim , Donald L. Ferrin , and H. Raghav Rao,"A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents", Decision Support Systems, 2008. [PDF]


2007
 
  •  

  • Insu Park, R. Sharman, H. R.Rao, S. Upadhyaya, "The Effect of Spam and Privacy Concerns on Email Users’ Behavior ", Journal of Information System Security, Volume 3, Number 1, pp 39-62,2007. [PDF]

  • D. Ghosh, R. Sharman, H. R. Rao and S. Upadhyaya, “Self-Healing Systems, Survey and Synthesis” Decision Support Systems, Volume 42, Number 4, pp 2164, 2007.

  • Insu Park, Sharman, R., Rao, H.R., and Upadhyaya, S. "Short term and total life impact analysis of email worms in computer systems," Decision Support Systems , Volume 43, Number 3, pp 827 2007 [PDF]

2006
  • S. Chai, T.C Herath, Insu Park, H.R. Rao, “Repeated Use of e-Gov websites: A Satisfaction and Confidentiality Perspective” International Journal of Electronic Government Research, Volume 2, Number 3, pp 1-23, July - September 2006.

  • Jin Ki Kim, Raj Sharman, H. Raghav Rao, and Shambhu Upadhyaya, "Perceptions of First Responders with regard to Critical Incident Management Systems: a comparison of Canadian and Non-Canadian Responders", Emergency Management Canada, 2006.

  • Park, I., Lee, J.K., Rao, H.R., and Upadhyaya, S. "Secure Knowledge Management : A Delphi Study," IEEE Transactions in Systems, Man and Cybernetics (36:3) 2006, p 421. [PDF]

  • Rao, H.R., and Upadhyaya, S. "Secure Knowledge Management - An Introduction¡± " IEEE Transactions on Systems, Man and Cybernetics (36:3) 2006. [PDF]


2005
  • Banerjee, S., and Rao, H.R. "Managing Outsourcing Data Security Risks for Financial Institutions¡± " Financial Services Outsourcing (Fall) 2005, pp 16-22.

  • Kim, D.J., Song, Y.I., Baynov, S.B., and Rao, H.R. "A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia/practitioner perspectives," Decision Support Systems (40:2) 2005, p 143. [PDF]

  • Lee, J., Upadhyaya, S.J., Rao, H.R., and Sharman, R. "Secure knowledge management and the semantic web," Association for Computing Machinery. Communications of the ACM (48:12) 2005, p 48. [PDF]

  • Ryu, C., Kim, Y.J., Chaudhury, A., and Rao, H.R. "Knowledge Acquisition Via Three Learning Processes In Enterprise Information Portals: Learning-By-Investment, Learning-By-Doing, And Learning-From-Others," MIS Quarterly (29:2) 2005, p 245. [PDF]

  • Tanna, G.B., Gupta, M., Rao, H.R., and Upadhyaya, S. "Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis," Decision Support Systems (41:1) 2005, p 242. [PDF]


2004
  • Gupta, M., Rao, R., and Upadhyaya, S. "Electronic Banking and Information Assurance Issues: Survey and Synthesis," Journal of Organizational and End User Computing (16:3) 2004, p 1. [PDF]

  • Kim, D.J., Sivasailam, N., and Rao, H.R. "Information Assurance in B2C Websites for Information Goods/Services," Electronic Markets (14:4) 2004, p 344. [PDF]

  • Randeree, E., and Rao, H.R. "E-Health and Assurance: Curing Hospital Web Sites," International Journal of Electronic Healthcare (IJEH) ) 2004. [PDF]


2003
  • Agrawal, M., Rao, H.R., and Sanders, G.L. "Impact of Mobile Computing Terminals in Police Work," Journal of Organizational Computing and Electronic Commerce (13:2) 2003. [PDF]

  • Kim, D.J., Agrawal, M., Jayaraman, B., and Rao, H.R. "A comparison of B2B e-service solutions," Association for Computing Machinery. Communications of the ACM (46:12) 2003, p 317. [PDF]

