Segui
Tejaswini (Teju) Herath
Tejaswini (Teju) Herath
Email verificata su brocku.ca - Home page
Titolo
Citata da
Citata da
Anno
Protection motivation and deterrence: a framework for security policy compliance in organisations
T Herath, HR Rao
European Journal of information systems 18 (2), 106-125, 2009
18272009
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
T Herath, HR Rao
Decision support systems 47 (2), 154-165, 2009
12742009
Understanding employee responses to stressful information security requirements: A coping perspective
J D'Arcy, T Herath, MK Shoss
Journal of management information systems 31 (2), 285-318, 2014
7542014
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
J D'arcy, T Herath
European journal of information systems 20 (6), 643-658, 2011
6192011
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
5362011
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
IEEE transactions on professional communication 55 (4), 345-362, 2012
2862012
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information systems journal 24 (1), 61-84, 2014
2352014
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India
A Pal, T Herath, R De’, HR Rao
Information Technology for Development 26 (2), 394-420, 2020
1612020
Copula-based actuarial model for pricing cyber-insurance policies
HSB Herath, TC Herath
Insurance Markets and Companies 2 (1), 2011
1472011
Offshore outsourcing: risks, challenges, and potential solutions
T Herath, R Kishore
Information Systems Management 26 (4), 312-326, 2009
1352009
Coping with the new normal imposed by the COVID-19 pandemic: Lessons for technology management and governance
T Herath, HSB Herath
Information Systems Management 37 (4), 277-283, 2020
1342020
Why do people use mobile payment technologies and why would they continue? An examination and implications from India
A Pal, T Herath, HR Rao
Research Policy 50 (6), 104228, 2021
1252021
Investments in information security: A real options perspective with Bayesian postaudit
HSB Herath, TC Herath
Journal of Management Information Systems 25 (3), 337-375, 2008
1122008
Is the convenience worth the risk? An investigation of mobile payment usage
A Pal, T Herath, R De’, HR Rao
Information systems frontiers 23, 941-961, 2021
1072021
Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective
A Ayanso, TC Herath, N O'Brien
Decision Support Systems 77, 112-122, 2015
1012015
Balanced scorecard implementation of security strategies: a framework for IT security performance management
T Herath, H Herath, WG Bremser
Information Systems Management 27 (1), 72-81, 2010
802010
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
762011
A review of contextual factors affecting mobile payment adoption and use
A Pal, R De’, T Herath, HR Rao
Journal of Banking and Financial Technology 3, 43-57, 2019
752019
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
582009
The role of mobile payment technology in sustainable and human-centric development: evidence from the post-demonetization period in India
A Pal, R De’, T Herath
Information Systems Frontiers 22, 607-631, 2020
552020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20