Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where H. Raghav Rao is active.

Publication


Featured researches published by H. Raghav Rao.


Communications of The ACM | 2000

On risk, convenience, and Internet shopping behavior

Amit Bhatnagar; Sanjog Misra; H. Raghav Rao

The past century experienced a proliferation of retail formats in the marketplace. However, as a new century begins, these retail formats are being threatened by the emergence of a new kind of store, the online or Internet store. From being almost a novelty in 1995, online retailing sales were expected to reach


European Journal of Information Systems | 2009

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath; H. Raghav Rao

7 billion by 2000 [9]. In this increasngly timeconstrained world, Internet stores allow consumers to shop from the convenience of remote locations. Yet most of these Internet stores are losing money [6]. Why is such counterintuitive phenomena prevailing? The explanation may lie in the risks associated with Internet shopping. These risks may arise because consumers are concerned about the security of transmitting credit card information over the Internet. Consumers may also be apprehensive about buying something without touching or feeling it and being unable to return it if it fails to meet their approval. Having said this, however, we must point out that consumers are buying goods on the Internet. This is reflected in the fact that total sales on the Internet are on the increase [8, 11]. Who are the consumers that are patronizing the Internet? Evidently, for them the perception of the risk associated with shopping on the Internet is low or is overshadowed by its relative convenience. This article attempts to determine why certain consumers are drawn to the Internet and why others are not. Since the pioneering research done by Becker [3], it has been accepted that the consumer maximizes his utility subject to not only income constraints but also time constraints. A consumer seeks out his best decision given that he has a limited budget of time and money. While purchasing a product from a store, a consumer has to expend both money and time. Therefore, the consumer patronizes the retail store where his total costs or the money and time spent in the entire process are the least. Since the util-


Information Systems Research | 2009

Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration

Dan Jong Kim; Donald L. Ferrin; H. Raghav Rao

Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is informed by the literature on IS adoption, protection-motivation theory, deterrence theory, and organisational behaviour, and is motivated by the fundamental premise that the adoption of information security practices and policies is affected by organisational, environmental, and behavioural factors. We develop an Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todds Decomposed Theory of Planned Behaviour. Furthermore, we evaluate the effect of organisational commitment on employee security compliance intentions. Finally, we empirically test the theoretical model with a data set representing the survey responses of 312 employees from 78 organisations. Our results suggest that (a) threat perceptions about the severity of breaches and response perceptions of response efficacy, self-efficacy, and response costs are likely to affect policy attitudes; (b) organisational commitment and social influence have a significant impact on compliance intentions; and (c) resource availability is a significant factor in enhancing self-efficacy, which in turn, is a significant predictor of policy compliance intentions. We find that employees in our sample underestimate the probability of security breaches.


Communications of The ACM | 1996

A two-level investigation of information systems outsourcing

Kichan Nam; S. Rajagopalan; H. Raghav Rao; Abhijit Chaudhury

Trust and satisfaction are essential ingredients for successful business relationships in business-to-consumer electronic commerce. Yet there is little research on trust and satisfaction in e-commerce that takes a longitudinal approach. Drawing on three primary bodies of literature, the theory of reasoned action, the extended valence framework, and expectation-confirmation theory, this study synthesizes a model of consumer trust and satisfaction in the context of e-commerce. The model considers not only how consumers formulate their prepurchase decisions, but also how they form their long-term relationships with the same website vendor by comparing their prepurchase expectations to their actual purchase outcome. The results indicate that trust directly and indirectly affects a consumers purchase decision in combination with perceived risk and perceived benefit, and also that trust has a longer term impact on consumer e-loyalty through satisfaction. Thus, this study extends our understanding of consumer Internet transaction behavior as a three-fold (prepurchase, purchase, and postpurchase) process, and it recognizes the crucial, multiple roles that trust plays in this process. Implications for theory and practice as well as limitations and future directions are discussed.


Communications of The ACM | 2008

Coordination in emergency response management

Rui Chen; Raj Sharman; H. Raghav Rao; Shambhu J. Upadhyaya

O UTSOURCING is the contracting of various systems to outside information systems (IS) vendors. Ever since the Eastman Kodak--IBM partnership was reported in 1989 [15], outsourcing has emerged and has been recognized as a key method of managing IS. In previous studies of outsourcing [4, 5, 12, 15, 17, 20], two gaps are noticeable. The first relates to the fact that requirements for outsourcing are not uniform, and managers have different approaches to the process. Yet most previous research studies have phrased their inquiries unidimensionally in terms of the extent or degree of outsourcing: either as a binary variable or as size of contract in terms of the percentage of total IS budget [5, 15]. Neither unidimensional gauge is sufficiently expressive; neither allows representation of diverse patterns of outsourcing. Second, even though the IS industry had not used the term “outsourcing” explicitly in the past, outsourcing is not a new concept and has existed for many years in one form or another. Even though firms have repetitively used outside vendors for years, researchers have neither considered prior relationships in their studies of IS outsourcing nor studied the intentions of client firms to continue the partnership with the outsourcing vendors in the future. In this study, IS outsourcing decisions are investigated at two levels. The first level deals with the initial outsourcing decision of client firms. The second level pertains to the intention to continue the relationships with current outsourcing vendors in the future. The following three research questions are explored at these two levels (in contrast to the singlelevel approach taken by most researchers): • What are the dimensions of outsourcing decisions? Two dimensions, extent of substitution by vendors and strategic impact of IS applications, are proposed in order to conceptualize the diverse types of outsourcing relationships between clients and vendors. Based on these two dimensions, four types of outsourcing relationships are proposed. • What are the determinants that affect the dimensions of outsourcing decisions at the first level? The concepts derived from incomplete contracts [2, 9] and transactions cost economics [23, 24] theory are used with information technology (IT) organizational contexts and processes as a foundation to study the determinants of the two dimensions of outsourcing decisions. Information Syst


decision support systems | 2007

An investigation of factors that influence the duration of IT outsourcing relationships

Jahyun Goo; Rajiv Kishore; Kichan Nam; H. Raghav Rao; Yong-Il Song

Developing a framework to analyze coordination patterns occurring in the emergency response life cycle.


Information Systems Frontiers | 2011

Information control and terrorism: Tracking the Mumbai terrorist attack through twitter

Onook Oh; Manish Agrawal; H. Raghav Rao

Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of research. In this study, we take a multi-theoretic perspective to explore factors that determine the duration of continuing IT outsourcing relationships between vendor and client firms. Five ex-ante and two ex-post factors that may influence relationship duration were examined in this study. Data for this study were collected using a nationwide survey. To investigate the dynamics of continuing outsourcing relationships through repetitive contracts, we performed survival analysis using an accelerated failure-time (AFT) model. Four factors are found to have a significant relationship with relationship duration as hypothesized. However, three factors, of which two are ex-post factors, are found to not have a significant impact on outsourcing relationship duration. Implications and contributions of the study are discussed.


Journal of Management Information Systems | 1995

Management of Information Systems Outsourcing: A Bidding Perspective

Abhijit Chaudhury; Kichan Nam; H. Raghav Rao

This paper analyzes the role of situational information as an antecedent of terrorists’ opportunistic decision making in the volatile and extreme environment of the Mumbai terrorist attack. We especially focus on how Mumbai terrorists monitored and utilized situational information to mount attacks against civilians. Situational information which was broadcast through live media and Twitter contributed to the terrorists’ decision making process and, as a result, increased the effectiveness of hand-held weapons to accomplish their terrorist goal. By utilizing a framework drawn from Situation Awareness (SA) theory, this paper aims to (1) analyze the content of Twitter postings of the Mumbai terror incident, (2) expose the vulnerabilities of Twitter as a participatory emergency reporting system in the terrorism context, and (3), based on the content analysis of Twitter postings, we suggest a conceptual framework for analyzing information control in the context of terrorism.


Management Information Systems Quarterly | 2005

Knowledge acquisition via three learning processes in enterprise information portals: learning-by-investment, learning-by-doing, and learning-from-others

Chungsuk Ryu; Yong Jin Kim; Abhijit Chaudhury; H. Raghav Rao

Abstract:Outsourcing is the contracting of various information systems’ subfunctions by user firms to outside information systems vendors. A critical factor in the outsourcing process is the bidding and vendor selection mechanism. This paper describes the process of outsourcing and identifies the various stages involved. Subsequently, considering that cost reduction is a driving force of outsourcing for user-firms, this paper proposes a bidding mechanism to reduce expected outsourcing costs in the final bidding and vendor selection process. The paper studies outsourcing contracts of routine and repetitive activities such as maintenance and operation of telecommunication networks. A realistic scenario is studied, wherein multiple vendors bid for such contracts and where one vendor has cost and expertise advantages over other vendors and as a result tends to inflate bids. A mixed integer programming model is formulated for a multiple vendor scenario. In general, the results suggest a prescription that calls...


Information & Management | 2006

Market reactions to E-business outsourcing announcements: an event study

Manish Agrawal; Rajiv Kishore; H. Raghav Rao

An enterprise information portal (EIP) is viewed as a knowledge community. Activity theory provides a framework to study such a community: members of an EIP conduct specific tasks that are assigned through a division of labor. Each member of an enterprise information portal can undergo three distinct types of learning processes: learning-by-investment, learning-by-doing, and learning-from-others. Through these three types of learning processes, each member achieves specialized knowledge that is related to his or her own task. Cumulative knowledge resulting from the learning processes is considered in terms of two distinct attributes: depth and breadth of knowledge. This paper formulates a mathematical model and defines the goal of an EIP member as maximizing the net benefits of knowledge resulting from individual investment and effort. Numerical examples are provided to analyze patterns of optimal investment and effort plans as well as the resulting accumulated knowledge. The results provide useful managerial implications. In business conditions characterized by high interest rates or high internal rate of returns, it is preferable for members to delay spending their resources for learning. Intensive investment and efforts to obtain knowledge are preferable when the discount rate of costs is high, when knowledge is durable, when the value of knowledge is high, when the initial level of knowledge is high, when the productivity of the learning process is high, and when sufficient knowledge is transferred from other members. On the other hand, the size of the EIP has a positive or negative effect depending on the attribute of knowledge and the productivity of learning processes. Further properties of the optimal decisions and learning processes are analyzed and discussed.

Collaboration


Dive into the H. Raghav Rao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rui Chen

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar

Jingguo Wang

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manish Agrawal

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

Dan Jong Kim

University of North Texas

View shared research outputs
Top Co-Authors

Avatar

Ram Ramesh

State University of New York System

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge