Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Michelle Ramim, Ph.D.Nova Southeastern University (NSU)Verified email at nova.edu
- Wang, LingNova Southestern UniversityVerified email at nova.edu
- Herbert MattordProfessor of Cybersecurity and Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Dr. Melissa CarltonLindsey Wilson College - Columbia, KYVerified email at lindsey.edu
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Steve TerrellVerified email at nova.edu
- Inkyoung HurFlorida Atlantic UniversityVerified email at fau.edu
- Anat Zeelim HovavNoneVerified email at korea.ac.kr
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Wei LiProfessor of Computer Science and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu
- Ruti GafniVerified email at mta.ac.il
- James ParrishUniversity of North TexasVerified email at unt.edu
- Lynn futcherNelson Mandela UniversityVerified email at mandela.ac.za
- Siddharth KazaTowson UniversityVerified email at towson.edu
- Tommy Pollock Ph.D.IT Programs Coordinator, Tidewater Community College Center for Workforce DevelopmentVerified email at tcc.edu
- John D'ArcyProfessor of MIS, University of DelawareVerified email at udel.edu
- Albert BallRegent UniversityVerified email at regent.edu
- Marc SchniederjansC. Wheaton Battey Distinguished Professor of Business, University of Nebraska-LincolnVerified email at unl.edu
- Dara SchniederjansVerified email at uri.edu
- Allen ParrishExecutive Director, Alabama Cyber Institute, The University of AlabamaVerified email at ua.edu
Follow
Yair Levy, Ph.D.
Professor of Information Systems and Cybersecurity, Nova Southeastern University
Verified email at nova.edu - Homepage