Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stephen F BushGE ResearchVerified email at research.ge.com
Yuan HongUniversity of ConnecticutVerified email at uconn.edu
Ersin DincelliAssistant Professor of Information Systems | University of Colorado DenverVerified email at ucdenver.edu
Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityVerified email at msstate.edu
Jagdish GangollyAssociate Professor Emeritus of InformaticsVerified email at albany.edu
Vagelis PapakonstantinouProfessor, Faculty of Law & Criminology, Vrije Universiteit BrusselVerified email at vub.be
S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaVerified email at virginia.edu
Haibing LuSanta Clara UniversityVerified email at scu.edu
Nicholas RizzoUniversity at AlbanyVerified email at albany.edu
Prabhat HajelaRensselaer Polytechnic InstituteVerified email at rpi.edu
Panagiotis KarrasAssociate Professor, Aarhus UniversityVerified email at cs.au.dk
Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
Justin Scott GiboneyBrigham Young UniversityVerified email at byu.edu
Joseph S. ValacichMunsinger Professor of Entrepreneurship and Innovation, The University of ArizonaVerified email at arizona.edu
Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
Paul MiesingUniversity at Albany, State University of New York - EmeritusVerified email at albany.edu
Hwee-Joo Kam, D.Sc., CISSPAssociate Professor of Cybersecurity, University of TampaVerified email at ut.edu
Nic DePaulaWayne State UniversityVerified email at wayne.edu
Sandro CarraraFaculty (MER), EPFL (École Polytechnique Fédérale de Lausanne)Verified email at epfl.ch
Alexandre SchmidEPFLVerified email at epfl.ch