Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- W. Alec CramSchool of Accounting and Finance, University of WaterlooVerified email at uwaterloo.ca
- Judee BurgoonProfessor of Communication, Center for Identification Technology Research, University of ArizonaVerified email at cmi.arizona.edu
- John D'ArcyProfessor of MIS, University of DelawareVerified email at udel.edu
- Joseph S. ValacichMuzzy Endowed Chair, The University of ArizonaVerified email at arizona.edu
- Jeffrey L. JenkinsProfessor of Information Systems, Brigham Young UniversityVerified email at byu.edu
- Nathan W. TwymanBrigham Young UniversityVerified email at byu.edu
- Ryan M. SchuetzlerBrigham Young UniversityVerified email at byu.edu
- J F Nunamaker, Jr.Regents and Soldwedal Professor of MIS, Computer Science and CommunicationVerified email at cmi.arizona.edu
- Mark GrimesUniversity of HoustonVerified email at uh.edu
- Prof. Paul Benjamin LowryVirginia TechVerified email at VT.edu
Follow
Jeffrey G. Proudfoot
Associate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT Sloan
Verified email at bentley.edu