Author of the publication

Building an Anti-phishing Game to Enhance Network Security Literacy Learning.

, , , , and . ICALT, page 121-123. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a Frame-Based Cyber Security Learning Game., , , and . MobiSec, volume 797 of Communications in Computer and Information Science, page 32-41. Springer, (2016)Finding trustworthy experts to help problem solving on the programming learning forum., and . Interact. Learn. Environ., 18 (1): 81-99 (2010)A new approach for constructing the concept map., , , , and . Comput. Educ., 49 (3): 691-707 (2007)Building a Personalized Music Emotion Prediction System., , , and . PCM, volume 4261 of Lecture Notes in Computer Science, page 730-739. Springer, (2006)Constructing SCORM compliant course based on High-Level Petri Nets., , , , and . Comput. Stand. Interfaces, 28 (3): 336-355 (2006)An Iterative, Collaborative Ontology Construction Scheme, , , , and . Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conference on, page 150-150. (2007)A rule-based CBR approach for expert finding and problem diagnosis., , , , , and . Expert Syst. Appl., 37 (3): 2427-2438 (2010)Building an Anti-phishing Game to Enhance Network Security Literacy Learning., , , , and . ICALT, page 121-123. IEEE Computer Society, (2012)Constructing Scorm Compliant Course Based on High Level Petri Nets., , , and . CELDA, page 204-216. IADIS, (2004)Design and Implementation of an Object Oriented Learning Activity System., , , and . J. Educ. Technol. Soc., 12 (3): 248-265 (2009)