default search action
Tejaswini C. Herath
Person information
- affiliation: Brock University, Goodman School of Business, St. Catharines, ON, Canada
- affiliation: University at Buffalo, Department of Management Science, Amherst, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Tejaswini C. Herath, Hemantha S. B. Herath, David Cullum:
An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks. Inf. Syst. Frontiers 25(2): 681-721 (2023) - 2021
- [j23]Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage. Inf. Syst. Frontiers 23(4): 941-961 (2021) - [p2]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j22]Tejaswini C. Herath, Hemantha S. B. Herath, John D'Arcy:
Organizational Adoption of Information Security Solutions: An Integrative Lens Based on Innovation Adoption and the Technology- Organization- Environment Framework. Data Base 51(2): 12-35 (2020) - [j21]Abhipsa Pal, Rahul De', Tejaswini C. Herath:
The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India. Inf. Syst. Frontiers 22(3): 607-631 (2020) - [j20]Tejaswini C. Herath, Hemantha S. B. Herath:
Coping with the New Normal Imposed by the COVID-19 Pandemic: Lessons for Technology Management and Governance. Inf. Syst. Manag. 37(4): 277-283 (2020) - [j19]Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India. Inf. Technol. Dev. 26(2): 394-420 (2020)
2010 – 2019
- 2019
- [j18]Abhipsa Pal, Rahul De', Tejaswini C. Herath, H. Raghav Rao:
A review of contextual factors affecting mobile payment adoption and use. J. Bank. Financial Technol. 3(1): 43-57 (2019) - 2018
- [j17]John D'Arcy, Tejaswini C. Herath, Myung-Seong Yim, Kichan Nam, H. Raghav Rao:
Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model. AIS Trans. Replication Res. 4: 8 (2018) - [j16]Tejaswini C. Herath, Myung-Seong Yim, John D'Arcy, Kichan Nam, H. Raghav Rao:
Examining employee security violations: moral disengagement and its environmental influences. Inf. Technol. People 31(6): 1135-1162 (2018) - [c9]Nasim Talebi, Mohsen M. Jozani, Tejaswini (Teju) Herath, H. Raghav Rao:
Using Cognitive Dissonance Theory to Explain Information Security Policy Violations. AMCIS 2018 - [c8]Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Factors facilitating Adoption of Mobile Payment Services over Credit/Debit Cards: An Investigation after the Demonetization Policy Shock in India. PACIS 2018: 337 - 2017
- [c7]Tejaswini C. Herath, Hemantha S. B. Herath, John D'Arcy:
Managing Security in Organizations: Adoption of Information Security Solutions. SIGMIS-CPR 2017: 87-88 - 2015
- [j15]Anteneh Ayanso, Tejaswini C. Herath, Nicole O'Brien:
Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective. Decis. Support Syst. 77: 112-122 (2015) - [c6]Tejaswini C. Herath, John D'Arcy:
Social Networking Behaviors: Role of personality, perceived risk, and social influences. CONF-IRM 2015: 4 - 2014
- [j14]Hemantha S. B. Herath, Tejaswini C. Herath:
IT security auditing: A performance evaluation decision model. Decis. Support Syst. 57: 54-63 (2014) - [j13]Tejaswini C. Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur, H. Raghav Rao:
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf. Syst. J. 24(1): 61-84 (2014) - [j12]John D'Arcy, Tejaswini C. Herath, Mindy K. Shoss:
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. J. Manag. Inf. Syst. 31(2): 285-318 (2014) - 2013
- [c5]Xiao Tang, Srikanth Parameswaran, Rajiv Kishore, Tejaswini C. Herath:
Simulation Model of Knowledge Complexity in New Knowledge Transfer Performance. AMCIS 2013 - 2012
- [j11]Jingguo Wang, Tejaswini C. Herath, Rui Chen, Arun Vishwanath, H. Raghav Rao:
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. IEEE Trans. Prof. Commun. 55(4): 345-362 (2012) - 2011
- [j10]Arun Vishwanath, Tejaswini C. Herath, Rui Chen, Jingguo Wang, H. Raghav Rao:
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3): 576-586 (2011) - [j9]Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Raghav Rao:
An investigation of email processing from a risky decision making perspective. Decis. Support Syst. 52(1): 73-81 (2011) - [j8]John D'Arcy, Tejaswini C. Herath:
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. Eur. J. Inf. Syst. 20(6): 643-658 (2011) - [p1]Anteneh Ayanso, Tejaswini C. Herath, Kaveepan Lertwachara:
Social Web: Web 2.0 Technologies to Enhance Knowledge Communities. Community-Built Databases 2011: 3-20 - 2010
- [j7]Tejaswini C. Herath, Hemantha S. B. Herath, Wayne G. Bremser:
Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance Management. Inf. Syst. Manag. 27(1): 72-81 (2010)
2000 – 2009
- 2009
- [j6]Tejaswini C. Herath, H. Raghav Rao:
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47(2): 154-165 (2009) - [j5]Jingguo Wang, Rui Chen, Tejaswini C. Herath, H. Raghav Rao:
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. Decis. Support Syst. 48(1): 92-102 (2009) - [j4]Tejaswini C. Herath, H. Raghav Rao:
Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2): 106-125 (2009) - [j3]Tejaswini C. Herath, Rajiv Kishore:
Offshore Outsourcing: Risks, Challenges, and Potential Solutions. Inf. Syst. Manag. 26(4): 312-326 (2009) - [j2]Hemantha S. B. Herath, Tejaswini C. Herath:
Investments in Information Security: A Real Options Perspective with Bayesian Postaudit. J. Manag. Inf. Syst. 25(3): 337-375 (2009) - 2007
- [c4]Tejaswini C. Herath, G. Lawrence Sanders:
Sharing of Knowledge in Public Knowledge Spaces: Influencing Factors. AMCIS 2007: 53 - [c3]Tejaswini C. Herath, Rajiv Kishore:
Outsourcing Success: Psychological Contract Perspective. AMCIS 2007: 58 - [c2]Hemantha S. B. Herath, Tejaswini C. Herath:
Cyber-Insurance: Copula Pricing Framework and Implication for Risk Management. WEIS 2007 - 2006
- [j1]Sangmi Chai, Tejaswini C. Herath, Insu Park, H. Raghav Rao:
Repeated Use of E-Gov Web Sites: A Satisfaction and Confidentiality Perspective. Int. J. Electron. Gov. Res. 2(3): 1-22 (2006) - [c1]Hemantha S. B. Herath, Tejaswini C. Herath:
Justifying Spam and E-mail Virus Security Investments: A Case Study. WEIS 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-31 02:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint