Get my own profile
Co-authors
- Jerry W. LinUniversity of South Florida, Florida, USAVerified email at usf.edu
- Hongjiang XuProfessor, Butler UniversityVerified email at butler.edu
- Shih-Chih ChenProfessor, National Kaohsiung University of Science and TechnologyVerified email at nkust.edu.tw
- Jack BeckerAssociate Professor of ITDS, University of North TexasVerified email at unt.edu
- David C. YenTexas Southern UniversityVerified email at TSU.edu
- John WindsorUniversity of North TexasVerified email at unt.edu
- Frank L. SchmidtFethke Leadership Chair Emeritus, U. of Iowa, Tippie Business CollegeVerified email at uiowa.edu
- Kevin CruthirdsAssociate Professor of Management, University of Texas Rio Grande ValleyVerified email at utrgv.edu
- James CappelCentral Michigan UniversityVerified email at cmich.edu
- Susan HelserCybersecurity Program Director, Central Michigan UniversityVerified email at cmich.edu
- Ephraim McLeanRegents' Professor, Georgia State UniversityVerified email at gsu.edu
- Shing-Han LiNational Taipei University of BusinessVerified email at ntub.edu.tw
Follow
Mark Hwang
Professor of Information Systems, Central Michigan University
Verified email at cmich.edu - Homepage