Current state of information security research in IS H Zafar, JG Clark Communications of the Association for Information Systems 24 (1), 34, 2009 | 156 | 2009 |
Human resource information systems: Information security concerns for organizations H Zafar Human Resource Management Review 23 (1), 105-113, 2013 | 130 | 2013 |
User satisfaction research in information systems: Historical roots and approaches R Vaezi, A Mills, WW Chin, H Zafar Communications of the Association for Information Systems, 2016 | 99 | 2016 |
The value of the CIO in the top management team on performance in the case of information security breaches H Zafar, MS Ko, KM Osei-Bryson Information Systems Frontiers 18, 1205-1215, 2016 | 94 | 2016 |
Financial impact of information security breaches on breached firms and their non-breached competitors H Zafar, M Ko, KM Osei-Bryson Information Resources Management Journal (IRMJ) 25 (1), 21-37, 2012 | 50 | 2012 |
A multi-country assessment of mobile payment adoption YA Au, H Zafar UTSA, College of Business, 2008 | 46 | 2008 |
Rethinking fs-isac: An it security information sharing network model for the financial services sector CZ Liu, H Zafar, YA Au Communications of the Association for Information Systems 34 (1), 2, 2014 | 36 | 2014 |
Gender-based differences in culture in the Indian IT workplace AB Woszczynski, P Dembla, H Zafar International Journal of Information Management 36 (4), 507-519, 2016 | 28 | 2016 |
Toward a more secure HRIS: The role of HCI and unconscious behavior H Zafar, AB Randolph, N Martin AIS Transactions on Human-Computer Interaction 9 (1), 59-74, 2017 | 26 | 2017 |
A security and privacy framework for e-Learning R Ali, H Zafar International Journal for e-Learning Security, 2017 | 22 | 2017 |
Who wins in a data breach?-A comparative study on the intangible costs of data breach incidents G Sinanaj, H Zafar | 16 | 2016 |
Security risk management in healthcare: A case study H Zafar, MS Ko, JG Clark Communications of the Association for Information Systems 34 (1), 37, 2014 | 16 | 2014 |
Cybersecurity: role of behavioral training in healthcare H Zafar | 14 | 2016 |
Security risk management at a Fortune 500 firm: A case study H Zafar Journal of Information Privacy and Security 7 (4), 23-53, 2011 | 13 | 2011 |
Mobile computing and hand‐held devices at work H Zafar The Wiley Blackwell handbook of the psychology of the internet at work, 195-210, 2017 | 9 | 2017 |
Influence of information overload on IT security behavior: a theoretical framework T Bandyopadhyay, H Zafar | 9 | 2017 |
The Russian and Ukrainian information technology outsourcing market: Potential, barriers and management considerations VF Kleist, AB Woszcynski, H Zafar, P Dembla Journal of Global Information Technology Management 18 (1), 6-28, 2015 | 9 | 2015 |
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm H Zafar, JG Clark, M Ko, YA Au | 9 | 2011 |
Traditional SETA no more: investigating the intersection between cybersecurity and cognitive neuroscience H Zafar, A Randolph, S Gupta, C Hollingsworth | 8 | 2019 |
Does a CIO matter? Investigating the impact of IT security breaches on firm performance using Tobin's q H Zafar, M Ko, KM Osei-Bryson 2011 44th Hawaii International Conference on System Sciences, 1-7, 2011 | 8 | 2011 |