Tejaswini C. Herath

Orcid: 0000-0002-3653-5643

Affiliations:
  • Brock University, Goodman School of Business, St. Catharines, ON, Canada
  • University at Buffalo, Department of Management Science, Amherst, NY, USA


According to our database1, Tejaswini C. Herath authored at least 34 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks.
Inf. Syst. Frontiers, April, 2023

2021
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage.
Inf. Syst. Frontiers, 2021

2020
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India.
Inf. Technol. Dev., 2020

Coping with the New Normal Imposed by the COVID-19 Pandemic: Lessons for Technology Management and Governance.
Inf. Syst. Manag., 2020

The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India.
Inf. Syst. Frontiers, 2020

Organizational Adoption of Information Security Solutions: An Integrative Lens Based on Innovation Adoption and the Technology- Organization- Environment Framework.
Data Base, 2020

2019
A review of contextual factors affecting mobile payment adoption and use.
J. Bank. Financial Technol., 2019

2018
Examining employee security violations: moral disengagement and its environmental influences.
Inf. Technol. People, 2018

Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model.
AIS Trans. Replication Res., 2018

Factors facilitating Adoption of Mobile Payment Services over Credit/Debit Cards: An Investigation after the Demonetization Policy Shock in India.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Using Cognitive Dissonance Theory to Explain Information Security Policy Violations.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Managing Security in Organizations: Adoption of Information Security Solutions.
Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017

2015
Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective.
Decis. Support Syst., 2015

Social Networking Behaviors: Role of personality, perceived risk, and social influences.
Proceedings of the CONF-IRM 2015, 2015

2014
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective.
J. Manag. Inf. Syst., 2014

Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
Inf. Syst. J., 2014

IT security auditing: A performance evaluation decision model.
Decis. Support Syst., 2014

2013
Simulation Model of Knowledge Complexity in New Knowledge Transfer Performance.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email.
IEEE Trans. Prof. Commun., 2012

2011
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings.
Eur. J. Inf. Syst., 2011

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model.
Decis. Support Syst., 2011

An investigation of email processing from a risky decision making perspective.
Decis. Support Syst., 2011

Social Web: Web 2.0 Technologies to Enhance Knowledge Communities.
Proceedings of the Community-Built Databases - Research and Development., 2011

2010
Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance Management.
Inf. Syst. Manag., 2010

2009
Investments in Information Security: A Real Options Perspective with Bayesian Postaudit.
J. Manag. Inf. Syst., 2009

Offshore Outsourcing: Risks, Challenges, and Potential Solutions.
Inf. Syst. Manag., 2009

Protection motivation and deterrence: a framework for security policy compliance in organisations.
Eur. J. Inf. Syst., 2009

Visual e-mail authentication and identification services: An investigation of the effects on e-mail use.
Decis. Support Syst., 2009

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness.
Decis. Support Syst., 2009

2007
Cyber-Insurance: Copula Pricing Framework and Implication for Risk Management.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Sharing of Knowledge in Public Knowledge Spaces: Influencing Factors.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Outsourcing Success: Psychological Contract Perspective.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Repeated Use of E-Gov Web Sites: A Satisfaction and Confidentiality Perspective.
Int. J. Electron. Gov. Res., 2006

Justifying Spam and E-mail Virus Security Investments: A Case Study.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006


  Loading...