Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- James J. JiangNational Taiwan UniversityEmail verificata su ntu.edu.tw
- Hua SunShandong UniversityEmail verificata su sdu.edu.cn
- carol saundersUniversity of Central FloridaEmail verificata su ucf.edu
- Yu Andy WuUniversity of North TexasEmail verificata su unt.edu
- Bharatendra RaiProfessor of Business Analytics & Chair, University of Massachusetts-DartmouthEmail verificata su umassd.edu
- Zhe ZhangEastern Kentucky UniversityEmail verificata su eku.edu
- Richard D. JohnsonWashington State UniversityEmail verificata su wsu.edu
- Steven HornikUniversity of Central FloridaEmail verificata su ucf.edu
- Kuang Ting ChengDepartment of Information Management National United UniversityEmail verificata su nuu.edu.tw
- Julie Yu-Chih LiuProfessor, Department of Information management, Yuan Ze universityEmail verificata su saturn.yzu.edu.tw
- Morgan ShepherdProfessor of Information Systems, University of Colorado @ Colorado SpringsEmail verificata su uccs.edu
- Walter FernandezProfessor of Information Systems, UNSW SydneyEmail verificata su unsw.edu.au
- Angappa GunasekaranProfessor of Operations Management, School of Business Administration, Penn State HarrisburgEmail verificata su psu.edu
- Stella TomasiTowson UniversityEmail verificata su towson.edu
- Gary KleinCybersecurity Management Council