Get my own profile
Co-authors
- Tyler M PieronNova Southeastern UniversityVerified email at mynsu.nova.edu
- Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu
- Anat Zeelim HovavNoneVerified email at korea.ac.kr
- James ParrishUniversity of North TexasVerified email at unt.edu
- Andrew (Andy) Green, Ph.D.Assistant Professor of Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Jason WilliamsAugusta UniversityVerified email at augusta.edu
- Kim Withers, PhDProfessor of Cybersecurity at Texas A&M San Antonio and Kennesaw State UniversityVerified email at tamusa.edu
- Ryan MatthewsAssistant Professor - Tennessee Tech UniversityVerified email at tntech.edu
- Adriane B. RandolphKennesaw State UniversityVerified email at kennesaw.edu
- Amy WoszczynskiProfessor of Information Systems, Kennesaw State UniversityVerified email at kennesaw.edu
- Mark A. HarrisAugusta University (School of Computer and Cyber Sciences)Verified email at augusta.edu
- Amita Goyal ChinVirginia Commonwealth UniversityVerified email at vcu.edu
- Jason Bennett ThatcherTemple UniversityVerified email at temple.edu
- Dana E. HarrisonDepartment of Management and Marketing - East Tennessee State UniversityVerified email at etsu.edu