Journal Articles
Herath, T., D'Arcy, J., Herath, H. and Yuan, S.. Role of Need to Belong, Social Influences, and Perceived Risks in Social Networking Behaviors, International Journal of Digital Society, Volume 15, 2024.
Herath, T., Herath, H. and Cullum, D.. An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks, Information Systems Frontiers, Volume 25, 2023.
Amo, L., Grijalva, E., Herath, T., Lemoine, G. and Rao, H.. Technological Entitlement: It's My Technology and I'll (Ab)Use It How I Want To, MIS Quarterly, Volume 46, Number 3, September, 2022.
Pal, A., Herath, T., De, R. and Rao, H.. Is the Convenience worth the Risk? An Investigation of Mobile Payment Usage, Information Systems Frontiers, Volume 23, 2021.
Herath, H. and Herath, T.. Joint Cost Allocation Anomaly Detection in Not-for-profit Organizations (NPOs) Using Cluster Analysis, Accountancy Business and the Public Interest, Volume 20, 2021.
Pal, A., Herath, T., De, R. and Rao, H.. Why do people use mobile payment technologies and why would they continue? An examination and implications from India, Research Policy, Volume 50, Number 6, 2021.
Pal, A., Herath, T., De', R. and Rao, H.. Contextual Facilitators and Barriers influencing the Continued Use of Mobile Payment Services in A Developing Country: Insights from Adopters in India, Information Technology for Development, Volume 26, Number 2, 2020.
Herath, T. and Herath, H.. Coping with the New Normal Imposed by the COVID-19 Pandemic: Lessons for Technology Management and Governance, Information Systems Management, Volume 37, Number 4, 2020.
Barth, J., Herath, H., Herath, T. and Xu, P.. Cryptocurrency Valuation and Ethics: A Text Analytic Approach, Journal of Management Analytics, Volume 7, Number 3, 2020.
Herath, T., Herath, H. and D'Arcy, J.. Organizational Adoption of Information Security Solutions: An Integrative Lens based on Innovation Adoption and the Technology-Organization-Environment Framework, The Data Base for Advances in Information Systems, Volume 51, Number 2, 2020.
Pal, A., Herath, T., De', R. and Rao, H.. The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India, Information Systems Frontiers, Volume 22, 2020.
Herath, H., Herath, T. and Dunn, P.. Profit-Driven Corporate Social Responsibility as a Bayesian Real Option in Green Computing, Journal of Business Ethics, Volume 158, Number 2, August, 2019.
Herath, H. and Herath, T.. Post-Audits for Managing Cyber Security Investments: Bayesian Post-Audit Using Markov Chain Monte Carlo (MCMC) Simulation, Journal of Accounting and Public Policy, Volume 37, Number 6, December, 2018.
D'Arcy, J., Herath, T., Yim, M., Nam, K. and Rao, H.. Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model, AIS Transactions on Replication Research, Volume 4, Number 1, 2018.
Herath, T., Yim, M., D'Arcy, J., Nam, K. and Rao, H.. Examining Employee Security Violations: Moral Disengagement and Its Environmental Influences, Information Technology & People, Volume 31, Number 6, 2018.
Chen, R., Wang, J., Herath, T. and Rao, H.. An Examination Of An E-Authentication Service As An Intervention In E-Mail Risk Perception, Journal of Information Privacy and Security, Volume 13, Number 1, 2017.
Ayanso, A., Herath, T. and OBrien, N.. Understanding Continuance Intentions of Physicians with Electronic Medical Records (EMR): An Expectancy-Confirmation Perspective, Decision Support Systems, Volume 77, Number 1, September, 2015.
Herath, T.. Student Learning and Performance in Information Systems Courses: The Role of Academic Motivation, Decision Sciences Journal of Innovative Education, Volume 13, Number 4, 2015.
Herath, H. and Herath, T.. IT Security Auditing: A Performance Evaluation Decision Model, Decision Support Systems, Volume 57, Number 1, 2014.
