Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityVerified email at msstate.edu
- Jordan B. BarlowUniversity of St. ThomasVerified email at stthomas.edu
- Robert E. CrosslerAssociate Professor of Information Systems, Washington State UniversityVerified email at wsu.edu
- Alan R. DennisProfessor and John T. Chambers Chair of Internet Systems, Indiana UniversityVerified email at indiana.edu
- Hwee-Joo Kam, D.Sc., CISSPAssociate Professor of Cybersecurity, University of TampaVerified email at ut.edu
- Philip MenardAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at utsa.edu
- France BelangerVirginia TechVerified email at vt.edu
- Allen C. JohnstonHewson Professor of Cybersecurity, University of AlabamaVerified email at ua.edu
- J.P. Shim (심정필 교수)Faculty of CIS, Georgia State U; MSU Prof Emeritus (John Grisham Prof)Verified email at cobilan.msstate.edu
- Leigh MutchlerAssistant Professor at James Madison UniversityVerified email at jmu.edu
- Mario SilicSwiss School of Business and ManagementVerified email at ssbm.ch
- Roger McHaneyUniversity Distinguished Teaching Scholar, Professor, Kansas State UniversityVerified email at ksu.edu
- Samuel ThompsonAssistant Professor of Information Systems, University of Alabama at BirminghamVerified email at uab.edu
- David SachsProfessor of Information Technology, Pace UniversityVerified email at pace.edu
- Kent MarettMississippi State UniversityVerified email at business.msstate.edu