default search action
Ram L. Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Orcun Temizkan, Ram L. Kumar:
Knowledge transfer to aid social coding: The case of Stack Overflow. Decis. Support Syst. 179: 114174 (2024) - 2023
- [j34]Su Dong, Monica S. Johar, Ram L. Kumar:
An optimization approach for hybrid workflows in platform-enabled private service marketplaces. Eur. J. Oper. Res. 310(2): 874-890 (2023) - 2022
- [j33]Ram L. Kumar, Chandra Subramaniam, Kexin Zhao:
Special issue on digital inclusion. Inf. Syst. E Bus. Manag. 20(4): 631-634 (2022)
2010 – 2019
- 2019
- [j32]Ram L. Kumar, Sungjune Park:
A Portfolio Approach to Supply Chain Risk Management. Decis. Sci. 50(2): 210-244 (2019) - [j31]Su Dong, Monica S. Johar, Ram L. Kumar:
Design of Contracts and Workflows for Knowledge Intensive IT Service Environments. Decis. Sci. 50(3): 418-458 (2019) - [j30]Muhammad Adeel Zaffar, Ram L. Kumar, Kexin Zhao:
Using agent-based modelling to investigate diffusion of mobile-based branchless banking services in a developing country. Decis. Support Syst. 117: 62-74 (2019) - 2018
- [j29]Peiqin Zhang, Kexin Zhao, Ram L. Kumar:
The Impact of Firm Characteristics and IT Governance on IT Material Weaknesses. J. Organ. End User Comput. 30(2): 88-111 (2018) - 2017
- [j28]Sarah S. Khan, Kexin Zhao, Ram L. Kumar, Antonis C. Stylianou:
Examining Real Options Exercise Decisions in Information Technology Investments. J. Assoc. Inf. Syst. 18(5): 2 (2017) - 2016
- [j27]Peiqin Zhang, Kexin Zhao, Ram L. Kumar:
Impact of IT Governance and IT Capability on Firm Performance. Inf. Syst. Manag. 33(4): 357-373 (2016) - [j26]Haya Ajjan, Ram L. Kumar, Chandrasekar Subramaniam:
Information technology portfolio management implementation: a case study. J. Enterp. Inf. Manag. 29(6): 841-859 (2016) - [c10]Su Dong, Monica S. Johar, Ram L. Kumar:
Optimal Pricing and Workforce Composition for Service Delivery Using a Hybrid Workforce (Research in Progress). WEB 2016: 67-73 - 2015
- [j25]Orcun Temizkan, Ram L. Kumar:
Exploitation and Exploration Networks in Open Source Software Development: An Artifact-Level Analysis. J. Manag. Inf. Syst. 32(1): 116-150 (2015) - [c9]Peiqin Zhang, Lucian L. Visinescu, Kexin Zhao, Ram L. Kumar:
Using Text Mining Analytics to Understand IT Internal Control Weaknesses. WEB 2015: 155-160 - 2014
- [j24]Ram L. Kumar, Antonis C. Stylianou:
A process model for analyzing and managing flexibility in information systems. Eur. J. Inf. Syst. 23(2): 151-184 (2014) - [j23]Muhammad Adeel Zaffar, Ram L. Kumar, Kexin Zhao:
Impact of Interorganizational Relationships on Technology Diffusion: An Agent-Based Simulation Modeling Approach. IEEE Trans. Engineering Management 61(1): 68-79 (2014) - [c8]Sarah S. Khan, Moutaz J. Khouja, Ram L. Kumar:
Explaining Escalation Of Commitment In Information Technology Investments. ICIS 2014 - [c7]Peiqin Zhang, Kexin Zhao, Ram L. Kumar:
The Impact of IT Governance on IT Capability and Firm Performance. ICIS 2014 - 2013
- [j22]Sarah S. Khan, Moutaz J. Khouja, Ram L. Kumar:
Effects of time-inconsistent preferences on information technology infrastructure investments with growth options. Eur. J. Inf. Syst. 22(2): 206-220 (2013) - [j21]Haya Ajjan, Ram L. Kumar, Chandrasekar Subramaniam:
Understanding Differences between Adopters and Nonadopters of Information Technology Project portfolio Management. Int. J. Inf. Technol. Decis. Mak. 12(6): 1151-1174 (2013) - 2012
- [j20]Su Dong, Monica S. Johar, Ram L. Kumar:
Understanding key issues in designing and using knowledge flow networks: An optimization-based managerial benchmarking approach. Decis. Support Syst. 53(3): 646-659 (2012) - [j19]Su Dong, Monica S. Johar, Ram L. Kumar:
A Benchmarking Model for Management of Knowledge-Intensive Service Delivery Networks. J. Manag. Inf. Syst. 28(3): 127-160 (2012) - [j18]Orcun Temizkan, Ram L. Kumar, Sungjune Park, Chandrasekar Subramaniam:
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis. J. Manag. Inf. Syst. 28(4): 305-338 (2012) - 2011
