Obtenir mon propre profil
Citée par
Toutes | Depuis 2019 | |
---|---|---|
Citations | 1148 | 354 |
indice h | 15 | 10 |
indice i10 | 21 | 10 |
Accès public
Tout afficher1 article
0 article
disponibles
non disponibles
Sur la base des exigences liées au financement
Coauteurs
- Michael E. WhitmanProfessor of Information Security and Assurance, Kennesaw State UniversityAdresse e-mail validée de kennesaw.edu
- Albert SegarsUniversity of North Carolina at Chapel HillAdresse e-mail validée de unc.edu
- Andrew (Andy) Green, Ph.D.Assistant Professor of Information Security and Assurance, Kennesaw State UniversityAdresse e-mail validée de kennesaw.edu
- Herbert MattordProfessor of Cybersecurity and Information Security and Assurance, Kennesaw State UniversityAdresse e-mail validée de kennesaw.edu
- Alan CannonThe University of Texas at ArlingtonAdresse e-mail validée de uta.edu
- Monica AdyaDean & Professor, Rutgers University-Camden, School of BusinessAdresse e-mail validée de rutgers.edu
- Peter HoonakkerUniversity of Wisconsin-MadisonAdresse e-mail validée de wisc.edu
- Mike GallivanSchool of Public Policy, Georgia Institute of TechnologyAdresse e-mail validée de gatech.edu
- Mark GuzdialProfessor, Computer Science, Engineering Education Research, University of MichiganAdresse e-mail validée de umich.edu
- L. Lynn StallingsProfessor of Mathematics Education, Auburn University at MontgomeryAdresse e-mail validée de aum.edu
Suivre
Amy Woszczynski
Professor of Information Systems, Kennesaw State University
Adresse e-mail validée de kennesaw.edu