Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Philip MenardAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at utsa.edu
- Robert E. CrosslerAssociate Professor of Information Systems, Washington State UniversityVerified email at wsu.edu
- Nancy Howell BrinsonThe University of AlabamaVerified email at ua.edu
- Jameson Hayes, Ph.D.Associate Professor, University of AlabamaVerified email at apr.ua.edu
- Marie EspositoAssistant ProfessorVerified email at g.clemson.edu
- Wenxi PuUniversity of ManitobaVerified email at umanitoba.ca
- Jason Bennett ThatcherUniversity of Colorado BoulderVerified email at colorado.edu
- Siyuan LiCollege of William and MaryVerified email at mason.wm.edu
- Paul M. Di GangiProfessor, University of Alabama at Birmingham - Collat School of BusinessVerified email at uab.edu
- Allen C. JohnstonHewson Professor of Cybersecurity, University of AlabamaVerified email at ua.edu
- Robert OtondoProfessor Emeritus of Information Systems, Mississippi State UniversityVerified email at msstate.edu
- Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk