Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Gustav VerhulsdonckCentral Michigan UniversityVerified email at cmich.edu
- James MeltonCentral Michigan UniversityVerified email at cmich.edu
- Karl SmartAssociate Dean, College of Business Administration, Central Michigan UniversityVerified email at cmich.edu
- Christina SerranoManagement Information Systems, University of GeorgiaVerified email at uga.edu
- Michael D. AbramoffProfessor of Ophthalmology and Visual Sciences, Electrical and Computer Engineering and Biomedical EngineeringVerified email at uiowa.edu
- Sana Rouis SkandraniKarlstad Business School, SwedenVerified email at kau.se
- Moez LimayemUniversity of North FloridaVerified email at unf.edu
- Sankar SrinivasanProfessor, University of UtahVerified email at eccles.utah.edu
- James CappelCentral Michigan UniversityVerified email at cmich.edu
- Amr SororAssociate Professor at California State University, FullertonVerified email at fullerton.edu
- Hwee-Joo Kam, D.Sc., CISSPAssociate Professor of Cybersecurity, University of TampaVerified email at ut.edu
- Shuyuan Mary Ho MetcalfeFlorida State UniversityVerified email at fsu.edu
- Dr. Carlo G. Porto-BelliniChief researcher at GTIS, associate professor at UFPB, BrazilVerified email at pq.cnpq.br
- Robert MillerAssociate Professor of Information Systems, Central Michigan UniversityVerified email at cmich.edu