  • Salam, A.F., Rao, H.R., and Pegels, C.C. "Consumer-perceived risk in e-commerce transactions," Association for Computing Machinery. Communications of the ACM (46:12) 2003, p 325. [PDF]


2002
  • Sivasailam, N., Kim, D.J., and Rao, H.R. "What Companies Are(n't) Doing about Web Site Assurance," IT Professional Magazine (4:3) 2002, p 33. (Quoted in Democrat and Chronicle, Rochester, NY July 6, 2002; Associated Press News Release, July 17, 2002; Washington Post, July 17, 2002, Buffalo News, July 21, 2002, Houston Chronicle, July 20, 2002, Canadian NewsWire, July 19, 2002 ) [PDF]

2001
  • Chaudhury, A., Mallick, D.N., and Rao, H.R. "Web channels in e-commerce," Association for Computing Machinery. Communications of the ACM (44:1) 2001, p 99. [PDF]

1990~2000
  • Bhatnagar, A., Misra, S., and Rao, H.R. "On risk, convenience, and Internet shopping behavior," Association for Computing Machinery. Communications of the ACM (43:11) 2000, p 98. [PDF]

  • Salam, A.F., Rao, H.R., and Pegels, C.C. "Content of corporate Web pages as advertising media," Association for Computing Machinery. Communications of the ACM (41:3) 1998, p 76. (quoted in Arthur Andersen's Knowledge Space: 06/25/98 in an article by Marianthi N. Contos, "Marketing Thursday: Making your Web Site a Draw"; also quoted in a piece aired on National Public Radio (WBFO) July 10, 1998 at 8.00 a.m; Industry Week, July 17, 1998, Managed Healthcare News, September 15, 1998, Akron (Ohio) Beacon Journal, August 25, 1998; ComputerWorld,Oct 1998; Working Woman , November 1998, Reporter June 30, 1998) [PDF]

  • Rao, H. Raghav; Chaudhury, Abhijit; Chakka, M. "Modeling Team Processes: Issues and a Specific Example," Information Systems Research , Sep95, Vol. 6 Issue 3, p255-285 [PDF]
Top
 

Papers on Extreme Events


2014

Jessica Pu Li, Arun Vishwanath, H. Raghav Rao: "Retweeting the Fukushima nuclear radiation disaster". Communications of the ACM 57(1): 78-85 [PDF]

2013

Chen, R., Sharman, R., Rao, H. R., & Upadhyaya, S. J. (2013). Data model development for fire related extreme events: An activity theory approach. MIS Quarterly, 37(1), 125-147 [PDF]

2013

"Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises", Onook Oh, M. Agrawal, and H. R. Rao, MIS Quarterly, 37(2), June 2013, pp 407-426 [PDF]

2012

"Audience Gatekeeping in the Twitter Service: An Investigation of Tweets about the 2009 Gaza Conflict," Hazel Kwon, Onook Oh., Agrawal M. and Rao, H.R., AIS Transactions on Human-Computer interactions, 4(4), 2012, pp 212-229 [PDF]

2011

Minkyun Kim,Raj Sharman,atherine P. Cook-Cottone, H. Raghav Rao b & Shambhu J. Upadhyaya. Assessing roles of people, technology and structure in emergency management systems: a public sector perspective. Behaviour & Information Technology, DOI:10.1080/0144929X.2010.510209 [PDF]

2010

Jessica Li and H.R.Rao "Twitter as a Rapid Response News Service: An Exploration in the Context of the 2008 China Earthquake," Electronic Journal of Information Systems in Developing Countries (42) 2010.[PDF]

JinKyu Lee, Nitesh Bharosa, Jing Yang, Marijn Janssen, H.R. Rao. Group value and intention to use — A study of multi-agency disaster management information systems for public safety, Decision. Support Systems. (2010), doi:10.1016/j.dss.2010.10.002[PDF]

2009


  • Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee, and H. R. Rao"Information Sharing: A study of information attributes and their relative significance during catastrophic events", in Cyber-Security and Global Information Assurance: Threat Analysis And Response Solutions, (ed Kenneth Knapp) IGI Publishers, 2009 [PDF]


