Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of Information Overload on IT Security Behavior: A Theoretical Framework., and . AMCIS, Association for Information Systems, (2017)IT Outsourcing Risk Management Practices in Higher Educational Institutes in Ethiopia - A Qualitative Study., , and . AMCIS, Association for Information Systems, (2015)A model to analyze the challenge of using cyber insurance., and . Inf. Syst. Frontiers, 21 (2): 301-325 (2019)Towards a Managerial Decision Framework for Utilization of Cyber Insurance Instruments in IT security., and . AMCIS, Association for Information Systems, (2011)Electronic Payment Adoption in the Banking Sector of Low-Income Countries., , and . Int. J. Inf. Syst. Serv. Sect., 7 (4): 27-47 (2015)Mobile healthcare services adoption., , and . Int. J. Netw. Virtual Organisations, 16 (2): 143-156 (2016)Dynamic competition in IT security: A differential games approach., , , and . Inf. Syst. Frontiers, 16 (4): 643-661 (2014)Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism., and . Decision Analysis, 15 (3): 174-193 (2018)Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest., , and . Inf. Technol. Manag., 11 (1): 7-23 (2010)ICT Integration Efforts in Higher Education in Developing Economies: The Case of Addis Ababa University, Ethiopia., , and . Int. J. Inf. Commun. Technol. Educ., 5 (3): 34-58 (2009)