Purdue Krannert School of Management
Krannert Home > Directory > Karthik Natarjan Kannan -- Publications
 Explore Directory
 Directory home
 Karthik Natarajan Kannan - Publications

  1. Kannan, K., Rahman, M., and Tawarmalani, M (2014 Forthcoming). “Implications of Restricted Patch Distribution,” Management Science.

  2. Overby, E., and Kannan, K (2014 Forthcoming). “Reduced Search Costs Bidder Distribution Auctions,” Management Science.

  3. Hashim, M., Kannan, K., Maximiano, S., and Rees, J (2014). “Digital Piracy, Teens, and the Source of Advice: An Experimental Study” JMIS, Vol. 31(2): 211-244.

  4. Wang, T., Rees, J., and Kannan, K (2013). “The Textual Contents of Media Reports of Information Security Breaches and Profitable Short-Term Investment Opportunities,” Journal of Organizational Computing and Electronic Commerce, Vol. 23(3): 200-223.

  5. Wang, T., Kannan, K., and Rees, J (2013). “The Association between the Disclosure and the Realization of Information Security Risk Factors,” Information Systems Research, Vol. 24(2):201-218.

  6. Kim, A., Balachander, S., and Kannan, K (2012). “Optimal Number of Slots in Search Auctions,” Marketing Letters, Vol. 23(3): 851-868.

  7. Kannan, K (2012). “Effects of Revelation Policies under Cost Uncertainty,” Information Systems Research, Vol. 23(1): 75-92.

  8. Cason, T., Kannan, K., and Siebert, R (2011). “An Experimental Study of Information Revelation Policies in Sequential Auctions,” Management Science, Vol. 57(4): 667-688.

  9. Kannan, K (2010). “Declining Prices in Sequential Auction with Complete Revelation of Bids,” Economics Letters, Vol. 108(1): 49-51.

  10. Greenwald, A., Kannan, K., and Krishnan, R (2010). “On Evaluating Information Revelation Policies in Procurement Auctions: A Markov Decision Process Approach,” Information Systems Research, Vol. 20(4): 15-36.

  11. Balachander, S., Kannan, K., and Schwartz, D (2009). “A Theoretical and Empirical Analysis of Alternate Auction Policies for Search Advertisements,” Review of Marketing Science, Vol. 7, Article 5.

  12. Tawarmalani, M., Kannan, K., and De, P (2009). “Allocating Objects in a Network of Caches: Centralized and Decentralized Analyses,” Management Science, Vol. 55(1): 132-147.

  13. Kannan, K., Rees, J., and Sridhar, S (2007). “Market Reactions to Security Breach Announcements: An Empirical Analysis,” International Journal of E-Commerce, Vol. 12(1): 69-91.

  14. Arora, A., Greenwald, A., Kannan, K., and Krishnan, R (2007). “Effects of Information Revelation Policies Under Market Structure Uncertainty,” Management Science, Vol. 53(8): 1234-1248.

  15. Koo, S., Kannan, K., and Lee, G (2006). “On Neighbor Selection Strategy in Hybrid Peer-to-Peer Networks,” Future Generation Computer Systems, Vol. 22 (7): 732-741. The journal coordinated with organizers of ICCCN, 2004 to select a few papers from the conference for a special issue. (See also the Papers in Refereed Conference Proceedings section.)

  16. Kannan, K., and Telang, R (2005). “Markets for Software Vulnerabilities? Think again,” Management Science, Vol. 51(5): 726-741.

Krannert Home | Purdue Home | Contact Information
Copyright © 2015 Purdue University. All Rights Reserved.
An equal access/equal opportunity university.



 Related Links