Author of the publication

Architecture for Managing Knowledge on Cybersecurity in Sub-Saharan Africa.

, , and . Inf. Technol. Dev., 20 (2): 140-164 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Cross-Addiction on Information Sharing Behaviors on Social Networking Sites., and . J. Comput. Inf. Syst., 59 (2): 105-115 (2019)Personality Traits and Information Privacy Concern on Social Media Platforms.. J. Comput. Inf. Syst., 55 (4): 11-19 (2015)Architecture for Managing Knowledge on Cybersecurity in Sub-Saharan Africa., , and . Inf. Technol. Dev., 20 (2): 140-164 (2014)Checklists, Checklists, Every Where, but not a List to Easily Check: An Exploratory Study of Personal Health Information Management Practices., , and . AMCIS, Association for Information Systems, (2015)Information Systems' Diverse Origins Coming Together., , , and . J. Inf. Technol. Educ., (2009)A peer-influence perspective on compulsive social networking site use: Trait mindfulness as a double-edged sword., and . Comput. Hum. Behav., (2017)Shareable Technology Mash-Up for Situation Awareness in Catastrophic Events., , and . HICSS, page 684-692. IEEE Computer Society, (2012)The Impact of Importance and Distribution on Information Exchange in Team Decision Making: Preliminary Results., , and . HICSS, page 3786-3795. IEEE Computer Society, (2012)An Assessment of Electronic Banking Initiatives in Nigeria., , , and . AMCIS, page 64. Association for Information Systems, (2007)Seeing is believing (or at least changing your mind): The influence of visibility and task complexity on preference changes in computer-supported team decision making., , and . J. Assoc. Inf. Sci. Technol., 67 (9): 2090-2104 (2016)