Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaVerified email at cmi.arizona.edu
J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationVerified email at cmi.arizona.edu
Matthew L. JensenUniversity of OklahomaVerified email at ou.edu
Christie FullerBoise State UniversityVerified email at boisestate.edu
Dimitris N. MetaxasDistinguished Professor of Computer Science, Rutgers UniversityVerified email at cs.rutgers.edu
John KruseUniversity of Arizona, MITRE CorporationVerified email at kruser.org
Thomas MeservyBrigham Young UniversityVerified email at byu.edu
Amit V. DeokarAssociate Dean of Undergraduate Programs, Assoc. Prof. of Management Information SystemsVerified email at uml.edu
Kent MarettMississippi State UniversityVerified email at business.msstate.edu
Karl WiersUS Air ForceVerified email at mail.mil
Nicole ForsgrenMicrosoft ResearchVerified email at microsoft.com
David SikoliaPittsburg State UniversityVerified email at pittstate.edu
Douglas C. DerrickUtah State UniversityVerified email at usu.edu
Rex J. RowleyIllinois State University, Department of Geography, Geology, and the EnvironmentVerified email at ilstu.edu
Lee SpitzleyUniversity at Albany, SUNYVerified email at albany.edu
Steven PentlandAssistant Professor, Boise State UniversityVerified email at boisestate.edu
Rick L. WilsonProfessor of MSIS, Oklahoma State UniversityVerified email at okstate.edu
Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
Ann-Frances CameronProfessor of Information Technology, HEC Montreal, GRESI, Tech3LabVerified email at hec.ca
Nathan W. TwymanBrigham Young UniversityVerified email at byu.edu