Dr. Zareef Aqeeb Mohammed

  • Assistant Professor at Dept of Information Systems & Analytics, McCoy College of Business

Scholarly and Creative Works

2023

  • Ji Yang Leong, B., & Mohammed, Z. A. (2023). “From where should we work?”: Analyzing American twitter sentiment of work arrangement preferences. International Journal of Social Media and Online Communities, 15(1), 1–20. https://doi.org/DOI: 10.4018/IJSMOC.330754
  • Tejay, G., & Mohammed, Z. A. (2023). Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective. Information & Management, 60(3), 20. https://doi.org/https://doi.org/10.1016/j.im.2022.103751
  • Mohammed, Z. A., & Tejay, G. (2023). How to compensate after a data breach? Investigating compensation types and role of fairness in customer repatronage intentions. ACM DATA BASE for the Advances in Information Systems, 54(1), 110–127.
  • Tejay, G., & Mohammed, Z. A. (2023). Examining the Low-Resolution Electromagnetic Tomography technique for EEG brain mapping: Towards methodological advancement for IS research. ACM DATA BASE for Advances in Information Systems, 54(1), 66–81.

2022

  • Mohammed, Z. A. (2022). Data breach recovery areas: An exploration of organization’s recovery strategies for surviving data breaches. Organizational Cybersecurity Journal: Practice, Process and People, 2(1), 41–59. https://doi.org/https://doi.org/10.1108/OCJ-05-2021-0014

2021

  • Mohammed, Z. A., & Tejay, G. P. (2021). Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study. Computers & Security, 104. https://doi.org/https://doi.org/10.1016/j.cose.2021.102201
  • Tejay, G., Mohammed, Z. A., & Luo, X. (2021). Discovering factors influencing information believability to mitigate dissemination of (mis)information: An experimental neuroscience study for trustworthy cyberspace.

2020

  • Shankar, N., & Mohammed, Z. A. (2020). Surviving data breaches: A multiple case study analysis. Journal of Comparative International Management, 23(1), 35–54.

2019

  • Tejay, G., & Mohammed, Z. A. (2019). Identifying factors of information security culture: An exploratory study.

2017

  • Mohammed, Z. A., Tejay, G. P., & Squillace, J. (2017). Utilizing normative theories to develop ethical actions for better privacy practices. Journal of Information Privacy and Security, 13(4), 1–20. https://doi.org/https://doi.org/10.1080/15536548.2017.1419018
  • Mohammed, Z. A., & Tejay, G. P. (2017). Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals’ perception towards technology. Computers & Security, 67, 254–265.
  • Mohammed, Z. A., & Tejay, G. (2017). Understanding privacy-related decisions through individuals’ neural disposition: A neuroscience.
  • Mohammed, Z. A., & Tejay, G. P. (2017). Re-examining the privacy paradox through cognitive neuroscience perspective. Association of Information Systems (AIS).

2015

  • Mohammed, Z. A., Tejay, G. P., & Winkfield, M. (2015). Understanding the role of equity in leveraging privacy concerns of consumers in ecommerce. Association for Information Systems (AIS).