Humayun Zafar
Orcid: 0000-0001-9936-9753
  According to our database1,
  Humayun Zafar
  authored at least 34 papers
  between 2009 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
  2025
    Commun. Assoc. Inf. Syst., 2025
    
  
  2024
Fortifying healthcare: An action research approach to developing an effective SETA program.
    
  
    Comput. Secur., March, 2024
    
  
Reducing fraud in organizations through information security policy compliance: An information security controls perspective.
    
  
    Comput. Secur., 2024
    
  
  2023
    Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
    
  
Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?
    
  
    Proceedings of the 29th Americas Conference on Information Systems, 2023
    
  
  2022
    Int. J. Syst. Softw. Secur. Prot., 2022
    
  
    Int. J. Syst. Softw. Secur. Prot., 2022
    
  
    Proceedings of the Conference on Computers and People Research, 2022
    
  
  2019
Traditional SETA No More: Investigating the Intersection Between Cybersecurity and Cognitive Neuroscience.
    
  
    Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
    
  
  2017
    AIS Trans. Hum. Comput. Interact., 2017
    
  
Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud.
    
  
    Proceedings of the 23rd Americas Conference on Information Systems, 2017
    
  
    Proceedings of the 23rd Americas Conference on Information Systems, 2017
    
  
  2016
The value of the CIO in the top management team on performance in the case of information security breaches.
    
  
    Inf. Syst. Frontiers, 2016
    
  
    Int. J. Inf. Manag., 2016
    
  
    Commun. Assoc. Inf. Syst., 2016
    
  
Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents.
    
  
    Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
    
  
    Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
    
  
    Proceedings of the 22nd Americas Conference on Information Systems, 2016
    
  
  2015
    Proceedings of the 21st Americas Conference on Information Systems, 2015
    
  
  2014
    Commun. Assoc. Inf. Syst., 2014
    
  
Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector.
    
  
    Commun. Assoc. Inf. Syst., 2014
    
  
  2013
    Int. J. Interdiscip. Telecommun. Netw., 2013
    
  
Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?
    
  
    Proceedings of the 19th Americas Conference on Information Systems, 2013
    
  
  2012
Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors.
    
  
    Inf. Resour. Manag. J., 2012
    
  
    Commun. Assoc. Inf. Syst., 2012
    
  
    Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
    
  
Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study.
    
  
    Proceedings of the 18th Americas Conference on Information Systems, 2012
    
  
    Proceedings of the 18th Americas Conference on Information Systems, 2012
    
  
  2011
Does a CIO Matter? Investigating the Impact of IT Security Breaches on Firm Performance Using Tobin's q.
    
  
    Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
    
  
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm.
    
  
    Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
    
  
  2010
A primer on carrying out a successful yet rigorous security risk management based case study.
    
  
    Proceedings of the Information Security Curriculum Development Conference, 2010
    
  
  2009
    Commun. Assoc. Inf. Syst., 2009
    
  
    Proceedings of the 15th Americas Conference on Information Systems, 2009
    
  
The Economic Ramifications of Strategic IT Security Information Sharing in the Financial Services Industry.
    
  
    Proceedings of the 15th Americas Conference on Information Systems, 2009