Tejaswini (Teju) Herath
Tejaswini (Teju) Herath
Verified email at - Homepage
Cited by
Cited by
Protection motivation and deterrence: a framework for security policy compliance in organisations
T Herath, HR Rao
European Journal of information systems 18, 106-125, 2009
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
T Herath, HR Rao
Decision Support Systems 47 (2), 154-165, 2009
Understanding employee responses to stressful information security requirements: A coping perspective
J D'Arcy, T Herath, MK Shoss
Journal of management information systems 31 (2), 285-318, 2014
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
J D'arcy, T Herath
European journal of information systems 20 (6), 643-658, 2011
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
IEEE transactions on professional communication 55 (4), 345-362, 2012
Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information systems journal 24 (1), 61-84, 2014
Offshore outsourcing: risks, challenges, and potential solutions
T Herath, R Kishore
Information Systems Management 26 (4), 312-326, 2009
Copula-based actuarial model for pricing cyber-insurance policies
HSB Herath, TC Herath
Insurance Markets and Companies 2 (1), 2011
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India
A Pal, T Herath, R De’, HR Rao
Information Technology for Development 26 (2), 394-420, 2020
Coping with the new normal imposed by the COVID-19 pandemic: Lessons for technology management and governance
T Herath, HSB Herath
Information Systems Management 37 (4), 277-283, 2020
Investments in information security: A real options perspective with Bayesian postaudit
HSB Herath, TC Herath
Journal of Management Information Systems 25 (3), 337-375, 2008
Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective
A Ayanso, TC Herath, N O'Brien
Decision Support Systems 77, 112-122, 2015
Balanced scorecard implementation of security strategies: a framework for IT security performance management
T Herath, H Herath, WG Bremser
Information Systems Management 27 (1), 72-81, 2010
Why do people use mobile payment technologies and why would they continue? An examination and implications from India
A Pal, T Herath, HR Rao
Research Policy 50 (6), 104228, 2021
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
A review of contextual factors affecting mobile payment adoption and use
A Pal, R De’, T Herath, HR Rao
Journal of Banking and Financial Technology 3, 43-57, 2019
Is the convenience worth the risk? An investigation of mobile payment usage
A Pal, T Herath, R De’, HR Rao
Information systems frontiers 23, 941-961, 2021
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
IT security auditing: A performance evaluation decision model
HSB Herath, TC Herath
Decision Support Systems 57, 54-63, 2014
The system can't perform the operation now. Try again later.
Articles 1–20