{"id":36,"date":"2011-05-03T05:26:12","date_gmt":"2011-05-03T13:26:12","guid":{"rendered":"https:\/\/blogs.ubc.ca\/cavusoglu\/"},"modified":"2026-04-21T08:31:03","modified_gmt":"2026-04-21T16:31:03","slug":"research","status":"publish","type":"page","link":"https:\/\/blogs.ubc.ca\/cavusoglu\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<h1>Refereed Journal<\/h1>\n<p>Lee, M., Lee, G. M.,\u00a0<strong>Cavusoglu, H<\/strong>., Seidel, M. L. (<em>forthcoming<\/em>) Computational Framework for Measuring Strategic Opportunities Based on Structural Hole Theory. <span style=\"text-decoration: underline;\"><em>Journal of Management Information Systems<\/em><\/span>. (Accepted Apr 21, 2026)<\/p>\n<p>Zhang, X., <strong>Cavusoglu, H.<\/strong> (2026) Skyline Operators in Multi-criteria Decision Making: A Review of Characterization, Comparison, and Perspectives. <span style=\"text-decoration: underline;\"><em>Expert Systems with Applications<\/em><\/span>. 306(15). 1-23. Apr 2026.<\/p>\n<p>Amiri, A. K., <strong>Cavusoglu, H.<\/strong> Benbasat, I. Grover, V. (<em>forthcoming<\/em>) A Theory of Strategic IT Unavailability. <span style=\"text-decoration: underline;\"><em>Information Systems Research<\/em><\/span>. (<a href=\"https:\/\/pubsonline.informs.org\/doi\/abs\/10.1287\/isre.2019.0208\">published version<\/a>)<\/p>\n<p>Cao, R., Matta, M., <strong>Cavusoglu, H.<\/strong>, Kafaee, N. O., Aziz, A. (<em>forthcoming<\/em>). <span data-olk-copy-source=\"MessageBody\">Is Prevention better than Cure? Effects of Cyber Risk Disclosures on Shareholder Response to Breaches.<\/span>\u00a0<span style=\"text-decoration: underline;\"><em>Information Systems Research<\/em><\/span>. (<a href=\"https:\/\/doi.org\/10.1287\/isre.2022.0405\">published version<\/a>)<\/p>\n<p>Zhang, X., David, A., Isah, H., <strong>Cavusoglu, H.<\/strong> (<em>2025<\/em>). <span data-olk-copy-source=\"MessageBody\">Personally Identifiable Information Detection in Smart Edge Computing: A Robust Model Evaluation. <span style=\"text-decoration: underline;\"><em>Knowledge-Based Systems<\/em><\/span>. 328. October. (<a href=\"https:\/\/doi.org\/10.1016\/j.knosys.2025.114153\">published version<\/a>)<\/span><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">Liang, P. ; <strong>Cavusoglu, H.<\/strong>; Hu, N. (2025). Do Supplier CEO\u2019s National Cultural Origins Affect Supplier-Customer Relationships? <em><span style=\"text-decoration: underline;\">IEEE Transactions on Engineering Management<\/span><\/em>. 72. 2848-2860. (<a href=\"https:\/\/ieeexplore.ieee.org\/document\/11066215\">published version<\/a>)<\/span><\/p>\n<p>Tunc, M., <strong>Cavusoglu, H.<\/strong>, Zhang, E. (<em>2025<\/em>). <span data-olk-copy-source=\"MessageBody\">Resale Royalty in NFT Marketplaces: Blessing or Burden for Creators and Platforms? <span style=\"text-decoration: underline;\"><em>Information Systems Research<\/em><\/span>. (<a href=\"http:\/\/el.informs.org\/ls\/click?upn=u001.ETRVEyx-2FPqpzy4tEHd-2Fb8xM3PNTM9PU0K39ojARXq60Go9yFvqtLfuKiCxaqkXp-2F6NCYcPElQ6YMTdLeaQml7NDWifUnEFGz7NUgXoyVFss-3DE0dd_dCs67Y-2BetRHosr3GKBi1Qgi2Gxt9cVs87OhLNw5U4M1T7wrhV65RBZK2Zcny0GaveeFZeOL20IMks6JoMGNCIvfspOUhE8JGqAqvAKhAqFWc6axqqYaZ59Diql2q8iuMRLrT6ggsrRb8Fzc946ApGQmD0hyAwtneSYoIkmzt8nCS9G8a0rHskJcsfmYIpDnf6XvgQbs2E2-2F0d9zrfQ-2F8xnAXul3lfLvHuWZ6vLlKWZPc68J5atjjz-2Bzusw-2BObbFjI8a8rMPcSaU9YSSaepzje50j1RX8yINT-2Bh7xdMgXHrk-3D\" target=\"_blank\" rel=\"noopener\">published version<\/a>) 36(3):1543-1564.<\/span><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">Liang, P., <strong>Cavusoglu, H.<\/strong>, Hu, N. (2025). Sticky Information Technology Investment: Theory and Empirical Evidence. <em><span style=\"text-decoration: underline;\">IEEE Transactions on Engineering Management<\/span><\/em>. 72. 1010-1026.<\/span><\/p>\n<p>Bahreini, A. F., <strong>Cavusoglu, H.<\/strong>, Cenfetelli, R. (2023). How \u201cWhat You Think You Know About Cybersecurity\u201d Can Help Users Make More Secure Decisions. <em><span style=\"text-decoration: underline;\">Information and Management<\/span><\/em>. 60(7).<\/p>\n<p>Liang, P., <strong>Cavusoglu, H.<\/strong>, Hu, N. (2023) Customers&#8217; Managerial Expectations and Suppliers&#8217; Asymmetric Cost Management. <span style=\"text-decoration: underline;\"><em>Production and Operations Management<\/em><\/span>. 32(6). 1975-1993.<\/p>\n<p>Matta, M., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2023). Understanding the Board\u2019s Involvement in Information Technology Governance. <span style=\"text-decoration: underline;\"><em>Information Systems Management<\/em><\/span>. 40(2). 127-147. (<a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2022.2074580\">published version<\/a>)<\/p>\n<p>Gopalakrishnan, S., Matta, M., <strong>Cavusoglu. H.<\/strong> (2022)\u00a0 The Dark Side of Technological Modularity: Opportunistic Information Hiding During Interorganizational System Adoption.\u00a0 <span style=\"text-decoration: underline;\"><em>Information Systems Research<\/em><\/span>. 33(3):1072-1092. <a href=\"https:\/\/pubsonline.informs.org\/doi\/abs\/10.1287\/isre.2022.1100\">https:\/\/pubsonline.informs.org\/doi\/abs\/10.1287\/isre.2022.1100<\/a><\/p>\n<p>Al-Natour, S., <strong>Cavusoglu, H.<\/strong>, Benbasat, I., Aleem, U. (2020) An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps. <span style=\"text-decoration: underline;\"><em>Information Systems Research<\/em><\/span>. <a href=\"https:\/\/doi.org\/10.1287\/isre.2020.0931\">https:\/\/doi.org\/10.1287\/isre.2020.0931<\/a>.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Geng, X. (2020).\u00a0Bloatware and Jailbreaking: Strategic Impact of Consumer-Initiated Modification of Technology Products. <em><span style=\"text-decoration: underline;\">Information Systems Research<\/span><\/em>. 31(1):240-257. <a href=\"https:\/\/doi.org\/10.1287\/ isre.2019.0883\">https:\/\/doi.org\/10.1287\/ isre.2019.0883<\/a>.<\/p>\n<p>Kajtazi, M. <strong>Cavusoglu, H.<\/strong>, Benbasat, I., Haftor, D. (2018). Escalation of Commitment as an Antecedent to Noncompliance with Information Security Policy. <em><span style=\"text-decoration: underline;\">Computer &amp; Information Security<\/span>.<\/em> Vol. 26 Issue: 2, pp.171-193,\u00a0<a href=\"https:\/\/doi.org\/10.1108\/ICS-09-2017-0066\">https:\/\/doi.org\/10.1108\/ICS-09-2017-0066<\/a>.<\/p>\n<p>Cavusoglu, H. Phan, T., <strong>Cavusoglu, H.<\/strong>, Airoldi, E. (2016). Assessing The Impact Of Granular Privacy Controls On Content Sharing And Disclosure On Facebook. <span style=\"text-decoration: underline;\"><em>Information Systems Research<\/em><\/span>. 27 (4). 848 \u2013879. Lead Article in the Special Section: Ubiquitous IT and Digital Vulnerabilities. (<a href=\"http:\/\/pubsonline.informs.org\/doi\/abs\/10.1287\/isre.2016.0672\">Informs Pubs Online<\/a>) (<a href=\"https:\/\/blogs.ubc.ca\/cavusoglu\/files\/2016\/12\/Assessing-the-impact-of-granular-controls_AAM_combined.pdf\">Author Accepted Manuscript version<\/a>)<\/p>\n<p>Wang, S. and <strong>Cavusoglu, H.<\/strong>\u00a0Deng, Z. (2016) Early Mover Advantage in Ecommerce Platforms with Low Entry Barriers: The Role of Customer Relationship Management Capabilities. <span style=\"text-decoration: underline;\"><em>Information and Management<\/em><\/span>. 53 (2). 197-206.<\/p>\n<p>Wang, S. and <strong>Cavusoglu, H.<\/strong> (2015) Small and Medium Sized Manufacturer Performance on Third Party B2B Electronic Marketplaces: the Role of Enabling and IT Capabilities. <span style=\"text-decoration: underline;\"><em>Decision Support Systems<\/em><\/span>. 79. 184-194.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Son, J.-Y., and Benbasat, I. (2015) Institutional Pressures in Security Management: Direct and Indirect Influences on Organizational Investment in Information Security Control Resources. <em><span style=\"text-decoration: underline;\">Information &amp; Management<\/span><\/em>. 52(4), 385-400. June. (<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378720614001499\" target=\"_blank\" rel=\"noopener noreferrer\">download<\/a>)<\/p>\n<p>Munson, SA, <strong>Cavusoglu, H.<\/strong>, Frisch, L., Fels, S. (2013). Sociotechnical Challenges and Progress in using Social Media for Health. <span style=\"text-decoration: underline;\"><em>J<span style=\"text-decoration: underline;\">o<\/span>urnal of Medical Internet Research<\/em><\/span>. 15 (10), e226. (<a href=\"http:\/\/www.jmir.org\/2013\/10\/e226\">download<\/a>)<\/p>\n<p>Hu, N., <strong>Cavusoglu, H.<\/strong>, Liu, L., and Ni, C. (<em>2012<\/em>). Do Vendors\u2019 Pricing Decisions Fully Reflect Information in Online Reviews? <em><span style=\"text-decoration: underline;\">ACM Transactions on Management Information Systems<\/span><\/em>.\u00a03(3) 1-26, October.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Raghunathan, S. (2012).\u00a0Production Postponement and Information Sharing Strategies for Supply Chain Firms<em>. <\/em><em><span style=\"text-decoration: underline;\">Production and Operations Management Journal<\/span><\/em>. \u00a021 (3). May-June 2012. 470-488.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2010) Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness<em>. <\/em><em><span style=\"text-decoration: underline;\">Management Information Systems Quarterly<\/span><\/em>. 34 (3). September 2010. 523-548.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Hu, N., Li, Y., Ma, D. (2010) Information Technology Diffusion with Influentials, Imitators, and Opponents: Model and Preliminary Evidence<em>. <\/em><em><span style=\"text-decoration: underline;\">Journal of Management Information Systems<\/span><\/em>. 27 (2). Fall 2010. 305-334.