Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ofir TurelCalifornia State University, Fullerton; University of Southern California; McMaster UniversityVerified email at usc.edu
Monideepa TarafdarProfessor of Information Systems, Lancaster University Management SchoolVerified email at lancaster.ac.uk
W. Alec CramSchool of Accounting and Finance, University of WaterlooVerified email at uwaterloo.ca
Jeffrey G. ProudfootAssociate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT SloanVerified email at bentley.edu
Corey AngstUniversity of Notre DameVerified email at nd.edu
Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
Donald A. HantulaTemple UniversityVerified email at temple.edu
Charles R. CrowellProfessor of Psychology, University of Notre DameVerified email at nd.edu
DAVID SCHUFFProfessor of Management Information Systems, Temple UniversityVerified email at temple.edu
Mindy (Krischer) ShossAssociate Professor of Psychology, University of Central FloridaVerified email at ucf.edu
Gregory D. MoodyLee Professor of Information Systems, UNLVVerified email at unlv.edu
Emily BlockGeorge M. Cormie Professor of Business University of Alberta Business SchoolVerified email at ualberta.ca
Teh Pei LeeSchool of BusinessVerified email at monash.edu
Ken KelleyUniversity of Notre Dame, Mendoza College of BusinessVerified email at nd.edu
H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
Mike ChappleTeaching Professor, University of Notre DameVerified email at nd.edu
Ganesh VaidyanathanAssociate Dean and Professor of Information SystemsVerified email at roosevelt.edu
Christy M K CheungHong Kong Baptist UniversityVerified email at hkbu.edu.hk
David C CrosonMichigan State University