Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thomas E. KellerUniversity of South FloridaVerified email at usf.edu
- Teresa M. HarrisonProfessor of Communication, University at AlbanyVerified email at albany.edu
- Catherine Dumas PhDAssistant Professor, Simmons University, Boston UniversityVerified email at simmons.edu
- Daniel LaMannaStudent of Computer Science, University at AlbanyVerified email at albany.edu
- Nic DePaulaWayne State UniversityVerified email at wayne.edu
- Ryan ScharfVerified email at mail.usf.edu
- Ozlem UzunerGeorge Mason UniversityVerified email at gmu.edu
- Fatima K. Espinoza VasquezUniversity of KentuckyVerified email at uky.edu
- Feng ChenDepartment of Computer Science, UT DallasVerified email at utdallas.edu
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaVerified email at virginia.edu
- Tim FakeOptiv Cybersecurity, University at AlbanyVerified email at albany.edu
- James E. Andrews, Ph.D.Professor, University of South Florida, School of InformationVerified email at usf.edu
- Luis Felipe Luna-ReyesProfessor of Public Administration and Policy (University at Albany)Verified email at albany.edu
- Muhammad Abdul-MageedThe University of British ColumbiaVerified email at ubc.ca
- Abebe RorissaProfessor & Director, School of Information SciencesVerified email at tennessee.edu
- William MayAtmospheric Sciences Research CenterVerified email at albany.edu
- Lisa FedererNational Library of MedicineVerified email at nih.gov
- Jisue LeeAssociate Professor, Chonnam National University, South KoreaVerified email at jnu.ac.kr
- Ersin DincelliAssistant Professor of Information Systems | University of Colorado DenverVerified email at ucdenver.edu
- Soon Ae ChunProfessor of IS/Informatics, Graduate Comp Sci & Data Sci, CUNY, College of Staten IslandVerified email at csi.cuny.edu
Follow