Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaVerified email at cmi.arizona.edu
W. Alec CramSchool of Accounting and Finance, University of WaterlooVerified email at uwaterloo.ca
John D'ArcyProfessor of MIS, University of DelawareVerified email at udel.edu
Nathan W. TwymanBrigham Young UniversityVerified email at byu.edu
Joseph S. ValacichMunsinger Professor of Entrepreneurship and Innovation, The University of ArizonaVerified email at arizona.edu
Jeffrey L. JenkinsBrigham Young UniversityVerified email at byu.edu
Ryan M. SchuetzlerBrigham Young UniversityVerified email at byu.edu
J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationVerified email at cmi.arizona.edu
Mark GrimesUniversity of HoustonVerified email at uh.edu
Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
Douglas C. DerrickUtah State UniversityVerified email at usu.edu
Follow
Jeffrey G. Proudfoot
Associate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT Sloan
Verified email at bentley.edu