Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaVerified email at cmi.arizona.edu
- J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationVerified email at cmi.arizona.edu
- Lina ZhouProfessor, The University of North Carolina at CharlotteVerified email at uncc.edu
- Matthew L. JensenUniversity of OklahomaVerified email at ou.edu
- Christie FullerBoise State UniversityVerified email at boisestate.edu
- Dimitris N. MetaxasBoard of Governors and Distinguished Professor of Computer Science, Rutgers UniversityVerified email at cs.rutgers.edu
- John KruseUniversity of Arizona, MITRE CorporationVerified email at kruser.org
- Thomas MeservyBrigham Young UniversityVerified email at byu.edu
- Amit V. DeokarAssociate Dean of Undergrad. Prog. and Accreditation, Assoc. Prof. of Management Information SystemsVerified email at uml.edu
- Kent MarettMississippi State UniversityVerified email at business.msstate.edu
- Karl WiersUS Air ForceVerified email at mail.mil
- Nicole ForsgrenMicrosoft ResearchVerified email at microsoft.com
- Doug DerrickUtah State UniversityVerified email at usu.edu
- David SikoliaPittsburg State UniversityVerified email at pittstate.edu
- Lee SpitzleyUniversity at Albany, SUNYVerified email at albany.edu
- Steven PentlandAssistant Professor, Boise State UniversityVerified email at boisestate.edu
- Rex J. RowleyIllinois State University, Department of Geography, Geology, and the EnvironmentVerified email at ilstu.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
- Ann-Frances CameronProfessor of Information Technology, HEC Montreal, GRESI, Tech3LabVerified email at hec.ca
- Nathan W. TwymanBrigham Young UniversityVerified email at byu.edu