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>\u00a0 (2010) Making Sound Security Investment Decisions<em>.<\/em> <em><span style=\"text-decoration: underline;\">The Journal of Information Privacy and Security<\/span> <\/em>.6 (1).<\/p>\n<p>Cavusoglu, H., Raghunathan, S., <strong>Cavusoglu, H.<\/strong>\u00a0 (2009). Configuration of and Interaction between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. <em><span style=\"text-decoration: underline;\">Information Systems Research<\/span><\/em>, 20 (2), June, pp. 198-217.<\/p>\n<p>Al-Natour, S., <strong>Cavusoglu, H.<\/strong>\u00a0 (2009). The Strategic Knowledge-based Dependency Diagrams: A Tool for Analyzing Strategic Knowledge Dependencies for the Purposes of Understanding and Communicating. <em><span style=\"text-decoration: underline;\">Information Technology and Management<\/span><\/em>, 10 (2-3), Sep., pp. 103-121.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Zhang, J. (2008). Security Patch Management: Share the Burden or Share the Damage? <em><span style=\"text-decoration: underline;\">Management Science<\/span><\/em>, 54(4), Apr., pp. 657 &#8211; 670.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Raghunathan, S. (2007). Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. <em><span style=\"text-decoration: underline;\">IEEE Transactions on Software Engineering<\/span><\/em>, 33(3), March, pp. 171 &#8211; 185.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Raghunathan, S. (2007). Selecting a Customization Strategy under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation. <em><span style=\"text-decoration: underline;\">IEEE Transactions on Engineering Management<\/span><\/em>, 54(1), Feb., pp. 12 &#8211; 28.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Raghunathan, S. (2004). Economics of IT Security Management: Four Improvements to Current Security Practices. <em><span style=\"text-decoration: underline;\">Communications of the AlS<\/span><\/em>, 14(article 3), pp. 65-75.<\/p>\n<h1>Refereed Conference Proceedings<\/h1>\n<p>Aleem, U., <strong>Cavusoglu, H.<\/strong>, Benbasat, I., Al Natour. (2026). The Framing Effect in Privacy Management Tools. In Proceedings of <span style=\"text-decoration: underline;\"><em>Hawaii International Conference on Systems Science (HICSS 2026)<\/em><\/span>. 4588-4597. Jan 6-9, 2026, Maui, HI.<\/p>\n<p>Li, Z., Zhou, M., <strong>Cavusoglu, H.<\/strong> (2025) The Impact of Blockchain Security Breaches on Crypto Token Valuation. In Proceedings of <span style=\"text-decoration: underline;\"><em>Hawaii International Conference on Systems Science (HICSS 2025)<\/em><\/span>. 3930-3939. Jan 7-10, 2025. Waikoloa, HI. <strong><em>Best Paper Nominee<\/em><\/strong>.<\/p>\n<p>Chu, S., <strong>Cavusoglu, H.<\/strong> (2025) The Role of Enterprise Systems Sourcing on Cybersecurity Breaches: An Empirical Approach. In Proceedings of <span style=\"text-decoration: underline;\"><em>Hawaii International Conference on Systems Science (HICSS 2025)<\/em><\/span>. 5943-5952Jan 7-10, 2025. Waikoloa, HI. <strong><em>Best Paper Nominee<\/em><\/strong>.<\/p>\n<p>Bhatia, G., Nagoudi, EMB, <strong>Cavusoglu, H.<\/strong>, Abdul-Mageed, M. (2024) Fintral: A Family of GPT-4 level Multimodal Financial Large Language Models. In Findings of <span style=\"text-decoration: underline;\"><em>the Association for Computational Linguistics (ACL 2024)<\/em><\/span>. 13064-13087, Bangkok, Thailand.<\/p>\n<p>Cao, R., Kafaee, N. O., Aziz, A., <strong>Cavusoglu, H.<\/strong> (2023) Market Reaction to Cyber Strategy Disclosure: Word Embedding Derived Approach. In Proceedings of <span style=\"text-decoration: underline;\"><em>Hawaii International Conference on Systems Science (HICSS 2023)<\/em><\/span>. 6078-6087. Jan 3-6, 2023. Maui, HI.<\/p>\n<p>Al-Natour, S., <strong>Cavusoglu, H.<\/strong>, Saghafi, A., Wiercinska, N.\u00a0 Too Close to Home: The Drivers of Perceived Risk of Home Automation. In Proceedings of <span style=\"text-decoration: underline;\"><em>Americas Conference on Information Systems (AMCIS 2022)<\/em><\/span>. Aug 10-14 2022. Minneapolis.<\/p>\n<p>Cao, R., Kafaee, N. O., Aziz, A., <strong>Cavusoglu, H. <\/strong>(2022). Market Value of Cybersecurity Strategies. In Proceedings of <span style=\"text-decoration: underline;\"><em>Pacific Asia Conference on Information Systems (PACIS 2022)<\/em><\/span>. July 5-9, 2022. Taipei-Sydney.<\/p>\n<p>Fard Bahreini, A., Cenfetelli, R.T., <strong>Cavusoglu, H.<\/strong> (2022). The Role of Heuristics in Information Security Decision Making. Proceedings of <span style=\"text-decoration: underline;\"><em>the Hawaii International Conference on System Sciences<\/em><\/span>. Kauai, HI. Jan. 5, 2022.<\/p>\n<p>Nagoudi, E. M. B., Chen W., Abdul-Mageed, M., and <strong>Cavusoglu, H.<\/strong> (2021). IndT5: A Text-to-Text Transformer for 10 Indigenous Languages. In Proceedings of <em>t<span style=\"text-decoration: underline;\">he First Workshop on Natural Language Processing for Indigenous Languages of the Americas<\/span><\/em>, pages 265\u2013271. Jun 2021. Association for Computational Linguistics.<\/p>\n<p>Nagoudi, E., Elmadany, A., Abdul-Mageed, M., Alhindi, T., <strong>Cavusoglu, H.<\/strong> (2020). Machine Generation and Detection of Arabic Manipulated and Fake News. In Proceedings of <span style=\"text-decoration: underline;\"><em>the Fifth Arabic Natural Language Processing Workshop (WANLP 2020)<\/em><\/span>. Barcelona, Spain. Dec. 20, 2020.<\/p>\n<p>Cao, R., Lee, G.M., <strong>Cavusoglu, H.<\/strong> (2020). Corporate Social Network Analysis: A Deep Learning Approach. <span style=\"text-decoration: underline;\"><em>Workshop on Information Technologies and Systems (WITS 2020)<\/em><\/span>. Dec 16-18\u00a0 2020.<\/p>\n<p>Fard Bahreini, A., <strong>Cavusoglu, H.<\/strong>, Cenfetelli, R.T. (2020). Role of Feedback on Improving Novice Users\u2019 Security Performance Using Construal Level and Valence Framing. Proceedings of<span style=\"text-decoration: underline;\"><em> International Conference on Information Systems (ICIS)<\/em><\/span>. Hyderabad, India, Dec 12-16 2020.<\/p>\n<p>Fard Bahreini, A., <strong>Cavusoglu, H.<\/strong>, Cenfetelli, R.T. (2020). The Influence of Status Quo Bias on Novice Users\u2019 Security Decisions: An Empirical Analysis. <span style=\"text-decoration: underline;\"><em>SERENE-RISC Annual Workshop<\/em><\/span>. Montr\u00e9al, Canada, Oct 21-22 2020.<\/p>\n<p>Nagoudi, E. M. B. Abdul-Mageed, M. <strong>Cavusoglu, H. <\/strong>(2020). Growing Together: Modeling Human Language Learning With n-Best Multi-Checkpoint Machine Translation. <em>Proceedings of <span style=\"text-decoration: underline;\">the Fourth Workshop on Neural Generation and Translation<\/span><\/em>. 169-177. July 10, 2020.<\/p>\n<p>Song, X. P., <strong>Cavusoglu, H.<\/strong>, Lee G. M., Ma, L. Z. (2020). IT Risk Factor Disclosure and Stock Price Crashes. Proceedings of <span style=\"text-decoration: underline;\"><em>the Hawaii International Conference on System Sciences<\/em><\/span>. January 7-10, 2020. Maui. USA.<\/p>\n<p>Zhao, R., Benbasat, I., <strong>Cavusoglu, H.<\/strong> (2019). Do Users always want to know more? Investigating the Relationship between System Transparency and Users\u2019 Trust in Advice-giving Systems. Proceedings of <span style=\"text-decoration: underline;\">t<em>he 27th European Conference on Information Systems<\/em><\/span>. June 8-14, 2019. Stockholm &amp; Uppsala, Sweden.<\/p>\n<p>Zhao, R., Benbasat, I., <strong>Cavusoglu, H.<\/strong> (2019). Transparency in Advice-Giving Systems: A Framework &amp; A Research Model for Transparency Provision. Proceedings of <span style=\"text-decoration: underline;\"><em>the<\/em> <em>Intelligent User Interfaces for Algorithmic Transparency in Emerging Technologies<\/em><\/span>. March 20, 2019. Los Angeles. USA.<\/p>\n<p>Zhao, R., Benbasat, I., <strong>Cavusoglu, H.<\/strong> (2018). Enhancing Users\u2019 Trust in Second-generation Advice-giving Systems. Proceedings of <em><span style=\"text-decoration: underline;\">the Workshop on Designing User Assistance in Interactive Intelligent Systems,<\/span><\/em> Portsmouth, UK, June 11, 2018.<\/p>\n<p>Matta, M., <strong>Cavusoglu, H.<\/strong>, Saraf, N., Benbasat, I. (2017). Effects of Heterogeneity in Board IT Capital on Firm Innovation. Proceedings of <em><span style=\"text-decoration: underline;\">International Conference on Information Systems<\/span><\/em>. Seoul, S. Korea. Dec. 10-13.<\/p>\n<p>Kim, H., Benbasat, I., <strong>Cavusoglu, H.<\/strong> (2017). Supporting Online Consumers by Identifying Consistency Distance Among Advice Sources. Proceedings of <span style=\"text-decoration: underline;\"><em>International Conference on Information Systems<\/em><\/span>. Seoul, S. Korea. Dec. 10-13.<\/p>\n<p>Kim, H., Benbasat, I., <strong>Cavusoglu, H.<\/strong> (2017). Online Consumers\u2019 Attribution of Inconsistency Between Advice Sources. Proceedings of <span style=\"text-decoration: underline;\"><em>International Conference on Information Systems<\/em><\/span>. Seoul, S. Korea. Dec. 10-13.<\/p>\n<p>Aleem, U., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2017). An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps. Proceedings of <span style=\"text-decoration: underline;\"><em>Workshop on the Economics of Information Security<\/em><\/span>. La Jolla, CA. Jun 26-27.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Geng, X. (2015). Should Firms Bundle Bloatware with Consumer Electronics? \u2013 Implications for Product Pricing and Consumer Surplus. Proceedings of <em>I<span style=\"text-decoration: underline;\">nternational Conference on Information Systems<\/span><\/em>. Fort Worth, TX. Dec. 13-16, 2015.<\/p>\n<p>Amiri, A. K., <strong>Cavusoglu, H.<\/strong> Benbasat, I. (2015). Enhancing Strategic IT Alignment through Common Language: Using the Terminology of the Resource-based View or the Capability-based View? Proceedings of <em>I<span style=\"text-decoration: underline;\">nternational Conference on Information Systems<\/span><\/em>. Fort Worth, TX. Dec. 13-16, 2015.<\/p>\n<p>Cavusoglu, H. Phan, T., <strong>Cavusoglu, H.<\/strong>, Airoldi, E. (2015). Privacy Controls and Disclosure Behavior: A Nature Experiment on Facebook. Proceedings of <span style=\"text-decoration: underline;\"><em>Americas Conference on Information Systems<\/em><\/span>. Puerto Rico. Aug. 13-15, 2015.<\/p>\n<p>Aleem, U., <strong>Cavusoglu, H.<\/strong> and Benbasat, I. (2014). \u201cFraming Effect in Privacy Decision-Making in Context of Social Networks.\u201d Proceedings of <span style=\"text-decoration: underline;\">Workshop on e-Business<\/span>. Auckland, New Zealand. Dec. 13.<\/p>\n<p>Aleem, U., <strong>Cavusoglu, H.<\/strong> and Benbasat, I. (2014). \u201cFraming Effect in Privacy Decision-Making in Context of Social Networks,\u201d Proceedings of <span style=\"text-decoration: underline;\"><em>Annual SIGSEC Workshop on Information Security and Privacy<\/em><\/span>, Auckland, New Zealand. Dec. 13.<\/p>\n<p>Aleem, U., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2014). \u201cUncovering Privacy Uncertainty: An Empirical Investigation in the Context of Mobile Apps,\u201d <em>Proceedings of <span style=\"text-decoration: underline;\">Annual SIGSEC Workshop on Information Security and Privacy<\/span><\/em>, Auckland, New Zealand. Dec. 13.<\/p>\n<p>Kajtazi, M., Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, and Benbasat, I. (2014). Assessing Sunk Cost Effect on Employees\u2019 Intentions to Violate Information Security Policies in Organizations. Proceedings of the <span style=\"text-decoration: underline;\"><em>47th Hawaii International Conference on System Sciences (HICSS 2014)<\/em><\/span>, Big Island, Hawaii. Jan. 6-9.<\/p>\n<p>Wang, S., <strong>Cavusoglu, H.<\/strong>, Deng, Z. (2013). Early Mover Advantage in an industry with Low Entry Barrier: Evidence from Etailers on Third Party ECommerce Platforms. Proceedings of <em><span style=\"text-decoration: underline;\">International Conference on Information Systems (ICIS)<\/span><\/em>. Milan, Italy. Dec 15-18. (<em>Best RIP Paper Award Nominee<\/em>)<\/p>\n<p>Cavusoglu. H., Phan, T., <strong>Cavusoglu, H.<\/strong>\u00a0(2013) Privacy Controls and Content Sharing Patterns of Online Social Network Users: A Natural Experiment. Proceedings of <em><span style=\"text-decoration: underline;\">International Conference on Information Systems (ICIS)<\/span><\/em>. Milan, Italy. Dec 15-18.<\/p>\n<p>Kajtazi, M., <strong>Cavusoglu, H.<\/strong>, Benbasat, I., Haftor, D. (2013). Proceedings of <span style=\"text-decoration: underline;\"><em>Australasian Conference on Information Systems<\/em><\/span>. Melbourne, Australia. Dec. 4-6.<\/p>\n<p>Kajtazi, M., <strong>Cavusoglu, H.<\/strong> (2013). Guilt Proneness as a Mechanism Towards Information Security Policy Compliance. Proceedings of <span style=\"text-decoration: underline;\"><em>Australasian Conference on Information Systems<\/em><\/span>. Melbourne, Australia. Dec. 4-6.<\/p>\n<p>Cavusoglu, H., Phan, T., <strong>Cavusoglu, H.<\/strong> (2013). Privacy Controls and Information Disclosure Behavior of Online Social Network User. Proceedings of <i>t<span style=\"text-decoration: underline;\">he Workshop on Economies of Information Security<\/span><\/i><span style=\"text-decoration: underline;\"> (WEIS)<\/span>, Washington, D.C. June 11-12, 2013<\/p>\n<p>Xu, C. M., Benbasat, I., <b>Cavusoglu, H<\/b>. (2012). Trusting those who trust you: A study on trust and privacy on Facebook. Proceedings of <i>I<span style=\"text-decoration: underline;\">nternational Conference on Information Systems<\/span><\/i><span style=\"text-decoration: underline;\"> (ICIS)<\/span>. Orlando, FL. December.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. 2011. \u201cInformation Security Policy Compliance: The Role of Fairness, Commitment, and Cost Beliefs,\u201d <em>Proceedings of <span style=\"text-decoration: underline;\">the 6th Mediterranean Conference on Information Systems (MCIS 2011)<\/span><\/em>, Cyprus, September 3-5.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Al-Natour, S., Cavusoglu, H. (2011). ICT Value Creation at Four Levels of Analysis: Review of Extant Research and a New Conceptual Model,\u201d <em>Proceedings of <span style=\"text-decoration: underline;\">8th International Conference on Enterprise Systems, Accounting and Logistics (ICESAL)<\/span><\/em>. Thassos Island, Greece, July 10\u201013, 2011.