Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Xihui "Paul" ZhangProfessor of Computer Information Systems, University of North AlabamaVerified email at una.edu
- Halbana TarmiziBemidji State UniversityVerified email at bemidjistate.edu
- Cherie NoteboomAssistant Professor, Dakota State UniversityVerified email at dsu.edu
- Maria ValeroAssistant Professor, Kennesaw State UniversityVerified email at kennesaw.edu
- Gert-Jan de VreedeInterim Dean & Professor, University of South FloridaVerified email at usf.edu
- Richard Halstead-NusslochProfessor Emeritus of Information Technology, Kennesaw State UniversityVerified email at kennesaw.edu
- Jack ZhengKennesaw State UniversityVerified email at kennesaw.edu
- Sweta SnehaProfessor of Information SystemsVerified email at kennesaw.edu
- Sheikh Iqbal AhamedMarquette University, USAVerified email at marquette.edu
- Liang ZhaoKennesaw State UniversityVerified email at kennesaw.edu
- Yi (Joy) LiKennesaw State UniversityVerified email at kennesaw.edu
- Mehruz KamalAssociate Professor of Information SystemsVerified email at brockport.edu
Follow
Chi Zhang
Professor of Information Technology, Kennesaw State University
Verified email at kennesaw.edu