Author of the publication

Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice.

, , and . CEP, page 9:1-9:4. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Different Types of Contributions to Knowledge (in CER): All Needed, But Not All Recognised., and . ACM Trans. Comput. Educ., 23 (1): 7:1-7:36 (March 2023)Experience Report: Thinkathon - Countering an "I Got It Working" Mentality with Pencil-and-Paper Exercises., , , , , , , and . ITiCSE, page 203-209. ACM, (2019)Questionnaires as a software evaluation tool., and . CHI, page 83-87. ACM, (1983)Certifai: A Toolkit for Building Trust in AI Systems., , , , , , , , , and 15 other author(s). IJCAI, page 5249-5251. ijcai.org, (2020)Demo.A Dialog About the Special Issues on Theory., , , , , , and . ACM Trans. Comput. Educ., 23 (1): 8:1-8:5 (March 2023)Relating Spatial Skills and Expression Evaluation., , and . UKICER, page 17-23. ACM, (2020)Research-led Active Learning Sessions in Cyber Security through Research Paper Reading., , and . CEP, page 33-36. ACM, (2023)Engaging Students in Threat Thinking with the Cyber Security Cinema., , and . CEP, page 13-16. ACM, (2023)Programming skills, visual layout design, and unjustifiably useful testing: Three reports in the psychology of programming.. PPIG, page 17. Psychology of Programming Interest Group, (1996)Maximising Dialogue in Lectures using Group Response Systems., , , and . CATE, page 421-426. ACTA Press, (2004)