Year |
Citation |
Score |
2020 |
Kuem J, Ray S, Hsu P, Khansa L. Smartphone Addiction and Conflict: An Incentive-Sensitisation Perspective of Addiction for Information Systems European Journal of Information Systems. 1-22. DOI: 10.1080/0960085X.2020.1803154 |
0.359 |
|
2018 |
Wilson K, Khansa L. Migrating to electronic health record systems: A comparative study between the United States and the United Kingdom. Health Policy (Amsterdam, Netherlands). PMID 30193980 DOI: 10.1016/J.Healthpol.2018.08.013 |
0.359 |
|
2018 |
Dominiczak J, Khansa L. Principles of Automation for Patient Safety in Intensive Care: Learning From Aviation. The Joint Commission Journal On Quality and Patient Safety. 44: 366-371. PMID 29793888 DOI: 10.1016/J.Jcjq.2017.11.008 |
0.332 |
|
2018 |
Ma X, Khansa L, Kim SS. Active Community Participation and Crowdworking Turnover: A Longitudinal Model and Empirical Test of Three Mechanisms Journal of Management Information Systems. 35: 1154-1187. DOI: 10.1080/07421222.2018.1523587 |
0.318 |
|
2018 |
Khansa L, Barkhi R, Ray S, Davis Z. Cyberloafing in the workplace: mitigation tactics and their impact on individuals' behavior Information Technology & Management. 19: 197-215. DOI: 10.1007/S10799-017-0280-1 |
0.347 |
|
2017 |
Khansa L, Kuem J, Siponen MT, Kim SS. To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls Journal of Management Information Systems. 34: 141-176. DOI: 10.1080/07421222.2017.1297173 |
0.336 |
|
2017 |
Casselman J, Onopa N, Khansa L. Wearable healthcare: Lessons from the past and a peek into the future Telematics and Informatics. 34: 1011-1023. DOI: 10.1016/J.Tele.2017.04.011 |
0.395 |
|
2016 |
Davis Z, Khansa L. Evaluating the epic electronic medical record system: A dichotomy in perspectives and solution recommendations Health Policy and Technology. 5: 65-73. DOI: 10.1016/J.Hlpt.2015.10.004 |
0.314 |
|
2015 |
Khansa L, Ma X, Liginlal D, Kim SS. Understanding Members' Active Participation in Online Question-and-Answer Communities: A Theory and Empirical Analysis Journal of Management Information Systems. 32: 162-203. DOI: 10.1080/07421222.2015.1063293 |
0.662 |
|
2015 |
Khansa L. M&As and market value creation in the information security industry Journal of Economics and Business. 82: 113-134. DOI: 10.1016/J.Jeconbus.2015.07.003 |
0.417 |
|
2014 |
Khansa L, Zobel CW. Assessing Innovations in Cloud Security Journal of Computer Information Systems. 54: 45-56. DOI: 10.1080/08874417.2014.11645703 |
0.348 |
|
2013 |
James TL, Khansa L, Cook DF, Bruyaka O, Keeling KB. Using network-based text analysis to analyze trends in Microsoft's security innovations Computers and Security. 36: 49-67. DOI: 10.1016/J.Cose.2013.02.004 |
0.426 |
|
2012 |
Khansa L, Forcade J, Nambari G, Parasuraman S, Cox P. Proposing an Intelligent Cloud-Based Electronic Health Record System International Journal of Business Data Communications and Networking. 8: 57-71. DOI: 10.4018/Jbdcn.2012070104 |
0.371 |
|
2012 |
Khansa L, Liginlal D. Regulatory influence and the imperative of innovation in identity and access management Information Resources Management Journal. 25: 78-97. DOI: 10.4018/Irmj.2012070104 |
0.717 |
|
2012 |
Khansa L, Zobel C, Goicochea G. Creating a Taxonomy for Mobile Commerce Innovations Using Social Network and Cluster Analyses International Journal of Electronic Commerce. 16: 19-52. DOI: 10.2753/Jec1086-4415160402 |
0.303 |
|
2012 |
Zobel CW, Khansa L. Quantifying Cyberinfrastructure Resilience against Multi‐Event Attacks Decision Sciences. 43: 687-710. DOI: 10.1111/J.1540-5915.2012.00364.X |
0.365 |
|
2012 |
Khansa L, Liginlal D. Whither information security? Examining the complementarities and substitutive effects among IT and information security firms International Journal of Information Management. 32: 271-281. DOI: 10.1016/J.Ijinfomgt.2011.11.015 |
0.704 |
|
2012 |
Khansa L, Cook DF, James T, Bruyaka O. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms Computers & Security. 31: 750-770. DOI: 10.1016/J.Cose.2012.06.007 |
0.43 |
|
2012 |
Liginlal D, Sim I, Khansa L, Paul Fearn. HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory Computers and Security. 31: 206-220. DOI: 10.1016/J.Cose.2011.12.002 |
0.683 |
|
2011 |
James T, Khansa L, Cook D, Liginlal D. Technology and U.S. politics Ieee Technology and Society Magazine. 30: 20-27. DOI: 10.1109/Mts.2011.940292 |
0.673 |
|
2010 |
Khansa L, James TL, Cook DF. Acceptance, Use, and Influence of Political Technologies among Youth Voters in the 2008 US Presidential Election International Journal of E-Politics. 1: 1-21. DOI: 10.4018/Jep.2010100101 |
0.312 |
|
2010 |
Liginlal D, Khansa L, Chia SC. Using real options theory to evaluate strategic investment options for mobile content delivery: A case study International Journal of Business Data Communications and Networking. 6: 18-39. DOI: 10.4018/Jbdcn.2010010102 |
0.682 |
|
2009 |
Khansa L, Liginlal D. Quantifying the benefits of investing in information security Communications of the Acm. 52: 113-117. DOI: 10.1145/1592761.1592789 |
0.696 |
|
2009 |
Khansa L, Liginlal D. Valuing the flexibility of investing in security process innovations European Journal of Operational Research. 192: 216-235. DOI: 10.1016/J.Ejor.2007.08.039 |
0.698 |
|
2009 |
Liginlal D, Sim I, Khansa L. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management Computers and Security. 28: 215-228. DOI: 10.1016/J.Cose.2008.11.003 |
0.664 |
|
Show low-probability matches. |