Author of the publication

Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism.

, and . Decision Analysis, 15 (3): 174-193 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IT Outsourcing Risk Management Practices in Higher Educational Institutes in Ethiopia - A Qualitative Study., , and . AMCIS, Association for Information Systems, (2015)Influence of Information Overload on IT Security Behavior: A Theoretical Framework., and . AMCIS, Association for Information Systems, (2017)A model to analyze the challenge of using cyber insurance., and . Inf. Syst. Frontiers, 21 (2): 301-325 (2019)Towards a Managerial Decision Framework for Utilization of Cyber Insurance Instruments in IT security., and . AMCIS, Association for Information Systems, (2011)Electronic Payment Adoption in the Banking Sector of Low-Income Countries., , and . Int. J. Inf. Syst. Serv. Sect., 7 (4): 27-47 (2015)Mobile healthcare services adoption., , and . Int. J. Netw. Virtual Organisations, 16 (2): 143-156 (2016)Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism., and . Decision Analysis, 15 (3): 174-193 (2018)Dynamic competition in IT security: A differential games approach., , , and . Inf. Syst. Frontiers, 16 (4): 643-661 (2014)Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest., , and . Inf. Technol. Manag., 11 (1): 7-23 (2010)Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology., , and . AMCIS, page 456. Association for Information Systems, (2005)