default search action
Humayun Zafar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jason A. Williams, Humayun Zafar, Saurabh Gupta:
Fortifying healthcare: An action research approach to developing an effective SETA program. Comput. Secur. 138: 103655 (2024) - [j13]Dennis Brown, Gunjan Batra, Humayun Zafar, Khawaja Saeed:
Reducing fraud in organizations through information security policy compliance: An information security controls perspective. Comput. Secur. 144: 103958 (2024) - 2023
- [c19]Gunjan Batra, Khawaja Saeed, Humayun Zafar:
Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events? AMCIS 2023 - [c18]Humayun Zafar, Jason A. Williams, Saurabh Gupta:
Toward an Effective SETA Program: An Action Research Approach. HICSS 2023: 3297-3304 - 2022
- [j12]Humayun Zafar:
Critical Success Factors for an Effective Security Risk Management Program. Int. J. Syst. Softw. Secur. Prot. 13(1): 1-26 (2022) - [j11]Humayun Zafar:
Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting. Int. J. Syst. Softw. Secur. Prot. 13(1): 1-20 (2022) - [c17]Jason A. Williams, Saurabh Gupta, Humayun Zafar:
Accidental Insecure Behavior. SIGMIS-CPR 2022: 16:1-16:4
2010 – 2019
- 2019
- [c16]Humayun Zafar, Adriane B. Randolph, Saurabh Gupta, Carole L. Hollingsworth:
Traditional SETA No More: Investigating the Intersection Between Cybersecurity and Cognitive Neuroscience. HICSS 2019: 1-10 - 2017
- [j10]Humayun Zafar, Adriane B. Randolph, Neale Martin:
Toward a More Secure HRIS: The Role of HCI and Unconscious Behavior. AIS Trans. Hum. Comput. Interact. 9(1): 4 (2017) - [c15]Tridib Bandyopadhyay, Humayun Zafar:
Influence of Information Overload on IT Security Behavior: A Theoretical Framework. AMCIS 2017 - [c14]Dennis Brown, Humayun Zafar:
Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud. AMCIS 2017 - 2016
- [j9]Reza Vaezi, Annette Mills, Wynne Chin, Humayun Zafar:
User Satisfaction Research in Information Systems: Historical Roots and Approaches. Commun. Assoc. Inf. Syst. 38: 27 (2016) - [j8]Amy B. Woszczynski, Pamila Dembla, Humayun Zafar:
Gender-based differences in culture in the Indian IT workplace. Int. J. Inf. Manag. 36(4): 507-519 (2016) - [j7]Humayun Zafar, Myung S. Ko, Kweku-Muata Osei-Bryson:
The value of the CIO in the top management team on performance in the case of information security breaches. Inf. Syst. Frontiers 18(6): 1205-1215 (2016) - [c13]Humayun Zafar:
Cybersecurity: Role of Behavioral Training in Healthcare. AMCIS 2016 - [c12]Hossain Shahriar, Svetlana Peletsverger, Humayun Zafar, Bill Bailey, Linda Johnston:
Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security. COMPSAC Workshops 2016: 622-623 - [c11]Griselda Sinanaj, Humayun Zafar:
Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents. PACIS 2016: 60 - 2015
- [c10]Neale Martin, Humayun Zafar:
Information Security: Modeling the Unconscious Mind. AMCIS 2015 - [e5]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015. ACM 2015, ISBN 978-1-4503-4049-6 [contents] - 2014
- [j6]Charles Zhechao Liu, Humayun Zafar, Yoris A. Au:
Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector. Commun. Assoc. Inf. Syst. 34: 2 (2014) - [j5]Humayun Zafar, Myung S. Ko, Jan Guynes Clark:
Security Risk Management in Healthcare: A Case Study. Commun. Assoc. Inf. Syst. 34: 37 (2014) - [e4]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014. ACM 2014, ISBN 978-1-4503-3049-7 [contents] - 2013
- [j4]Michael E. Whitman, Humayun Zafar:
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited. Int. J. Interdiscip. Telecommun. Netw. 5(2): 43-50 (2013) - [c9]Andrew W. Green, Humayun Zafar:
Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work? AMCIS 2013 - [e3]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013. ACM 2013, ISBN 978-1-4503-2547-9 [contents] - 2012
- [j3]Humayun Zafar, Sweta Sneha:
Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm. Commun. Assoc. Inf. Syst. 31: 9 (2012) - [j2]Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson:
Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors. Inf. Resour. Manag. J. 25(1): 21-37 (2012) - [c8]Humayun Zafar:
Exploring Organizational Human Resource Information System Security. AMCIS 2012 - [c7]Humayun Zafar, Jan Guynes Clark, Myung S. Ko:
Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study. AMCIS 2012 - [c6]Kirk Inman, Humayun Zafar:
IR, DR and BC with wireless mesh networks. InfoSecCD 2012: 33-39 - [e2]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012. ACM 2012, ISBN 978-1-4503-1538-8 [contents] - 2011
- [c5]Humayun Zafar, Jan Guynes Clark, Myung S. Ko, Yoris A. Au:
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm. AMCIS 2011 - [c4]Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson:
Does a CIO Matter? Investigating the Impact of IT Security Breaches on Firm Performance Using Tobin's q. HICSS 2011: 1-7 - [e1]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011. ACM 2011, ISBN 978-1-4503-0812-0 [contents] - 2010
- [c3]Humayun Zafar:
A primer on carrying out a successful yet rigorous security risk management based case study. InfoSecCD 2010: 48
2000 – 2009
- 2009
- [j1]Humayun Zafar, Jan Guynes Clark:
Current State of Information Security Research In IS. Commun. Assoc. Inf. Syst. 24: 34 (2009) - [c2]Humayun Zafar, Yoris A. Au:
The Economic Ramifications of Strategic IT Security Information Sharing in the Financial Services Industry. AMCIS 2009: 281 - [c1]Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson:
Intra-Industry Effects of Information Security Breaches on Firm Performance. AMCIS 2009: 590
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint