Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 245-256. Springer, (2013)Delivery of QTIv2 Question Types, , , , , , , and . (2007)A Study of Students' Conception of Problem Situations: Using Conceptualization in Scenario-Based Learning., , and . ICWL, volume 11007 of Lecture Notes in Computer Science, page 47-53. Springer, (2018)A Delivery Engine for QTI Assessments., , , , , and . Int. J. Emerg. Technol. Learn., 3 (S1): 71-76 (2008)Creating Structure from Disorder - Using Folksonomies to Create Semantic Metadata., , and . WEBIST (3), page 391-396. INSTICC Press, (2007)Transforming a Competency Model to Parameterised Questions in Assessment., , and . WEBIST (Selected Papers), volume 18 of Lecture Notes in Business Information Processing, page 390-403. Springer, (2008)A Mobile Toolkit for Placement Learning., , , , , , and . ICALT, page 92-96. IEEE Computer Society, (2008)Deriving E-Assessment from a Competency Model., , and . ICALT, page 327-329. IEEE Computer Society, (2008)Towards a Canonical View of Peer Assessment., , , , , , and . ICALT, page 793-797. IEEE Computer Society, (2007)A Framework for Pedagogical Feedback in the Motor Skill Domain., , and . ICALT, page 37-39. IEEE Computer Society, (2009)