Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Justin Scott GiboneyBrigham Young UniversityVerified email at byu.edu
- Mark GrimesUniversity of HoustonVerified email at uh.edu
- David WilsonBrigham Young UniversityVerified email at byu.edu
- Mark J KeithAssociate Professor of Information Systems, Brigham Young UniversityVerified email at byu.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
- J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationVerified email at cmi.arizona.edu
- Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaVerified email at cmi.arizona.edu
- Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
- Nathan W. TwymanBrigham Young UniversityVerified email at byu.edu
- Doug DerrickUtah State UniversityVerified email at usu.edu
- Anthony VanceLenz Professor of Business Information Technology, Virginia TechVerified email at vt.edu
- Jordan B. BarlowUniversity of St. ThomasVerified email at stthomas.edu
- Thomas A GregoryUniversity of GeorgiaVerified email at uga.edu
- Joseph S. ValacichMuzzy Endowed Chair, The University of ArizonaVerified email at arizona.edu
- Matthew PickardNorthern Illinois UniversityVerified email at niu.edu
- David A. WoodGlenn D. Ardis Professor at Brigham Young UniversityVerified email at byu.edu
- Holly K. RosserUniversity of Nebraska OmahaVerified email at unomaha.edu
- Martina A. ClarkeUniversity of Nebraska Omaha, School of Interdisciplinary InformaticsVerified email at unomaha.edu
- Degan KettlesBrigham Young UniversityVerified email at byu.edu
- Jim MarquardsonNorthern Michigan UniversityVerified email at nmu.edu