Get my own profile
Public access
View all2 articles
3 articles
available
not available
Based on funding mandates
Co-authors
H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
Dr. Rui (Ray) ChenAssociate Professor of Iowa State UniversityVerified email at iastate.edu
Tejaswini (Teju) HerathBrock UniversityVerified email at brocku.ca
Jingguo WangProfessor of Information Systems, University of Texas at ArlingtonVerified email at uta.edu
Yu Jie NgNanyang Technological UniversityVerified email at e.ntu.edu.sg
Joseph M. SirianniNiagara UniversityVerified email at niagara.edu
George BarnettProfessor of Communication, University of California, DavisVerified email at ucdavis.edu
Elena SvetievaUniversity of Colorado Colorado SpringsVerified email at uccs.edu
Dr Majeed KhaderNanyang Technological University, SINGAPORE and the Ministry of Home Affairs SingaporeVerified email at ntu.edu.sg
Loo Seng NeoRS AuditVerified email at e.ntu.edu.sg
Janet Z. YangProfessor of Communication, University at BuffaloVerified email at buffalo.edu
Weiai Wayne XuAssociate Professor, University of Massachusetts AmherstVerified email at umass.edu
Michael J EgnotoEnsco, Inc. USSF, USAFVerified email at ensco.com
Rohit ValechaAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at utsa.edu
Harry BouwmanDelft University of Technology Technology Policy and ManagementVerified email at freedom.nl
Lidwien van de WijngaertProfessor - Communication and Information Studies Radboud UniversityVerified email at let.ru.nl