Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Justin Scott GiboneyBrigham Young UniversityEmail verificata su byu.edu
- Mark GrimesUniversity of HoustonEmail verificata su uh.edu
- David WilsonBrigham Young UniversityEmail verificata su byu.edu
- Mark J KeithAssociate Professor of Information Systems, Brigham Young UniversityEmail verificata su byu.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanEmail verificata su bentley.edu
- Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaEmail verificata su cmi.arizona.edu
- J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationEmail verificata su cmi.arizona.edu
- Prof. Paul Benjamin LowryVirginia TechEmail verificata su VT.edu
- Ann FruhlingUniversity of Nebraska OmahaEmail verificata su unomaha.edu
- Nathan W. TwymanBrigham Young UniversityEmail verificata su byu.edu
- Anthony VanceLenz Professor of Business Information Technology, Virginia TechEmail verificata su vt.edu
- Jordan B. BarlowUniversity of St. ThomasEmail verificata su stthomas.edu
- Thomas A GregoryUniversity of GeorgiaEmail verificata su uga.edu
- Joseph S. ValacichMuzzy Endowed Chair, The University of ArizonaEmail verificata su arizona.edu
- Matthew PickardNorthern Illinois UniversityEmail verificata su niu.edu
- Holly K. RosserUniversity of Nebraska OmahaEmail verificata su unomaha.edu
- Martina A. ClarkeUniversity of Nebraska Omaha, School of Interdisciplinary InformaticsEmail verificata su unomaha.edu
- David A. WoodGlenn D. Ardis Professor at Brigham Young UniversityEmail verificata su byu.edu
- Jim MarquardsonNorthern Michigan UniversityEmail verificata su nmu.edu
- Randall BoyleProfessor of Information Systems, Weber State University, BusinessEmail verificata su Weber.edu