RESEARCH INTERESTS

  • Information Security and Privacy
  • Economics of Information Systems
  • Online User Engagement and Gamification
  • Mobile App Market
  • Aviation Security and Passenger Profiling
  • Production Customization
  • Supply Chain Management

    REFEREED JOURNAL PUBLICATIONS

  1. Cezar, A., H. Cavusoglu, and S. Raghunathan (2016), "Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality," Production and Operations Management, (Forthcoming)


  2. Cavusoglu, H., H. Cavusoglu, J-Y. Son, and I. Benbasat (2015), "Institutional Pressures in Security Management: Direct and Indirect Influences on Organizational Investment in Information Security Control Resourcess," Information and Management, 52(4), June, pp. 385-400


  3. Cezar, A., H. Cavusoglu, and S. Raghunathan (2014), "Outsourcing Information Security: Contracting Issues and Security Implications," Management Science, 60(3), March, pp. 638-657


  4. Cavusoglu, H., Y. Kwark, B. Mai, and S. Raghunathan (2013), "Passenger Profiling and Screening in the Presence of Strategic Attackers," INFORMS Decision Analysis, 10(1), March, pp. 63-81


  5. Cavusoglu, H., H. Cavusoglu, and S. Raghunathan (2012), "Production Postponement and Information Sharing Strategies for Supply Chain Firms," Production and Operations Management, 23(3), May-June, pp. 470-488


  6. Cavusoglu, H., B. Koh, and S. Raghunathan (2010), "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, 58(5), September-October, pp. 1287-1302


  7. Cavusoglu, H., S. Raghunathan, and H. Cavusoglu (2009), "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, 20(2), June, pp. 198-217


  8. Gerace, T., H. Cavusoglu (2009), "The Critical Elements of the Patch Management Process," Communications of the ACM, 52(8) pp. 117-121


  9. Cavusoglu, H., H. Cavusoglu, J. Zhang (2008), "Security Patch Management - Share the Burden or Share the Damage?," Management Science, 54(1), April, pp. 657-670


  10. Ogut, H., H. Cavusoglu, S. Raghunathan (2008), "Intrusion Detection Policies for IT Security Breaches," INFORMS Journal on Computing, 20(1), Winter, pp. 112-123


  11. Cavusoglu, H., S. Raghunathan, and W. Yue (2008), "Decision-Theoretic and Game-Theoretic Apporaches to IT Security Investment," Journal of Management Information Systems, 25(2), Fall, pp. 281-304


  12. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2007), "Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge ," IEEE Transactions on Software Engineering, 33(3), March, pp. 171-185


  13. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2007), "Selecting a Customization Strategy under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation," IEEE Transactions on Engineering Management, 54(1), February, pp. 12-28, Special Issue on Mass Customization (Lead Article)


  14. Cavusoglu, H., B. Mishra, S. Raghunathan (2005), "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, 16(1), March, pp. 28-46


  15. Cavusoglu, H. and S. Raghunathan (2004), "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," INFORMS Decision Analysis, 1(3), September, pp. 131-148


  16. Cavusoglu, H., B. Mishra, S. Raghunathan (2004), "A Model for Evaluating IT Security Investments," Communications of the ACM, 47(7), July, pp. 87-92


  17. Cavusoglu, H., B. Mishra, S. Raghunathan (2004), "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reaction for Breached Firms and Internet Security Developers," Special Issue: Measuring the Business Value of Information Technology in e-Business Environments, International Journal of Electronic Commerce, 9(1), pp. 69-105


  18. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2004), "Economics of IT Security Management: Four Missing Elements of Current Security Practices," Communications of the AIS, 14(3), July


    REFEREED CONFERENCE/WORKSHOP PUBLICATIONS

  1. Cavusoglu, H., H. Cavusoglu, and X. Geng (2016), "Bloatware and Jailbreaking: How Consumer-Initiated Modification Interacts with Product Pricing," Theory in Economics of Information Systems (TEIS), Guanacaste, Costo Rica, March


  2. Ayvaci, M., H. Cavusoglu, and S. Raghunathan (2015), "Incentivizing Health Information Exchange Adoption Through Alternative Payment Models," Workshop on Information Systems and Economics (WISE), Dallas, TX, December


  3. Cavusoglu, H., H. Cavusoglu, X. Geng (2015), "Should Firms Bundle Bloatware with Consumer Electronics? Implications for Product Pricing and Consumer Surplus," International Conference on Information Systems (ICIS), Forth Worth, TX, December


