default search action
Divakaran Liginlal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j17]Silvia Pessoa, Maria Pia Gomez Laich, Divakaran Liginlal, Thomas D. Mitchell:
Scaffolding Case Analysis Writing: A Collaboration between Information Systems and Writing Faculty. J. Inf. Syst. Educ. 30(1): 42-56 (2019) - 2015
- [j16]Lara Khansa, Xiao Ma, Divakaran Liginlal, Sung S. Kim:
Understanding Members' Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis. J. Manag. Inf. Syst. 32(2): 162-203 (2015) - 2012
- [j15]Divakaran Liginlal, Inkook Sim, Lara Khansa, Paul Fearn:
HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory. Comput. Secur. 31(2): 206-220 (2012) - [j14]Lara Khansa, Divakaran Liginlal:
Whither information security? Examining the complementarities and substitutive effects among IT and information security firms. Int. J. Inf. Manag. 32(3): 271-281 (2012) - [j13]Lara Khansa, Divakaran Liginlal:
Regulatory Influence and the Imperative of Innovation in Identity and Access Management. Inf. Resour. Manag. J. 25(3): 78-97 (2012) - [j12]Inkook Sim, Divakaran Liginlal, Lara Khansa:
Information Privacy Situation Awareness: Construct and Validation. J. Comput. Inf. Syst. 53(1): 57-64 (2012) - 2011
- [j11]Lara Khansa, Divakaran Liginlal:
Predicting stock market returns from malicious attacks: A comparative analysis of vector autoregression and time-delayed neural networks. Decis. Support Syst. 51(4): 745-759 (2011) - [j10]Tabitha L. James, Lara Khansa, Deborah F. Cook, Divakaran Liginlal:
Technology and U.S. Politics. IEEE Technol. Soc. Mag. 30(1): 20-27 (2011) - 2010
- [j9]Divakaran Liginlal, Lara Khansa, Stella C. Chia:
Using Real Options Theory to Evaluate Strategic Investment Options for Mobile Content Delivery: A Case Study. Int. J. Bus. Data Commun. Netw. 6(1): 17-37 (2010) - 2009
- [j8]Lara Khansa, Divakaran Liginlal:
Quantifying the benefits of investing in information security. Commun. ACM 52(11): 113-117 (2009) - [j7]Divakaran Liginlal, Inkook Sim, Lara Khansa:
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Comput. Secur. 28(3-4): 215-228 (2009) - [j6]Lara Khansa, Divakaran Liginlal:
Valuing the flexibility of investing in security process innovations. Eur. J. Oper. Res. 192(1): 216-235 (2009) - 2008
- [j5]Ye Chen, Divakaran Liginlal:
A maximum entropy approach to feature selection in knowledge-based authentication. Decis. Support Syst. 46(1): 388-398 (2008) - 2007
- [j4]Ye Chen, Divakaran Liginlal:
Bayesian Networks for Knowledge-Based Authentication. IEEE Trans. Knowl. Data Eng. 19(5): 695-710 (2007) - 2006
- [j3]Divakaran Liginlal, Terence T. Ow:
Modeling attitude to risk in human decision processes: An application of fuzzy measures. Fuzzy Sets Syst. 157(23): 3040-3054 (2006) - [j2]Divakaran Liginlal, S. Ram, Lucien Duckstein:
Fuzzy measure theoretical approach to screening product innovations. IEEE Trans. Syst. Man Cybern. Part A 36(3): 577-591 (2006) - 2005
- [j1]Divakaran Liginlal, Terence T. Ow:
On policy capturing with fuzzy measures. Eur. J. Oper. Res. 167(2): 461-474 (2005)
Conference and Workshop Papers
- 2018
- [c14]Divakaran Liginlal, Silvia Pessoa, Maria Pia Gomez Laich, Chadi Aoun:
Applying the Onion Model to Scaffold Writing Development in Information Systems Courses. AMCIS 2018 - [c13]Mohammed Zakaria, Divakaran Liginlal, Chadi Aoun:
Measuring Corporate Transparency in Sustainability Reporting. AMCIS 2018 - [c12]Latifa Khalid Al-Thani, Divakaran Liginlal:
A Study of Natural Interactions with Digital Heritage Artifacts. DigitalHERITAGE/VSMM 2018: 1-4 - 2017
- [c11]Divakaran Liginlal, Dana Al-Muftah:
Web Accessibility as a Barrier to Successful Digital Governance: A Case Study of the Arabian Gulf Region. CONF-IRM 2017: 42 - 2016
- [c10]Yun Deng, Jinghui (Jove) Hou, Divakaran Liginlal, Xue Yang, Xiao Ma:
Applying the Cox Model to Study Online Gambling Behavior. ICIS 2016 - 2015
- [c9]Chadi Aoun, Simon Fass, Divakaran Liginlal, Rami Yousef:
Combining Morphological Analysis and Bayesian Belief Networks: A DSS for Safer Construction of a Smart City. AMCIS 2015 - [c8]Aisha Al-Missned, Divakaran Liginlal:
Voices of Al-Khor a study in digital cultural heritage. Digital Heritage 2015: 631-634 - [c7]Divakaran Liginlal, Maryam Al-Fehani, Preetha Gopinath, Alex Cheek:
Wish Lists and Shopping Carts: A Study of Visual Metaphors on Arab E-Commerce Websites. WEB 2015: 176-180 - 2009
- [c6]Divakaran Liginlal, Inkook Sim, Lara Khansa, Paul Fearn:
Human Error and Privacy Breaches in Healthcare Organizations: Causes and Management Strategies. AMCIS 2009: 406 - [c5]Lara Khansa, Divakaran Liginlal:
Will the Information Security Industry Die? Applying Social Network Analysis to Sturdy Industry Convergence. AMCIS 2009: 523 - [c4]Lara Khansa, Divakaran Liginlal:
Has Decreasing Innovation Hurt the Stock Price of Information Security Firms? A Time Series Analysis. AMCIS 2009: 784 - [c3]Divakaran Liginlal, Lara Khansa:
Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks. WEB 2009: 166-176 - 2007
- [c2]Lara Khansa, Divakaran Liginlal:
The Influence of Regulations on Innovation in Information Security. AMCIS 2007: 180 - [c1]Ye Chen, Divakaran Liginlal:
An Empirical Investigation of Knowledge-Based Authentication. AMCIS 2007: 265
Parts in Books or Collections
- 2015
- [p1]Divakaran Liginlal:
HIPAA and Human Error: The Role of Enhanced Situation Awareness in Protecting Health Information. Medical Data Privacy Handbook 2015: 679-696
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint