Get my own profile
Public access
View all2 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- James J. JiangNational Taiwan UniversityVerified email at ntu.edu.tw
- Hua SunShandong UniversityVerified email at sdu.edu.cn
- carol saundersUniversity of Central FloridaVerified email at ucf.edu
- Yu Andy WuUniversity of North TexasVerified email at unt.edu
- Bharatendra RaiProfessor of Business Analytics & Chair, University of Massachusetts-DartmouthVerified email at umassd.edu
- Zhe ZhangEastern Kentucky UniversityVerified email at eku.edu
- Richard D. JohnsonWashington State UniversityVerified email at wsu.edu
- Steven HornikUniversity of Central FloridaVerified email at ucf.edu
- Kuang Ting ChengDepartment of Information Management National United UniversityVerified email at nuu.edu.tw
- Julie Yu-Chih LiuProfessor, Department of Information management, Yuan Ze universityVerified email at saturn.yzu.edu.tw
- Morgan ShepherdProfessor of Information Systems, University of Colorado @ Colorado SpringsVerified email at uccs.edu
- Walter FernandezProfessor of Information Systems, UNSW SydneyVerified email at unsw.edu.au
- Angappa GunasekaranProfessor of Operations Management, School of Business Administration, Penn State HarrisburgVerified email at psu.edu
- Stella TomasiTowson UniversityVerified email at towson.edu
- Gary KleinCybersecurity Management Council