Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Anat Zeelim HovavNoneVerified email at korea.ac.kr
- W. Alec CramSchool of Accounting and Finance, University of WaterlooVerified email at uwaterloo.ca
- Ofir TurelSchool of Computing and Information Systems, University of Melbourne, University of SouthernVerified email at usc.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
- Corey AngstUniversity of Notre DameVerified email at nd.edu
- Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
- Donald A. HantulaTemple UniversityVerified email at temple.edu
- Mindy (Krischer) ShossProfessor of Psychology, University of Central FloridaVerified email at ucf.edu
- Emily BlockGeorge M. Cormie Professor of Business University of Alberta Business SchoolVerified email at ualberta.ca
- Teh Pei LeeProfessor, School of Business, Monash University MalaysiaVerified email at monash.edu
- Charles R. CrowellProfessor of Psychology, University of Notre DameVerified email at nd.edu
- Gregory D. MoodyLee Professor of Information Systems, UNLVVerified email at unlv.edu
- Hemantha HerathProfessor of Accounting, Brock UniversityVerified email at brocku.ca
- Ken KelleySorin Society Professor of IT, Analytics, and Operations, University of Notre Dame, Mendoza CollegeVerified email at nd.edu
- Hamed Qahri-SaremiCIS Department, College of Business, Colorado State UniversityVerified email at colostate.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
- Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
- David C CrosonUniversity of MinnesotaVerified email at umn.edu
- Ante GlavasSKEMA Business SchoolVerified email at skema.edu
- Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu