Current state of information security research in IS H Zafar, JG Clark Communications of the Association for Information Systems 24 (1), 34, 2009 | 155 | 2009 |
Human resource information systems: Information security concerns for organizations H Zafar Human Resource Management Review 23 (1), 105-113, 2013 | 120 | 2013 |
User satisfaction research in information systems: Historical roots and approaches R Vaezi, A Mills, WW Chin, H Zafar Communications of the Association for Information Systems, 2016 | 97 | 2016 |
The value of the CIO in the top management team on performance in the case of information security breaches H Zafar, MS Ko, KM Osei-Bryson Information Systems Frontiers 18, 1205-1215, 2016 | 87 | 2016 |
Financial impact of information security breaches on breached firms and their non-breached competitors H Zafar, M Ko, KM Osei-Bryson Information Resources Management Journal (IRMJ) 25 (1), 21-37, 2012 | 47 | 2012 |
A multi-country assessment of mobile payment adoption YA Au, H Zafar UTSA, College of Business, 2008 | 42 | 2008 |
A multi-country assessment of mobile payment adoption YA Au, H Zafar UTSA, College of Business, 2008 | 42 | 2008 |
Rethinking fs-isac: An it security information sharing network model for the financial services sector CZ Liu, H Zafar, YA Au Communications of the Association for Information Systems 34 (1), 2, 2014 | 30 | 2014 |
Rethinking fs-isac: An it security information sharing network model for the financial services sector CZ Liu, H Zafar, YA Au Communications of the Association for Information Systems 34 (1), 2, 2014 | 30 | 2014 |
Toward a more secure HRIS: The role of HCI and unconscious behavior H Zafar, AB Randolph, N Martin AIS Transactions on Human-Computer Interaction 9 (1), 59-74, 2017 | 27 | 2017 |
Gender-based differences in culture in the Indian IT workplace AB Woszczynski, P Dembla, H Zafar International Journal of Information Management 36 (4), 507-519, 2016 | 27 | 2016 |
A security and privacy framework for e-Learning R Ali, H Zafar International Journal for e-Learning Security, 2017 | 21 | 2017 |
Security risk management in healthcare: A case study H Zafar, MS Ko, JG Clark Communications of the Association for Information Systems 34 (1), 37, 2014 | 15 | 2014 |
Who wins in a data breach?-a comparative study on the intangible costs of data breach incidents G Sinanaj, H Zafar | 13 | 2016 |
Cybersecurity: Role of behavioral training in healthcare H Zafar | 13 | 2016 |
Security risk management at a Fortune 500 firm: A case study H Zafar Journal of Information Privacy and Security 7 (4), 23-53, 2011 | 12 | 2011 |
Mobile computing and hand‐held devices at work H Zafar The Wiley Blackwell handbook of the psychology of the internet at work, 195-210, 2017 | 8 | 2017 |
Does a CIO matter? Investigating the impact of IT security breaches on firm performance using Tobin's q H Zafar, M Ko, KM Osei-Bryson 2011 44th Hawaii International Conference on System Sciences, 1-7, 2011 | 8 | 2011 |
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm H Zafar, JG Clark, M Ko, YA Au | 8 | 2011 |
Influence of information overload on IT security behavior: a theoretical framework T Bandyopadhyay, H Zafar | 7 | 2017 |