- [j17]Muhammad Adeel Zaffar, Ram L. Kumar, Kexin Zhao:
Diffusion dynamics of open source software: An agent-based computational economics (ACE) approach. Decis. Support Syst. 51(3): 597-608 (2011) - 2010
- [c6]Sarah S. Khan, Ram L. Kumar, Moutaz J. Khouja, Kexin Zhao:
Narrow Framing Effects on Real Options: the Case of IT Application Portfolios. ICIS 2010: 186
2000 – 2009
- 2009
- [c5]Sarah S. Khan, Ram L. Kumar:
Understanding Managerial Decision Risks in IT Project Management: An Integrated Behavioral Decision Analysis Perspective. AMCIS 2009: 120 - 2008
- [j16]Ram L. Kumar, Haya Ajjan, Yuan Niu:
Information Technology Portfolio Management: Literature Review, Framework, and Research Issues. Inf. Resour. Manag. J. 21(3): 64-87 (2008) - [j15]Ram L. Kumar, Sungjune Park, Chandrasekar Subramaniam:
Understanding the Value of Countermeasure Portfolios in Information Systems Security. J. Manag. Inf. Syst. 25(2): 241-280 (2008) - [c4]Muhammad Adeel Zaffar, Ram L. Kumar, Kexin Zhao:
Diffusion Dynamics of Open-Source Software in the Presence of Upgrades: An Agent-Based Computational Economics (ACE) Approach. ICIS 2008: 55 - [c3]Haya Ajjan, Ram L. Kumar, Chandrasekar Subramaniam:
Investigating Determinants of Project Portfolio Management Adoption. ICIS 2008: 85 - 2007
- [j14]Shana L. Dardan, Ram L. Kumar, Antonis C. Stylianou:
The diffusion Of Customer-Related IT Among Large And Mid-Sized Companies. Inf. Resour. Manag. J. 20(4): 12-24 (2007) - 2006
- [j13]Shana L. Dardan, Antonis C. Stylianou, Ram L. Kumar:
The Impact of Customer-Related it Investments on Customer Satisfaction and Shareholder Returns. J. Comput. Inf. Syst. 47(2): 100-111 (2006) - [c2]Ram L. Kumar, Sungjune Park, Chandrasekar Subramaniam, Tae Sung:
A Framework for Assessing IT Security Investment Portfolios. AMCIS 2006: 398 - 2005
- [j12]Moutaz J. Khouja, Ram L. Kumar:
Acquisition of Telecommunications Bandwidth Under Economies of Scale in Size and Duration of Contracts. Decis. Sci. 36(1): 135-158 (2005) - [j11]Antonis C. Stylianou, Ram L. Kumar, Stephanie S. Robbins:
Pricing on the Internet and in Conventional Retail Channels: A Study of Over-the-Counter Pharmaceutical Products. Int. J. Electron. Commer. 10(1): 135-148 (2005) - 2004
- [j10]Ram L. Kumar, Michael Alan Smith, Snehamay Banerjee:
User interface features influencing overall ease of use and personalization. Inf. Manag. 41(3): 289-302 (2004) - [j9]Michael Alan Smith, Ram L. Kumar:
A theory of application service provider (ASP) use from a client perspective. Inf. Manag. 41(8): 977-1002 (2004) - [j8]Ram L. Kumar:
A Framework for Assessing the Business Value of Information Technology Infrastructures. J. Manag. Inf. Syst. 21(2): 11-32 (2004) - 2002
- [j7]Snehamay Banerjee, Ram L. Kumar:
Managing electronic interchange of business documents. Commun. ACM 45(7): 96-102 (2002) - [j6]Ram L. Kumar:
Managing risks in IT projects: an options perspective. Inf. Manag. 40(1): 63-74 (2002) - 2000
- [j5]Antonis C. Stylianou, Ram L. Kumar:
An integrative framework for IS quality management. Commun. ACM 43(9): 99-104 (2000)
1990 – 1999
- 1999
- [j4]Ram L. Kumar, Connie W. Crook:
A Multi-Disciplinary Framework for the Management of Interorganizational Systems. Data Base 30(1): 22-37 (1999) - 1998
- [j3]Connie W. Crook, Ram L. Kumar:
Electronic data interchange: a multi-industry investigation using grounded theory. Inf. Manag. 34(2): 75-89 (1998) - 1997
- [j2]Antonis C. Stylianou, Ram L. Kumar, Moutaz J. Khouja:
A Total Quality Management-Based Systems Development Process. Data Base 28(3): 59-71 (1997) - 1996
- [j1]Ram L. Kumar:
A Note on Project Risk and Option Values of Investments in Information Technologies. J. Manag. Inf. Syst. 13(1): 187-193 (1996) - 1995
- [c1]Ram L. Kumar, Anthony C. Stylianou:
Managing Flexibility in Distributed Information Systems Architectures. ICIS 1995: 345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint