default search action
Abhijit Chaudhury
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j30]Pratyush Bharati, Kui Du, Abhijit Chaudhury, Narendra M. Agrawal:
Idea Co-creation on Social Media Platforms: Towards a Theory of Social Ideation. Data Base 52(3): 9-38 (2021)
2010 – 2019
- 2019
- [j29]Pratyush Bharati, Abhijit Chaudhury:
Assimilation of Big Data Innovation: Investigating the Roles of IT, Social Media, and Relational Capital. Inf. Syst. Frontiers 21(6): 1357-1368 (2019) - [c15]Abhijit Chaudhury, Kevin Mentzer, Debasish Mallick:
Does IT Promote Collaborative Processes and Improve Learning? An Activity Theory Approach. AMCIS 2019 - 2018
- [c14]Abhijit Chaudhury, Debasish Mallick:
Can an Ego Defense Mechanism Model Help Explain Dysfunctional IS Security Behavior? AMCIS 2018 - 2015
- [j28]Pratyush Bharati, Wei Zhang, Abhijit Chaudhury:
Better knowledge with social media? Exploring the roles of social capital and organizational knowledge management. J. Knowl. Manag. 19(3): 456-475 (2015) - [c13]Narendra M. Agrawal, Pratyush Bharati, Abhijit Chaudhury, Kui Du:
Enabling Organizational Ideation with Cognitive Dexterity using Social Media: An Exploratory Study. AMCIS 2015 - 2014
- [j27]Pratyush Bharati, Chen Zhang, Abhijit Chaudhury:
Social media assimilation in firms: Investigating the roles of absorptive capacity and institutional pressures. Inf. Syst. Frontiers 16(2): 257-272 (2014) - [j26]Chen Zhang, Rong Pan, Abhijit Chaudhury, Changxin Xu:
Effect of Security Investment on Evolutionary Games. J. Inf. Sci. Eng. 30(6): 1695-1718 (2014) - 2013
- [j25]Mario Recine, Janet J. Prichard, Abhijit Chaudhury:
Social Media and Evolving Marketing Communication Using IT. Commun. Assoc. Inf. Syst. 33: 8 (2013) - [c12]Abhijit Chaudhury, Pratyush Bharati, Chen Zhang, Mir Song:
Roles of Fun and Flow in Social Media Usage - A Comparative Study of American and Chinese Students. AMCIS 2013 - 2012
- [j24]Pratyush Bharati, Abhijit Chaudhury:
Technology Assimilation Across the Value Chain: An Empirical Study of Small and Medium-Sized Enterprises. Inf. Resour. Manag. J. 25(1): 38-60 (2012) - [c11]Pratyush Bharati, Abhijit Chaudhury, Wei Zhang:
Building Organizational Knowledge Quality: Investigating the Role of Social Media and Social Capital. AMCIS 2012 - 2011
- [c10]Pratyush Bharati, Abhijit Chaudhury:
Impact of Institutional Pressures on Absorptive Capacity of a Firm and Web 2.0 Assimilation. AMCIS 2011 - 2010
- [j23]Pratyush Bharati, Abhijit Chaudhury:
Impact of Knowledge Acquisition on Technology Assimilation. J. Comput. Inf. Syst. 51(2): 97-106 (2010)
2000 – 2009
- 2008
- [j22]Jingguo Wang, Abhijit Chaudhury, H. Raghav Rao:
Research Note - A Value-at-Risk Approach to Information Security Investment. Inf. Syst. Res. 19(1): 106-120 (2008) - [c9]Abhijit Chaudhury, Pratyush Bharati:
IT Outsourcing Adoption by Small and Medium Enterprises: A Diffusion of Innovation Approach. AMCIS 2008: 390 - 2007
- [c8]Noushin Ashrafi, Abhijit Chaudhury, Jean-Pierre Kuilboer, Peng Xu:
IT-Enabled Competencies and Business Value: An Empirical Study in Fast-Cycle Industries. ICIS 2007: 67 - 2006
- [j21]Pratyush Bharati, Abhijit Chaudhury:
Studying the current status of technology adoption. Commun. ACM 49(10): 88-93 (2006) - [j20]Pratyush Bharati, Abhijit Chaudhury:
Product Customization on the Web: An Empirical Study of Factors Impacting Choiceboard User Satisfaction. Inf. Resour. Manag. J. 19(2): 69-81 (2006) - [c7]Pratyush Bharati, Abhijit Chaudhury:
Diffusion of Technology-enabled Value Innovation among Manufacturing SMEs. AMCIS 2006: 157 - 2005
- [j19]Chungsuk Ryu, Yong Jin Kim, Abhijit Chaudhury, H. Raghav Rao:
Knowledge Acquisition via Three Learning Processes in Enterprise Information Portals: Learning-by-Investment, Learning-by-Doing, and Learning-from-Others. MIS Q. 29(2): 245-278 (2005) - [c6]Jingguo Wang, Abhijit Chaudhury, H. Raghav Rao:
