H. Raghav Rao

ORCID: 0000-0002-2307-231X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Technology Adoption and User Behaviour
  • Information and Cyber Security
  • Misinformation and Its Impacts
  • Spam and Phishing Detection
  • Social Media and Politics
  • Cybercrime and Law Enforcement Studies
  • Disaster Management and Resilience
  • Public Relations and Crisis Communication
  • Auction Theory and Applications
  • Opinion Dynamics and Social Influence
  • Knowledge Management and Sharing
  • Digital Platforms and Economics
  • Digital Marketing and Social Media
  • Network Security and Intrusion Detection
  • Complex Network Analysis Techniques
  • Service-Oriented Architecture and Web Services
  • Software Engineering Techniques and Practices
  • Impact of Technology on Adolescents
  • Advanced Malware Detection Techniques
  • Customer Service Quality and Loyalty
  • E-Government and Public Services
  • FinTech, Crowdfunding, Digital Finance
  • Information Systems Theories and Implementation
  • User Authentication and Security Systems

The University of Texas at San Antonio
2016-2024

University of Portland
2023

Kennesaw State University
2023

University at Buffalo, State University of New York
2009-2020

Audie L. Murphy Memorial VA Hospital
2019

University of Delaware
2018

Brock University
2018

Sahmyook University
2018

American University of Sharjah
2018

AID Atlanta
2016-2018

Recent extreme events show that Twitter, a micro-blogging service, is emerging as the dominant social reporting tool to spread information on crises. It elevating online public community status of first responders who can collectivel

10.25300/misq/2013/37.2.05 article EN MIS Quarterly 2013-02-02

Developing a framework to analyze coordination patterns occurring in the emergency response life cycle.

10.1145/1342327.1342340 article EN Communications of the ACM 2008-05-01

Digitization within Human Resource Management (HRM) has resulted in Artificial Intelligence (AI) becoming increasingly prevalent Systems (HRMS) and HR Information (HRIS). The tactical procedures of recruitment, employee performance evaluation satisfaction, compensation benefit analysis, best practice discipline management, training development systems have seen a growth the incorporation AI. To better understand this evolution, we seek to explore publication sources literature that feature...

10.1016/j.jjimei.2021.100047 article EN cc-by-nc-nd International Journal of Information Management Data Insights 2021-11-01

Abstract Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of security services have been developed, including email authentication service designed to cope with threats. It remains unknown how users perceive and evaluate these consequently form their adoption intention. Drawing on Technology Acceptance Model Threat Avoidance Theory, this paper investigates factors that affect user intention adopt service. Our results...

10.1111/j.1365-2575.2012.00420.x article EN Information Systems Journal 2012-07-27

Abstract Micro‐blogging websites (such as twitter), a new information channel, was widely reported outperforming the mainstream channels in numerous ways during massive 2008 China earthquake, including beating first official news released from USGS to report initial tremor (BBC May 12 2008). According Twitter.com, there have been noticeable spikes of twitter usage disasters and other large events, serving an extremely powerful effective fast response service. This raises some important...

10.1002/j.1681-4835.2010.tb00300.x article EN The Electronic Journal of Information Systems in Developing Countries 2010-07-01

This study explores the role of social media in change by analyzing Twitter data collected during 2011 Egypt Revolution. Particular attention is paid to notion collective sense making, which considered a critical aspect for emergence action change. We suggest that making through can be conceptualized as human-machine collaborative information processing involves an interplay signs, grammar, humans, and technologies. focus on occurrences hashtags among high volume tweets sense-making...

10.1287/isre.2015.0565 article EN Information Systems Research 2015-02-19

Mobile payment services hold the potential for financial inclusion in developing economies. Low-income countries are characterized by distinctive conditions like price sensitivity, low digital penetration, high risk of failure, and competitive emerging markets, which further influence mobile usage. We develop a research model to identify contextual facilitators (like benefit, network externalities, trust, habit) barriers risk, lack facilitating conditions, operational constraints) driving...

10.1080/02681102.2019.1701969 article EN Information Technology for Development 2020-01-03

Post-analyses of major extreme events reveal that information sharing is critical for effective emergency response. The lack consistent data standards current management practice, however, hinders efficient flow among incident responders. In this paper, we adopt a third-generation activity theory guided approach to develop model can be used in the response fire-related events. This prescribes core reduce interoperability barriers. validated through three-step including request comment (RFC)...

10.25300/misq/2013/37.1.06 article EN MIS Quarterly 2013-01-01

This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how appli

10.25300/misq/2015/39.1.05 article EN MIS Quarterly 2015-01-01

This study investigates users’ coping responses in the process of phishing email detection. Three common are identified based on literature: task-focused coping, emotion-focused (i.e., worry and self-criticism), avoidance coping. The three used to conceptualize a higher-order construct, adaptiveness, that resides continuum between maladaptive adaptive (manifested as increased decreased coping). Drawing extended parallel model behavioral decision-making literature, this paper examines...

10.1287/isre.2016.0680 article EN Information Systems Research 2017-04-17

article Free Access Share on Information systems frontiers Authors: Jagdish Chandra Science and Technology directorate at the U.S. Army Research Laboratory in Adelphi, MD MDView Profile , Salvatore T. March Carlson School of Management University Minnesota MinnesotaView Satyen Mukherjee Microelectronic Devices, Circuits Systems Department, Philips Laboratories Briarcliff Manor, NY NYView Will Pape VeriFone, Inc. Inc.View R. Ramesh State New York Buffalo BuffaloView H. Raghav Rao Ray O....

10.1145/323830.323847 article EN Communications of the ACM 2000-01-01

article Share on Consumer-perceived risk in e-commerce transactions Authors: A. F. Salam University of North Carolina, Greensboro GreensboroView Profile , H. R. Rao State New York, Buffalo BuffaloView C. Pegels Authors Info & Claims Communications the ACMVolume 46Issue 12December 2003pp 325–331https://doi.org/10.1145/953460.953517Published:01 December 2003Publication History 71citation4,723DownloadsMetricsTotal Citations71Total Downloads4,723Last 12 Months173Last 6 weeks19 Get Citation...

10.1145/953460.953517 article EN Communications of the ACM 2003-12-01
Coming Soon ...