Scholarly and Creative Works
2023
- Ji Yang Leong, B., & Mohammed, Z. A. (2023). “From where should we work?”: Analyzing American twitter sentiment of work arrangement preferences. International Journal of Social Media and Online Communities, 15(1), 1–20. https://doi.org/DOI: 10.4018/IJSMOC.330754
- Tejay, G., & Mohammed, Z. A. (2023). Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective. Information & Management, 60(3), 20. https://doi.org/https://doi.org/10.1016/j.im.2022.103751
- Mohammed, Z. A., & Tejay, G. (2023). How to compensate after a data breach? Investigating compensation types and role of fairness in customer repatronage intentions. ACM DATA BASE for the Advances in Information Systems, 54(1), 110–127.
- Tejay, G., & Mohammed, Z. A. (2023). Examining the Low-Resolution Electromagnetic Tomography technique for EEG brain mapping: Towards methodological advancement for IS research. ACM DATA BASE for Advances in Information Systems, 54(1), 66–81.
2022
- Mohammed, Z. A. (2022). Data breach recovery areas: An exploration of organization’s recovery strategies for surviving data breaches. Organizational Cybersecurity Journal: Practice, Process and People, 2(1), 41–59. https://doi.org/https://doi.org/10.1108/OCJ-05-2021-0014
2021
- Mohammed, Z. A., & Tejay, G. P. (2021). Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study. Computers & Security, 104. https://doi.org/https://doi.org/10.1016/j.cose.2021.102201
- Tejay, G., Mohammed, Z. A., & Luo, X. (2021). Discovering factors influencing information believability to mitigate dissemination of (mis)information: An experimental neuroscience study for trustworthy cyberspace.
2020
- Shankar, N., & Mohammed, Z. A. (2020). Surviving data breaches: A multiple case study analysis. Journal of Comparative International Management, 23(1), 35–54.
2019
- Tejay, G., & Mohammed, Z. A. (2019). Identifying factors of information security culture: An exploratory study.
2017
- Mohammed, Z. A., Tejay, G. P., & Squillace, J. (2017). Utilizing normative theories to develop ethical actions for better privacy practices. Journal of Information Privacy and Security, 13(4), 1–20. https://doi.org/https://doi.org/10.1080/15536548.2017.1419018
- Mohammed, Z. A., & Tejay, G. P. (2017). Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals’ perception towards technology. Computers & Security, 67, 254–265.
- Mohammed, Z. A., & Tejay, G. (2017). Understanding privacy-related decisions through individuals’ neural disposition: A neuroscience.
- Mohammed, Z. A., & Tejay, G. P. (2017). Re-examining the privacy paradox through cognitive neuroscience perspective. Association of Information Systems (AIS).
2015
- Mohammed, Z. A., Tejay, G. P., & Winkfield, M. (2015). Understanding the role of equity in leveraging privacy concerns of consumers in ecommerce. Association for Information Systems (AIS).