default search action
Michael E. Kyobe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Alexander Ekow Asmah, Michael Kyobe:
A configurational analysis of IT governance: A study of the financial services sector in Ghana. Electron. J. Inf. Syst. Dev. Ctries. 89(1) (2023) - [c23]Michael Kyobe, Hishaam Damon:
The Influence Of Techonological Factors On Dark Web Marketplace Closure. DMSVIVA 2023: 104-112 - 2022
- [c22]Rutendo Mushore, Michael Kyobe:
Aligning Tasks, Technology, People, and Structures to Leverage the Value of Big Data Analytics. FNC/MobiSPC/SEIT 2022: 739-744 - [c21]Anass Bayaga, Michael Kyobe:
PLS-SEM modelling in Information Systems. ICTAS 2022: 1-6 - [c20]Simo-Sihle Ganca, Michael Kyobe:
The Effectiveness of School Anti-cyberbullying Policies and Their Compliance with South African Laws: A Conceptual Framework. IDIA 2022: 234-248 - 2021
- [c19]Joseph Omidosu, Michael Kyobe:
Towards a harm-based framework to evaluate Cyberhate. ICTAS 2021: 16-20 - [c18]Anass Bayaga, Michael Kyobe:
PLS-SEM technique and phases of analysis - implications for information systems' exploratory design researchers. ICTAS 2021: 46-51 - [c17]Anthonia Oladimeji, Michael Kyobe:
Factors Influencing Cyberbullying on Instagram Among University Students. ICTAS 2021: 139-144 - 2020
- [c16]Anass Bayaga, Michael Kyobe, Jacques Ophoff:
Criticism of the role of trust in e-government services. ICTAS 2020: 1-6 - [c15]Dean Hayes, Michael Kyobe:
The Adoption of Automation in Cyber Forensics. ICTAS 2020: 1-6
2010 – 2019
- 2019
- [c14]Motekoa Mokhitli, Michael Kyobe:
Examining Factors that Impede Internal Auditors from Leveraging Information Technology for Continuous Auditing. ICTAS 2019: 1-6 - 2018
- [c13]Alexander Ekow Asmah, Michael Kyobe:
A Practice-Based Study on the Challenges of IT Governance Auditing in Ghana. AMCIS 2018 - [c12]Meduduetso Tsumake, Michael Kyobe:
E-Business Value in Small and Medium-Sized Enterprises in Southern Africa: A Quantitative Content Analysis of Websites. AMCIS 2018 - [c11]Joel Chigada, Michael Eddie Kyobe:
Evaluating Factors Contributing to Misalignment of the South African National Cybeersecurity Policy Framework. CONF-IRM 2018: 4 - [c10]Alexander Ekow Asmah, Michael Kyobe:
Towards an Integrative Theoretical Model For Examining IT Governance Audits. ICEGOV 2018: 18-22 - 2017
- [j10]Shallen Lusinga, Michael Kyobe:
Testing a Typology of Mobile Phone Victimisation Using Cluster Analysis. Electron. J. Inf. Syst. Dev. Ctries. 78(1): 1-36 (2017) - [j9]Lucas Mimbi, Michael Kyobe:
Public Perceptions of the Role of IT in Resolving Governance Challenges in a Transition State: THe Case of Tanzania. Electron. J. Inf. Syst. Dev. Ctries. 78(1): 1-25 (2017) - [j8]Deborah O. Ajumobi, Michael Kyobe:
Alignment of Human Competencies with Mobile Phone Technology and Business Strategies by Women-LED SMEs in South Africa. Electron. J. Inf. Syst. Dev. Ctries. 80(1): 1-25 (2017) - [c9]Meduduetso Tsumake, Michael Kyobe:
A Conceptual Model to Guide the Evaluation of E-Business Value in Small and Medium-Sized Enterprises in Botswana. AFRICOMM 2017: 293-303 - [c8]Kedibone Charlotte Namane, Michael Kyobe:
Examining the evolution of mobile bully-victims across different schools located in low to high safety risk areas in Cape Town, South Africa. ICTAS 2017: 1-5 - 2016
- [c7]Unathi Pokwana, Michael Kyobe:
Investigating the Misalignment in the Existing E-Legislation of South Africa. CONF-IRM 2016: 38 - [c6]Sikhulile L. Ndlovu, Michael E. Kyobe:
Challenges of CoBIT 5 IT Governance Framework Migration. CONF-IRM 2016: 58 - 2015
- [j7]Michael Kyobe, Esther Namirembe, Mzwandile Shongwe:
The Alignment of Information Technology Applications with Non-Technological Competencies of SMEs in Africa. Electron. J. Inf. Syst. Dev. Ctries. 67(1): 1-22 (2015) - 2014
- [j6]Samuel Muhanguzi, Michael Kyobe:
Aligning Work Practices, Mobile Technology and Strategy for Performance Improvement: The Case of SMEs in Uganda. Electron. J. Inf. Syst. Dev. Ctries. 60(1): 1-22 (2014) - 2013
- [c5]Malcolm Garbutt, Michael Kyobe:
Knowledge practices of people with disabilities and the role of ICT. ICTA 2013: 1-6 - [c4]Rutendo Mushore, Michael Kyobe:
Investigating the factors influencing information security compliance in a financial services firm. ISTAS 2013: 155-173 - 2012
- [j5]Ian Wayman, Michael Kyobe:
Incorporating Knowledge of Legal and Ethical Aspects into Computing Curricula of South African Universities. J. Inf. Technol. Educ. Innov. Pract. 11: 139-157 (2012) - 2011
- [j4]Michael Kyobe:
Investigating the key factors influencing ICT adoption in South Africa. J. Syst. Inf. Technol. 13(3): 255-267 (2011) - [c3]Chiedza Khumbula, Michael Kyobe:
Investigating the extent to which students share tacit knowledge using mobile phones in group projects. SAICSIT 2011: 141-150 - [c2]Lucas Mimbi, Felix Olu Bankole, Michael Kyobe:
Mobile phones and digital divide in East African countries. SAICSIT 2011: 318-321 - 2010
- [j3]Michael Kyobe:
A knowledge management approach to resolving the crises in the information systems discipline. J. Syst. Inf. Technol. 12(2): 161-173 (2010) - [c1]Michael Kyobe:
Towards a framework to guide compliance with IS Security policies and Regulations in a university. ISSA 2010
2000 – 2009
- 2009
- [j2]Michael Kyobe:
Factors Influencing SME Compliance with Government Regulation on Use of IT: The Case of South Africa. J. Glob. Inf. Manag. 17(2): 30-59 (2009) - 2008
- [j1]Michael Kyobe:
The influence of strategy-making types on IT alignment in SMEs. J. Syst. Inf. Technol. 10(1): 22-38 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint