Tejaswini Herath
Associate Professor
Goodman School of Business
Brock University
Canada
Biography
"Dr. Tejaswini (Teju) Herath holds an Advanced Certificate in Information Assurance, (National Security Agency Certified Information Assurance Program, SUNY Buffalo, USA). She completed (CGA - Certified General Accountant) certification in 2009. She is a recipient of 2014 Faculty Award for Excellence in Teaching. Previously she worked as a library systems analyst and a part-time lecturer at University of Northern British Columbia (UNBC)."
Research Interest
Dr. Herath's research interests are mainly in area of Information Assurance and include topics such as Information Security and Privacy, Diffusion of Information Assurance Practices, Economics of Information Security and Security Management
Publications
-
Herath, T., Herath, H. and Bremser, W.. Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance Management, Information Systems Management. Volume 27, Number 1, 2010.
-
Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H.R.. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model, Decision Support Systems. Volume 51, Number 3, 2011.
-
Herath, H. and Herath, T.. Copula Based Actuarial Model for Pricing Cyber-Insurance Policies, Insurance Markets and Companies: Analyses and Actuarial Computations. Volume 2, Number 1, 2011.
-
Chen, R., Wang, J., Herath, T. and Rao, H.R.. An Investigation of Email Processing from a Risky Decision Making Perspective, Decision Support Systems. Volume 52, Number 1, December, 2011.
-
Wang, J., Herath, T., Chen, R., Vishwanath, A. and Rao, H.R.. Phishing Susceptibility: An Investigation into the Processing of a Targeted Spear Phishing Email, IEEE Transactions on Professional Communication. Volume 55, Number 4, 2012.
-
DArcy, J., Herath, T. and Shoss, M.. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective, Journal of Management Information Systems. Volume 31, Number 2, 2014.
-
Herath, T., Chen , R., Wang, J., Banjara , K., Wilbur, J. and Rao, R.. Security Services as Coping Mechanisms: An Investigation into User Intention to Adopt an Email Authentication Service, Information Systems Journal. Volume 24, Number 1, 2014.
-
Herath, H. and Herath, T.. IT Security Auditing: A Performance Evaluation Decision Model, Decision Support Systems. Volume 57, Number 1, 2014.
-
Herath, T.. Student Learning and Performance in Information Systems Courses: The Role of Academic Motivation, Decision Sciences Journal of Innovative Education. Volume 13, Number 4, 2015.
-
Ayanso, A., Herath, T. and OBrien, N.. Understanding Continuance Intentions of Physicians with Electronic Medical Records (EMR): An Expectancy-Confirmation Perspective, Decision Support Systems. Volume 77, Number 1, September, 2015.