Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityEmail verificata su msstate.edu
- Robert E. CrosslerPhilip L Kays Distinguished Professor of Information Systems, Washington State UniversityEmail verificata su wsu.edu
- Jordan B. BarlowUniversity of St. ThomasEmail verificata su stthomas.edu
- Hwee-Joo Kam, D.Sc., CISSPAssociate Professor of Cybersecurity, University of TampaEmail verificata su ut.edu
- Philip MenardAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioEmail verificata su utsa.edu
- Alan R. DennisProfessor and John T. Chambers Chair of Internet Systems, Indiana UniversityEmail verificata su indiana.edu
- France BelangerVirginia TechEmail verificata su vt.edu
- J.P. Shim (심정필 교수)Faculty of CIS, Georgia State U; MSU Prof Emeritus (John Grisham Prof)Email verificata su cobilan.msstate.edu
- Leigh MutchlerAssociate Professor at James Madison UniversityEmail verificata su jmu.edu
- Mario SilicSwiss School of Business and ManagementEmail verificata su ssbm.ch
- Allen C. JohnstonHewson Professor of Cybersecurity, University of AlabamaEmail verificata su ua.edu
- Samuel ThompsonAssistant Professor of Information Systems, University of Alabama at BirminghamEmail verificata su uab.edu
- Roger McHaneyUniversity Distinguished Teaching Scholar, Professor, Kansas State UniversityEmail verificata su ksu.edu
- David SachsProfessor of Information Technology, Pace UniversityEmail verificata su pace.edu
- Kent MarettMississippi State UniversityEmail verificata su business.msstate.edu