Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying., , , and . CoRR, (2020)The Impact of Thinking-Aloud on Usability Inspection., , and . PACMHCI, 4 (EICS): 88:1-88:22 (2020)Co-Constructing a Community of Practice for Early-Career Computer Science Academics in the UK., , , , , , , , , and 1 other author(s). CEP, page 21-24. ACM, (2022)A Comparative Study of Teaching Forensics at a University Degree Level., , , , , , and . IMF, volume P-97 of LNI, page 116-127. GI, (2006)A UK Case Study on Cybersecurity Education and Accreditation., , , and . FIE, page 1-9. IEEE, (2019)Assessing the Value of Professional Body Accreditation of Computer Science Degree Programmes: A UK Case Study., , , and . ITiCSE, page 565. ACM, (2020)A National Mentoring and Buddying Pilot Scheme for UK Early Career CS Academics., , , , , and . ITiCSE (2), page 630. ACM, (2022)Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes., , , , and . FIE, page 1-9. IEEE, (2020)Digital Forensics to Intelligent Forensics., and . Future Internet, 6 (3): 584-596 (2014)Relating research and teaching: learning from experiences and beliefs., and . ITiCSE, page 75-79. ACM, (2009)