Crea il mio profilo
Coautori
- Dustin OrmondCreighton UniversityEmail verificata su creighton.edu
- Philip MenardAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioEmail verificata su utsa.edu
- Robert E. CrosslerAssociate Professor of Information Systems, Washington State UniversityEmail verificata su wsu.edu
- Tom MattsonUniversity of RichmondEmail verificata su richmond.edu
- Dan J. KimUniversity of North TexasEmail verificata su unt.edu
- Yanyan ShangThe University of TampaEmail verificata su ut.edu
- John D'ArcyProfessor of MIS, University of DelawareEmail verificata su udel.edu
- Alaa NehmeMississippi State UniversityEmail verificata su msstate.edu
- Hong LiuIndiana University KokomoEmail verificata su iu.edu
- Chen ZhongThe University of TampaEmail verificata su ut.edu
- Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityEmail verificata su msstate.edu
- Matthew L. JensenUniversity of OklahomaEmail verificata su ou.edu
- Allen C. JohnstonHewson Professor of Cybersecurity, University of AlabamaEmail verificata su ua.edu
Segui
Hwee-Joo Kam, D.Sc., CISSP
Associate Professor of Cybersecurity, University of Tampa
Email verificata su ut.edu - Home page