Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Sangjae Lee
Sejong university
Verified email at sejong.ac.kr
Cited by 6110
Business Information Systems
Business Analytics
Computer Information Systems
Security Management
Leo Vijayasarathy
Colorado State University
Verified email at colostate.edu
Cited by 5678
Computer Information Systems
Brian L. Dos Santos
University of Louisville
Verified email at louisville.edu
Cited by 4869
Information systems
MIS
Computer Information Systems
William N. Robinson
Georgia State University
Verified email at gsu.edu
Cited by 3390
Computer Information Systems
Peggy L Lane
University of Louisiana Monroe
Verified email at ulm.edu
Cited by 1386
computer information systems
MIS
expert systems
Sean L. Humpherys
West Texas A&M
Verified email at wtamu.edu
Cited by 1202
Deception detection
information systems
computer information systems
ranking
credibility assessment
Stephen Yerka
PhD Student, University of Tennessee
Verified email at utk.edu
Cited by 557
Archaeology
Anthropology
Spatial analysis
Geophysics
Computer Information Systems
Munir Tubagus
Institut Agama Islam Negeri (IAIN) Manado
Verified email at iain-manado.ac.id
Cited by 535
Education technology
Computer Information Systems
Vladan Jovanovic
Professor of Computer Sciences Georgia Southern University- retired 2019
Verified email at georgiasouthern.edu
Cited by 445
Computer Information Systems
Data Bases
Software Engineering
Femi Osasona
Independent researcher, Scottish Water
Verified email at scottishwater.co.uk
Cited by 411
Computer information systems
cybersecurity
security governance
process improvement
Data analytic
1 - 10
Privacy
Terms
Help
About Scholar
Search help