Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stacie PetterSchool of Business, Wake Forest UniversityVerified email at wfu.edu
Joseph F. Hair, Jr.University of South Alabama, Cleverdon Chair of BusinessVerified email at southalabama.edu
Alain yee-loong Chong OR AYL ChongProfessor in Information Systems and Operations Management, University of NottinghamVerified email at nottingham.edu.cn
Melody Moore JacksonProfessor of Computer Science, Georgia TechVerified email at cc.gatech.edu
Pierre-Majorique Léger, Ph.D.HEC MontréalVerified email at hec.ca
Jan vom BrockeUniversity of LiechtensteinVerified email at uni.li
René RiedlUniversity of Applied Sciences Upper Austria & Johannes Kepler University LinzVerified email at fh-steyr.at
Fred D DavisTexas Tech UniversityVerified email at ttu.edu
Janée N. BurkhalterProfessor of Marketing, Saint Joseph's UniversityVerified email at sju.edu
Charnetta BrownRoosevelt UniversityVerified email at va.gov
Michelle CarterWashington State UniversityVerified email at wsu.edu
Humayun ZafarAssociate Professor of Information Security and AssuranceVerified email at kennesaw.edu
Allen S. LeeProfessor Emeritus of Information Systems, Virginia Commonwealth UniversityVerified email at alum.mit.edu
Hearrington, DougVerified email at edukateable.com
Tim MartinAssociate Professor of Psychology, Kennesaw State UniversityVerified email at kennesaw.edu
Terry W. Loe, Ph.DProfessor of Marketing & Sales, Kennesaw State UniversityVerified email at kennesaw.edu
Aberdeen Leila BordersProfessor, Kennesaw State UniversityVerified email at kennesaw.edu
Geoffrey HubonaAssociate Professor of MIS, Texas A&M International UniversityVerified email at tamiu.edu
Saurabh GuptaKennesaw State UnversityVerified email at kennesaw.edu
Sandra M. RichardsonUniversity of MemphisVerified email at memphis.edu