Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioEmail verificata su buffalo.edu
- Dr. Rui (Ray) ChenProfessor of Iowa State UniversityEmail verificata su iastate.edu
- Tejaswini (Teju) HerathBrock UniversityEmail verificata su brocku.ca
- Jingguo WangProfessor of Information Systems, University of Texas at ArlingtonEmail verificata su uta.edu
- Yu Jie NgNanyang Technological UniversityEmail verificata su e.ntu.edu.sg
- Joseph M. SirianniNiagara UniversityEmail verificata su niagara.edu
- George BarnettProfessor of Communication, University of California, DavisEmail verificata su ucdavis.edu
- Elena SvetievaUniversity of Colorado Colorado SpringsEmail verificata su uccs.edu
- Dr Majeed KhaderNanyang Technological University, SINGAPORE and the Ministry of Home Affairs SingaporeEmail verificata su ntu.edu.sg
- Loo Seng NeoRS AuditEmail verificata su e.ntu.edu.sg
- Janet Z. YangProfessor of Communication, University at BuffaloEmail verificata su buffalo.edu
- Weiai Wayne XuAssociate Professor, University of Massachusetts AmherstEmail verificata su umass.edu
- Michael J EgnotoEnsco, Inc. USSF, USAFEmail verificata su ensco.com
- Rohit ValechaAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioEmail verificata su utsa.edu
- Harry BouwmanDelft University of Technology Technology Policy and ManagementEmail verificata su freedom.nl
- Lidwien van de WijngaertProfessor - Communication and Information Studies Radboud UniversityEmail verificata su let.ru.nl