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2010). Understanding Emergence and Outcomes of Information Privacy Concerns: A Case of Facebook. Proceedings of <em><span style=\"text-decoration: underline;\">the International Conference on Information Systems (ICIS 2010)<\/span><\/em>, St. Louis, MO USA, December 12-15, 2010.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2010). The Role of Information Security Policy Fairness, Organizational Commitment, and Work Experience in Managing Information Security. Proceedings of <em><span style=\"text-decoration: underline;\">Workshop on Information Security and Privacy (WISP 2010)<\/span><\/em>, St. Louis, MO USA, December 12.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. Quality and Fairness of an Information Security Policy as Antecedents of Employees\u2019 Security Engagement in the Workplace:\u00a0 An Empirical Investigation. Proceedings of <em><span style=\"text-decoration: underline;\">43<sup>rd<\/sup> Hawaii International Conference on System Sciences (HICSS 2010)<\/span><\/em>. Koloa, Hawaii. Jan 5-8, 2010.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong> and Benbasat, I. \u201cAnalysis of Consumers\u2019 Privacy Breach Consent: A Resource Dependency Perspective\u201d Proceedings of <em><span style=\"text-decoration: underline;\">Workshop on Information Security and Privacy (WISP 2009)<\/span><\/em>, Phoenix, Arizona, December 14, 2009.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H<\/strong>., Benbasat, I. (2009). Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders\u2019 Good Security Behavior. Proceedings of <em><span style=\"text-decoration: underline;\">IEEE Workshop on Software Security Process<\/span><\/em>. Vancouver, Canada. August 29-31, 2009.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2009). Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance. Proceedings of the<em><span style=\"text-decoration: underline;\"> Fifteenth Americas Conference on Information Systems<\/span><\/em>, San Francisco, California. August 6-9 2009.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H.<\/strong>, Benbasat, I. (2008). Analysis of Perceived Burden of Compliance: The Role of Fairness, Awareness, and Facilitating Conditions. Proceedings of the <em><span style=\"text-decoration: underline;\">Workshop on Information Security and Privacy<\/span><\/em>, Paris, France, 2008.<\/p>\n<p>Banker, R., <strong>Cavusoglu, H.<\/strong>, Kumar, N. (2007). Investments in Technology and Value Appropriation. Proceedings of the <em><span style=\"text-decoration: underline;\">International Symposium on Information Systems (ISIS)<\/span><\/em>, Hyderabad, India, 2007.<\/p>\n<p>Al-Natour, S., <strong>Cavusoglu, H.<\/strong>\u00a0 (2007). The Knowledge Dependency Network Diagrams: A Tool for Analyzing Strategic Knowledge Dependencies for Understanding and Communicating. Proceedings of the <em><span style=\"text-decoration: underline;\">Workshop on Information Technology and Systems (WITS)<\/span><\/em>, Montreal, 2007.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Zhang, J. (2006). Economies of Security Patch Management. Proceedings of the <em><span style=\"text-decoration: underline;\">Workshop on Economies of Information Security (WEIS)<\/span><\/em>, Cambridge, England, 2006.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Raghunathan, S. (2005). Degree of Customization under Competition. Proceedings of the <em><span style=\"text-decoration: underline;\">35th International Conference on Computers and Industrial Engineering<\/span><\/em>, Istanbul, Turkey, 2005.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Zhang, J. (2005). Nested Policies for Security Patch Management. Proceedings of the <em><span style=\"text-decoration: underline;\">35th International Conference on Computers and Industrial Engineering<\/span><\/em>, Istanbul, Turkey, 2005.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Raghunathan, S. (2005). Emerging Issues in Responsible Vulnerability Disclosure. Proceedings of the <em><span style=\"text-decoration: underline;\">4th Workshop on the Economics of Information Security<\/span><\/em>, Boston, MA, 2005.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Raghunathan, S. (2004). How Should We Disclose Software Vulnerabilities? Proceedings of the <em><span style=\"text-decoration: underline;\">Workshop on Information Technology and Systems (WITS)<\/span><\/em>, Washington, DC, 2004.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Zhang, J. (2004). Security Patch Management: Can&#8217;t Live with it, Can&#8217;t Live without it. Proceedings of the <em><span style=\"text-decoration: underline;\">Workshop on Information Technology and Systems (WITS)<\/span><\/em>, Washington, DC, 2004.<\/p>\n<h1>Other Conferences or Workshops<\/h1>\n<p>Lee, M. H., Lee, G. M., <strong>Cavusoglu, H.,<\/strong> and Seidel, M. D. L. (2022). Strategic Competitive Positioning: A Structural Hole-based Firm Measure. <span style=\"text-decoration: underline;\"><em>INFORMS Annual Conference<\/em><\/span>. Oct 16-19, 2022. Indianapolis, USA<\/p>\n<p>Tun\u00e7, M., van den Heuvel, T., <strong>Cavusoglu, H.