Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
Chuang WANGSouth China University of TechnologyVerified email at scut.edu.cn
Mikko SiponenProfessor of Business Cyber Security, Professor of MIS, the University of AlabamaVerified email at ua.edu
Gregory D. MoodyLee Professor of Information Systems, UNLVVerified email at unlv.edu
Tailai WuHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Dezhi WuProfessor, University of South CarolinaVerified email at cec.sc.edu
Sutirtha ChatterjeeUniversity of Nevada, Las VegasVerified email at unlv.edu
Qiqi JiangCopenhagen Business SchoolVerified email at cbs.dk
Lele KangNanjing UniversityVerified email at nju.edu.cn
Victor DibiaMicrosoft ResearchVerified email at microsoft.com
Matthew K O LeeCity University of Hong KongVerified email at cityu.edu.hk
Xiabing ZhengAssociate Professor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Hemin JiangSchool of Management, University of Science and Technology of ChinaVerified email at ustc.edu.cn