Herath, T., Chen , R., Wang, J., Banjara , K., Wilbur, J. and Rao, R.. Security Services as Coping Mechanisms: An Investigation into User Intention to Adopt an Email Authentication Service, Information Systems Journal, Volume 24, Number 1, 2014.
DArcy, J., Herath, T. and Shoss, M.. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective, Journal of Management Information Systems, Volume 31, Number 2, 2014.
Wang, J., Herath, T., Chen, R., Vishwanath, A. and Rao, H.R.. Phishing Susceptibility: An Investigation into the Processing of a Targeted Spear Phishing Email, IEEE Transactions on Professional Communication, Volume 55, Number 4, 2012.
Chen, R., Wang, J., Herath, T. and Rao, H.R.. An Investigation of Email Processing from a Risky Decision Making Perspective, Decision Support Systems, Volume 52, Number 1, December, 2011.
D'Arcy, J. and Herath, T.. A Review and Analysis of Deterrence Theory in the IS Security Literature: Making Sense of the Disparate Findings, European Journal of Information Systems, Volume 20, Number 6, 2011.
Herath, H. and Herath, T.. Copula Based Actuarial Model for Pricing Cyber-Insurance Policies, Insurance Markets and Companies: Analyses and Actuarial Computations, Volume 2, Number 1, 2011.
Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H.R.. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model, Decision Support Systems, Volume 51, Number 3, 2011.
Herath, T., Herath, H. and Bremser, W.. Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance Management, Information Systems Management, Volume 27, Number 1, 2010.
Herath, T. and Rao, HR.. Control Mechanisms in Information Security: A Principal Agent Perspective, International Journal of Business Governance and Ethics, Volume 5, Number 1/2, 2010.
Herath, H. and Herath, T.. Investments in Information Security: A Real Options Perspective with Bayesian Post-Audit, Journal of Management Information Systems, Volume 25, Number 3, Winter, 2009.
Herath, T. and Kishore, R.. Offshore Outsourcing: Risks, Challenges, and Solutions, Information Systems Management, Volume 26, Number 3, Summer, 2009.
Herath, T. and Rao, H.R.. Encouraging Information Security Behaviors: Role of Penalties, Pressures and Perceived Effectiveness, Decision Support Systems, Volume 47, Number 2, 2009.
Herath, T. and Rao, HR. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations, European Journal of Information Systems, Volume 18, Number 2, 2009.
Wang, J., Chen, R., Herath, T. and Rao, HR.. Visual E-Mail Authentication and Identification Services: An Investigation of the Effect on E-Mail Use, Decision Support Systems, Volume 48, Number 1, 2009.
Chai, S., Herath, T., Park, I. and Rao, HR. Repeated Use of E-Gov Websites: A Satisfaction and Confidentiality Perspective, International Journal of Electronic Government Research, Volume 2, Number 4, 2006.
Book Chapters / Sections
Herath, H., Herath, T. and Ekanayake, A.. Climate Preservation in Urban Communities Case Studies - Chapter: Smart Community and City Environmental Responsibility. Editors: . Woodrow Clark, Elsevier Inc, United States of America, 2019.
Ayanso, A. and Herath, T.. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices - Chapter: Law and Technology at Crossroads in Cyberspace: Where do we go from here?. Editors: Dudley, A., Braman, J., Vincenti, G.. IGI Global, Pennsylvania, 2011.
Ayanso, A., Herath, T. and Lertwachara, K.. Community-Built Database: Research and Development - Chapter: Social Web: Web 2.0 Technologies to Enhance Knowledge Communities. Editors: Eric Pardede. Springer, New York, 2011.
Wang, J., Chen, R., Herath, T. and Rao, H.R.. Annals of Emerging Research in IA, Security and Privacy Services - Chapter: An Empirical Exploration of the Design Pattern of Phishing Attacks. Editors: . Emrald Group Publishing Ltd., England, 2009.
Chai, S., Herath, T., Park, I. and Rao, H.R.. Information Security and Ethics: Concepts, Methodologies, Tools, and Application - Chapter: Repeated Use of E-Gov.... REPRINTED. Editors: Hamid Nemati. IGI Publications, Pennsylvania, 2008.
Chai, S., Herath, T., Park, I and Rao, HR. Electronic Government: Concepts, Methodologies, Tools and Applications - Chapter: Repeated Use of E-Gov.... REPRINTED. Editors: Ari-Veikko Anttiroiko. IGI Global, Pennsylvania, 2008.
Chai, S., Herath, T., Park, I. and Rao, HR.. E-Government Research: Policy and Management - Chapter: Repeated Use of E-Gov .... REPRINTED. Editors: Donald Norris. IGI Publishing, Pennsylvania, 2008.
Herath, T., Rao, H.R. and Upadhyaya, S.. Handbook of Research on Social and Organizational Liabilities in Information Security - Chapter: Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education play a role in Vulnerability?. Editors: M. Gupta and R. Sharman. IGI Global, New York, 2008.
Bhatnagar, S., Herath, T., Sharman, R., Rao, H.R. and Upadhyaya, S.. Web 2.0: The Business Model - Chapter: Web 2.0: Investigation of Issues for the Design of Social Networks. Editors: Ernesto Damiani, Miltiadis D. Lytras, and Patricia Ordonez De Pablos. Springer Verlag, New York, 2008.
Herath, T., Bagchi-Sen, S and Rao, HR.. Gender and Information Technology Encyclopedia - Chapter: Vulnerability to Internet Crime and Gender Issues. Editors: Eileen Trauth. IGI Global, Pennsylvania, 2006.
Conference Proceedings and Presentations
Renaud, K., House, D. and Herath, T.. It takes a Society to Protect Childrens’ Privacy Rights - Dewald Roode Workshop on Information Systems Security Research, IFIP WG 8.11/11.13, San Antonio, Texas, October, 2021.
Jozani, M., Herath, T. and Rao, H.. Understanding the Role of Inertia in Explaining Employees’ Information Security Policy Violations Behavior - Dewald Roode Workshop on Information Systems Security Research, IFIP WG 8.11/11.13, San Antonio, Texas, October, 2021.
Pal, A., Herath, T., De, R. and Rao, H.. An Investigation of Factors impacting Perceived Risk and Perceived Security of Mobile Payment Services: The Moderating influence of Convenience - International Conference on Secure Knowledge Management, Goa, India, December, 2019.
Pal, A., Herath, T., De, R. and Rao, H.. Factors facilitating Adoption of Mobile Payment Services over Credit/Debit Cards: An Investigation after the Demonetization Policy Shock in India - Twenty-Second Pacific Asia Conference on Information Systems, Yokohama, Japan, June, 2018.
Talebi, N., Jozani, M., Herath, T. and Rao, H.. Using Cognitive Dissonance Theory to Explain Information Security Policy Violations - Americas Conference on Information Systems (AMCIS), New Orleans, Louisiana, 2018.
Valecha, R., Chen, R., Herath, T., Vishwanath, A., Wang, J. and Rao, H.. A Multi-level Model of Phishing Email Detection - Dewald Roode Workshop on Information Systems Security Research, IFIP WG 8.11/11.13, Tampa, Florida, October, 2017.
Herath, T. and DArcy, J.. Social Influences in Social Networking Behaviors - Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11, Newcastle, United Kingdom, June, 2014.
Herath, H. and Herath, T.. Bayesian Post-audit of an E-mail Service Security Investment - 2nd International Conference on Advancements in Information Technology (ICAIT), Singapore, Other / Not in List, August, 2013.
Tang, X., Parameswaran, S., Kishore, R. and Herath, T.. Simulation Model of Knowledge Complexity in New Knowledge Transfer Performance - Americas Conference of Information Systems (AMCIS 2013), Chicago, Illinois, August, 2013.
Herath, T.. Driving Security through Compliance Mechanisms: A View from Control Reasoning Theory - Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11 2012, Provo, Utah, September, 2012.
Herath, T., Yim, M., DArcy, J. and Nam, K.. Examining Employee Security Behavior: A Moral Disengagement Perspective - Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11 2011, Blacksburg, Virginia, September, 2011.
Herath, H. and Herath, T.. Copula Based Actuarial Model for Pricing Cyber-Insurance Policies - Seventh Annual Forum on Financial Information Systems and Cybersecurity (Invited), University of Maryland, Maryland, January, 2011.
Herath, H. and Herath, T.. Information Security Auditing- A Decision Model for Performance Evaluation - Management Accounting Section (MAS) Research and Case Conference, Atlanta, Georgia, January, 2011.
Herath, H. and Herath, T.. Security Auditing- Performance Evaluation Decision Model - Pre ICIS Workshop in Information Security and Privacy (WISP), St. Louis, Missouri, December, 2010.
Herath, T., Nam, K. and Rao, HR.. Selective Disengagement from Self Regulatory Mechanisms: Examination of Employee Security Behavior - Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11, Waltham, Massachusetts, October, 2010.
Herath, H. and Herath, T.. IT Security Risk Management with Cyber-Insurance - INFORMS-Canadian Operations Research Society, Toronto, Ontario, June, 2009.
Herath, T., Gupta, M. and Rao, HR.. Forging an Effective Information Security Governance Program: A Case Study of a Multinational Organization - IFIP TC 8 International Workshop on Information Systems Security Research, Cape Town, South Africa, May, 2009.
Herath, H. and Herath, T.. Bayesian Post Audit and Extensions - INVITED Presentation, Robert H. Smith School of Business, University of Maryland, College Park, Maryland, April, 2009.
Herath, T. and Rao, H.R.. Control Mechanisms in Information Security: A Principal Agent Perspective - 30th McMaster World Congress (Economic Crime Prevention) - (received a Best Paper Award), Hamilton, Ontario, January, 2009.
Herath, T., Gupta, M. and Rao, HR.. Security Governance in IT Enabled Services: A Case Study at ABC Multinational - MISQE Workshop at AMCIS, Toronto, Ontario, August, 2008.
Herath, T. and Rao, H.R.. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations - INVITED Presentation - Joint Workshop on Cyber Security 2008: Information Assurance in Academic, Business and Government Environment, Center of Excellence in Information Systems Assurance Research and Education at University, Buffalo, New York, May, 2008.
Herath, T. and Rao, H.R.. Encouraging Information Security Behaviors in organizations: Role of Penalties, Pressures and Perceived Effectiveness - INVITED Presentation - METIS Security Seminar Series, Oshawa, Ontario, December, 2007.
Chen, R., Herath, T., Wang, J. and Rao, HR.. Exploring Patterns of Phishing Emails: A Host-Based Analysis - Pre ICIS Workshop in Information Security and Privacy (WISP), Montreal, Quebec, December, 2007.
Herath, T. and Kishore, R.. Outsourcing Success: Psychological Contract Perspective - Americas Conference of Information Systems (AMCIS), Keystone, Colorado, August, 2007.
Herath, T. and Sanders, L.. Sharing of Knowledge in Public Knowledge Spaces: Influencing Factors - Americas Conference of Information Systems (AMCIS), Keystone, Colorado, August, 2007.
Herath, H. and Herath, T.. Cyber-Insurance: Copula Pricing Framework and Implications for Risk Management - Sixth Workshop on the Economics of Information Security (WEIS), Pittsburgh, Pennsylvania, June, 2007.
Wang, J., Chen, R., Herath, T. and Rao, HR.. Design Signatures of Phishing Attacks - First Annual Anti-phishing Working Group (APWG) eCrime Research Summit, Orlando, Florida, November, 2006.
Herath, H. and Herath, T.. Justifying Spam and E-mail Virus Security Investments: A Case Study - Fifth Workshop on the Economics of Information Security (WEIS), Cambridge, England, June, 2006.
Chai, S., Herath, T., Park, I. and Rao, HR. Repeated Use of E-Gov Websites: A Satisfaction and Confidentiality Perspective - the 2005 International Conference on E-Government, Ottawa, Ontario, October, 2005.
Other Publications and Presentations
Armstrong, M. and Herath, T.. Ransomware like Bad Rabbit is big business, The Conversation, October, 2017.
Armstrong, M. and Herath, T.. Is your IT department prepared for a ransomware attack?, Globe & Mail, September, 2016.