Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaEmail verificata su uwf.edu
- Xihui "Paul" ZhangProfessor of Computer Information Systems, University of North AlabamaEmail verificata su una.edu
- Halbana TarmiziBemidji State UniversityEmail verificata su bemidjistate.edu
- Cherie NoteboomAssistant Professor, Dakota State UniversityEmail verificata su dsu.edu
- Han ReichgeltProfessor of Information Systems, USF St Petersburg CampusEmail verificata su usf.edu
- Gert-Jan de VreedeInterim Dean & Professor, University of South FloridaEmail verificata su usf.edu
- Richard Halstead-NusslochProfessor Emeritus of Information Technology, Kennesaw State UniversityEmail verificata su kennesaw.edu
- Maria ValeroAssistant Professor, Kennesaw State UniversityEmail verificata su kennesaw.edu
- Jack ZhengKennesaw State UniversityEmail verificata su kennesaw.edu
- Sweta SnehaProfessor of Information SystemsEmail verificata su kennesaw.edu
- Sheikh Iqbal AhamedMarquette University, USAEmail verificata su marquette.edu
- Liang ZhaoAssistant Professor, Kennesaw State UniversityEmail verificata su kennesaw.edu
- Yi (Joy) LiKennesaw State UniversityEmail verificata su kennesaw.edu
- Mehruz KamalAssociate Professor of Information SystemsEmail verificata su brockport.edu
Segui
Chi Zhang
Professor of Information Technology, Kennesaw State University
Email verificata su kennesaw.edu