Lancia Raja is a first-year Masters student in Computer and Information Technology under the guidance of advisor Dr. Ida Ngambeki. Her broad research focus is data privacy, and she is currently working on understanding the intents and motivations behind decision making related to privacy online, and the state of data privacy and security and larger policy and consumer implications in digital agriculture. Lancia graduated with her Bachelors degree in CIT from Purdue in May 2020. During her undergraduate education, she was involved in undergraduate research in digital agriculture, held positions of leadership across various student organizations like Purdue Polytechnic Ambassadors and Purdue Tamil Sangam, and was an undergraduate TA and grader for undergraduate courses offered in the Polytechnic Institute. Currently in addition to working on projects, she is also the graduate TA for CNIT320 – Policy, Regulation and Globalization in IT.
Tianshuai “Quill” Guan, a second year graduate student and focused on Machine Learning and CyberSecurity.
Minglu is a second year master student in CNIT. My research interests are data visualization and machine learning.
Biliangyu Wu is a master student of Computer and Information Technology at Purdue University. His research interest is improving the efficiency and security in IT projects by identifying and analyzing cybersecurity issues in project management area.
Ida Ngambeki is an Assistant Professor of Computer and Information Technology at Purdue University. Dr. Ngambeki graduated from Smith College with a B.S. in Engineering and from Purdue University with a PhD in Engineering Education. Dr. Ngambeki’s key areas of research interest include: Cybersecure behavior, social engineering, cybersecurity Education, cybersecurity Policy, and cybersecurity workforce development. Dr. Ngambeki’s research investigates human factors in cybersecurity, how the affordances of information technologies affect individuals' learning and decision-making and the wider policy implications of those choices, how social and personality factors can be manipulated to compromise cybersecurity, the social and psychological factors influencing individuals' cybersecurity choices, how students learn secure programming, how individuals develop an interest in and make-decisions about their careers in computing and how individuals use information technology to engage in political participation.