Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A competency based approach to developing articulation agreements in computing., , and . SIGITE Conference, page 129-132. ACM, (2011)The Information Technology Model Curriculum., , , , , , and . J. Inf. Technol. Educ., (2006)Implementing a living-learning community in information technology., , and . SIGITE, page 153-158. ACM, (2014)Improving the Pipeline: Modules for an After-School Program for Preparing Information Assurance and Cyber Defense Professionals., , , and . SIGITE, page 183. ACM, (2017)Developing realistic capstone projects in conjunction with industry., , and . SIGITE Conference, page 27-32. ACM, (2007)Improving the Pipeline: A First Look at the Data., , , and . SIGITE, page 154. ACM, (2018)Perceptions, Effectiveness, and Impact of a Dual Enrollment Cybersecurity Course., , , and . SIGITE, page 304. ACM, (2020)Improving the Pipeline: After-School Program for Preparing Information Assurance and Cyber Defense Professionals., , , and . SIGITE, page 167. ACM, (2017)Improving the Pipeline: Lessons Learned., , , and . SIGITE, page 59. ACM, (2018)Using student professional development planning to inform program review., , , and . SIGITE Conference, page 71-74. ACM, (2012)