Herath Tejaswini

Tejaswini Herath

Information about the author Tejaswini Herath will soon be added to the site.
Found 3 papers in total
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
2011
Deterrence theory is one of the most widely applied theories in information systems...
An investigation of email processing from a risky decision making perspective
2011
The prevalence of cyber crimes has threatened the business model enabled by email....
Protection motivation and deterrent: a framework for security policy compliance in organisations
2009
Enterprises establish computer security policies to ensure the security of information...
Papers per page: