1. Dr. John David Homer
    Abilene Christian University
    Professor
    School of Information Technology and Computing
    Director, School of Information Technology & Computing
    Mabee Business Building (MBB) 236
    (325) 674-6603
    jdh08a@acu.edu

Education

  1. PhD, Kansas State University, 2009.
    Major: Computer Science
  2. MS, Kansas State University, 2006.
    Major: Computer Science

Publications

  • Conference Proceeding

    1. Prather, J. R., Homer, J. D., Denny, P., Becker, B., Marsden, J., & Powell, G. (2022, August). Scaffolding Task Planning Using Abstract Parsons Problems. World Conference on Computers in Education. Published.
    2. Prather, J., Pettit, R., McMurry, K., Peters, A., Homer, J. D., & Cohen, M. (2018, August 17). Metacognitive Difficulties Faced by Novice Programmers in Automated Assessment Tools. Published.
    3. Prather, J. R., Pettit, R. S., Holcomb, K. M., Peters, A. L., Homer, J. D., Simone, N. F., & Cohen, M. S. (2017, August 18). On Novices’ Interaction with Compiler Error Messages: A Human Factors Approach. Published. https://doi.org/https://doi.org/10.1145/3105726.3106169
    4. Pettit, R. S., & Homer, J. D. (2017). Do Enhanced Compiler Error Messages Help Students? Results Inconclusive. No, 465–470. https://doi.org/DOI: https://doi.org/10.1145/3017680.3017768
    5. Acosta, J., Padilla, E., & Homer, J. D. (2016, November). Augmenting Attack Graphs to Represent Data Link and Network Layer Vulnerabilities. Published.
    6. Pettit, R. S., Homer, J. D., Holcomb, K., Simone, N., & Mengel, S. (2015). Are Automated Assessment Tools Helpful in Programming Courses?. 20. https://doi.org/10.18260/p.23569
    7. Pettit, R. S., Homer, J. D., Gee, R., Mengel, S., & Starbuck, A. (2015). An Empirical Study of Iterative Improvement in Programming Assignments. Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 410–415. https://doi.org/http://dx.doi.org/10.1145/2676723.2677279
    8. Zhang, S., Ou, X., & Homer, J. (2011). Effective Network Vulnerability Assessment through Model Abstraction. Published.
    9. Zhang, S., Ou, X., Singhal, A., & Homer, J. D. (2011, July). An Empirical Study of a Vulnerability Metric Aggregation Method. Published.
    10. Homer, J., Varikuti, A., & Ou, X. (2008). Improving Attack Graph Visualization through Data Reduction and Attack Grouping. Published.
  • Journal Article

    1. Jessup, R. K., Busemeyer, J. R., Dimperio, E., Homer, J. D., & Phillips, A. (2022). Choice is a tricky thing: Integrating sophisticated choice models with learning processes to better account for complex choice behavior. Decision, 9(3), 221–249.
    2. Jessup, R. K., Homer, J. D., & Ritchie, L. E. (2020). Hurry up and decide: Empirical tests of the choice overload effect using cognitive process models. Decision, 7(2), 137–152. https://doi.org/http://dx.doi.org/10.1037/dec0000115
    3. Acosta, J., Padilla, E., Homer, J. D., & Ou, X. (2016). Risk Analysis with Execution-Based Model Generation. 5(1).
    4. Homer, J. D., Zhang, S., Ou, X., Schmidt, D., Du, Y., R. R., & Singhal, A. (2013). Aggregating Vulnerability Metrics in Enterprise Networks using Attack Graphs. 21(4), 561–597.
    5. Homer, J., & Ou, X. (2009). SAT-Solving Approaches to Context-Aware Enterprise Network Security Management. Published.
  • Technical Report

    1. Homer, J. D., Ou, X., & Schmidt, D. (2009). A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks.

Presentations

  1. Fridge, B. A., Homer, J. D., Wick, K. J., Jessup, R. K., Southwestern Psychological Association, "Dating games: How graceful are you at dating?," San Antonio, TX. (April 2021).
  2. Wick, K. (Author & Presenter), Jessup, R. (Author), Homer, J. D. (Author), Stevens, L. (Author & Presenter), Rodriguez, E. (Author & Presenter), Southwestern Psychological Association Annual Conference, "Marriage Games: A Game Theory Exploration of Marital Cooperation," SWPA, San Antonio, TX. (April 2021).
  3. Jessup, R. K., Phillips, A., Homer, J. D., Busemeyer, J. R., Society for Judgment and Decision Making, "Decision field theory with learning: Learning through experience to choose in an uncertain world," Society for Judgment and Decision Making, New Orleans, LA. (November 2018).
  4. Acosta, J. (Author & Presenter), Padilla, E. (Author), Homer, J. D., MILCOM2016, "Augmenting Attack Graphs to Represent Data Link and Network Layer Vulnerabilities," Baltimore, MD. (November 2016).
  5. Phillips, A. R., Jessup, R. K., Homer, J. D., "Choice is a tricky thing: Learning to choose in an uncertain world," Southwestern Psychological Association Conference, Wichita, Kansas. (April 2015).
  6. Phillips, A. R., Jessup, R. K., Homer, J. D., "Choice is a tricky thing: Learning to choose in an uncertain world," Abilene Christian University Undergraduate Research Festival, Abilene, Texas. (March 2015).
  7. Phillips, A. R., Jessup, R. K., Homer, J. D., "Choice is a tricky thing: Learning to choose in an uncertain world," College of Business, Abilene, Texas. (March 2015).
  8. P. (Author & Presenter), R. (Author), Mengel, S. (Author), Roger, G. (Author), Adam, S. (Author), SIGCSE Technnical Symposium, "An Empirical Study of Iterative Improvement in Programming Assignments," ACM SIGCSE, Kansas City, MO. (March 2015).
  9. Jessup, R. K., Ritchie, L. E., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," Society for Judgment and Decision Making, Long Beach, California. (November 2014).
  10. Ritchie, L. E., Jessup, R. K., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," Southwestern Psychological Association Conference, San Antonio, Texas. (April 2014).
  11. Ritchie, L. E., Jessup, R. K., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," College of Business, Abilene, Texas. (March 2014).
  12. Ritchie, L. E., Jessup, R. K., Homer, J. D., "Can there be too much choice? Empirical explorations of theoretical predictions," Abilene Christian University Undergraduate Research Festival, Abilene, Texas. (March 2014).
  13. Homer, J. D. (Author & Presenter), Towell, D. E. (Author), Reynolds, D. (Author), 2012 Association for Computer Educators in Texas Conference, "Testing Test-First First," Association for Computer Educators in Texas, Houston, TX. (November 2012).
  14. Homer, J. D. (Author & Presenter), Towell, D. (Author), Reynolds, D. (Author), Association for Computer Educators in Texas Conference, "Testing Test-First First," Association for Computer Educators in Texas, Sugarland, TX. (November 2012).
  15. Bosch, N. (Author & Presenter), Towell, D. E. (Author), Homer, J. D. (Author), 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering, "Characterization of CS1 Student Programming," Las Vegas, NV. (July 2012).
  16. Zhang, S. (Author & Presenter), Ou, X. (Author), Homer, J. D., Conference on Detection of Intrusions and Malware & Vulnerability Assessment, "Effective Network Vulnerability Assessment through Model Abstraction." (July 2011).
  17. Zhang, S. (Author & Presenter), Ou, X. (Author), Singhal, A. (Author), Homer, J. D., International Conference on Security and Management, "An Empirical Study of a Vulnerability Metric Aggregation Model," Las Vegas, NV. (July 2011).
  18. Homer, J. D. (Author & Presenter), 5th Midwest Security Workshop, "SAT-Solving Approaches to Context-Aware Enterprise Network Security Management," Chicago, IL. (April 2008).

Service

  • University

    1. Committee Member, Teacher Education Council. (August 2012 - Present).
    2. Committee Member, University Library Committee. (August 2013 - August 2016).
    3. Committee Member, Faculty Development Committee. (August 2009 - May 2012).

Professional

  1. Reviewer, Conference Paper, SIGCSE Technical Symposium. (September 2016).
  2. Reviewer, Journal Article, IEEE Transactions on Parallel and Distributed Systems. (August 2015 - June 2016).
  3. Editor, Associate Editor, Central European Journal of Computer Science. (November 2010 - January 2015).
  4. Reviewer, Journal Article, IEEE Transactions on Dependable and Secure Computing. (August 2013 - November 2014).
  5. Reviewer, Conference Paper, International Conference on Security and Management. (March 2014 - April 2014).
  6. Reviewer, Conference Paper, International Conference on Security and Management. (March 2013 - April 2013).
  7. Reviewer for computer science program at Texas Wesleyan University, Texas Wesleyan University, Dallas, TX. (November 2012).

Public

Teaching

  • Spring 2025

    1. ITC 250 - History of Computing
    2. CS 130 - Programming II: Data Struct
    3. BUSA 423 - Social Enterprise Consulting
  • Fall 2024

    1. IT 263 - Data Management Visualization
    2. IT 263 - Data Management Visualization
  • Spring 2024

    1. CS 130 - Programming II: Data Struct
    2. CS 365 - Theory of Computation
  • Fall 2023

    1. IT 263 - Data Management Visualization
    2. IT 263 - Data Management Visualization
    3. CS 130 - Programming II: Data Struct
  • Summer 2023

    1. ITC 250 - History of Computing
    2. CS 340 - ST: Principles of Cog. Science
  • Spring 2023

    1. IT 263 - Data Management Visualization
    2. ITC 250 - History of Computing
    3. CS 467 - Intro. to Artificial Intelgnce
    4. CS 130 - Programming II: Data Struct
  • Spring 2022

    1. ITC 250 - History of Computing
    2. CS 130 - Programming II: Data Struct
    3. CS 352 - Programming Languages
    4. CS 440 - ST: Pattern Recognition
    5. CS 365 - Theory of Computation
  • Summer 2021

    1. ITC 399 - ITC Research
  • Spring 2021

    1. ITC 250 - History of Computing
    2. CS 467 - Intro. to Artificial Intelgnce
    3. CS 130 - Programming II: Data Struct
    4. CS 352 - Programming Languages
  • Spring 2020

    1. ITC 250 - History of Computing
    2. CS 130 - Programming II: Data Struct
    3. CS 352 - Programming Languages
    4. CS 365 - Theory of Computation
  • Fall 2019

    1. CS 332 - Design & Analysis of Algorithm
    2. ITC 399 - ITC Research
  • Spring 2019

    1. ITC 250 - History of Computing
    2. CS 467 - Intro. to Artificial Intelgnce
    3. ITC 399 - ITC Research
    4. CS 130 - Programming II: Data Struct
    5. CS 365 - Theory of Computation
  • Fall 2018

    1. CS 332 - Design & Analysis of Algorithm
    2. CS 120 - Programming I
  • Spring 2018

    1. CS 130 - Programming II: Data Struct
    2. CS 365 - Theory of Computation
  • Fall 2017

    1. CS 332 - Design & Analysis of Algorithm
    2. CS 120 - Programming I
    3. CS 120 - Programming I
  • Summer 2017

    1. CS 440 - Sp Top:History of Computer Sci
    2. ITC 440 - Sp. Top: Security & Usability
  • Spring 2017

    1. CS 130 - Programming II: Data Struct
    2. CS 352 - Programming Languages
  • Fall 2016

    1. CS 332 - Design & Analysis of Algorithm
    2. CS 400 - GS: CS Senior Seminar
    3. CS 120 - Programming I
    4. CS 120 - Programming I
  • Spring 2016

    1. CS 130 - Programming II: Data Struct
    2. CS 365 - Theory of Computation
  • Fall 2015

    1. CS 332 - Design & Analysis of Algorithm
    2. HON 407 - HCol: Existence of God
    3. HON 417 - HCol: Existence of God
    4. CS 120 - Programming I
    5. CS 120 - Programming I
    6. CS 130 - Programming II: Data Struct
  • Spring 2015

    1. HON 405 - HCol:Program Zombie Apocalypse
    2. HON 415 - HCol:Program Zombie Apocalypse
    3. CS 130 - Programming II: Data Struct
    4. CS 352 - Programming Languages
    5. CS 365 - Theory of Computation
  • Fall 2014

    1. CS 355 - Compiler Construction
    2. CS 332 - Design & Analysis of Algorithm
    3. CS 120 - Programming I
    4. CS 120 - Programming I
  • Spring 2014

    1. HON 402 - Honors Colloquium
    2. HON 412 - Honors Colloquium
    3. CS 130 - Programming II: Data Struct
    4. CS 352 - Programming Languages
    5. CS 365 - Theory of Computation
  • Fall 2013

    1. CS 332 - Design & Analysis of Algorithm
    2. CS 120 - Programming I
    3. CS 130 - Programming II: Data Struct
    4. CS 495 - Senior Seminar
  • Summer 2013

    1. CS 140 - Sp. Top:
  • Spring 2013

    1. HON 401 - Honors Colloquium
    2. HON 411 - Honors Colloquium
    3. CS 301 - Language Lab
    4. CS 352 - Programming Languages
    5. CS 365 - Theory of Computation
  • Fall 2012

    1. CS 332 - Design & Analysis of Algorithm
    2. HON 401 - Honors Colloquium
    3. HON 411 - Honors Colloquium
    4. CS 120 - Programming I
    5. CS 130 - Programming II: Data Struct
  • Spring 2012

    1. CS 120 - Programming I
    2. CS 130 - Programming II: Data Struct
  • Fall 2011

    1. CS 332 - Design & Analysis of Algorithm
    2. CS 120 - Programming I
    3. CS 130 - Programming II: Data Struct
  • Summer 2011

    1. IT 620 - Info Assurance and Control
  • Spring 2011

    1. CS 120 - Programming I
    2. CS 130 - Programming II: Data Struct
    3. CS 352 - Programming Languages
  • Fall 2010

    1. IT 310 - Intro Computer & Info Security
    2. CS 120 - Programming I
    3. CS 374 - Software Engineering
  • Summer 2010

    1. IT 100 - GS:
  • Spring 2010

    1. CS 495 - Comp Science Senior Seminar
    2. CS 120 - Programming I
    3. IT 340 - Sp Top:Intro Comp & Info Sec
  • Fall 2009

    1. CS 120 - Programming I
    2. CS 120 - Programming I
    3. IT 640 - Sp Top:Info.Assur.& Control