- Dr. John David Homer
Abilene Christian University
Professor
School of Information Technology and Computing
Director, School of Information Technology & Computing
Mabee Business Building (MBB) 236
(325) 674-6603
jdh08a@acu.edu
Education
- PhD, Kansas State University, 2009.
Major: Computer Science - MS, Kansas State University, 2006.
Major: Computer Science
Publications
Conference Proceeding
- Prather, J. R., Homer, J. D., Denny, P., Becker, B., Marsden, J., & Powell, G. (2022, August). Scaffolding Task Planning Using Abstract Parsons Problems. World Conference on Computers in Education. Published.
- Prather, J., Pettit, R., McMurry, K., Peters, A., Homer, J. D., & Cohen, M. (2018, August 17). Metacognitive Difficulties Faced by Novice Programmers in Automated Assessment Tools. Published.
- Prather, J. R., Pettit, R. S., Holcomb, K. M., Peters, A. L., Homer, J. D., Simone, N. F., & Cohen, M. S. (2017, August 18). On Novices’ Interaction with Compiler Error Messages: A Human Factors Approach. Published. https://doi.org/https://doi.org/10.1145/3105726.3106169
- Pettit, R. S., & Homer, J. D. (2017). Do Enhanced Compiler Error Messages Help Students? Results Inconclusive. No, 465–470. https://doi.org/DOI: https://doi.org/10.1145/3017680.3017768
- Acosta, J., Padilla, E., & Homer, J. D. (2016, November). Augmenting Attack Graphs to Represent Data Link and Network Layer Vulnerabilities. Published.
- Pettit, R. S., Homer, J. D., Holcomb, K., Simone, N., & Mengel, S. (2015). Are Automated Assessment Tools Helpful in Programming Courses?. 20. https://doi.org/10.18260/p.23569
- Pettit, R. S., Homer, J. D., Gee, R., Mengel, S., & Starbuck, A. (2015). An Empirical Study of Iterative Improvement in Programming Assignments. Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 410–415. https://doi.org/http://dx.doi.org/10.1145/2676723.2677279
- Zhang, S., Ou, X., & Homer, J. (2011). Effective Network Vulnerability Assessment through Model Abstraction. Published.
- Zhang, S., Ou, X., Singhal, A., & Homer, J. D. (2011, July). An Empirical Study of a Vulnerability Metric Aggregation Method. Published.
- Homer, J., Varikuti, A., & Ou, X. (2008). Improving Attack Graph Visualization through Data Reduction and Attack Grouping. Published.
Journal Article
- Jessup, R. K., Busemeyer, J. R., Dimperio, E., Homer, J. D., & Phillips, A. (2022). Choice is a tricky thing: Integrating sophisticated choice models with learning processes to better account for complex choice behavior. Decision, 9(3), 221–249.
- Jessup, R. K., Homer, J. D., & Ritchie, L. E. (2020). Hurry up and decide: Empirical tests of the choice overload effect using cognitive process models. Decision, 7(2), 137–152. https://doi.org/http://dx.doi.org/10.1037/dec0000115
- Acosta, J., Padilla, E., Homer, J. D., & Ou, X. (2016). Risk Analysis with Execution-Based Model Generation. 5(1).
- Homer, J. D., Zhang, S., Ou, X., Schmidt, D., Du, Y., R. R., & Singhal, A. (2013). Aggregating Vulnerability Metrics in Enterprise Networks using Attack Graphs. 21(4), 561–597.
- Homer, J., & Ou, X. (2009). SAT-Solving Approaches to Context-Aware Enterprise Network Security Management. Published.
Technical Report
- Homer, J. D., Ou, X., & Schmidt, D. (2009). A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks.
Presentations
- Fridge, B. A., Homer, J. D., Wick, K. J., Jessup, R. K., Southwestern Psychological Association, "Dating games: How graceful are you at dating?," San Antonio, TX. (April 2021).
- Wick, K. (Author & Presenter), Jessup, R. (Author), Homer, J. D. (Author), Stevens, L. (Author & Presenter), Rodriguez, E. (Author & Presenter), Southwestern Psychological Association Annual Conference, "Marriage Games: A Game Theory Exploration of Marital Cooperation," SWPA, San Antonio, TX. (April 2021).
- Jessup, R. K., Phillips, A., Homer, J. D., Busemeyer, J. R., Society for Judgment and Decision Making, "Decision field theory with learning: Learning through experience to choose in an uncertain world," Society for Judgment and Decision Making, New Orleans, LA. (November 2018).
- Acosta, J. (Author & Presenter), Padilla, E. (Author), Homer, J. D., MILCOM2016, "Augmenting Attack Graphs to Represent Data Link and Network Layer Vulnerabilities," Baltimore, MD. (November 2016).
- Phillips, A. R., Jessup, R. K., Homer, J. D., "Choice is a tricky thing: Learning to choose in an uncertain world," Southwestern Psychological Association Conference, Wichita, Kansas. (April 2015).
- Phillips, A. R., Jessup, R. K., Homer, J. D., "Choice is a tricky thing: Learning to choose in an uncertain world," Abilene Christian University Undergraduate Research Festival, Abilene, Texas. (March 2015).
- Phillips, A. R., Jessup, R. K., Homer, J. D., "Choice is a tricky thing: Learning to choose in an uncertain world," College of Business, Abilene, Texas. (March 2015).
- P. (Author & Presenter), R. (Author), Mengel, S. (Author), Roger, G. (Author), Adam, S. (Author), SIGCSE Technnical Symposium, "An Empirical Study of Iterative Improvement in Programming Assignments," ACM SIGCSE, Kansas City, MO. (March 2015).
- Jessup, R. K., Ritchie, L. E., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," Society for Judgment and Decision Making, Long Beach, California. (November 2014).
- Ritchie, L. E., Jessup, R. K., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," Southwestern Psychological Association Conference, San Antonio, Texas. (April 2014).
- Ritchie, L. E., Jessup, R. K., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," College of Business, Abilene, Texas. (March 2014).
- Ritchie, L. E., Jessup, R. K., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," Abilene Christian University Undergraduate Research Festival, Abilene, Texas. (March 2014).
- Homer, J. D. (Author & Presenter), Towell, D. E. (Author), Reynolds, D. (Author), 2012 Association for Computer Educators in Texas Conference, "Testing Test-First First," Association for Computer Educators in Texas, Houston, TX. (November 2012).
- Homer, J. D. (Author & Presenter), Towell, D. (Author), Reynolds, D. (Author), Association for Computer Educators in Texas Conference, "Testing Test-First First," Association for Computer Educators in Texas, Sugarland, TX. (November 2012).
- Bosch, N. (Author & Presenter), Towell, D. E. (Author), Homer, J. D. (Author), 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering, "Characterization of CS1 Student Programming," Las Vegas, NV. (July 2012).
- Zhang, S. (Author & Presenter), Ou, X. (Author), Homer, J. D., Conference on Detection of Intrusions and Malware & Vulnerability Assessment, "Effective Network Vulnerability Assessment through Model Abstraction." (July 2011).
- Zhang, S. (Author & Presenter), Ou, X. (Author), Singhal, A. (Author), Homer, J. D., International Conference on Security and Management, "An Empirical Study of a Vulnerability Metric Aggregation Model," Las Vegas, NV. (July 2011).
- Homer, J. D. (Author & Presenter), 5th Midwest Security Workshop, "SAT-Solving Approaches to Context-Aware Enterprise Network Security Management," Chicago, IL. (April 2008).
Service
University
- Committee Member, Teacher Education Council. (August 2012 - Present).
- Committee Member, University Library Committee. (August 2013 - August 2016).
- Committee Member, Faculty Development Committee. (August 2009 - May 2012).
Professional
- Reviewer, Conference Paper, SIGCSE Technical Symposium. (September 2016).
- Reviewer, Journal Article, IEEE Transactions on Parallel and Distributed Systems. (August 2015 - June 2016).
- Editor, Associate Editor, Central European Journal of Computer Science. (November 2010 - January 2015).
- Reviewer, Journal Article, IEEE Transactions on Dependable and Secure Computing. (August 2013 - November 2014).
- Reviewer, Conference Paper, International Conference on Security and Management. (March 2014 - April 2014).
- Reviewer, Conference Paper, International Conference on Security and Management. (March 2013 - April 2013).
- Reviewer for computer science program at Texas Wesleyan University, Texas Wesleyan University, Dallas, TX. (November 2012).
Public
Teaching
Spring 2025
- ITC 250 - History of Computing
- CS 130 - Programming II: Data Struct
- BUSA 423 - Social Enterprise Consulting
Fall 2024
- IT 263 - Data Management Visualization
- IT 263 - Data Management Visualization
Spring 2024
- CS 130 - Programming II: Data Struct
- CS 365 - Theory of Computation
Fall 2023
- IT 263 - Data Management Visualization
- IT 263 - Data Management Visualization
- CS 130 - Programming II: Data Struct
Summer 2023
- ITC 250 - History of Computing
- CS 340 - ST: Principles of Cog. Science
Spring 2023
- IT 263 - Data Management Visualization
- ITC 250 - History of Computing
- CS 467 - Intro. to Artificial Intelgnce
- CS 130 - Programming II: Data Struct
Spring 2022
- ITC 250 - History of Computing
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
- CS 440 - ST: Pattern Recognition
- CS 365 - Theory of Computation
Summer 2021
- ITC 399 - ITC Research
Spring 2021
- ITC 250 - History of Computing
- CS 467 - Intro. to Artificial Intelgnce
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
Spring 2020
- ITC 250 - History of Computing
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
- CS 365 - Theory of Computation
Fall 2019
- CS 332 - Design & Analysis of Algorithm
- ITC 399 - ITC Research
Spring 2019
- ITC 250 - History of Computing
- CS 467 - Intro. to Artificial Intelgnce
- ITC 399 - ITC Research
- CS 130 - Programming II: Data Struct
- CS 365 - Theory of Computation
Fall 2018
- CS 332 - Design & Analysis of Algorithm
- CS 120 - Programming I
Spring 2018
- CS 130 - Programming II: Data Struct
- CS 365 - Theory of Computation
Fall 2017
- CS 332 - Design & Analysis of Algorithm
- CS 120 - Programming I
- CS 120 - Programming I
Summer 2017
- CS 440 - Sp Top:History of Computer Sci
- ITC 440 - Sp. Top: Security & Usability
Spring 2017
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
Fall 2016
- CS 332 - Design & Analysis of Algorithm
- CS 400 - GS: CS Senior Seminar
- CS 120 - Programming I
- CS 120 - Programming I
Spring 2016
- CS 130 - Programming II: Data Struct
- CS 365 - Theory of Computation
Fall 2015
- CS 332 - Design & Analysis of Algorithm
- HON 407 - HCol: Existence of God
- HON 417 - HCol: Existence of God
- CS 120 - Programming I
- CS 120 - Programming I
- CS 130 - Programming II: Data Struct
Spring 2015
- HON 405 - HCol:Program Zombie Apocalypse
- HON 415 - HCol:Program Zombie Apocalypse
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
- CS 365 - Theory of Computation
Fall 2014
- CS 355 - Compiler Construction
- CS 332 - Design & Analysis of Algorithm
- CS 120 - Programming I
- CS 120 - Programming I
Spring 2014
- HON 402 - Honors Colloquium
- HON 412 - Honors Colloquium
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
- CS 365 - Theory of Computation
Fall 2013
- CS 332 - Design & Analysis of Algorithm
- CS 120 - Programming I
- CS 130 - Programming II: Data Struct
- CS 495 - Senior Seminar
Summer 2013
- CS 140 - Sp. Top:
Spring 2013
- HON 401 - Honors Colloquium
- HON 411 - Honors Colloquium
- CS 301 - Language Lab
- CS 352 - Programming Languages
- CS 365 - Theory of Computation
Fall 2012
- CS 332 - Design & Analysis of Algorithm
- HON 401 - Honors Colloquium
- HON 411 - Honors Colloquium
- CS 120 - Programming I
- CS 130 - Programming II: Data Struct
Spring 2012
- CS 120 - Programming I
- CS 130 - Programming II: Data Struct
Fall 2011
- CS 332 - Design & Analysis of Algorithm
- CS 120 - Programming I
- CS 130 - Programming II: Data Struct
Summer 2011
- IT 620 - Info Assurance and Control
Spring 2011
- CS 120 - Programming I
- CS 130 - Programming II: Data Struct
- CS 352 - Programming Languages
Fall 2010
- IT 310 - Intro Computer & Info Security
- CS 120 - Programming I
- CS 374 - Software Engineering
Summer 2010
- IT 100 - GS:
Spring 2010
- CS 495 - Comp Science Senior Seminar
- CS 120 - Programming I
- IT 340 - Sp Top:Intro Comp & Info Sec
Fall 2009
- CS 120 - Programming I
- CS 120 - Programming I
- IT 640 - Sp Top:Info.Assur.& Control