Gurvirender Tejay
Orcid: 0000-0003-3135-4699Affiliations:
- University of Colorado, College of Business, Colorado Springs, USA
According to our database1,
Gurvirender Tejay
authored at least 27 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective.
Inf. Manag., April, 2023
Examining the Low- Resolution Electromagnetic Tomography Technique for EEG Brain Mapping: Towards Methodological Advancement for IS Research.
ACM SIGMIS Database, February, 2023
How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions.
ACM SIGMIS Database, February, 2023
2021
Examining the privacy paradox through individuals' neural disposition in e-commerce: An exploratory neuroimaging study.
Comput. Secur., 2021
2020
Introducing virtue ethics concepts into the decision processes of information systems trusted workers: a Delphi study.
Int. J. Inf. Comput. Secur., 2020
Special Issue Introduction: Desperately Seeking the Information in Information Systems Research at HICSS 2019.
Data Base, 2020
2017
Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology.
Comput. Secur., 2017
Information Systems Security Leadership: An Empirical Study of Behavioral Influences.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Information system security commitment: A study of external influences on senior management.
Comput. Secur., 2016
2015
Understanding the role of equity in leveraging privacy concerns of consumers in ecommerce.
Proceedings of the CONF-IRM 2015, 2015
The Role of Cognitive Disposition in Deconstructing the Privacy Paradox: A Neuroscience Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015
2013
Information System Security Commitment: A Pilot Study of External Influences on Senior Management.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013
2012
Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Evaluation of Information Security Controls in Organizations by Grey Relational Analysis.
Int. J. Dependable Trust. Inf. Syst., 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
2010
Int. J. Electron. Gov. Res., 2010
Proceedings of the 2010 eCrime Researchers Summit, 2010
Utilizing End-user Requirements to Inform the Knowledge Supply Strategies of IT Project Teams.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
Building a better password: The role of cognitive load in information security training.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the 15th Americas Conference on Information Systems, 2009
2007
Identifying Governance Dimensions to Evaluate Information Systems Security in Organizations.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2006
Identifying Information Systems Security Requirements for Different Organizational Forms: A transactions cost approach.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004