default search action
Hasan Cavusoglu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Gagan Bhatia, El Moatez Billah Nagoudi, Hasan Cavusoglu, Muhammad Abdul-Mageed:
FinTral: A Family of GPT-4 Level Multimodal Financial Large Language Models. ACL (Findings) 2024: 13064-13087 - [i4]Gagan Bhatia, El Moatez Billah Nagoudi, Hasan Cavusoglu, Muhammad Abdul-Mageed:
FinTral: A Family of GPT-4 Level Multimodal Financial Large Language Models. CoRR abs/2402.10986 (2024) - 2023
- [j19]Amir Fard Bahreini, Hasan Cavusoglu, Ronald T. Cenfetelli:
How "What you think you know about cybersecurity" can help users make more secure decisions. Inf. Manag. 60(7): 103860 (2023) - [j18]Moksh Matta, Hasan Cavusoglu, Izak Benbasat:
Understanding the Board's Involvement in Information Technology Governance. Inf. Syst. Manag. 40(2): 127-147 (2023) - [c28]Rui Cao, Nazli Ozum Kafaee, Arslan Aziz, Hasan Cavusoglu:
Market Reaction to Cyber Strategy Disclosure: Word Embedding Derived Approach. HICSS 2023: 6078-6087 - 2022
- [j17]Sanjith Gopalakrishnan, Moksh Matta, Hasan Cavusoglu:
The Dark Side of Technological Modularity: Opportunistic Information Hiding During Interorganizational System Adoption. Inf. Syst. Res. 33(3): 1072-1092 (2022) - [c27]Sameh Al-Natour, Hasan Cavusoglu, Arash Saghafi, Natalia Wiercinska:
Too Close to Home: The Drivers of Perceived Risk of Home Automation. AMCIS 2022 - [c26]Amir Fard Bahreini, Ron Cenfetelli, Hasan Cavusoglu:
The Role of Heuristics in Information Security Decision Making. HICSS 2022: 1-10 - [c25]Rui Cao, Nazli Ozum Kafaee, Arslan Aziz, Hasan Cavusoglu:
Market Value of Cybersecurity Strategies. PACIS 2022: 113 - 2021
- [i3]El Moatez Billah Nagoudi, Wei-Rui Chen, Muhammad Abdul-Mageed, Hasan Cavusoglu:
IndT5: A Text-to-Text Transformer for 10 Indigenous Languages. CoRR abs/2104.07483 (2021) - 2020
- [j16]Hasan Cavusoglu, Huseyin Cavusoglu, Xianjun Geng:
Bloatware and Jailbreaking: Strategic Impacts of Consumer-Initiated Modification of Technology Products. Inf. Syst. Res. 31(1): 240-257 (2020) - [j15]Sameh Al-Natour, Hasan Cavusoglu, Izak Benbasat, Usman Aleem:
An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps. Inf. Syst. Res. 31(4): 1037-1063 (2020) - [c24]El Moatez Billah Nagoudi, Muhammad Abdul-Mageed, Hasan Cavusoglu:
Growing Together: Modeling Human Language Learning With n-Best Multi-Checkpoint Machine Translation. NGT@ACL 2020: 169-177 - [c23]Victor Song, Hasan Cavusoglu, Gene Moo Lee, Li Zhi Ma:
IT Risk Factor Disclosure and Stock Price Crashes. HICSS 2020: 1-7 - [c22]Amir Fard Bahreini, Hasan Cavusoglu, Ron Cenfetelli:
Role of Feedback in Improving Novice Users' Security Performance Using Construal Level and Valance Framing. ICIS 2020 - [i2]El Moatez Billah Nagoudi, Muhammad Abdul-Mageed, Hasan Cavusoglu:
Growing Together: Modeling Human Language Learning With n-Best Multi-Checkpoint Machine Translation. CoRR abs/2006.04050 (2020) - [i1]El Moatez Billah Nagoudi, AbdelRahim A. Elmadany, Muhammad Abdul-Mageed, Tariq Alhindi, Hasan Cavusoglu:
Machine Generation and Detection of Arabic Manipulated and Fake News. CoRR abs/2011.03092 (2020)
2010 – 2019
- 2019
- [c21]Ruijing Zhao, Izak Benbasat, Hasan Cavusoglu:
Do Users Always Want to Know More? Investigating the Relationship between System Transparency and Users' Trust in Advice-Giving Systems. ECIS 2019 - [c20]Ruijing Zhao, Izak Benbasat, Hasan Cavusoglu:
Transparency in Advice-Giving Systems: A Framework and a Research Model for Transparency Provision. IUI Workshops 2019 - 2018
- [j14]Miranda Kajtazi, Hasan Cavusoglu, Izak Benbasat, Darek M. Haftor:
Escalation of commitment as an antecedent to noncompliance with information security policy. Inf. Comput. Secur. 26(2): 171-193 (2018) - 2017
- [c19]Hongki Kim, Izak Benbasat, Hasan Cavusoglu:
Online Consumers' Attribution of Inconsistency Between Advice Sources. ICIS 2017 - [c18]Hongki Kim, Izak Benbasat, Hasan Cavusoglu:
Supporting Online Consumers by Identifying Consistency Distance Among Advice Sources. ICIS 2017 - [c17]Moksh Matta, Hasan Cavusoglu, Nilesh Saraf, Izak Benbasat:
Effects of Heterogeneity in Board IT Capital on Firm Innovation. ICIS 2017 - 2016
- [j13]Shan Wang, Hasan Cavusoglu, Ziliang Deng:
Early mover advantage in e-commerce platforms with low entry barriers: The role of customer relationship management capabilities. Inf. Manag. 53(2): 197-206 (2016) - [j12]Huseyin Cavusoglu, Tuan Quang Phan, Hasan Cavusoglu, Edoardo M. Airoldi:
Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook. Inf. Syst. Res. 27(4): 848-879 (2016) - 2015
- [j11]Shan Wang, Hasan Cavusoglu:
Small and medium sized manufacturer performance on third party B2B electronic marketplaces: The role of enabling and IT capabilities. Decis. Support Syst. 79: 184-194 (2015) - [j10]Huseyin Cavusoglu, Hasan Cavusoglu, Jai-Yeol Son, Izak Benbasat:
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources. Inf. Manag. 52(4): 385-400 (2015) - [c16]Edoardo M. Airoldi, Hasan Cavusoglu, Huseyin Cavusoglu, Tuan Quang Phan:
Privacy Controls and Disclosure Behavior. AMCIS 2015 - [c15]Amin Khodabandeh Amiri, Hasan Cavusoglu, Izak Benbasat:
Enhancing Strategic IT Alignment through Common Language: Using the Terminology of the Resource-based View or the Capability-based View? ICIS 2015 - [c14]Hasan Cavusoglu, Huseyin Cavusoglu, Xianjun Geng:
Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus. ICIS 2015 - 2014
- [c13]Miranda Kajtazi, Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Assessing Sunk Cost Effect on Employees' Intentions to Violate Information Security Policies in Organizations. HICSS 2014: 3169-3177 - [c12]Amin Khodabandeh Amiri, Hasan Cavusoglu, Izak Benbasat:
When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing. ICIS 2014 - 2013
- [c11]Miranda Kajtazi, Hasan Cavusoglu, Izak Benbasat, Darek M. Haftor:
Assessing Self-Justification as an Antecedent of Noncompliance with Information Security Policies. ACIS 2013: 115 - [c10]Miranda Kajtazi, Hasan Cavusoglu:
Guilt Proneness as a Mechanism Towards Information Security Policy Compliance. ACIS 2013: 157 - [c9]Huseyin Cavusoglu, Tuan Quang Phan, Hasan Cavusoglu:
Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment. ICIS 2013 - [c8]Shan Wang, Hasan Cavusoglu, Ziliang Deng:
Early Mover Advantage in an Industry with Low Entry Barrier: Evidence from Etailers on Third Party ECommerce Platforms. ICIS 2013 - 2012
- [j9]Nan Hu, Hasan Cavusoglu, Ling Liu, Chenkai Ni:
Do Vendors' Pricing Decisions Fully Reflect Information in Online Reviews? ACM Trans. Manag. Inf. Syst. 3(3): 16:1-16:26 (2012) - [c7]Christine Mengting Xu, Izak Benbasat, Hasan Cavusoglu:
Trusting those who trust you: A study on trust and privacy on Facebook. ICIS 2012 - 2010
- [j8]Hasan Cavusoglu, Nan Hu, Yingjiu Li, Dan Ma:
Information Technology Diffusion with Influentials, Imitators, and Opponents. J. Manag. Inf. Syst. 27(2): 305-334 (2010) - [j7]Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Q. 34(3): 523-548 (2010) - [c6]Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Empirical Investigation. HICSS 2010: 1-7 - [c5]Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Understanding Emergence and Outcomes of Information Privacy Concerns: a Case of Facebook. ICIS 2010: 230
2000 – 2009
- 2009
- [j6]Huseyin Cavusoglu, Srinivasan Raghunathan, Hasan Cavusoglu:
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. Inf. Syst. Res. 20(2): 198-217 (2009) - [j5]Sameh Al-Natour, Hasan Cavusoglu:
The strategic knowledge-based dependency diagrams: a tool for analyzing strategic knowledge dependencies for the purposes of understanding and communicating. Inf. Technol. Manag. 10(2-3): 103-121 (2009) - [c4]Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance. AMCIS 2009: 419 - [c3]Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors. CSE (3) 2009: 476-481 - 2008
- [j4]Hasan Cavusoglu, Huseyin Cavusoglu, Jun Zhang:
Security Patch Management: Share the Burden or Share the Damage? Manag. Sci. 54(4): 657-670 (2008) - 2007
- [j3]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation. IEEE Trans. Engineering Management 54(1): 12-28 (2007) - [j2]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. IEEE Trans. Software Eng. 33(3): 171-185 (2007) - 2006
- [c2]Huseyin Cavusoglu, Hasan Cavusoglu, Jun Zhang:
Economics of Security Patch Management. WEIS 2006 - 2005
- [c1]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Emerging Issues in Responsible Vulnerability Disclosure. WEIS 2005 - 2004
- [j1]Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan:
Economics of ITSecurity Management: Four Improvements to Current Security Practices. Commun. Assoc. Inf. Syst. 14: 3 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint