Press "Enter" to skip to content

Scholar

Research Opportunities: Domains

The following projects explore where tech, people, and big ideas come together. Whether you’re into cracking quantum problems, making AI more trustworthy, or figuring out…

People, Process & Technology: Cyber Security

People, Processes, and Technology Security Tactics There are various approaches that IT teams should consider when attempting to develop a tiered security environment: People Employees…

Detecting Security Gap: Hand-On or Hand-OFF

MITRE ATT&CK is gradually becoming the de facto tool for analysing and mapping attacker behaviour. In general, there are two methods for detecting security gaps. The…

Web resources: Creating a teaching portfolio

Creating a teaching portfolio The final teaching portfolio component requires you to compile and finalize your teaching portfolio, which you may then use in the…

Five Teaching Styles to Practice: Teaching Personality

Throughout the last century, traditional teaching methods have undergone significant changes; brought on by social, cultural and technological developments.  In the contemporary classroom, five distinct…