Srinivasan Raghunathan

Learn More
Assessing the value of information technology (IT) security is challenging because of the difficulty of measuring the cost of security breaches. An event-study analysis, using market valuations, was used to assess the impact of security breaches on the market value of breached firms. The information-transfer effect of security breaches (i.e., their effect(More)
The structure of the homotetrameric DNA binding domain of the single stranded DNA binding protein from Escherichia coli (Eco SSB) bound to two 35-mer single stranded DNAs was determined to a resolution of 2.8 A. This structure describes the vast network of interactions that results in the extensive wrapping of single stranded DNA around the SSB tetramer and(More)
A ssessing the return on investment has always been a sticking point for technology investments. Similar to IT productivity paradox [1], Return on Security Investment (ROSI) has become a controversial topic due to immense growth of e-businesses. Defining the value of security investments is challenging. However, it is clear that “security consumers will(More)
The crystal structure of the tetrameric DNA-binding domain of the single-stranded DNA binding protein from Escherichia coli was determined at a resolution of 2.9 A using multiwavelength anomalous dispersion. Each monomer in the tetramer is topologically similar to an oligomer-binding fold. Two monomers each contribute three beta-strands to a single(More)
Research on information sharing partnerships between manufacturers and retailers in a supply chain is relatively recent. The research has generally focused on models involving a single retailer or multiple retailers with independent demands. We analyze the value of demand information sharing in a one manufacturer–N retailer model in which demands at the(More)
Assessing the value of information technology (IT) security investments by firms is a challenging task because of difficulties in the measurement of tangible and intangible benefits. Event study methodology that uses market valuations is a widely used in these cases. We employ the event study methodology to assess the impact of Internet security breaches on(More)
T increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT(More)