From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Managerial Decision Framework for Utilization of Cyber Insurance Instruments in IT security., и . AMCIS, Association for Information Systems, (2011)Influence of Information Overload on IT Security Behavior: A Theoretical Framework., и . AMCIS, Association for Information Systems, (2017)IT Outsourcing Risk Management Practices in Higher Educational Institutes in Ethiopia - A Qualitative Study., , и . AMCIS, Association for Information Systems, (2015)A model to analyze the challenge of using cyber insurance., и . Inf. Syst. Frontiers, 21 (2): 301-325 (2019)Electronic Payment Adoption in the Banking Sector of Low-Income Countries., , и . Int. J. Inf. Syst. Serv. Sect., 7 (4): 27-47 (2015)Mobile healthcare services adoption., , и . Int. J. Netw. Virtual Organisations, 16 (2): 143-156 (2016)Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism., и . Decision Analysis, 15 (3): 174-193 (2018)Dynamic competition in IT security: A differential games approach., , , и . Inf. Syst. Frontiers, 16 (4): 643-661 (2014)Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest., , и . Inf. Technol. Manag., 11 (1): 7-23 (2010)ICT Integration Efforts in Higher Education in Developing Economies: The Case of Addis Ababa University, Ethiopia., , и . Int. J. Inf. Commun. Technol. Educ., 5 (3): 34-58 (2009)