Crea il mio profilo
Accesso pubblico
Visualizza tutto0 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaEmail verificata su cmi.arizona.edu
- J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationEmail verificata su cmi.arizona.edu
- Lina ZhouProfessor, The University of North Carolina at CharlotteEmail verificata su uncc.edu
- Matthew L. JensenUniversity of OklahomaEmail verificata su ou.edu
- Christie FullerBoise State UniversityEmail verificata su boisestate.edu
- Dimitris N. MetaxasDistinguished Professor of Computer Science, Rutgers UniversityEmail verificata su cs.rutgers.edu
- John KruseUniversity of Arizona, MITRE CorporationEmail verificata su kruser.org
- Thomas MeservyBrigham Young UniversityEmail verificata su byu.edu
- Amit V. DeokarAssociate Dean of Undergraduate Programs, Assoc. Prof. of Management Information SystemsEmail verificata su uml.edu
- Kent MarettMississippi State UniversityEmail verificata su business.msstate.edu
- Karl WiersUS Air ForceEmail verificata su mail.mil
- Nicole ForsgrenMicrosoft ResearchEmail verificata su microsoft.com
- Doug DerrickUtah State UniversityEmail verificata su usu.edu
- David SikoliaPittsburg State UniversityEmail verificata su pittstate.edu
- Rex J. RowleyIllinois State University, Department of Geography, Geology, and the EnvironmentEmail verificata su ilstu.edu
- Lee SpitzleyUniversity at Albany, SUNYEmail verificata su albany.edu
- Steven PentlandAssistant Professor, Boise State UniversityEmail verificata su boisestate.edu
- Rick L. WilsonProfessor of MSIS, Oklahoma State UniversityEmail verificata su okstate.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanEmail verificata su bentley.edu
- Ann-Frances CameronProfessor of Information Technology, HEC Montreal, GRESI, Tech3LabEmail verificata su hec.ca