Rajarshi Chakraborty

ORCID: 0000-0003-3269-2323
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • Cybercrime and Law Enforcement Studies
  • Technology Use by Older Adults
  • Spam and Phishing Detection
  • Terrorism, Counterterrorism, and Political Violence
  • Biometric Identification and Security
  • Impact of Technology on Adolescents
  • Healthcare Education and Workforce Issues
  • User Authentication and Security Systems
  • Technology Adoption and User Behaviour
  • Sharing Economy and Platforms
  • Crime Patterns and Interventions
  • Innovation in Digital Healthcare Systems
  • Data Quality and Management
  • Internet Traffic Analysis and Secure E-voting
  • Cyberloafing and Workplace Behavior
  • Technology and Data Analysis
  • Access Control and Trust
  • Misinformation and Its Impacts
  • Information and Cyber Security
  • Cloud Data Security Solutions

University at Buffalo, State University of New York
2008-2022

Cloud computing has fostered many concerns about security, privacy, and business integrity. How do information assurance practices differ based on a cloud vendor's service offering, amount of online traffic, company size?

10.1109/mitp.2010.44 article EN IT Professional 2010-03-19

Recent events have shown that online booking is vulnerable to hacking incidents such as data breaches. The primary purpose of this study investigate the effect risky decision-making factors on consumer post breach behavior. After a breach, most companies offer monitoring services restore customer trust and encourage them for future purchases. However, little research has been done understand impact these In study, we examine whether can mitigate risk perception booking. We utilized Marriott...

10.1145/3571823.3571829 article EN ACM SIGMIS Database the DATABASE for Advances in Information Systems 2022-11-15

This research investigates the ability of older adults to perceive online threats. Specifically, factors that influence web-browsing safety efficacy (WSE) among are investigated. The investigated are: attitude towards unsolicited email senders, risk aversion, perceived in finding information, security education, and social connectivity. Partial least squares regression analysis was used analyze a sample age 55 years older. results showed information were positively associated with WSE...

10.1080/15536548.2015.1073534 article EN Journal of Information Privacy and Security 2015-07-03

The unprecedented terrorist attacks in India on November 26, 2008 tested conventional anti-terrorism response mechanisms of the law enforcement agencies. In this study we explore information processing that governed first from Mumbai Police department towards these attacks. This was conducted through interviews and survey with officers two distinct groups within department. One played a strategic role (Control Room) while other tactical (Zone 1) shaping early critical subduing Our findings...

10.1016/j.iimb.2014.03.001 article EN cc-by-nc-nd IIMB Management Review 2014-05-06

Advanced Google search queries can be used to extract sensitive information from Websites that potentially exploited for malice. The purpose of this paper is identify the existence unintended private disclosure possibilities in educational institutions across four countries through advanced techniques such as Hacking. Hacking a technique retrieving may not intended public retrieval using operators. focus on country level comparison Excel files which contain information. For exploratory...

10.1109/ecrime.2009.5342606 article EN 2009-10-01
Coming Soon ...