default search action
Utkarsh Shrivastava
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Srikar Velichety, Utkarsh Shrivastava:
Quantifying the impacts of online fake news on the equity value of social media platforms - Evidence from Twitter. Int. J. Inf. Manag. 64: 102474 (2022) - 2021
- [j9]Utkarsh Shrivastava, Jiahe Song, Bernard T. Han, Doug Dietzman:
Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation. Int. J. Medical Informatics 148: 104401 (2021) - [j8]Utkarsh Shrivastava, Bidyut Hazarika, Alan Rea:
Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability. Ind. Manag. Data Syst. 121(12): 2672-2696 (2021) - [j7]Utkarsh Shrivastava, Laurel Ofstein, Damodar Golhar:
Direct and Indirect Effects of ICT Infrastructure, Skills, and Use on Entrepreneurship: A Cross-Countr y Empirical Investigation. J. Glob. Inf. Manag. 29(6): 1-25 (2021)
2010 – 2019
- 2019
- [c11]Utkarsh Shrivastava, Jiahe Song, Bernard T. Han:
The implications of patient data security considerations for EHR interoperability and downtime recovery. AMCIS 2019 - 2018
- [j6]Anol Bhattacherjee, Utkarsh Shrivastava:
The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective. Gov. Inf. Q. 35(4): 703-712 (2018) - [j5]Vivek Kumar Singh, Utkarsh Shrivastava, Lina Bouayad, Balaji Padmanabhan, Anna Ialynytchev, Susan K. Schultz:
Machine learning for psychiatric patient triaging: an investigation of cascading classifiers. J. Am. Medical Informatics Assoc. 25(11): 1481-1487 (2018) - [c10]Agnieszka Onuchowska, Saurav Chakraborty, Wolfgang Jank, Utkarsh Shrivastava:
Detection and Classification of Attacks on IoT Networks. AMCIS 2018 - 2017
- [j4]Utkarsh Shrivastava, Taufeeq Mohammed:
A Cybersecurity Executive DBA? J. Inf. Technol. Educ. Discuss. Cases 6: 9 (2017) - [j3]Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Quynh Thi Nguyen:
Grandon.com Got Hacked! J. Inf. Technol. Educ. Discuss. Cases 6: 10 (2017) - 2015
- [c9]Anol Bhattacherjee, Utkarsh Shrivastava:
ICT as a Corruption Deterrent: A Theoretical Perspective. AMCIS 2015 - [c8]Wolfgang Jank, Utkarsh Shrivastava:
A data driven framework for early prediction of customer response to promotions. AMCIS 2015 - [c7]Utkarsh Shrivastava, Anol Bhattacherjee:
ICT as a corruption deterrent: a research note. ICTD 2015: 58:1-58:5 - 2014
- [j2]Utkarsh Shrivastava, Gyan Prakash, Joydip Dhar:
Extreme value theory and neural network for catastrophic fall prediction: a study of year 2008-2009. Int. J. Inf. Decis. Sci. 6(2): 193-210 (2014) - 2012
- [j1]Nitin, Rajan Vaish, Utkarsh Shrivastava:
On a deadlock and performance analysis of ALBR and DAR algorithm on X-Torus topology by optimal utilization of Cross Links and minimal lookups. J. Supercomput. 59(3): 1252-1288 (2012)
2000 – 2009
- 2009
- [c6]Nitin, Gitanjali Chauhan, Vivek Kumar Sehgal, Rohit Sharma, Abhishek Gupta, Aditya Patel, Amanpreet Singh Arora, Aprajita Gupta, Utkarsh Shrivastava, Rajan Vaish:
A Single Tape Deterministic Turing Machine of Adaptive Deterministic Routing Algorithm Designed for Torus Network. FCS 2009: 37-40 - [c5]Nitin, Gitanjali Chauhan, Rohit Sharma, Vivek Kumar Sehgal, Rohit Verma, Gaurav Kumar, Utkarsh Shrivastava, Rajan Vaish:
Single Tape Deterministic Turing Machine of Routing Algorithms Designed for Torus Network. FCS 2009: 47-52 - [c4]Nitin, Rajan Vaish, Sristhi Sarin, Utkarsh Shrivastava:
Adaptive Load Balanced Routing Algorithm for X-Torus Topology. PDPTA 2009: 283-288 - [c3]Satish Chandra, Utkarsh Shrivastava, Rajan Vaish, Siddharth Dixit, Manisha Rana:
Improved-AntNet: ACO Routing Algorithm in Practice. UKSim 2009: 25-29 - 2008
- [c2]Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Finite-State Modeling and Testing of Image Based Authentication System. ACIS-ICIS 2008: 427-432 - [c1]Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma:
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. ACIS-ICIS 2008: 575-580
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint