Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meaningful assessment., , and . SIGITE, page 109-114. ACM, (2014)Creating a Multifarious Cyber Science Major., , , , , and . SIGCSE, page 1205-1211. ACM, (2021)Seeing the Whole Elephant - A Comprehensive Framework for Data Education., , , , and . SIGCSE (1), page 248-254. ACM, (2024)A Capstone Design Project for Teaching Cybersecurity to Non-technical Users., , , , , , , and . SIGITE, page 142-147. ACM, (2016)Information Technology as a Cyber Science., , , , and . SIGITE, page 33-37. ACM, (2017)Cyber Education: A Multi-Level, Multi-Discipline Approach., , , , and . SIGITE, page 43-47. ACM, (2015)Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum., , , and . ITiCSE, page 82-88. ACM, (2020)An honest man has nothing to fear: user perceptions on web-based information disclosure., and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 112-121. ACM, (2007)Using Group Knowledge for Multitarget Terrain-Based State Estimation., , and . DARS, page 117-126. Springer, (2004)Should IT2008 be revised?, , , , , and . SIGITE Conference, page 53-54. ACM, (2013)