  4. Cavusoglu, H., T. Phan, H. Cavusoglu, E. Airoldi (2015), "Privacy Controls and Disclosure Behavior," Americas Conference on Information Systems (AMCIS), Puerto Rico, August


  5. Cavusoglu, H., L. Zhuolun, K.W. Huang, (2015), "Can Gamification Motivate Voluntary Contributions? The Case of Stack Overflow Q&A Community," ACM Conference Companion on Computer Supported Cooperative Work & Social Computing (CSCW 2015), Vancouver, Canada, March


  6. Li, Mei, K.Y. Goh, H. Cavusoglu (2014), "Should I Diversify My Mobile App Portfolio? Examining the Effects of App Portfolio Size and Diversity on App Quality and Popularity," Workshop on Information Systems and Economics (WISE), Auckland, New Zealand, December


  7. Li, Mei, K.Y. Goh, H. Cavusoglu (2014), "What is it in a Name? An Empirical Examination of Brand Imitation in Mobile App Market," Pacific Asia Conference on Information Systems,(PACIS), Chengdu, China, June


  8. Li, Mei, K.Y. Goh, H. Cavusoglu (2014), "Investigating Developers' Entry to Mobile App Platforms: A Network Externality View," European Conference on Information Systems (ECIS), Tel Aviv, Israel, June


  9. Li, Mei, K.Y. Goh, H. Cavusoglu (2013), "Mobile App Portfolio Management and Developers' Performance: An Empirical Study of the Apple iOS Platform," International Conference on Information Systems (ICIS), Milan, Italy, December


  10. Cavusoglu, H., T. Phan, H. Cavusoglu (2013), "Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment," International Conference on Information Systems (ICIS), Milan, Italy, December


  11. Cavusoglu, H., T. Phan, H. Cavusoglu (2013), "Do Privacy Controls Increase the Openness of Online Social Network Users?," INFORMS Marketing Science Conference, Istanbul, Turkey, July


  12. Cavusoglu, H., T. Phan, H. Cavusoglu (2013), "Privacy Controls and Information Disclosure Behavior of Online Social Network Users ," Workshop on the Economics of Information Security (WIES), Georgetown, Washington, June


  13. Zhuolun, L., K.W. Huang, H. Cavusoglu (2012), "Quantifying the Impact of Badges on User Engagement in Online Q&A Communities.," International Conference on Information Systems (ICIS), Orlando, Florida, December


  14. Sitoh, M. K., H. Cavusoglu, (2012), "The Effect of Customers' Emotion on Service Recovery Strategy in IT Service Failures," International Conference on Information Systems (ICIS), Orlando, Florida, December


  15. Kankanhalli, A., M. Taer, H. Cavusoglu, S. H. Kim (2012), "Gamification: A New Paradigm for Online User Engagement," International Conference on Information Systems (ICIS), Orlando, Florida, December


  16. Zhuolun, L., K.W. Huang, H. Cavusoglu (2012), "Can We Gamify Voluntary Contributions to Online Q&A Communities? Quantifying the Impact of Badges on User Engagement," Workshop on Information Systems and Economics (WISE), Orlando, Florida, December


  17. Cavusoglu, H., T. Phan, H. Cavusoglu (2012), "Do Privacy Controls Increase the Openness of Online Social Network Users: Analysis of Information Disclosure Behaviour through a Natural Experiment," Workshop on Information Systems and Economics (WISE), Orlando, Florida, December


  18. Cezar, A., H. Cavusoglu, S. Raghunathan (2011), "Outsourcing Information Security: Contracting Issues and Security Implications," Workshop on Information Systems and Economics (WISE), Shanghai, China, December


  19. Cavusoglu, H., S. Al-Natour, H. Cavusoglu, (2011), "ICT Value Creation at Four Levels of Analysis: Review of Extant Research and a New Conceptual Model," International Conference on Enterprise Systems, Accounting and Logistics (ICESAL), Thassos, Greece, July


  20. Cezar, A., H. Cavusoglu, S. Raghunathan (2010), "Outsourcing Information Security: Contracting Issues and Security Implications," Workshop on the Economics of Information Security (WEIS), Cambridge, MA, June


  21. Cezar, A., H. Cavusoglu, S. Raghunathan (2009), "Speculative Risks, and IT Security Outsourcing," Workshop on the Economics of Information Security (WEIS), London, England, June


