Protection motivation and deterrence: a framework for security policy compliance in organisations T Herath, HR Rao European Journal of information systems 18 (2), 106-125, 2009 | 1827 | 2009 |
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness T Herath, HR Rao Decision support systems 47 (2), 154-165, 2009 | 1274 | 2009 |
Understanding employee responses to stressful information security requirements: A coping perspective J D'Arcy, T Herath, MK Shoss Journal of management information systems 31 (2), 285-318, 2014 | 754 | 2014 |
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings J D'arcy, T Herath European journal of information systems 20 (6), 643-658, 2011 | 619 | 2011 |
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model A Vishwanath, T Herath, R Chen, J Wang, HR Rao Decision Support Systems 51 (3), 576-586, 2011 | 536 | 2011 |
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email J Wang, T Herath, R Chen, A Vishwanath, HR Rao IEEE transactions on professional communication 55 (4), 345-362, 2012 | 286 | 2012 |
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao Information systems journal 24 (1), 61-84, 2014 | 235 | 2014 |
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India A Pal, T Herath, R De’, HR Rao Information Technology for Development 26 (2), 394-420, 2020 | 161 | 2020 |
Copula-based actuarial model for pricing cyber-insurance policies HSB Herath, TC Herath Insurance Markets and Companies 2 (1), 2011 | 147 | 2011 |
Offshore outsourcing: risks, challenges, and potential solutions T Herath, R Kishore Information Systems Management 26 (4), 312-326, 2009 | 135 | 2009 |
Coping with the new normal imposed by the COVID-19 pandemic: Lessons for technology management and governance T Herath, HSB Herath Information Systems Management 37 (4), 277-283, 2020 | 134 | 2020 |
Why do people use mobile payment technologies and why would they continue? An examination and implications from India A Pal, T Herath, HR Rao Research Policy 50 (6), 104228, 2021 | 125 | 2021 |
Investments in information security: A real options perspective with Bayesian postaudit HSB Herath, TC Herath Journal of Management Information Systems 25 (3), 337-375, 2008 | 112 | 2008 |
Is the convenience worth the risk? An investigation of mobile payment usage A Pal, T Herath, R De’, HR Rao Information systems frontiers 23, 941-961, 2021 | 107 | 2021 |
Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective A Ayanso, TC Herath, N O'Brien Decision Support Systems 77, 112-122, 2015 | 101 | 2015 |
Balanced scorecard implementation of security strategies: a framework for IT security performance management T Herath, H Herath, WG Bremser Information Systems Management 27 (1), 72-81, 2010 | 80 | 2010 |
An investigation of email processing from a risky decision making perspective R Chen, J Wang, T Herath, HR Rao Decision Support Systems 52 (1), 73-81, 2011 | 76 | 2011 |
A review of contextual factors affecting mobile payment adoption and use A Pal, R De’, T Herath, HR Rao Journal of Banking and Financial Technology 3, 43-57, 2019 | 75 | 2019 |
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use J Wang, R Chen, T Herath, HR Rao Decision Support Systems 48 (1), 92-102, 2009 | 58 | 2009 |
The role of mobile payment technology in sustainable and human-centric development: evidence from the post-demonetization period in India A Pal, R De’, T Herath Information Systems Frontiers 22, 607-631, 2020 | 55 | 2020 |