Theories used in information systems research: Insights from complex network analysis S Lim, TJV Saldanha, S Malladi, NP Melville Journal of Information Technology Theory and Application (JITTA) 14 (2), 2, 2013 | 78 | 2013 |
Theories used in information systems research: identifying theory networks in leading IS journals S Lim, T Saldanha, S Malladi, NP Melville ICIS 2009 Proceedings, 91, 2009 | 70 | 2009 |
Bug bounty programs for cybersecurity: Practices, issues, and recommendations SS Malladi, HC Subramanian IEEE software 37 (1), 31-39, 2019 | 59 | 2019 |
Cloud computing adoption and its implications for CIO strategic focus–an empirical analysis S Malladi, MS Krishnan | 51 | 2012 |
Adoption of business intelligence & analytics in organizations–an empirical study of antecedents S Malladi | 41 | 2013 |
Lean principles in IT services: a case study on implementation and best practices S Malladi, PDD Dominic, A Kamil International Journal of Business Information Systems 8 (3), 247-268, 2011 | 35 | 2011 |
Determinants of usage variations of business intelligence & analytics in organizations–an empirical analysis S Malladi, M Krishnan | 26 | 2013 |
Bug bounty marketplaces and enabling responsible vulnerability disclosure: an empirical analysis HC Subramanian, S Malladi Journal of Database Management (JDM) 31 (1), 38-63, 2020 | 18 | 2020 |
Does Software-as-a-Service (SaaS) has a role in IT-enabled Innovation?–An Empirical Analysis S Malladi, M Krishnan | 15 | 2012 |
Achieving customer centricity: Technologies and practices S Malladi Cutter IT Journal 24 (2), 24, 2011 | 5 | 2011 |
Transformation Potential of Cloud Computing-Understanding Strategic Value Creation from Customer and Vendor Perspectives. SSR Malladi University of Michigan, 2014 | 1 | 2014 |
Bug Bounty Programs for Cybersecurity SS Malladi, HC Subramanian Digital Object Identifier 10, 0 | 1 | |
Could Cyber-conflict be Avoided? Exploring Deterrence in Low and High Stakes Information Security Interactions CM Parra, H Subramanian, S Malladi | | 2020 |
Essential Technologies and Organizational Practices for Effective Crowdsourcing S Malladi Cutter IT Journal 24 (6), 17, 2011 | | 2011 |