Why IT managers don't go for cyber-insurance products T Bandyopadhyay, VS Mookerjee, RC Rao Communications of the ACM 52 (11), 68-73, 2009 | 155 | 2009 |
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest T Bandyopadhyay, V Jacob, S Raghunathan Information Technology and Management 11, 7-23, 2010 | 88 | 2010 |
Dynamic competition in IT security: A differential games approach T Bandyopadhyay, D Liu, VS Mookerjee, AW Wilhite Information Systems Frontiers 16, 643-661, 2014 | 31 | 2014 |
Organizational adoption of cyber insurance instruments in IT security risk management–a modeling approach T Bandyopadhyay | 29 | 2012 |
A model to analyze the challenge of using cyber insurance T Bandyopadhyay, V Mookerjee Information systems frontiers 21, 301-325, 2019 | 27 | 2019 |
ICT integration efforts in higher education in developing economies: The case of Addis Ababa University, Ethiopia D Tibebu, T Bandyopadhyay, S Negash International Journal of Information and Communication Technology Education …, 2009 | 20 | 2009 |
Mobile healthcare services adoption G Shanko, S Negash, T Bandyopadhyay International Journal of Networking and Virtual Organisations 16 (2), 143-156, 2016 | 12 | 2016 |
Electronic payment adoption in the banking sector of low-income countries T Alemu, T Bandyopadhyay, S Negash International Journal of Information Systems in the Service Sector (IJISSS …, 2015 | 12 | 2015 |
Mitigation and transfer of information security risk: Investment in financial instruments and technology T Bandyopadhyay The University of Texas at Dallas, 2006 | 11 | 2006 |
Role of intelligence inputs in defending against cyber warfare and cyberterrorism A Bagchi, T Bandyopadhyay Decision Analysis 15 (3), 174-193, 2018 | 10 | 2018 |
Mobile IT in health–the case of short messaging service in an HIV awareness program T Bandyopadhyay, P Meso, S Negash Information technology for development 24 (2), 359-397, 2018 | 10 | 2018 |
Towards a managerial decision framework for utilization of cyber insurance instruments in IT security T Bandyopadhyay, S Shidore | 10 | 2011 |
A model to analyze the unfulfilled promise of cyber insurance: The impact of secondary loss T Bandyopadhyay, VS Mookerjee, RC Rao Working Paper, 2010 | 10 | 2010 |
Simulation model development in information security education JM Garrido, T Bandyopadhyay 2009 Information Security Curriculum Development Conference, 21-26, 2009 | 10 | 2009 |
Agile course design: Multi-university faculty collaboration to design the MIS course for an online MBA program AB Woszczynski, JL Pridmore, T Bandyopadhyay, J Godin, BJ Prince Journal of Information Systems Education 32 (1), 9-26, 2021 | 8 | 2021 |
Influence of information overload on IT security behavior: a theoretical framework T Bandyopadhyay, H Zafar | 7 | 2017 |
Countering cyber terrorism: Investment models under decision and game theoretic frameworks T Bandyopadhyay, R Sebalia | 7 | 2008 |
Employing cost effective internet-based networking technologies to manage B2B relationship: The strategic impact on IT security risk T Bandyopadhyay International Journal of Risk and Contingency Management (IJRCM) 1 (1), 12-28, 2012 | 6 | 2012 |
Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology. T Bandyopadhyay, VS Jacob, S Raghunathan AMCIS, 456, 2005 | 6 | 2005 |
A model for B2B IT security: Multilayer defense facing interdependent cyber risk T Bandyopadhyay | 3 | 2011 |