Get my own profile
Co-authors
- Dustin OrmondCreighton UniversityVerified email at creighton.edu
- Philip MenardAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at utsa.edu
- Robert E. CrosslerAssociate Professor of Information Systems, Washington State UniversityVerified email at wsu.edu
- Tom MattsonUniversity of RichmondVerified email at richmond.edu
- Dan J. KimUniversity of North TexasVerified email at unt.edu
- Yanyan ShangThe University of TampaVerified email at ut.edu
- John D'ArcyProfessor of MIS, University of DelawareVerified email at udel.edu
- Chen ZhongThe University of TampaVerified email at ut.edu
- Alaa NehmeMississippi State UniversityVerified email at msstate.edu
- Hong LiuIndiana University KokomoVerified email at iu.edu
- Allen C. JohnstonHewson Professor of Cybersecurity, University of AlabamaVerified email at ua.edu
- Merrill WarkentinJames J. Rouse Endowed Professor of Information Systems, Mississippi State UniversityVerified email at msstate.edu
- Matthew L. JensenUniversity of OklahomaVerified email at ou.edu
Follow
Hwee-Joo Kam, D.Sc., CISSP
Associate Professor of Cybersecurity, University of Tampa
Verified email at ut.edu - Homepage