Humayun Zafar

Orcid: 0000-0001-9936-9753

According to our database1, Humayun Zafar authored at least 30 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fortifying healthcare: An action research approach to developing an effective SETA program.
Comput. Secur., March, 2024

2023
Toward an Effective SETA Program: An Action Research Approach.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Accidental Insecure Behavior.
Proceedings of the Conference on Computers and People Research, 2022

2019
Traditional SETA No More: Investigating the Intersection Between Cybersecurity and Cognitive Neuroscience.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2017
Toward a More Secure HRIS: The Role of HCI and Unconscious Behavior.
AIS Trans. Hum. Comput. Interact., 2017

Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Influence of Information Overload on IT Security Behavior: A Theoretical Framework.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
The value of the CIO in the top management team on performance in the case of information security breaches.
Inf. Syst. Frontiers, 2016

Gender-based differences in culture in the Indian IT workplace.
Int. J. Inf. Manag., 2016

User Satisfaction Research in Information Systems: Historical Roots and Approaches.
Commun. Assoc. Inf. Syst., 2016

Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Cybersecurity: Role of Behavioral Training in Healthcare.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Information Security: Modeling the Unconscious Mind.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Security Risk Management in Healthcare: A Case Study.
Commun. Assoc. Inf. Syst., 2014

Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector.
Commun. Assoc. Inf. Syst., 2014

2013
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited.
Int. J. Interdiscip. Telecommun. Netw., 2013

Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors.
Inf. Resour. Manag. J., 2012

Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm.
Commun. Assoc. Inf. Syst., 2012

IR, DR and BC with wireless mesh networks.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Exploring Organizational Human Resource Information System Security.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Does a CIO Matter? Investigating the Impact of IT Security Breaches on Firm Performance Using Tobin's q.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
A primer on carrying out a successful yet rigorous security risk management based case study.
Proceedings of the Information Security Curriculum Development Conference, 2010

2009
Current State of Information Security Research In IS.
Commun. Assoc. Inf. Syst., 2009

Intra-Industry Effects of Information Security Breaches on Firm Performance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

The Economic Ramifications of Strategic IT Security Information Sharing in the Financial Services Industry.
Proceedings of the 15th Americas Conference on Information Systems, 2009


  Loading...