Internet Governance in Kenya: An Assessment. ICT Development Associates Ltd, 2012.
Kenya’s Mobile Revolution and the Promise of Mobile Savings In Poverty Reduction and Economic Management Unit, Africa Region World Bank., 2012.
Africa 2013, Cybercrime, Hacking and Malware. IDG Connect, 2013.
Internet Going Mobile: Internet Access and Usage in 11 African Countries In Research ICT Africa., 2012.
Internet Market Analysis Study. CAK, 2007.
Understanding Cybercrime: A Guide for Developing Countries. Geneva: International Telecommunication Union (ITU), Telecommunication Development Centre, 2009.
Kenya’s ICT Master Plan 2014-2017. ICT Authority, 2013.
People – Often the Weakest Link in Security, but One of the Best Places to Start." Journal of Healthcare Compliance 6, no. 4 (2004): 57-60. "
Towards an Education Campaign for Fostering a Societal Cyber Security Culture In Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA)., 2014.
Internet Security Threat Report In 2011 trends, vol. 17. Symantec, 2012.
Highlights and Insights." In RSA 2014 Conference., 2014. "
The role of NIST and Technology in Mobile Security. NIST, 2014.
Mobile Threat Report. F-Secure Lab, 2013.
McAfee Lab Threat Report: Third Quarter 2013. McAfee, 2013.
The Threat Landscape. Kaspersky, 2013.
Kenya Wants EAC States to Hasten Fake Phone Switch Off. Standard Digital, 2013.
Kenya: 1.9 million Fake Phones Shut. All Africa, 2012.
Mobile Security from an Information Warfare Perspective. Information Security for South Africa (ISSA), 2010.
iPhone Privacy. Black Hat DC, 2010.
Monkey See – Money Take Photo: The Risk of Mobile Information Leakage." International Journal of Cyber Warfare and Terrorism 3, no. 4 3, no. 4 (2013). "
BYOD Security challenges: control and protect your most sensitive data." Network Security 12 (2012): 5-8. "
SMSs used as a tool of hate in Kenya." The Mail and Guardian (2008). "
Democracy Fourth Wave? Digital Media and the Arab Spring. Oxford: Oxford University Press, 2013.
KICTANet 28-29 September 2007 Workshop Report. KICTANet, 2007.
Impact of mobile Internet on people in Kenya, Nigeria and South Africa. Device Research, 2014.
Internet Usage Statistics for Africa In World Internet Statistics., 2014.
The South African Cyber Threat Barometer. WolfPack, 2013.
Kenya Cyber Security Repor 2012., 2012.
Cellphone Safety website., 2015.
Local Resources on Cybercrime In Cybercrime., 2015.
Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward." Council for Scientific and Industrial Research (2012). "
Effects of Cybercrime on State Security: Types, Impact and Mitigations with Fibre Optic Deployment in Kenya." Journal of Information Assurance & Cybersecurity (2011). "
Cybersecurity as Realpolitik." In Black Hat USA 2014 Conference., 2014. "
Passwords: If We’re So Smart, Why Are We Still Using Them?" In Financial Cryptography and Data Security, 230-237. Berlin/Heidelberg: Springer, 2009. "
Carry On: Sound Advice from Schneier on Security. Indianapolis, IN: John Wiley, 2004.
It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice." In Financial Cryptography and Data Security, 16-30. Berlin/Heidelberg: Springer, 2012. "
"Social Engineering: People Hacking." In Control Essentials. Enterprise Risk Management, 2009.