Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Michael E. WhitmanProfessor of Information Security and Assurance, Kennesaw State UniversityEmail verificata su kennesaw.edu
- Albert SegarsUniversity of North Carolina at Chapel HillEmail verificata su unc.edu
- Andrew (Andy) Green, Ph.D.Assistant Professor of Information Security and Assurance, Kennesaw State UniversityEmail verificata su kennesaw.edu
- Herbert MattordProfessor of Cybersecurity and Information Security and Assurance, Kennesaw State UniversityEmail verificata su kennesaw.edu
- Alan CannonThe University of Texas at ArlingtonEmail verificata su uta.edu
- Monica AdyaDean & Professor, Rutgers University-Camden, School of BusinessEmail verificata su rutgers.edu
- Peter HoonakkerUniversity of Wisconsin-MadisonEmail verificata su wisc.edu
- Mike GallivanSchool of Public Policy, Georgia Institute of TechnologyEmail verificata su gatech.edu
- Mark GuzdialProfessor, Computer Science, Engineering Education Research, University of MichiganEmail verificata su umich.edu
- L. Lynn StallingsProfessor of Mathematics Education, Auburn University at MontgomeryEmail verificata su aum.edu
Segui
Amy Woszczynski
Professor of Information Systems, Kennesaw State University
Email verificata su kennesaw.edu