  22. Cavusoglu, H., H. Cavusoglu, J. Son, I. Benbasat (2008), "What Drive Organizations to Invest in Information Security Controls? ," Workshop on Information Systems Economics (WISE), Paris, France, December


  23. Cavusoglu, H., B. Koh, S. Raghunathan (2008), "Analysis of the Impact of User Profiling for Security: Who really Benefits from Profiling?," Secure Knowledge Management (SKM), Richardson, TX, November


  24. Cezar, A., H. Cavusoglu, S. Raghunathan (2008), "Impact of Competition on Firms' Decisions to Outsource IT Security," Secure Knowledge Management (SKM), Richardson, TX, November


  25. Raghunathan, S., H. Cavusoglu, B. Mai (2008), "User Segmentation, Profiling, and Screening in Security," Secure Knowledge Management (SKM), Richardson, TX, November


  26. Cezar, A., H. Cavusoglu, S. Raghunathan (2008), "Impact of Competition on Firms' Decisions to Outsource IT Security," Conference on Information Systems and Technology (CIST), Washington, DC, October


  27. Cavusoglu, H., B. Mishra, S. Raghunathan (2008), "Optimal Configuration of Intrusion Detection Systems," Financial Information Systems and Cybersecurity , College Park, MD, May


  28. Cavusoglu, H., H. Cavusoglu, J. Zhang (2007), "Security Patch Management - Share the Burden or Share the Damage?," Workshop on Information Systems and Economics (WISE), Montreal, Canada, December


  29. Raghunathan, S., H. Cavusoglu,, B. Koh, and B. Mai (2007), "Economics of User Segmentation, Profiling, and Detection in Security," Workshop on Economics of Information Security (WEIS), Pittsburgh, PA, June


  30. Cavusoglu, H., H. Cavusoglu, J. Zhang (2007), "Security Patch Management," Decision and Risk Analysis Conference , Richardson, TX, May


  31. Cavusoglu, H., H. Cavusoglu, J. Son and I. Benbasat(2007), "Understanding Information Security Controls: An Empirical Study," Decision and Risk Analysis Conference , Richardson, TX, May


  32. Cavusoglu, H., B. Mishra, S. Raghunathan (2006), "Configuration of Intrusion Detection Systems," The Secure Knowledge Management Workshop (SKM), The Best Paper Award, Brooklyn, NY, September


  33. Cavusoglu, H., H. Cavusoglu, J. Zhang (2006), "Economics of Security Patch Management," Workshop on Economics of Information Security (WEIS), Cambridge, England, June


  34. Cavusoglu, H., S. Raghunathan, and H. Cavusoglu (2005), "How do Security Technologies Interact with Each Other to Create Value: The Analysis of Firewall and Intrusion Detection System," Workshop on Information Systems and Economics (WISE), Irvine, CA, December


  35. Gerace, T., H. Cavusoglu (2005), "The Critical Elements of Patch Management," 33rd Annual ACM SIGUCCS Conference, Monterey, CA, November


  36. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2005), "Emerging Issues in Responsible Vulnerability Disclosure," Workshop on Economics of Information Security (WEIS), Boston, MA, June


  37. Cavusoglu, H., H. Cavusoglu, J. Zhang (2005), "Nested Policies for Security Patch Management," 35th International Conference on Computer and Industrial Engineering (CIE), Istanbul, Turkey, June


  38. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2005), "Degree of Customization under Competition," 35th International Conference on Computer and Industrial Engineering (CIE), Istanbul, Turkey, June


  39. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2004), "How Should We Disclose Software Vulnerabilities," Workshop on Information Technology and Systems (WITS), The Best Paper Nomination, Washington, DC, December


  40. Cavusoglu, H., H. Cavusoglu, J. Zhang (2004), "Security Patch Management: Can't Live with it, Can't Live without it," Workshop on Information Technology and Systems (WITS), Washington, DC, December


  41. Cavusoglu, H., H. Cavusoglu, S. Raghunathan (2004), "Analysis of Software Vulnerability Disclosure Policies," CORS/INFORMS Joint International Meeting, Banff, Alberta, Canada, May


  42. Cavusoglu, H. and S. Raghunathan (2003), "Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches," International Conference on Information Systems (ICIS), The Best Completed Paper Nomination, Seattle, WA, December


  43. Cavusoglu, H., S. Raghunathan, and H. Ogut (2003), "Intrusion Detection Policies for IT Security Breaches," Workshop on Information Technology and Systems (WITS), The Best Paper Award, Seattle, WA, December


