Get my own profile
Public access
View all2 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
- Dr. Rui (Ray) ChenProfessor of Iowa State UniversityVerified email at iastate.edu
- Tejaswini (Teju) HerathBrock UniversityVerified email at brocku.ca
- Jingguo WangProfessor of Information Systems, University of Texas at ArlingtonVerified email at uta.edu
- Yu Jie NgNanyang Technological UniversityVerified email at e.ntu.edu.sg
- Joseph M. SirianniNiagara UniversityVerified email at niagara.edu
- George BarnettProfessor of Communication, University of California, DavisVerified email at ucdavis.edu
- Elena SvetievaUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Dr Majeed KhaderNanyang Technological University, SINGAPORE and the Ministry of Home Affairs SingaporeVerified email at ntu.edu.sg
- Loo Seng NeoRS AuditVerified email at e.ntu.edu.sg
- Janet Z. YangProfessor of Communication, University at BuffaloVerified email at buffalo.edu
- Weiai Wayne XuAssociate Professor, University of Massachusetts AmherstVerified email at umass.edu
- Michael J EgnotoEnsco, Inc. USSF, USAFVerified email at ensco.com
- Rohit ValechaAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at utsa.edu
- Harry BouwmanDelft University of Technology Technology Policy and ManagementVerified email at freedom.nl
- Lidwien van de WijngaertProfessor - Communication and Information Studies Radboud UniversityVerified email at let.ru.nl