{"id":21,"date":"2023-05-23T16:09:47","date_gmt":"2023-05-23T16:09:47","guid":{"rendered":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/?page_id=21"},"modified":"2023-11-07T15:46:00","modified_gmt":"2023-11-07T15:46:00","slug":"team","status":"publish","type":"page","link":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/team\/","title":{"rendered":"Meet the Team"},"content":{"rendered":"\n\n\n\n\n<p><strong>2022 &#8211; Current<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"391\" src=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/11\/Screen-Shot-2023-11-07-at-10.40.03-AM-1024x391.png\" alt=\"\" class=\"wp-image-139\" srcset=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/11\/Screen-Shot-2023-11-07-at-10.40.03-AM-1024x391.png 1024w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/11\/Screen-Shot-2023-11-07-at-10.40.03-AM-300x114.png 300w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/11\/Screen-Shot-2023-11-07-at-10.40.03-AM-768x293.png 768w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/11\/Screen-Shot-2023-11-07-at-10.40.03-AM.png 1436w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>2021 &#8211; 2022<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"388\" src=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/06\/TeamPicture_Oct2021-1024x388.jpeg\" alt=\"\" class=\"wp-image-109\" srcset=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/06\/TeamPicture_Oct2021-1024x388.jpeg 1024w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/06\/TeamPicture_Oct2021-300x114.jpeg 300w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/06\/TeamPicture_Oct2021-768x291.jpeg 768w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/06\/TeamPicture_Oct2021-1536x582.jpeg 1536w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/06\/TeamPicture_Oct2021.jpeg 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Principal Investigator<\/strong><br><a rel=\"noreferrer noopener\" href=\"https:\/\/florencemartin.wordpress.ncsu.edu\/about-me\/\" target=\"_blank\">Dr. Florence Martin, PhD.,<\/a>&nbsp;Educational Technology<\/p>\n\n\n\n<p><strong>Co-Principal Investigators<\/strong><br><a rel=\"noreferrer noopener\" href=\"https:\/\/cci.uncc.edu\/directory\/wang-weichao\" target=\"_blank\">Dr. Weichao Wang,&nbsp;PhD.,<\/a>&nbsp;Cybersecurity<br><a rel=\"noreferrer noopener\" href=\"https:\/\/reel.charlotte.edu\/directory\/erik-byker\" target=\"_blank\">Dr. Erik Byker, PhD.<\/a>&nbsp;,&nbsp;Elementary Education<\/p>\n\n\n\n<p><strong>Evaluator<\/strong><br>Dr. Lynn Ahlgrim-Delzell, PhD., Research Methodologist<\/p>\n\n\n\n<p><strong>Current Graduate Assistant<br><\/strong>Min Zhuang, Doctoral Student, Learning Design and Technology<\/p>\n\n\n\n<p><strong>Former Graduate Assistants<\/strong><br>Julie Bacak, Doctoral Student in Curriculum and Instruction<br>Jonathan Wagner, Masters Student in Cybersecurity<br>William McHenry, Masters Student in Learning, Design and Technology<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2022 &#8211; Current 2021 &#8211; 2022 Principal InvestigatorDr. Florence Martin, PhD.,&nbsp;Educational Technology Co-Principal InvestigatorsDr. Weichao Wang,&nbsp;PhD.,&nbsp;CybersecurityDr. Erik Byker, PhD.&nbsp;,&nbsp;Elementary Education EvaluatorDr. Lynn Ahlgrim-Delzell, PhD., Research Methodologist Current Graduate AssistantMin Zhuang, Doctoral Student, Learning Design and Technology Former Graduate AssistantsJulie Bacak, Doctoral Student in Curriculum and InstructionJonathan Wagner, Masters Student in CybersecurityWilliam McHenry, Masters Student in&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ncst_custom_author":"","ncst_show_custom_author":false,"ncst_dynamicHeaderBlockName":"ncst\/default-header","ncst_dynamicHeaderData":"{\"pageIntro\":\"Our team includes experts in educational technology, cybersecurity,  elementary education, and research methodology.\"}","ncst_content_audit_freq":"","ncst_content_audit_date":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":8,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/21\/revisions\/140"}],"wp:attachment":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}