Suresh Malladi
Suresh Malladi
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei uark.edu
Titel
Zitiert von
Zitiert von
Jahr
Theories used in information systems research: identifying theory networks in leading IS journals
S Lim, T Saldanha, S Malladi, NP Melville
ICIS 2009 Proceedings, 91, 2009
502009
Cloud computing adoption and its implications for CIO strategic focus–an empirical analysis
S Malladi, MS Krishnan
362012
Theories used in information systems research: Insights from complex network analysis
S Lim, TJV Saldanha, S Malladi, NP Melville
JITTA: Journal of Information Technology Theory and Application 14 (2), 5, 2013
322013
Lean principles in IT services: a case study on implementation and best practices
S Malladi, PDD Dominic, A Kamil
International Journal of Business Information Systems 8 (3), 247-268, 2011
232011
Adoption of business intelligence & analytics in organizations–an empirical study of antecedents
S Malladi
212013
Determinants of usage variations of business intelligence & analytics in organizations–an empirical analysis
S Malladi, M Krishnan
132013
Does Software-as-a-Service (SaaS) has a role in IT-enabled Innovation?–An Empirical Analysis
S Malladi, M Krishnan
132012
Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations
SS Malladi, HC Subramanian
IEEE Software 37 (1), 31-39, 2019
62019
Achieving customer centricity: Technologies and practices
S Malladi
Cutter IT Journal 24 (2), 24, 2011
52011
Transformation Potential of Cloud Computing-Understanding Strategic Value Creation from Customer and Vendor Perspectives.
SSR Malladi
University of Michigan, 2014
12014
Could Cyber-conflict be Avoided? Exploring Deterrence in Low and High Stakes Information Security Interactions
CM Parra, H Subramanian, S Malladi
2020
Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis
HC Subramanian, S Malladi
Journal of Database Management (JDM) 31 (1), 38-63, 2020
2020
Essential Technologies and Organizational Practices for Effective Crowdsourcing
S Malladi
Cutter IT Journal 24 (6), 17, 2011
2011
Bug Bounty Programs for Cybersecurity
SS Malladi, HC Subramanian
Theories Used in Informatio Complex Network Analysis
S Lim, TJV Saldanha, S Malladi, NP Melville
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–15