default search action
Baidyanath Biswas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j15]Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen:
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. Decis. Support Syst. 177: 114102 (2024) - [j14]Xin Liu, Yanju Zhou, Zongrun Wang, Ajay Kumar, Baidyanath Biswas:
Disease Topic Modeling of Users' Inquiry Texts: A Text Mining-Based PQDR-LDA Model for Analyzing the Online Medical Records. IEEE Trans. Engineering Management 71: 6319-6337 (2024) - 2023
- [j13]Rohit Gupta, Mohit Goswami, Yash Daultani, Baidyanath Biswas, Venkat Allada:
Profitability and pricing decision-making structures in presence of uncertain demand and green technology investment for a three tier supply chain. Comput. Ind. Eng. 179: 109190 (2023) - 2022
- [j12]Rohit Gupta, Bhawana Rathore, Abhishek Srivastava, Baidyanath Biswas:
Decision-making framework for identifying regions vulnerable to transmission of COVID-19 pandemic. Comput. Ind. Eng. 169: 108207 (2022) - [j11]Baidyanath Biswas, Arunabha Mukhopadhyay, Sudip Bhattacharjee, Ajay Kumar, Dursun Delen:
A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums. Decis. Support Syst. 152: 113651 (2022) - [j10]Baidyanath Biswas, Pooja Sengupta, Ajay Kumar, Dursun Delen, Shivam Gupta:
A critical assessment of consumer reviews: A hybrid NLP-based methodology. Decis. Support Syst. 159: 113799 (2022) - [j9]Baidyanath Biswas, Pooja Sengupta, Boudhayan Ganguly:
Your reviews or mine? Exploring the determinants of "perceived helpfulness" of online reviews: a cross-cultural study. Electron. Mark. 32(3): 1083-1102 (2022) - [j8]Weng Marc Lim, Gaurav Gupta, Baidyanath Biswas, Rohit Gupta:
Collaborative consumption continuance: a mixed-methods analysis of the service quality-loyalty relationship in ride-sharing services. Electron. Mark. 32(3): 1463-1484 (2022) - [j7]Praveen Ranjan Srivastava, Kinshuk Sengupta, Ajay Kumar, Baidyanath Biswas, Alessio Ishizaka:
Post-epidemic factors influencing customer's booking intent for a hotel or leisure spot: an empirical study. J. Enterp. Inf. Manag. 35(1): 78-99 (2022) - 2021
- [j6]Rohit Gupta, Baidyanath Biswas, Indranil Biswas, Shib Sankar Sana:
Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. Inf. Comput. Secur. 29(1): 73-104 (2021) - [j5]Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia, Manoj Dora:
Antecedents for enhanced level of cyber-security in organisations. J. Enterp. Inf. Manag. 34(6): 1597-1629 (2021) - 2020
- [j4]Baidyanath Biswas, Pooja Sengupta, Dwaipayan Chatterjee:
Examining the determinants of the count of customer reviews in peer-to-peer home-sharing platforms using clustering and count regression techniques. Decis. Support Syst. 135: 113324 (2020) - 2019
- [j3]Baidyanath Biswas, Rohit Gupta:
Analysis of barriers to implement blockchain in industry and service sectors. Comput. Ind. Eng. 136: 225-241 (2019) - 2018
- [j2]Baidyanath Biswas, Arunabha Mukhopadhyay:
G-RAM framework for software risk assessment and mitigation strategies in organisations. J. Enterp. Inf. Manag. 31(2): 276-299 (2018) - 2012
- [j1]Surjadeep Sarkar, Basab Chatterjee, Ujjwal Maulik, Baidyanath Biswas:
Elimination of truncation and round off error and enhancement of stability using a new split loop DPLL. Int. J. Commun. Syst. 25(8): 1059-1067 (2012)
Conference and Workshop Papers
- 2019
- [c5]Baidyanath Biswas, Arunabha Mukhopadhyay:
Why do I get phished? The role of persuasion, design authenticity and contextualization. AMCIS 2019 - 2018
- [c4]Arunabha Mukhopadhyay, Baidyanath Biswas, Shounak Pal:
C-R-P-M-I: A framework to model cyber risk from phishing and mitigation through insurance. AMCIS 2018 - [c3]Baidyanath Biswas, Arunabha Mukhopadhyay, Gaurav Gupta:
"Leadership in Action: How Top Hackers Behave" A Big-Data Approach with Text-Mining and Sentiment Analysis. HICSS 2018: 1-10 - 2016
- [c2]Baidyanath Biswas, Shounak Pal, Arunabha Mukhopadhyay:
AVICS-Eco Framework: An Approach to Attack Prediction and Vulnerability Assessment in a Cyber Ecosystem. AMCIS 2016 - [c1]Shounak Pal, Baidyanath Biswas, Arunabha Mukhopadhyay:
Can HIT Work Alone? A Security and Socio-Economic Perspective of Healthcare Quality. AMCIS 2016
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint