Abhijeet Ghoshal

20092019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 2 Similar Profiles
Recommender systems Engineering & Materials Science
Association rules Engineering & Materials Science
Profitability Engineering & Materials Science
Collaborative filtering Engineering & Materials Science
Factorization Engineering & Materials Science
Mobile computing Engineering & Materials Science
Knowledge management Engineering & Materials Science
Cloud computing Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2009 2019

Support Forums and Software Vendor's Pricing Strategy

Dey, D., Ghoshal, A. & Lahiri, A., Mar 4 2019, 29 p.

Research output: Working paper

Pricing strategy
Vendors
Short-run
Software
Profit

Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement

Dey, D., Ghoshal, A. & Lahiri, A., Mar 6 2018, 40 p.

Research output: Working paper

Enforcement
Education
Economic analysis
Strategic complements
Strategic substitutes

Dilemma of Data Sharing Alliance: When Do Competing Personalizing and Non-Personalizing Firms Share Data

Ghoshal, A., Kumar, S. & Mookerjee, V., Oct 20 2018, (Accepted/In press) In : Production and Operations Management.

Research output: Contribution to journalArticle

Profitability
Data sharing
Alliances

Security Circumvention: To Educate or To Enforce?

Dey, D., Ghoshal, A. & Lahiri, A., 2018. 10 p.

Research output: Contribution to conferencePaper

Open Access
Information systems

Drawing a line in the sand: Commitment problem in ending software support

Ghoshal, A., Lahiri, A. & Dey, D., Dec 2017, In : MIS Quarterly: Management Information Systems. 41, 4, p. 1227-1248 22 p.

Research output: Contribution to journalArticle

Profitability
Network security
Sand
Costs
Commitment problem