Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Professor Yuefeng LiQueensland university of technologyVerified email at qut.edu.au
Richi NayakProfessor, Queensland University of TechnologyVerified email at qut.edu.au
Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
Xujuan ZhouUniversity of Southern QueenslandVerified email at usq.edu.au
Huizhi LiangNewcastle UniversityVerified email at newcastle.ac.uk
Ahmad Abdel-HafezUniversity of Doha for Science and TechnologyVerified email at udst.edu.qa
Li-Tung WengPhD, Queensland University of TechnologyVerified email at intellihr.co
Touhid BhuiyanProfessor of Cyber Security, Washington University of Science and TechnologyVerified email at wust.edu
Peter BruzaProfessor of Information Systems, Queensland University of TechnologyVerified email at qut.edu.au
Abdullah AlgarniAssociate Professor, Institute of Public Administration, Saudi Arabia -previously with QUT AustraliaVerified email at ipa.edu.sa