Остановите войну!
for scientists:
default search action
H. Raghav Rao
- > Home > Persons > H. Raghav Rao
Publications
- 2021
- [j168]Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage. Inf. Syst. Frontiers 23(4): 941-961 (2021) - 2020
- [j158]Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India. Inf. Technol. Dev. 26(2): 394-420 (2020) - 2019
- [j150]Abhipsa Pal, Rahul De', Tejaswini C. Herath, H. Raghav Rao:
A review of contextual factors affecting mobile payment adoption and use. J. Bank. Financial Technol. 3(1): 43-57 (2019) - 2018
- [j147]John D'Arcy, Tejaswini C. Herath, Myung-Seong Yim, Kichan Nam, H. Raghav Rao:
Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model. AIS Trans. Replication Res. 4: 8 (2018) - [j143]Tejaswini C. Herath, Myung-Seong Yim, John D'Arcy, Kichan Nam, H. Raghav Rao:
Examining employee security violations: moral disengagement and its environmental influences. Inf. Technol. People 31(6): 1135-1162 (2018) - [c108]Nasim Talebi, Mohsen M. Jozani, Tejaswini (Teju) Herath, H. Raghav Rao:
Using Cognitive Dissonance Theory to Explain Information Security Policy Violations. AMCIS 2018 - [c103]Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Factors facilitating Adoption of Mobile Payment Services over Credit/Debit Cards: An Investigation after the Demonetization Policy Shock in India. PACIS 2018: 337 - 2014
- [j122]Tejaswini C. Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur, H. Raghav Rao:
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf. Syst. J. 24(1): 61-84 (2014) - 2012
- [j104]Jingguo Wang, Tejaswini C. Herath, Rui Chen, Arun Vishwanath, H. Raghav Rao:
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. IEEE Trans. Prof. Commun. 55(4): 345-362 (2012) - 2011
- [j101]Arun Vishwanath, Tejaswini C. Herath, Rui Chen, Jingguo Wang, H. Raghav Rao:
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3): 576-586 (2011) - [j100]Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Raghav Rao:
An investigation of email processing from a risky decision making perspective. Decis. Support Syst. 52(1): 73-81 (2011) - 2009
- [j87]Tejaswini C. Herath, H. Raghav Rao:
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47(2): 154-165 (2009) - [j85]Jingguo Wang, Rui Chen, Tejaswini C. Herath, H. Raghav Rao:
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. Decis. Support Syst. 48(1): 92-102 (2009) - [j84]Tejaswini C. Herath, H. Raghav Rao:
Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2): 106-125 (2009) - 2006
- [j63]Sangmi Chai, Tejaswini C. Herath, Insu Park, H. Raghav Rao:
Repeated Use of E-Gov Web Sites: A Satisfaction and Confidentiality Perspective. Int. J. Electron. Gov. Res. 2(3): 1-22 (2006)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint