Author of the publication

Convergence of Knowledge Management and E-Learning: The GetSmart Experience.

, , , , , , and . JCDL, page 135-146. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Marshall, Byron
add a person with the name Marshall, Byron
 

Other publications of authors with the same name

Cross-Jurisdictional Activity Networks to Support Criminal Investigations., , , , , , and . DG.O, Digital Government Research Center, (2004)Moving digital libraries into the student learning space: The GetSmart experience., , , and . ACM Journal of Educational Resources in Computing, 6 (1): 2 (2006)InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior., , , and . DATA BASE, 49 (SI): 49-66 (2018)Dimensional standard alignment in K-12 digital libraries: assessment of self-found vs. recommended curriculum., , and . JCDL, page 11-14. ACM, (2009)Personal Motivation Measures for Personal IT Security Behavior., , , and . AMCIS, Association for Information Systems, (2017)Extracting gene pathway relations using a hybrid grammar: the Arizona Relation Parser., , , and . Bioinformatics, 20 (18): 3370-3378 (2004)IT artifact bias: How exogenous predilections influence organizational information system paradigms., , and . Int J. Information Management, 34 (4): 427-436 (2014)Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research., , , , , , , , , and 1 other author(s). DG.O, volume 89 of ACM International Conference Proceeding Series, page 112-113. Digital Government Research Center, (2005)BorderSafe: cross-jurisdictional information sharing, analysis, and visualization., , , , , , , and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 241-242. Digital Government Research Center, (2005)Using importance flooding to identify interesting networks of criminal activity., , and . J. Assoc. Inf. Sci. Technol., 59 (13): 2099-2114 (2008)