


default search action
Chandrasekar Subramaniam
2020 – today
- 2022
- [j20]Kasi Viswanathan Palanisamy
, Chandrasekar Subramaniam, Balaji Sakthivel:
Evaluating the role of carbon quantum dots covered silica nanofillers on the partial discharge performance of transformer insulation. Turkish J. Electr. Eng. Comput. Sci. 30(4): 1492-1505 (2022) - 2021
- [j19]Reginald A. Silver
, Chandrasekar Subramaniam, Antonis C. Stylianou:
Association between Patient Portal use and Office Visits. J. Medical Syst. 45(7): 74 (2021) - 2020
- [j18]Won Seok Yang, Nam K. Kim, Sungjune Park
, Chandrasekar Subramaniam:
Improving service in the presence of surge traffic: a K-policy voluntary flushing queueing system. Ann. Oper. Res. 295(1): 411-423 (2020)
2010 – 2019
- 2019
- [j17]Antonis C. Stylianou, Chandrasekar Subramaniam, Yuan Niu:
The Role of Knowledge Management in the Relationship between IT Capability and Interorganizational Performance: An Empirical Investigation. Commun. Assoc. Inf. Syst. 45: 4 (2019) - 2016
- [j16]Haya Ajjan, Ram L. Kumar, Chandrasekar Subramaniam:
Information technology portfolio management implementation: a case study. J. Enterp. Inf. Manag. 29(6): 841-859 (2016) - 2015
- [j15]Sungjune Park
, Antonis C. Stylianou, Chandrasekar Subramaniam, Yuan Niu:
Information technology and interorganizational learning: An investigation of knowledge exploration and exploitation processes. Inf. Manag. 52(8): 998-1011 (2015) - [j14]Ravi Sen, Matthew L. Nelson, Chandrasekar Subramaniam:
Application of Survival Model to Understand Open Source Software Release. Pac. Asia J. Assoc. Inf. Syst. 7(2): 1 (2015) - 2013
- [j13]Haya Ajjan, Ram L. Kumar, Chandrasekar Subramaniam:
Understanding Differences between Adopters and Nonadopters of Information Technology Project portfolio Management. Int. J. Inf. Technol. Decis. Mak. 12(6): 1151-1174 (2013) - 2012
- [j12]Orcun Temizkan, Ram L. Kumar, Sungjune Park
, Chandrasekar Subramaniam:
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis. J. Manag. Inf. Syst. 28(4): 305-338 (2012) - 2011
- [j11]Ravi Sen, Chandrasekar Subramaniam, Matthew L. Nelson:
Open source software licenses: Strong-copyleft, non-copyleft, or somewhere in between? Decis. Support Syst. 52(1): 199-206 (2011) - [j10]Xiaoran Wu, Chandrasekar Subramaniam:
Understanding and Predicting Radio Frequency Identification (RFID) Adoption in Supply Chains. J. Organ. Comput. Electron. Commer. 21(4): 348-367 (2011) - [c7]Xiaoran Wu, Chandrasekar Subramaniam:
al. RFID Adoption in Supply Chain Activities Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, Michigan August 4th-7th 2011 1 Radio Frequency Identification (RFID) Adoption in Supply Chain Activities: Facilitators and Inhibitors. AMCIS 2011 - [c6]Xiaoran Wu, Jing Zhou, Sungjune Park, Chandrasekar Subramaniam:
The Impact of RFID on Firm and Supply Chain Performance: a Simulation Study. ICIS 2011
2000 – 2009
- 2009
- [j9]Chandrasekar Subramaniam, Ravi Sen, Matthew L. Nelson:
Determinants of open source software project success: A longitudinal study. Decis. Support Syst. 46(2): 576-585 (2009) - [j8]Kexin Zhao, Mu Xia, Michael J. Shaw, Chandrasekar Subramaniam:
The sustainability of B2B e-marketplaces: Ownership structure, market competition, and prior buyer-seller connections. Decis. Support Syst. 47(2): 105-114 (2009) - [j7]Ravi Sen, Chandrasekar Subramaniam, Matthew L. Nelson:
Determinants of the Choice of Open Source Software License. J. Manag. Inf. Syst. 25(3): 207-240 (2009) - [c5]Xiaoran Wu, Chandrasekar Subramaniam:
New Understanding of RFID Adoption and Infusion in Retail Supply Chain. HICSS 2009: 1-10 - [c4]Yuan Niu, Sungjune Park, Antonis C. Stylianou, Chandrasekar Subramaniam:
Bridging Gaps in Organizational Knowledge - The Role of IT-Enabled Organizational Learning in Supply Chain Partnerships. ICIS 2009: 74 - 2008
- [j6]Ram L. Kumar, Sungjune Park
, Chandrasekar Subramaniam:
Understanding the Value of Countermeasure Portfolios in Information Systems Security. J. Manag. Inf. Syst. 25(2): 241-280 (2008) - [c3]Haya Ajjan, Ram L. Kumar, Chandrasekar Subramaniam:
Investigating Determinants of Project Portfolio Management Adoption. ICIS 2008: 85 - 2006
- [j5]Matthew L. Nelson, Ravi Sen, Chandrasekar Subramaniam:
Understanding Open Source Software: A Research Classification Framework. Commun. Assoc. Inf. Syst. 17: 12 (2006) - [c2]Ram L. Kumar, Sungjune Park, Chandrasekar Subramaniam, Tae Sung:
A Framework for Assessing IT Security Investment Portfolios. AMCIS 2006: 398 - [c1]Michele L. Gribbins, Chandrasekar Subramaniam, Michael J. Shaw:
Process-Technology Fit: Extending Task-Technology Fit to Assess Enterprise Information Technologies. ICIS 2006: 6 - 2004
- [j4]Chandrasekar Subramaniam, Michael J. Shaw:
The Effects of Process Characteristics on the Value of B2B E-Procurement. Inf. Technol. Manag. 5(1-2): 161-180 (2004) - 2002
- [j3]Chandrasekar Subramaniam, Michael J. Shaw:
A Study of the Value and Impact of B2B E-Commerce: The Case of Web-Based Procurement. Int. J. Electron. Commer. 6(4): 19-40 (2002) - 2001
- [j2]Michael J. Shaw, Chandrasekar Subramaniam, Gek Woo Tan, Michael Welge:
Knowledge management and data mining for marketing. Decis. Support Syst. 31(1): 127-137 (2001) - 2000
- [j1]Chandrasekar Subramaniam, Michael J. Shaw, David M. Gardner:
Product Marketing and Channel Management in Electronic Commerce. Inf. Syst. Frontiers 1(4): 363-378 (2000) - [p1]Chandrasekar Subramaniam, Michael J. Shaw, David M. Gardner:
Product Marketing on the Internet. Handbook of Electronic Commerce 2000: 147-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
