An overview of and factor analytic approach to flow theory in online contexts AY Mahfouz, K Joonas, EU Opara Technology in Society 61, 101228, 2020 | 55 | 2020 |
Straddling the next cyber frontier: The empirical analysis on network security, exploits, and vulnerabilities EU Opara, OA Soluade International Journal of Electronics and Information Engineering 3 (1), 10-18, 2015 | 44 | 2015 |
Electronic health records: Challenges and opportunities JR Shah, MB Murtaza, E Opara Journal of International Technology and Information Management 23 (3), 10, 2014 | 32 | 2014 |
The empirical test of total quality management: an application of TQM at Chevron and its impact on productivity EU Opara Golden Gate University, 1995 | 25 | 1995 |
Posted: No Phishing LJ Trautman, MT Hussein, EU Opara, MJ Molesky, S Rahman | 19 | 2020 |
Enterprise cyber security challenges to medium and large firms: An analysis EU Opara, OJ Dieli International Journal of Electronics and Information Engineering 13 (2), 77-85, 2021 | 17 | 2021 |
Online credit card processing models: Critical issues to consider by small merchants MA Rob, EU Opara Human systems management 22 (3), 133-142, 2003 | 16 | 2003 |
Auto-ML cyber security data analysis using Google, Azure and IBM Cloud Platforms E Opara, H Wimmer, CM Rebman 2022 International Conference on Electrical, Computer and Energy …, 2022 | 12 | 2022 |
Effect of virtualization on enterprise network, server/desktop systems on small and mid-size businesses (SMB) EU Opara, OA Soluade Journal of International Technology and Information Management 22 (2), 3, 2013 | 11 | 2013 |
Careers in information technology: An analysis of job satisfaction among african american males and african american females EU Opara, V Etnyre, MA Rob Journal of Information Technology Management 16 (1), 39, 2005 | 11 | 2005 |
Cyber security, threat intelligence: Defending the digital platform EU Opara Dr, MT Hussein Dr Journal of International Technology and Information Management 26 (1), 138-160, 2017 | 8 | 2017 |
Security breaches, network exploits and vulnerabilities: A conundrum and an analysis OA Soluade, E Opara International Journal of Cyber-Security and Digital Forensics 3 (4), 246-261, 2014 | 8 | 2014 |
Security Breaches, Network Exploits and Vulnerabilities: A Conundrum and an Analysis E Opara, O Soluade International Journal of Cyber-Security and Digital Forensics, 3 (4), 2014 | 8 | 2014 |
The relative frequency of reported cases by information technology professionals of breaches on security defenses EU Opara, RL Bell International Journal of Global Management Studies Professional 3 (2), 15-28, 2011 | 7 | 2011 |
XML: Gateway for data mobility and universal connectivity EU Opara Journal of International Information Management 13 (3), 3, 2004 | 7 | 2004 |
The effect of information technology on global business EU Opara Journal for International Business and Entrepreneurship Development 1 (2), 45-49, 2003 | 6 | 2003 |
Network platforms, advanced persistence threat–The changing patterns of cyber-attacks EU Opara, AY Mahfouz, R Holloway Journal of Forensic Sciences & Criminal Investigation 1 (1), 104, 2017 | 4 | 2017 |
Some common practices in relation to breaches in information technology security: Does stiffening access reduce risk EU Opara, RL Bell, MR Bryant International Journal of Global Management Studies Professional 2 (2), 33-45, 2010 | 4 | 2010 |
Enterprise systems network: SecurID solutions, the authentication to global security systems EU Opara, V Etnyre Journal of International Technology and Information Management 19 (4), 2, 2010 | 4 | 2010 |
Enterprise Integrated Security Platform: A Comparison of Remote Access and Extranet Virtual Private Networks EU Opara, JT Marchewka Journal of International Technology and Information Management 15 (2), 3, 2006 | 4 | 2006 |