Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Michael E. WhitmanProfessor of Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Albert SegarsUniversity of North Carolina at Chapel HillVerified email at unc.edu
- Andrew (Andy) Green, Ph.D.Assistant Professor of Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Herbert MattordProfessor of Cybersecurity and Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Alan CannonThe University of Texas at ArlingtonVerified email at uta.edu
- Monica AdyaDean & Professor, Rutgers University-Camden, School of BusinessVerified email at rutgers.edu
- Peter HoonakkerUniversity of Wisconsin-MadisonVerified email at wisc.edu
- Mike GallivanSchool of Public Policy, Georgia Institute of TechnologyVerified email at gatech.edu
- Mark GuzdialProfessor, Computer Science, Engineering Education Research, University of MichiganVerified email at umich.edu
- L. Lynn StallingsProfessor of Mathematics Education, Auburn University at MontgomeryVerified email at aum.edu
Follow
Amy Woszczynski
Professor of Information Systems, Kennesaw State University
Verified email at kennesaw.edu