Humayun Zafar
Orcid: 0000-0001-9936-9753
According to our database1,
Humayun Zafar
authored at least 33 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
2
2
1
3
2
1
2
1
2
1
1
2
3
1
1
3
2
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Fortifying healthcare: An action research approach to developing an effective SETA program.
Comput. Secur., March, 2024
Reducing fraud in organizations through information security policy compliance: An information security controls perspective.
Comput. Secur., 2024
2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
Int. J. Syst. Softw. Secur. Prot., 2022
Int. J. Syst. Softw. Secur. Prot., 2022
Proceedings of the Conference on Computers and People Research, 2022
2019
Traditional SETA No More: Investigating the Intersection Between Cybersecurity and Cognitive Neuroscience.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2017
AIS Trans. Hum. Comput. Interact., 2017
Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
The value of the CIO in the top management team on performance in the case of information security breaches.
Inf. Syst. Frontiers, 2016
Int. J. Inf. Manag., 2016
Commun. Assoc. Inf. Syst., 2016
Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Commun. Assoc. Inf. Syst., 2014
Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector.
Commun. Assoc. Inf. Syst., 2014
2013
Int. J. Interdiscip. Telecommun. Netw., 2013
Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?
Proceedings of the 19th Americas Conference on Information Systems, 2013
2012
Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors.
Inf. Resour. Manag. J., 2012
Commun. Assoc. Inf. Syst., 2012
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study.
Proceedings of the 18th Americas Conference on Information Systems, 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Does a CIO Matter? Investigating the Impact of IT Security Breaches on Firm Performance Using Tobin's q.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
2010
A primer on carrying out a successful yet rigorous security risk management based case study.
Proceedings of the Information Security Curriculum Development Conference, 2010
2009
Commun. Assoc. Inf. Syst., 2009
Proceedings of the 15th Americas Conference on Information Systems, 2009
The Economic Ramifications of Strategic IT Security Information Sharing in the Financial Services Industry.
Proceedings of the 15th Americas Conference on Information Systems, 2009