An Extreme Value Approach to Information Technology Security Investment. ICIS 2005 - 2004
- [j18]Pratyush Bharati, Abhijit Chaudhury:
Using choiceboards to create business value. Commun. ACM 47(12): 77-81 (2004) - [j17]Pratyush Bharati, Abhijit Chaudhury:
An empirical investigation of decision-making satisfaction in web-based decision support systems. Decis. Support Syst. 37(2): 187-197 (2004) - [c5]Pratyush Bharati, Abhijit Chaudhury:
Influence of Choiceboards on E-Commerce Customers: An Empirical Study of Factors Impacting User Satisfaction. AMCIS 2004: 2 - 2003
- [j16]Rajiv Kishore, H. Raghav Rao, Kichan Nam, S. Rajagopalan, Abhijit Chaudhury:
A relationship perspective on IT outsourcing. Commun. ACM 46(12): 86-92 (2003) - 2001
- [j15]Abhijit Chaudhury, Debasish Mallick, H. Raghav Rao:
Web channels in e-commerce. Commun. ACM 44(1): 99-104 (2001) - [j14]Hee-Dong Yang, Robert M. Mason, Abhijit Chaudhury:
The Internet, Value Chain Visibility, and Learning. Int. J. Electron. Commer. 6(1): 101-120 (2001) - 2000
- [j13]Abhijit Chaudhury, H. Raghav Rao:
E-Commerce Technologies and Information Systems Curricula. J. Inf. Syst. Educ. 11(1-2): 19-33 (2000)
1990 – 1999
- 1998
- [j12]Abhijit Chaudhury:
Two mechanisms for distributed problem solving. IEEE Trans. Syst. Man Cybern. Part A 28(1): 48-55 (1998) - 1997
- [j11]Abhijit Chaudhury, H. Raghav Rao:
Introducing Client/Server Technologies in Information Systems Curricula. Data Base 28(4): 20-32 (1997) - [c4]T. S. Raghu, Abhijit Chaudhury, Bharat Jayaraman, H. Raghav Rao:
A simulation test bed for computational modeling of business processes. ICIS 1997: 464-465 - 1996
- [j10]H. Raghav Rao, Kichan Nam, Abhijit Chaudhury:
Information Systems Outsourcing (Introduction to the Special Section). Commun. ACM 39(7): 27-28 (1996) - [j9]Kichan Nam, H. Raghav Rao, Abhijit Chaudhury:
A Two-Level Investigation of Information Systems Outsourcing. Commun. ACM 39(7): 36-44 (1996) - [j8]Abhijit Chaudhury, Pi-Sheng Deng, Sukumar Rathnam:
A computational model of coordination. IEEE Trans. Syst. Man Cybern. Part A 26(1): 132-141 (1996) - 1995
- [j7]H. Raghav Rao, Abhijit Chaudhury, M. Chakka:
Modeling Team Processes: Issues and a Specific Example. Inf. Syst. Res. 6(3): 255-285 (1995) - [j6]Abhijit Chaudhury, Kichan Nam, H. Raghav Rao:
Management of Information Systems Outsourcing: A Bidding Perspective. J. Manag. Inf. Syst. 12(2): 131-159 (1995) - 1994
- [c3]Kichan Nam, S. Rajagopalan, H. Raghav Rao, Abhijit Chaudhury:
Dimensions of Information Systems Outsourcing. ICIS 1994: 453-454 - 1993
- [j5]Abhijit Chaudhury, Dan C. Marinescu, Andrew B. Whinston:
Net-Based Computational Models of Knowledge-Processing Systems. IEEE Expert 8(2): 79-86 (1993) - [j4]Chuang Lin, Abhijit Chaudhury, Andrew B. Whinston, Dan C. Marinescu:
Logical Inference of Horn Clauses in Petri Net Models. IEEE Trans. Knowl. Data Eng. 5(3): 416-425 (1993) - 1992
- [j3]Abhijit Chaudhury, Sukumar Rathnam:
Informational and Decision Processes for Flexible Manufacturing Systems. IEEE Expert 7(6): 53-62 (1992) - [j2]Pi-Sheng Deng, Abhijit Chaudhury:
A Conceptual Model of Adaptive Knowledge-Based Systems. Inf. Syst. Res. 3(2): 127-149 (1992) - [c2]Abhijit Chaudhury, Kichan Nam, H. Raghav Rao:
Information Systems Outsourcing: A Mixed Integer Programming Analysis. ICIS 1992: 263-264 - 1991
- [j1]Abhijit Chaudhury, H. Raghav Rao, Shashidhar Kaparthi:
A knowledge-based approach to CIM modeling. J. Intell. Manuf. 2(4): 223-234 (1991) - [c1]Abhijit Chaudhury, H. Raghav Rao, Sukumar Rathnam:
What can computer programs do to facilitate negotiation processes? COOCS 1991: 269-284
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint