Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
- Ryan M. SchuetzlerBrigham Young UniversityVerified email at byu.edu
- Joseph S. ValacichMuzzy Endowed Chair, The University of ArizonaVerified email at arizona.edu
- Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaVerified email at cmi.arizona.edu
- Jordan B. BarlowUniversity of St. ThomasVerified email at stthomas.edu
- Anthony VanceLenz Professor of Business Information Technology, Virginia TechVerified email at vt.edu
- Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
- Mark J KeithAssociate Professor of Information Systems, Brigham Young UniversityVerified email at byu.edu
- Justin Scott GiboneyBrigham Young UniversityVerified email at byu.edu
- Gregory D. MoodyLee Professor of Information Systems, UNLVVerified email at unlv.edu
- Sean L. HumpherysWest Texas A&MVerified email at wtamu.edu
- James GaskinProfessor of Information Systems, Brigham Young UniversityVerified email at byu.edu
- Dennis GallettaThomas H. O'Brien Professor of Information Systems, University of PittsburghVerified email at pitt.edu
- Phil LongstreetUniversity of Michigan - FlintVerified email at umich.edu
- Yu-Hao LeeAssociate Professor, College of Journalism & Communications. University of FloridaVerified email at jou.ufl.edu
- Ryan WrightUniversity of VirginiaVerified email at virginia.edu
- Clayton Arlen LooneyUniversity of MontanaVerified email at umontana.edu