<\/strong>, Zheng, Z. E. (2021). Impact of resale royalty on primary and secondary sale prices in the non-fungible token marketplace. <span style=\"text-decoration: underline;\"><em>Workshop on Information Systems and Economics<\/em> <em>(WISE)<\/em><\/span>. Austin, TX. Dec 16-17, 2021.<\/p>\n<p>Lee, M. H., Lee, G.M., <strong>Cavusoglu, H.<\/strong>, Seidel, M.L (2021) Structural Hole-based Measures of Firm-level Competition and Strategic Positioning. <span style=\"text-decoration: underline;\"><em>KrAIS Research Workshop (KrAIS 2021)<\/em><\/span>. Dec 16, 2021. Austin, Texas.<\/p>\n<p>Lee, M. H., Lee, G.M., <strong>Cavusoglu, H.<\/strong>, Seidel, M.L (2021). Structural Hole-based Measures of Firm-level Competition and Strategic Positioning. <span style=\"text-decoration: underline;\"><em>INFORMS Workshop on Data Science (DS 2021)<\/em><\/span>. Nov 13, 2021.<\/p>\n<p>Cao, R., Lee, G.M., <strong>Cavusoglu, H.<\/strong> (2021) Corporate Social Network Analysis: A Deep Learning Approach. <span style=\"text-decoration: underline;\"><em>INFORMS Workshop on Data Science (DS 2021)<\/em><\/span>. Nov 13, 2021.<\/p>\n<p>Tun\u00e7, M., van den Heuvel, T., <strong>Cavusoglu, H.<\/strong>, Zheng, Z. E. (2021). Impact of resale royalty on primary and secondary sale prices in the non-fungible token marketplace. <span style=\"text-decoration: underline;\"><em>Conference on Information Systems and Technology<\/em><\/span>. New Port Beach, CA. Oct. 23-24, 2021<\/p>\n<p>Wang, H., Aziz, A., <strong>Cavusoglu, H.<\/strong> (2020). The Risk of Exchanging Data: Evidence from Health Information Exchange Adoption. <span style=\"text-decoration: underline;\"><em>Workshop on Information Systems and Economics (WISE)<\/em><\/span>. Hyderabad, India. Dec 16-19, 2020.<\/p>\n<p>Matta, M., Vijayaraghavan, R., Saraf, N., <strong>Cavusoglu, H.<\/strong> (2010). Effects of Internal Control Weakness Disclosures on IT Investments: An Institutional and Agency Perspective. <span style=\"text-decoration: underline;\"><em>Conference on Information Systems and Technology<\/em><\/span>. Washington, DC. Nov 7-8, 2020.<\/p>\n<p>Lee, M., Lee, G. M., <strong>Cavusoglu, H.<\/strong>, Seidel, M. L. (2019). Opportunity Structure: Tensions in Strategic Posture Identification and Positioning of IPOs. <em><span style=\"text-decoration: underline;\">KrAIS Research Workshop<\/span>. <\/em> Dec 18, 2019.<\/p>\n<p>Lee, M., Lee, G. M., <strong>Cavusoglu, H.<\/strong>, Seidel, M. L. (2019). Opportunity Structure: Tensions in Strategic Posture Identification and Positioning of IPOs. <span style=\"text-decoration: underline;\"><em>Conference on Information Systems and Technology<\/em><\/span>. Seattle. Oct. 19-20, 2019.<\/p>\n<p>Song, V., <strong>Cavusoglu, H.<\/strong>, Lee, G. M., and Ma, M. L. Z. (2018). \u201cIT Risk Factor Disclosure and Stock Price Crash Risk\u201d. <span style=\"text-decoration: underline;\"><em>UBC Cybersecurity Summit<\/em><\/span>. May 11.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H., Geng, X. (2016).\u00a0Bloatware and Jailbreaking: How Consumer-Initiated Modification Interacts with Product Pricing.\u00a0<em><span style=\"text-decoration: underline;\">Theory in Economics of Information Systems<\/span><\/em>. Guanacaste, Costa Rica. March 18-21, 2016.<\/p>\n<p>Cavusoglu, H., Phan, T., <strong>Cavusoglu H.<\/strong> (2013). Do Privacy Controls Increase the Openness of Online Social Network Users? <span style=\"text-decoration: underline;\">I<em>NFORMS Marketing Science Conference<\/em><\/span><em>.<\/em> Istanbul, Turkey. July 11-13, 2013.<\/p>\n<p>Cavusoglu, H., Phan, T.,\u00a0<b>Cavusoglu, H<\/b>., Airoldi, E. (2012). Do Privacy Controls Increase the Openness of Online Social Network Users? Analysis of Information Disclosure Behaviour through a Natural Experiment.\u00a0<span style=\"text-decoration: underline;\"><i>Workshop on Information Systems and Economics<\/i>\u00a0(WISE)<\/span>, Orlando, Florida, December.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H<\/strong>. and Benbasat, I. (2011). Understanding Users\u2019 Coping with Information\u00a0Privacy Threats on Online Social Networks. <em><span style=\"text-decoration: underline;\">Dewald Roode Information Security Workshop 2011<\/span><\/em>,Blacksburg, Virginia, Sep 23-24, 2011.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Al-Natour, S. (2010). Understanding the multi-level impacts of ICTs on performance and productivity. <span style=\"text-decoration: underline;\"><em>SSHRC Knowledge Synthesis Paper on Digital Economy<\/em><\/span>.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H<\/strong>. and Benbasat, I. (2009). Roles of Information Security Awareness and Perceived Fairness In Information Security Policy Compliance. <em><span style=\"text-decoration: underline;\">INFORMS Annual Meeting 2009<\/span><\/em>. San Diego, California. October 2009.