Author of the publication

A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps.

, , , and . RIIT, page 61-62. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do You See What I See?: The Use of Visual Passwords for Authentication., , , , and . SIGITE, page 58-61. ACM, (2020)Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships.. SIGITE, page 156. ACM, (2018)A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps., , , and . RIIT, page 61-62. ACM, (2013)"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised.. RIIT, page 55. ACM, (2016)Fear might motivate secure password choices in the short term, but at what cost?, , and . HICSS, page 1-10. ScholarSpace, (2022)Cybersecurity Regrets: I've had a few.... Je Ne Regrette., , and . NSPW, page 1-20. ACM, (2022)Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices., and . SIGITE, page 117-122. ACM, (2018)Measuring the Human Factor in Information Security and Privacy., , and . HICSS, page 3676-3685. IEEE Computer Society, (2016)My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants., and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1318-1325. IEEE, (2019)Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological Factors., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1834-1840. IEEE, (2019)