  44. Cavusoglu, H. and S. Raghunathan (2003), "The Analysis of Configuration Issue in Classification and Detection Systems," INFORMS Annual Meeting, Atlanta, GA, November


  45. Cavusoglu, H., B. Mishra, S. Raghunathan (2003), "Quantifying the Value of IT Security Mechanisms and Setting Up an Effective Security Architecture," Workshop on Economics of Information Security (WEIS), College Park, MD, May


  46. Cavusoglu, H., B. Mishra, S. Raghunathan (2003), "The Effect of Internet Security Breach Announcements on Market Value of Breached Firms and Internet Security Developers," AAA-IS Mid-Year Conference, San Diego, CA, January


  47. Cavusoglu, H., B. Mishra, S. Raghunathan (2002), "Optimal Design of Information Technology (IT) Security Architecture," International Conference on Information Systems (ICIS), Barcelona, Spain, December


  48. Cavusoglu, H., B. Mishra, S. Raghunathan (2002), "The Effect of Internet Security Breach Announcements on Market Value of Breached Firms and Internet Security Developers," Workshop on Information Systems and Economics (WISE), Barcelona, Spain, December


  49. Cavusoglu, H., B. Mishra, S. Raghunathan (2002), "Assessing the Value of Detective Control in IT Security," Americas Conference on Information Systems (AMCIS), pp. 1910-1918, Dallas, TX, August


  50. Cavusoglu, H. (2002), "The Economics of Information Technology (IT) Security," Americas Conference on Information Systems (AMCIS), pp.2481-2485, Dallas, TX, August


    BOOK CHAPTERS

  1. Cezar, A., H. Cavusoglu, S. Raghunathan "Competition, Speculative Risks, and IT Security Outsourcing," T. Moore, D. Pym, and S. Lewis (eds), The Economics of Information Security and Privacy, pp. 301-315, Springer, 2010


  2. Cavusoglu, H. "Economics of IT Security: A Literature Review," J. Camp and R. Lewis (eds), The Economics of Information Security, pp. 71-84 Kluwer Academic Publishing, 2004


    RESEARCH IN PROGRESS

  1. Mei, L., H. Cavusoglu, K. Y. Goh, "What is it in a Name? An Empirical Examination of Brand Imitation in Mobile App Market,"


  2. Mei, L., H. Cavusoglu, K. Y. Goh, "Investigating Developers' Entry to Mobile App Platforms: A Network Externality View,"


  3. Sitoh, M. K., H. Cavusoglu, "The Effect of Customers'' Emotion on Service Recovery Strategy in IT Service Failures,"


  4. Kankanhalli, A., M. Taer, H. Cavusoglu, S. H. Kim, "Gamification: A New Paradigm for Online User Engagement,"


  5. Zhuolun, L., K.W. Huang, H. Cavusoglu, "Can We Gamify Voluntary Contributions to Online Q&A Communities? Quantifying the Impact of Badges on User Engagement,"


  6. Cavusoglu, H., T. Phan, H. Cavusoglu, E. Airoldi, "Do Privacy Controls Increase the Openness of Online Social Network Users: Analysis of Information Disclosure Behaviour through a Natural Experiment,"


  7. Cezar, A., H. Cavusoglu, and S. Raghunathan, "Impact of Competition on Firms' Decision to Outsource IT Security,"


  8. Cavusoglu, H., H. Cavusoglu "Economics of Privacy: Opt-in vs. Opt-out,"


  9. Cavusoglu, H., H. Cavusoglu, "Do Online Shoppers Care More About Product Quality Uncertainty or Seller Uncertainty? Partitioning the Cost of Uncertainty in Online Markets and Analyzing the Impact of Reputation,"


  10. Cavusoglu, H., H. Cavusoglu, "Supply Chain Traceability, Targeted Recalls and Product Liability,"


  11. Cavusoglu, H., H. Cavusoglu, J. Y. Son and I. Benbasat, "Information Security Controls in Organizations: A Multidimentional View and their Key Drivers,"


  12. Cavusoglu, H., H. Cavusoglu, and I. Benbasat, "Complementarities in Information Security Controls,"


  13. Cavusoglu, H., H. Cavusoglu "Analysis of Intra Market Adverse Selection in Online Auction Markets,"


  14. Cavusoglu, H., "Analysis of the Impacts of Factors on Diffusion of Malware,"


HOME |TEACHING | RESEARCH | VITA | PERSONAL