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H<\/strong>. and Benbasat, I. (2009). Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance. <em><span style=\"text-decoration: underline;\">The Fifteenth Americas Conference on Information Systems<\/span><\/em>, San Francisco, California. August 2009.<\/p>\n<p>Bulgurcu, B., <strong>Cavusoglu, H<\/strong>. and Benbasat, I. (2009). Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance. <em><span style=\"text-decoration: underline;\">The European and Mediterranean Conference on Information Systems<\/span><\/em>, Izmir, Turkey. July 2009.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Son, J., and Benbasat, I. (2008). What Drive Organizations to Invest in Information Security Controls? How Do Investments Improve Information Security Performance. <em><span style=\"text-decoration: underline;\">Workshop on Information Systems and Economics (WISE) 2008<\/span><\/em>, Paris, France. December 2008.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Zhang, J. (2007).Security Patch Management &#8211; Share the Burden or Share the Damage? <em><span style=\"text-decoration: underline;\">Workshop on Information Systems and Economics (WISE) 2007<\/span><\/em>, Montreal. December 2007.<\/p>\n<p>Cavusoglu, H., <strong>Cavusoglu, H.<\/strong>, Son, J., and Benbasat, I. (2007). Understanding Information Security Construct: An Empirical Study. <em><span style=\"text-decoration: underline;\">Decision and Risk Analysis Conference 2007<\/span><\/em>, Richardson, TX. May, 21-22, 2007.<\/p>\n<p>Cavusoglu, H., Raghunathan, S., and <strong>Cavusoglu, H.<\/strong> (2005). How Do Security Technologies Interact with Each Other to Create Value? The Analysis of Firewall and Intrusion Detection System. <em><span style=\"text-decoration: underline;\">Workshop on Information Systems and Economics (WISE) 2005<\/span><\/em>, Irvine, California. Dec. 2005.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Banker, R., Kumar, N. (2004). Informative Information Technology (IT): A Value Appropriation Perspective. <em><span style=\"text-decoration: underline;\">CORS\/INFORMS Joint International Meeting 2004<\/span><\/em>, Banff, Alberta. May 2004.<\/p>\n<p><strong>Cavusoglu, H.<\/strong>, Cavusoglu, H. and Raghunathan, S. (2004). Analysis of Software Vulnerability Disclosure Policies. <em><span style=\"text-decoration: underline;\">CORS\/INFORMS Joint International Meeting 2004<\/span><\/em>, Banff, Alberta. May 2004.<\/p>\n<p>Banker, R., <strong>Cavusoglu, H.<\/strong>, and Kumar, N. (2003). Sustainable Value Creation with IT. <em><span style=\"text-decoration: underline;\">Workshop of Information Systems and Economics (WISE) 2003<\/span><\/em>, Seattle, WA. Dec. 2003.<\/p>\n<p>Banker, R., <strong>Cavusoglu, H.<\/strong>, and Kumar, N. (2002). Investments in CRM Systems: Are Firms Better Off? <em><span style=\"text-decoration: underline;\">Workshop of Information Systems and Economics (WISE) 2002<\/span><\/em>, Barcelona, Spain. Dec. 2002.<\/p>\n<h1>Under Review<\/h1>\n<p>Song, V., Park, J., <strong>Cavusoglu, H.<\/strong>, Lee, G. M., Ma, M. L. Z. IT Risk Factor Disclosure and Stock Price Crash Risk.<\/p>\n<p>Chu, S., <strong>Cavusoglu, H.<\/strong> Integration versus Standardization: The Impact of Enterprise Systems Vendor Diversity on Cyber Breach Occurrence.<\/p>\n<p>Li, Z., Zhou, M., <strong>Cavusoglu, H.<\/strong> The Impact of Blockchain Security Breaches on Crypto Token Valuation<\/p>\n<p>Tunc, M., <strong>Cavusoglu, H.<\/strong>, Zhang, E. The Non-Fungible Token (NFT) Royalty Dilemma: Enforce Mandates or Embrace Creator Discretion?<\/p>\n<p>Wang, H., Arslan, A., <strong>Cavusoglu, H.<\/strong>Lui, S. The Risk of Exchanging Data: Evidence from Health Information Exchange Adoption.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Refereed Journal Lee, M., Lee, G. M.,\u00a0Cavusoglu, H., Seidel, M. L. (forthcoming) Computational Framework for Measuring Strategic Opportunities Based on Structural Hole Theory. Journal of Management Information Systems. (Accepted Apr 21, 2026) Zhang, X., Cavusoglu, H. (2026) Skyline Operators in &hellip; <a href=\"https:\/\/blogs.ubc.ca\/cavusoglu\/research\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7092,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-36","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/users\/7092"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":54,"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":259,"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/pages\/36\/revisions\/259"}],"wp:attachment":[{"href":"https:\/\/blogs.ubc.ca\/cavusoglu\/wp-json\/wp\/v2\/media?parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}