2007
  • Jin Kyu Lee, H.r. Rao, "Perceived Risks, Counter-Beliefs, and Intentions to Use Anti-/Counter-Terrorism Websites: An Exploratory Study of Government-Citizens Online Interactions in a Turbulent Environment," Decision Support Systems, 43 (4), 1431-1449,2007. [PDF]

  • Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambhu Upadhyaya, "Self-healing systems — survey and synthesis", Decision Support Systems , Volume 42, Issue 4 , January 2007 , Pages 2164-2185 [PDF]

  • Jin Ki Kim, Raj Sharman, H. Raghav Rao, and Shambhu Upadhyaya, "Efficiency of critical incident management systems: Instrument development and validation", in Decision Support Systems, Volume 44 , Issue 1, Pages 235-250, 2007. [PDF]

  • Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, Catherine P. Cook-Cottone "Organizational Coordination in Extreme Events: A Case Study of October 06 Snowstorm in Western New York" [PDF]

  • Rui Chen, Raj Sharman, H. Raghav Rao, and Shambhu J. Upadhyaya, " Emergency Response Coordination and IT support: Contingency and Strategies", The Americas Conferences on Information Systems, Keystone, CO, Aug 9-12, 2007 [PDF]

  • Rui Chen, Raj Sharman, H. Raghav Rao, and Shambhu J. Upadhyaya, " An Exploration of Coordination in Emergency Response Management" Communications of the ACM [PDF]

  • Rui Chen, Raj Sharman, H. Raghav Rao, and Shambhu J. Upadhyaya, "Design Principles for Emergency Response Management Systems, "Journal of Information Systems and e-Business Management", [PDF]

  • Rui Chen, Raj Sharman, Nirupama Chakravarti, H. Raghav Rao, Shambhu J Upadhyaya, "Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model" , Journal of the Association for Information Systems [PDF]

  • Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, Catherine P. Cook-Cottone, "Organizational Coordination in Extreme Events: A Case Study of October ’06 Snowstorm in Western New York", The Fifth Pre-ICIS SIG DSS Workshop, Montreal, Canada, Dec 9, 2007 [PDF]

  • Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, " Response Information Interoperability: A Development of Data Standards in the Fire Incident Context", The Sixth Pre-ICIS International Workshop on e-Business, Montreal, Canada, Dec 9, 2007 [PDF]

 

Gendered Tasks and Inequitable Outcomes in the Context of Cybersecurity


2009
  • Sangmi Chai , Sharmistha Bagchi-Sen, Claudia Morrell, H. R. Rao, Shambhu J. Upadhyaya “ Internet and Online Information Privacy: An Exploratory Study of Pre and Early teens” IEEE transaction on professional communications (forthcoming March 2009) [PDF]

  • S. Bagchi-Sen, S. Chai, H.R. Rao and S. Upadhyaya. "A Study of Women Professionals' Career Advancement in Cybersecurity, Forthcoming, IEEE IT Professional [PDF].

2006
  • S. Chai, S. Bagchi-Sen, H.R. Rao and S. Upadhyaya. “A Framework for Understanding Minority Students' Cyber Security Career Interests”. 12 th Americas Conference on Information Systems (AMCIS), Acapulco , Mexico , August 4-6, 2006 S.[PDF]

  • S. Chai, S. Bagchi-Sen, C. Morrell, H. R. Rao, S.Upadhyaya, "Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior” Issues in Informing Science and Information Technology, Vol.3, 2006 p. 127-135. [PDF]


2005
  • Bannerji, S., Kang, H., Bagchi-Sen, S., and Rao, H.R. "Gender Divide in the Use of the Internet Applications," The International Journal of E-Business Research (IJEBR) (1:2) 2005.

  • Kang, H., Bachi-Sen, S., Rao, H.R., and Bannerjee, S. "Internet Skeptics: An Analysis of Intermittent Users and Net-Dropouts " IEEE Technology and Society Magazine (24:2) 2005, pp 26-31. [PDF]

 

Top