Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Anat Zeelim HovavNoneVerified email at korea.ac.kr
W. Alec CramSchool of Accounting and Finance, University of WaterlooVerified email at uwaterloo.ca
Ofir TurelSchool of Computing and Information Systems, University of Melbourne, University of SouthernVerified email at usc.edu
Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
Corey AngstUniversity of Notre DameVerified email at nd.edu
Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
Donald A. HantulaTemple UniversityVerified email at temple.edu
Mindy (Krischer) ShossProfessor of Psychology, University of Central FloridaVerified email at ucf.edu
Emily BlockGeorge M. Cormie Professor of Business University of Alberta Business SchoolVerified email at ualberta.ca
Teh Pei LeeProfessor, School of Business, Monash University MalaysiaVerified email at monash.edu
Charles R. CrowellProfessor of Psychology, University of Notre DameVerified email at nd.edu
Gregory D. MoodyLee Professor of Information Systems, UNLVVerified email at unlv.edu
Hemantha HerathProfessor of Accounting, Brock UniversityVerified email at brocku.ca
Ken KelleySorin Society Professor of IT, Analytics, and Operations, University of Notre Dame, Mendoza CollegeVerified email at nd.edu
Hamed Qahri-SaremiCIS Department, College of Business, Colorado State UniversityVerified email at colostate.edu
Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
David C CrosonUniversity of MinnesotaVerified email at umn.edu
Ante GlavasSKEMA Business SchoolVerified email at skema.edu
Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu