Gurvirender Tejay

Orcid: 0000-0003-3135-4699

Affiliations:
  • University of Colorado, College of Business, Colorado Springs, USA


According to our database1, Gurvirender Tejay authored at least 27 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective.
Inf. Manag., April, 2023

Examining the Low- Resolution Electromagnetic Tomography Technique for EEG Brain Mapping: Towards Methodological Advancement for IS Research.
ACM SIGMIS Database, February, 2023

How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions.
ACM SIGMIS Database, February, 2023

2021
Examining the privacy paradox through individuals' neural disposition in e-commerce: An exploratory neuroimaging study.
Comput. Secur., 2021

2020
Introducing virtue ethics concepts into the decision processes of information systems trusted workers: a Delphi study.
Int. J. Inf. Comput. Secur., 2020

Special Issue Introduction: Desperately Seeking the Information in Information Systems Research at HICSS 2019.
Data Base, 2020

2017
Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology.
Comput. Secur., 2017

Information Systems Security Leadership: An Empirical Study of Behavioral Influences.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Information system security commitment: A study of external influences on senior management.
Comput. Secur., 2016

2015
Understanding the role of equity in leveraging privacy concerns of consumers in ecommerce.
Proceedings of the CONF-IRM 2015, 2015

The Role of Cognitive Disposition in Deconstructing the Privacy Paradox: A Neuroscience Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2013
Cybercrime in the Digital Economy - Editorial.
Comput. Secur., 2013

Information System Security Commitment: A Pilot Study of External Influences on Senior Management.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

The Convergence of Security and Usability: Defining a Framework for Mobile Design.
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013

2012
Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Evaluation of Information Security Controls in Organizations by Grey Relational Analysis.
Int. J. Dependable Trust. Inf. Syst., 2011

A Confirmatory Analysis of Information Systems Security Success Factors.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Theorizing Information Security Success: Towards Secure E-Government.
Int. J. Electron. Gov. Res., 2010

Securing IS assets through hacker deterrence: A case study.
Proceedings of the 2010 eCrime Researchers Summit, 2010

Utilizing End-user Requirements to Inform the Knowledge Supply Strategies of IT Project Teams.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Building a better password: The role of cognitive load in information security training.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Developing insider attack detection model: A grounded approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Developing an Information Systems Security Success Model for eGovernment Context.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2007
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Identifying Information Systems Security Requirements for Different Organizational Forms: A transactions cost approach.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Making Sense of Information Systems Security Standards.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004


  Loading...